Specify how and when connections between computers are authenticated and protected using Internet Protocol security (IPsec). After specifying how to protect connections using connection security rules, create firewall rules for connections you wish to allow.
Specify at least one supported Windows authentication method. If you select both methods, clients that use either method ...
Specify at least one supported Windows authentication method. If you select both methods, users that use either method will ...
Specify default credentials to be used when connecting to hosts. Leave user name blank if the user's logon credentials are ...
Specify expiration conditions for content protected using this template. If the content expires, it must be republished if ...
Specify how and when connections between computers are authenticated and protected using Internet Protocol security (IPsec). ...
Specify how frequently feeds will be downloaded. This setting is ignored for feeds that have a publisher's recommendation ...
Specify how this shared folder is to be used by clients accessing it over the SMB protocol. You can use the description to ...
Specify NTFS permissions to control how individual users and groups access this folder locally. For network access to a shared ...
Specify properties for this rule. The rule defines a device, or group of devices used to transmit a fax to the specified ...