This policy setting lets you allow certificates without an Extended Key Usage (EKU) set to be used for logon. In versions of Windows prior to Windows Vista, smart card certificates that are used for logon require an enhanced key usage (EKU) extension with a smart card logon object identifier. This policy setting can be used to modify that restriction. If you enable this policy setting, certificates with the following attributes can also be used to log on with a smart card: - Certificates with no EKU - Certificates with an All Purpose EKU - Certificates with a Client Authentication EKU If you disable or do not configure this policy setting, only certificates that contain the smart card logon object identifier can be used to log on with a smart card.
This policy setting is used only when you have deployed one or more BranchCache-enabled file servers at your main office. ...
This policy setting is used to manage temporary Internet files and cookies associated with your Internet browsing history, ...
This policy setting let you turn off Inline AutoComplete in File Explorer. Inline AutoComplete provides suggestions for what ...
This policy setting lets the system run startup scripts simultaneously. Startup scripts are batch files that run before the ...
This policy setting lets you allow certificates without an Extended Key Usage (EKU) set to be used for logon. In versions ...
This policy setting lets you allow signature key-based certificates to be enumerated and available for logon. If you enable ...
This policy setting lets you always use local ADM files for the Group Policy snap-in. By default, when you edit a Group Policy ...
This policy setting lets you capture the input and output of Windows PowerShell commands into text-based transcripts. If ...
This policy setting lets you configure Protected Event Logging. If you enable this policy setting, components that support ...