Retention method for system log This security setting determines the "wrapping" method for the system log. If you do not archive the system log, in the Properties dialog box for this policy, select the Define this policy setting check box, and then click Overwrite events as needed. If you archive the log at scheduled intervals, in the Properties dialog box for this policy, select the Define this policy setting check box, and then click Overwrite events by days and specify the appropriate number of days in the Retain system log setting. Make sure that the Maximum system log size is large enough to accommodate the interval. If you must retain all the events in the log, in the Properties dialog box for this policy, select the Define this policy setting check box, and then click Do not overwrite events (clear log manually). This option requires that the log be cleared manually. In this case, when the maximum log size is reached, new events are discarded. Note: This setting does not appear in the Local Computer Policy object. Default: None.
Retain security log This security setting determines the number of days' worth of events to be retained for the security ...
Retain system log This security setting determines the number of days' worth of events to be retained for the system log ...
Retention method for application log This security setting determines the "wrapping" method for the application log. If you ...
Retention method for security log This security setting determines the "wrapping" method for the security log. If you do ...
Retention method for system log This security setting determines the "wrapping" method for the system log. If you do not ...
Retries inactive subscription by attempting to reactivate all or specified event sources by establishing a connection and ...
Retrieves a message with a LookupId property that is equal to the specified lookup identifier, removing it from the queue, ...
Retrieves a structural representation of the object's security descriptor. The method returns an integer value that can be ...
Retrieves a structural representation of the object's security descriptor. The method returns an integer value that can be ...