This policy setting controls the location of the log file. The location of the file must be writable by the Event Log service and should only be accessible to administrators. If you enable this policy setting, the Event Log uses the path specified in this policy setting. If you disable or do not configure this policy setting, the Event Log uses the system32 or system64 subdirectory.
This policy setting controls the installation of ActiveX controls for sites in Trusted zone. If you enable this policy setting, ...
This policy setting controls the Kerberos client's behavior in validating the KDC certificate for smart card and system certificate ...
This policy setting controls the legacy remote shutdown interface (named pipe). The named pipe remote shutdown interface ...
This policy setting controls the load priority for the antimalware service. Increasing the load priority will allow for faster ...
This policy setting controls the location of the log file. The location of the file must be writable by the Event Log service ...
This policy setting controls the network latency and throughput thresholds that will cause a client computers to transition ...
This policy setting controls the Start background visuals. If you enable this policy setting, the Start background will use ...
This policy setting controls the state of Steps Recorder. Steps Recorder keeps a record of steps taken by the user. The data ...
This policy setting controls the state of the Inventory Collector. The Inventory Collector inventories applications, files, ...