[Forgot Password]
Login  Register Subscribe

30430

 
 

423868

 
 

247768

 
 

909

 
 

194555

 
 

282

 
 
Paid content will be excluded from the download.

Filter
Matches : 30426 Download | Alert*

Configure IP security policy processing This policy setting determines when IP security policies are updated. This policy setting affects all policies that use the IP security component of Group Policy, such as policies in Computer Configuration\Windows Settings\Security Settings\IP Security Policies on Local Machine. This policy setting overrides customized settings that the program implem ...

Log on as a service This policy setting allows accounts to launch network services or to register a process as a service running on the system. This user right should be restricted on any computer in a high security environment, but because many applications may require this privilege, it should be carefully evaluated and tested before configuring it in an enterprise environment. On Windows Vista ...

Configure user Group Policy loopback processing mode This policy setting directs the system to apply the set of Group Policy objects for the computer to any user who logs on to a computer affected by this setting. It is intended for special-use computers, such as those in public places, laboratories, and classrooms, where you must modify the user setting based on the computer that is being used. ...

Configure registry policy processing This policy setting determines when registry policies are updated. This policy setting affects all policies in the Administrative Templates folder and any other policies that store values in the registry. It overrides customized settings that the program implementing a registry policy set when it was installed. If you enable this policy setting, you can ...

Configure Automatic Updates This policy setting specifies whether computers in your environment will receive security updates from Windows Update or WSUS. If you configure this policy setting to Enabled, the operating system will recognize when a network connection is available and then use the network connection to search Windows Update or your designated intranet site for updates that apply to ...

Specify the System Hibernate Timeout (On Battery) Specifies the period of inactivity before Windows transitions the system to hibernate. If you enable this policy setting, you must provide a value, in seconds, indicating how much idle time should elapse before Windows transitions to hibernate. If you disable this policy setting or do not configure it, users can see and change this setting.

Set roaming profile path for all users logging onto this computer Specifies whether Microsoft Windows should use the specified network path as the roaming user profile path for all users logging onto this computer. To use this setting, type the path to the network share in the form \\Computername\Sharename\. It is recommended to add %USERNAME% to the path to give each user an individual profile ...

Detect application install failures This policy setting configures the Program Compatibility Assistant (PCA) to diagnose failures with application installations. If you enable this policy setting, the PCA is configured to detect failures in the execution of application installers through heuristics. When potential failures are detected, the PCA will provide the user with an option to restart th ...

Disable Active Desktop Disables Active Desktop and prevents users from enabling it. This setting prevents users from trying to enable or disable Active Desktop while a policy controls it. If you disable this setting or do not configure it, Active Desktop is disabled by default, but users can enable it. Note: If both the 'Enable Active Desktop' setting and the 'Disable Active Desktop' set ...

Remove My Documents icon on the desktop Removes most occurrences of the My Documents icon. This setting removes the My Documents icon from the desktop, from Windows Explorer, from programs that use the Windows Explorer windows, and from the standard Open dialog box. This setting does not prevent the user from using other methods to gain access to the contents of the My Documents folder. ...


Pages:      Start    2442    2443    2444    2445    2446    2447    2448    2449    2450    2451    2452    2453    2454    2455    ..   3042

© SecPod Technologies