This policy setting controls whether a device will request claims and compound authentication for Dynamic Access Control and Kerberos armoring using Kerberos authentication with domains that support these features. If you enable this policy setting, the client computers will request claims, provide information required to create compounded authentication and armor Kerberos messages in domains which support claims and compound authentication for Dynamic Access Control and Kerberos armoring. If you disable or do not configure this policy setting, the client devices will not request claims, provide information required to create compounded authentication and armor Kerberos messages. Services hosted on the device will not be able to retrieve claims for clients using Kerberos protocol transition.
This policy setting controls whether a BitLocker-protected computer that is connected to a trusted wired Local Area Network ...
This policy setting controls whether a computer requires that Kerberos message exchanges be armored when communicating with ...
This policy setting controls whether a device always sends a compound authentication request when the resource domain requests ...
This policy setting controls whether a device will automatically sign-in the last interactive user after Windows Update restarts ...
This policy setting controls whether a device will request claims and compound authentication for Dynamic Access Control ...
This policy setting controls whether additional data in support of error reports can be sent to Microsoft automatically. ...
This policy setting controls whether administrator accounts are displayed when a user attempts to elevate a running application. ...
This policy setting controls whether errors in general applications are included in reports when Windows Error Reporting ...
This policy setting controls whether errors in the operating system are included Windows Error Reporting is enabled. If you ...