This policy setting controls the Kerberos client's behavior in validating the KDC certificate for smart card and system certificate logon. If you enable this policy setting, the Kerberos client requires that the KDC's X.509 certificate contains the KDC key purpose object identifier in the Extended Key Usage (EKU) extensions, and that the KDC's X.509 certificate contains a dNSName subjectAltName (SAN) extension that matches the DNS name of the domain. If the computer is joined to a domain, the Kerberos client requires that the KDC's X.509 certificate must be signed by a Certificate Authority (CA) in the NTAuth store. If the computer is not joined to a domain, the Kerberos client allows the root CA certificate on the smart card to be used in the path validation of the KDC's X.509 certificate. If you disable or do not configure this policy setting, the Kerberos client requires only that the KDC certificate contain the Server Authentication purpose object identifier in the EKU extensions which can be issued to any server.
This policy setting controls the first-run response that the user sees on a zone-by-zone basis. When the user encounters ...
This policy setting controls the first-run response that the user sees on a zone-by-zone basis. When the user encounters ...
This policy setting controls the idle connection timeout for RPC/HTTP connections. This policy setting is useful in cases ...
This policy setting controls the installation of ActiveX controls for sites in Trusted zone. If you enable this policy setting, ...
This policy setting controls the Kerberos client's behavior in validating the KDC certificate for smart card and system certificate ...
This policy setting controls the legacy remote shutdown interface (named pipe). The named pipe remote shutdown interface ...
This policy setting controls the load priority for the antimalware service. Increasing the load priority will allow for faster ...
This policy setting controls the location of the log file. The location of the file must be writable by the Event Log service ...
This policy setting controls the network latency and throughput thresholds that will cause a client computers to transition ...