This policy setting lets you configure Protected Event Logging. If you enable this policy setting, components that support it will use the certificate you supply to encrypt potentially sensitive event log data before writing it to the event log. Data will be encrypted using the Cryptographic Message Syntax (CMS) standard and the public key you provide. You can use the Unprotect-CmsMessage PowerShell cmdlet to decrypt these encrypted messages, provided that you have access to the private key corresponding to the public key that they were encrypted with. If you disable or do not configure this policy setting, components will not encrypt event log messages before writing them to the event log.
This policy setting lets you allow certificates without an Extended Key Usage (EKU) set to be used for logon. In versions ...
This policy setting lets you allow signature key-based certificates to be enumerated and available for logon. If you enable ...
This policy setting lets you always use local ADM files for the Group Policy snap-in. By default, when you edit a Group Policy ...
This policy setting lets you capture the input and output of Windows PowerShell commands into text-based transcripts. If ...
This policy setting lets you configure Protected Event Logging. If you enable this policy setting, components that support ...
This policy setting lets you configure the entire recovery message or replace the existing URL that are displayed on the ...
This policy setting lets you configure the script execution policy, controlling which scripts are allowed to run. If you ...
This policy setting lets you configure the script execution policy, controlling which scripts are allowed to run. If you ...
This policy setting lets you control the redirection of supported Plug and Play and RemoteFX USB devices, such as Windows ...