Generate security audits This security setting determines which accounts can be used by a process to add entries to the security log. The security log is used to trace unauthorized system access. Misuse of this user right can result in the generation of many auditing events, potentially hiding evidence of an attack or causing a denial of service if the Audit: Shut down system immediately if unable to log security audits security policy setting is enabled. For more information see Audit: Shut down system immediately if unable to log security audits Default: Local Service Network Service.
General Global Parameters - Default Hop Limit : %1!s! hops Neighbor Cache Limit : %2!s! entries per interface Route Cache ...
Generate a report detailing the status of local hardware resources, system response times, and processes on the local computer ...
Generate a report detailing the status of local hardware resources, system response times, and processes on the local computer. ...
generate a script to retrieve and recover keys (default behavior if multiple matching recovery candidates are found, or if ...
Generate security audits This security setting determines which accounts can be used by a process to add entries to the security ...
Generic IKEv1, AuthIP, and IKEv2 is the set of Internet Protocol security (IPsec) Internet Key Exchange Version 1 (IKEv1), ...
Generic Routing Encapsulation is used for encapsulation of an arbitrary network layer protocol over another arbitrary network ...
Generic telemetry trigger event. PointType: %1 AppName: %2 ModuleName: %3 ModuleVersion: %4 FileName: %5 FunctionName: %6 ...
Genuine Validation determined the validation template identifier is invalid for this version of the Windows operating system. ...