Allows specified users to connect to the remote debugger. Only fully trusted users should be allowed to debug. If a malicious ...

Allows specified users to connect to the remote debugger. Only fully trusted users
                should be allowed to debug. If a malicious user was given permission to connect,
                they would be able to take over the user account of the user running the remote
                debugger. User names should be semicolon or comma separated (example: SomeDomain\Bob;SomeDomain\Alice)