Windows Server 2003

  1. Allows programs to execute as a user that does not have Administrator or Power User access rights, but can still access resouces ...
  2. Allows programs to execute with only access to resources granted to open well-known groups, blocking access Administrator ...
  3. Allows programs to open data files in specified directories as if they were in the current directory. APPEND drive:]path[;. ...
  4. Allows remote administration of this computer using administrative tools such as the Microsoft Management Console (MMC) and ...
  5. Allows Terminal Services administrators to install and configure programs remotely. By default, system administrators can ...
  6. Allows the adapter to compute the TCP or UDP checksum of outgoing packets. This improves TCP and UDP transmit performance. ...
  7. Allows the server to be remotely queried by administrators in order to determine the ports that certain services are listening ...
  8. Allows this computer to receive Remote Desktop requests. To do this, Windows Firewall opens TCP port 3389. If you enable ...
  9. Allows this computer to receive unsolicited Plug and Play messages sent by network devices, such as routers with built-in ...
  10. Allows unsolicited incoming messages from specified systems that authenticate using the IPSec transport. If you enable this ...
  11. Allows User based policy processing, Roaming User Profiles and User Object logon scripts for cross forest interactive logons. ...
  12. Allows users to connect interactively to a remote computer. Remote Desktop, Fast User Switching, Remote Assistance, and Terminal ...
  13. Allows users to install programs from removable media, such as floppy disks and CD-ROMs, during privileged installations. ...
  14. Allows users to search for installation files during privileged installations. This setting enables the Browse button in ...
  15. Allows users to upgrade programs during privileged installations. This setting permits all users to install patches, even ...
  16. Allows users to use the Add Printer Wizard to search the network for shared printers. If you enable this setting or do not ...
  17. Allows voice communication during a remote assistance session. (Note: The Remote Assistance feature will automatically configure ...
  18. Allows Web-based programs to install software on the computer without notifying the user. By default, when a script hosted ...
  19. Allows Windows Firewall to record information about the unsolicited incoming messages that it receives. If you enable this ...
  20. Allows you to analyze current systems settings against baseline settings that are stored in a database. The analysis results ...
  21. Allows you to configure a system with security settings stored in a database. The syntax of this command is: secedit /configure ...
  22. Allows you to configure how often a Distributed File System (DFS) client attempts to discover domain controllers on their ...
  23. Allows you to disable Windows Messenger. If you enable this setting, Windows Messenger will not run. If you disable or do ...
  24. Allows you to export security settings stored in a database. The syntax of this command is: secedit /export /db filename ...
  25. Allows you to generate a rollback template with respect to a configuration template. The syntax of this command is: secedit ...
  26. Allows you to have Windows Explorer display a confirmation dialog whenever a file is deleted or moved to the Recycle Bin. ...
  27. Allows you to import a security template into a database so that the settings specified in the template can be applied to ...
  28. Allows you to permit and prohibit the use of Microsoft Management Console (MMC) extension snap-ins. These snap-ins include ...
  29. Allows you to permit and prohibit the use of MMC snap-ins. These snap-ins include Active Directory, Disk Management, IP Security, ...
  30. Allows you to permit and prohibit the use of the Group Policy Object Editor snap-in and its extensions, as well as the Resultant ...
  31. Allows you to remove the Run command from the Start menu, Internet Explorer, and Task Manager. If you enable this setting, ...
  32. Allows you to restrict programs from being run from online Help. If you enable this setting, you can prevent programs that ...
  33. Allows you to specify that local computer administrators can supplement the "Define Activation Security Check exemptions" ...
  34. Allows you to turn off the Configuration Interface for System Restore. System Restore enables users, in the event of a problem, ...
  35. Allows you to validate the syntax of a security template. The syntax of this command is: secedit /validate filename /cfg ...
  36. Allows you to view and change a list of DCOM server application ids (appids) which are exempted from the DCOM Activation ...
  37. Allows you to view and change the port exceptions list defined by Group Policy. Windows Firewall uses two port exception ...
  38. Allows you to view and change the program exceptions list defined by Group Policy. Windows Firewall uses two program exception ...
  39. Also backup the registry to the repair directory. This backup can be used to help recover your system if the registry is ...
  40. Also include the SCWAudit.inf security template. SCWAudit.inf sets System Access Control Lists (SACLS) in order to audit ...
  41. Also, any time after completing one or more searches, you can specify that the next search look only within the topics displayed ...
  42. Alternatively, you may choose to disable the installer's rollback functionality. This allows the installer to restore your ...
  43. Although Routing and Remote Access can authenticate connection requests, large networks that include multiple remote access ...
  44. Although the files were successfully added to the archive, Compressed (zipped) Folders was unable to completely remove the ...
  45. Although the language indicator now appears on the taskbar, it will not appear the next time you start Windows. When you ...
  46. Although Windows XP supports multiple monitors, Setup might not be able to preserve your current monitor configuration. After ...
  47. Always use local ADM files for the Group Policy snap-in. By default, when you edit a Group Policy object (GPO) using the ...
  48. An abnormal error occurred during the WINS initialization. Check the application and system logs for information on the cause. ...
  49. An abstraction or emulation of a hardware entity, that may or may not be realized in physical hardware. Any characteristics ...
  50. An Access Denied error was returned while attempting to change a service. You may need to log on using an Administrator account ...
  51. An access point for a service. Access points are dependent in this relationship since they have no function without a corresponding ...
  52. An access to a user buffer failed at an "expected" point in time. This code is defined since the caller does not want to ...
  53. An Access-Request message was received from RADIUS client %1 with an Extensible Authentication Protocol (EAP) message but ...
  54. An Access-Request message was received from RADIUS client %1 without a message authenticator attribute when a message authenticator ...
  55. An accurate clock enables administrators to better correlate audit events. Also, many security protocols use time to prevent ...
  56. An Active Directory domain controller for domain %1 could not be contacted. Network connectivity or configuration problems, ...
  57. An Active Directory domain controller for domain %1 could not be contacted. The most likely causes of this problem include: ...
  58. An Active Directory domain controller for the domain %1 could not be contacted. Ensure that the DNS domain name is typed ...
  59. An Active Directory domain controller for the domain must be contacted in order to proceed. Correct the problem or choose ...
  60. An Active Directory domain controller for the forest root domain %1 could not be contacted. Ensure that the domain name you ...
  61. An Active Directory replication connection from a source domain controller to a destination domain controller could not be ...
  62. An active server control or component performed an illegal OLE CoUninitialize call. Components used by Active Server Pages ...
  63. An ActiveX control may be embedded as the results view for the node that you are currently adding to the tree. This wizard ...
  64. An ActiveX control on this page is not safe. Your current security settings prohibit running unsafe controls on this page. ...
  65. An ActiveX control on this page might be unsafe to interact with other parts of the page. Do you want to allow this interaction? ...
  66. An address could not bind to a socket. Make sure the TCP/IP stack is installed And running properly. This event might mean ...
  67. An administrator has changed the type and zone storage options of zone %1. The zone is now type %2. The zone will be stored ...
  68. An administrator has changed the type and/or Active Directory location of zone %1. The zone is now type %2. The zone will ...
  69. An administrator has moved the zone %1 to a new location in Active Diretory. The zone will be stored in Active Directory ...
  70. An alias (CNAME) record cannot be added to this DNS name. The DNS name contains records that are incompatible with the CNAME ...
  71. An anonymous session connected from %1 has attempted to open an LSA policy handle on this machine. The attempt was rejected ...
  72. An application cannot be created for the Message Queuing IIS extension %1. Message Queuing will not be able to receive HTTP ...
  73. An application configuration manifest contains a dependentAssembly element which is missing its assemblyIdentity subelement. ...
  74. An application configuration manifest contains more than one dependentAssembly element for configuring the same assembly ...
  75. An application has attempted to access the keyboard or mouse hardware as a 16 bit Windows program, which cannot be supported. ...