You can restrict the authentication methods that apply to this application. If you do not select any of the following check boxes, this application will accept any authentication method that is provided to it.
You can replace the animated Internet Explorer logo in the upper-right corner of the Internet Explorer window with an animated ...
You can replace the static Internet Explorer logo in the upper-right corner of the Internet Explorer window with a static ...
You can require a password for this identity. This provides a moderate level of security. However, other users may still ...
You can require a personal identification number (PIN) or a startup key on a USB flash drive be used every time you start ...
You can restrict the authentication methods that apply to this application. If you do not select any of the following check ...
You can return to this wizard at any time. To access the Display Configuration wizard after the preferred display is in use, ...
You can route authentication requests that use name suffixes that do not exist in the local forest to the specified forest. ...
You can route authentication requests that use name suffixes that do not exist in the specified forest to the local forest. ...
You can save your phone number settings with a unique name. For example, travelers can save and reuse settings for particular ...