[Forgot Password]
Login  Register Subscribe

30479

 
 

423868

 
 

250363

 
 

909

 
 

196124

 
 

282

 
 
Paid content will be excluded from the download.

Filter
Matches : 30475 Download | Alert*

Hides the Manage item on the File Explorer context menu Removes the Manage item from the File Explorer context menu. This context menu appears when you right-click File Explorer or My Computer. The Manage item opens Computer Management (Compmgmt.msc), a console tool that includes many of the primary Windows 2000 administrative tools, such as Event Viewer, Device Manager, and Disk Management. Y ...

Maximum allowed Recycle Bin size Limits the percentage of a volume's disk space that can be used to store deleted files. If you enable this setting, the user has a maximum amount of disk space that may be used for the Recycle Bin on their workstation. If you disable or do not configure this setting, users can change the total amount of disk space used by the Recycle Bin. Note: This setti ...

Turn off Preview Pane Hides the Preview Pane in File Explorer. If you enable this policy setting, the Preview Pane in File Explorer is hidden and cannot be turned on by the user. If you disable, or do not configure this setting, the Preview Pane is hidden by default and can be displayed by the user.

Configure disk quota policy processing This policy setting determines when disk quota policies are updated. This policy setting affects all policies that use the disk quota component of Group Policy, such as those in Computer Configuration\Administrative Templates\System\Disk Quotas. This policy setting overrides customized settings that the program implementing the disk quota policy set wh ...

Audit Policy: Object Access: Detailed File Share This policy setting allows you to audit attempts to access files and folders on a shared folder. The Detailed File Share setting logs an event every time a file or folder is accessed, whereas the File Share setting only records one event for any connection established between a client and file share. Detailed File Share audit events include detail ...

Application Configuration This setting helps prevent vulnerabilities in software from being successfully exploited for specific applications. You can use this setting to help reduce the potential for attacks on an application. If you enable this setting for a application, then the configured mitigations for the application are applied when the application is run. If you disable this setting ...

Default Action and Mitigation Settings This setting allows you to configure the default action after detection and advanced ROP mitigation settings. If you enable this setting, you can configure the default action to be taken once an exploit has been detected. If you disable or do not configure this setting, you cannot configure the default action to be taken once an exploit has been detect ...

Default Protections for Internet Explorer This setting allows you to apply the recommended EMET protections to Internet Explorer. If you enable this setting, the recommended EMET protections are applied to Internet Explorer. If you disable this setting, the recommended EMET protections are not applied to Internet Explorer.

Default Protections for Internet Explorer This setting allows you to apply the recommended EMET protections to Internet Explorer. If you enable this setting, the recommended EMET protections are applied to Internet Explorer. If you disable this setting, the recommended EMET protections are not applied to Internet Explorer.

Default Protections for Popular Software This setting allows you to apply the suggested EMET protections to other popular software (such as iTunes). If you enable this setting, the suggested EMET protections are applied to the other popular software. If you disable this setting, the suggested EMET protections are not applied to the other popular software.


Pages:      Start    2409    2410    2411    2412    2413    2414    2415    2416    2417    2418    2419    2420    2421    2422    ..   3047

© SecPod Technologies