[Forgot Password]
Login  Register Subscribe

30389

 
 

423868

 
 

247085

 
 

909

 
 

194218

 
 

282

 
 
Paid content will be excluded from the download.

Filter
Matches : 30385 Download | Alert*

Configure security policy processing This policy setting determines when security policies are updated. This policy setting affects all policies that use the security component of Group Policy, such as those in Windows Settings\Security Settings. This policy setting overrides customized settings that the program implementing the security policy set when it was installed. If you enable th ...

Specify sites covered by the GC Locator DNS SRV Records This policy setting specifies the sites for which the global catalogs (GC) should register site-specific GC locator DNS SRV resource records. These records are registered in addition to the site-specific SRV records registered for the site where the GC resides, and records registered by a GC configured to register GC Locator DNS SRV records ...

Do not track Shell shortcuts during roaming This policy setting determines whether Windows traces shortcuts back to their sources when it cannot find the target on the user's system. Shortcut files typically include an absolute path to the original target file as well as the relative path to the current target file. When the system cannot find the file in the current target path, then, by defa ...

Remove Shared Documents from My Computer This policy setting allows you to remove the Shared Documents folder from My Computer. When a Windows client is in a workgroup, a Shared Documents icon appears in the File Explorer Web view under 'Other Places' and also under 'Files Stored on This Computer' in My Computer. Using this policy setting, you can choose not to have these items displayed. I ...

Do not request alternate credentials Prevents users from submitting alternate logon credentials to install a program. This setting suppresses the 'Install Program As Other User' dialog box for local and network installations. This dialog box, which prompts the current user for the user name and password of an administrator, appears when users who are not administrators try to install programs ...

Turn off shell protocol protected mode This policy setting allows you to configure the amount of functionality that the shell protocol can have. When using the full functionality of this protocol, applications can open folders and launch files. The protected mode reduces the functionality of this protocol allowing applications to only open a limited set of folders. Applications are not able to op ...

Hide previous versions list for remote files This policy setting lets you hide the list of previous versions of files that are on file shares. The previous versions come from the on-disk restore points on the file share. If you enable this policy setting, users cannot list or restore previous versions of files on file shares. If you disable this policy setting, users can list and restore pr ...

Audit Policy: Object Access: File Share This subcategory reports when a file share is accessed. By itself, this policy setting will not cause auditing of any events. It determines whether to audit the event of a user who accesses a file share object that has a specified system access control list (SACL), effectively enabling auditing to take place. A SACL is comprised of access control entries (A ...

The required permissions for the directory %SystemRoot%\System32\dllcache should be assigned.

Do not process the run once list This policy setting ignores customized run-once lists. You can create a customized list of additional programs and documents that are started automatically the next time the system starts (but not thereafter). These programs are added to the standard list of programs and services that the system starts. If you enable this policy setting, the system ignores t ...


Pages:      Start    2391    2392    2393    2394    2395    2396    2397    2398    2399    2400    2401    2402    2403    2404    ..   3038

© SecPod Technologies