Allows Windows Firewall to record information about the unsolicited incoming messages that it receives. If you enable this policy setting, Windows Firewall writes the information to a log file. You must provide the name, location, and maximum size of the log file. The location can contain environment variables. You must also specify whether to record information about incoming messages that the firewall blocks (drops) and information about successful incoming and outgoing connections. Windows Firewall does not provide an option to log successful incoming messages. If you are configuring the log file name, ensure that the Windows Firewall service account has write permissions to the folder containing the log file. Default path for the log file is %systemroot%\system32\LogFiles\Firewall\pfirewall.log. If you disable this policy setting, Windows Firewall does not record information in the log file. If you enable this policy setting, and Windows Firewall creates the log file and adds information, then upon disabling this policy setting, Windows Firewall leaves the log file intact. If you do not configure this policy setting, Windows Firewall behaves as if the policy setting were disabled.
Allows unsolicited incoming messages from specified systems that authenticate using the IPsec transport. If you enable this ...
Allows UPnP devices to be hosted on this computer. If this service is stopped, any hosted UPnP devices will stop functioning ...
Allows users to connect interactively to a remote computer. Remote Desktop and Remote Desktop Session Host Server depend ...
Allows users to use the Add Printer Wizard to search the network for shared printers. If you enable this setting or do not ...
Allows Windows Firewall to record information about the unsolicited incoming messages that it receives. If you enable this ...
Allows you to analyze current systems settings against baseline settings that are stored in a database. The analysis results ...
Allows you to configure a system with security settings stored in a database. The syntax of this command is: secedit /configure ...
Allows you to disable System Restore configuration through System Protection. This policy setting allows you to turn off ...
Allows you to disable System Restore. This policy setting allows you to turn off System Restore. System Restore enables users, ...