# How to create a customized IPSec policy # Open the IP Security Policy Management console. # Select IP Security Policies. # Right-click the security policy which you want to customize and then click Properties from the shortcut menu. # When the Properties dialog box of the security policy opens, click the Rules tab. # Find the rule which you want to change, and then click the Edit button. # Click the Filter Action tab. # Proceed to customize the filter action. # Click the Security Methods tab. # If you want to create a new security method, click Add. # If you want to remove an existing security method, click Remove. # If you want to change an existing security method, click Edit. # To add a security method, click Custom, and then click Settings. # The Custom Security Method Settings dialog box opens. # To provide data integrity for the IP header and payload, enable the Data and address integrity without encryption (AH) checkbox. Select either the MD5 option or the SHA1 option as the Integrity algorithm. # To provide data integrity and data confidentiality for the IP header and payload, enable the Data integrity and encryption (ESP) checkbox. Select either the MD5 option or the SHA1 option as the Integrity algorithm if you do not have the AH authentication protocol enabled. If you do have the authentication protocol enabled, click the None option. Select either the None option, DES option, or the 3DES option as the Encryption algorithm. # Info found @ http://www.tech-faq.com/configuring-and-managing-ipsec.shtml
Password Replication Policy
Group Policy Object Editor
Login as a administrator. open group policy and configure possword policy.
password replication policy
The law that specifically deals with encryption policy in the United States is the Export Administration Act (EAA) of 1979. This law regulates the export of encryption software and products from the US, imposing certain requirements and restrictions on their exportation. However, it is worth noting that the EAA expired in 2001 and has not been reauthorized, so its provisions are currently not in effect.
Kerberos Policy: first sentence on page162
secedit /configure /cfg %windir%\repair\secsetup.inf /db secsetup.sdb /verbose
Enforce Password History
Implementation is the realization of an application, or execution of a plan, idea, model, design, specification, standard, algorithm, or policy.
IPSec is a set of IP extensions that provide security services, such as encryption,authentication, and data integrity. IPSec is typically used with a VPN.
Kerberos Policy. This is found under: +Computer Configuration +Windows Settings +Security Settings +Account Policies +Kerberos Policies
The Shutterfly privacy policy outlines how user data and personal information are protected, including measures such as encryption, secure storage, and limited access to data.