This page lets you view and manage the list of user identities that are defined in the application. The list of users can be used to perform authentication, authorization, and other security-related operations.
This page is a backup of Trusted Platform Module (TPM) security hardware owner password information. Upon request, use the ...
This page is attempting to make or monitor telephone calls or other multimedia connections on your computer. Do you want ...
This page lets you view and manage a list of user groups. A user group provides the ability to categorize users and to perform ...
This page lets you view and manage the list of application pools on the server. Application pools are associated with worker ...
This page lets you view and manage the list of user identities that are defined in the application. The list of users can ...
This page lets you view and manage the list of virtual directories in an application. Virtual directories contain content ...
This page lists Windows Firewall rules that are needed for the roles and other options you have selected. Selected rules ...
This page provides potentially unsafe information to an ActiveX control. Your current security settings prohibit running ...
This page uses fonts that need to be temporarily installed. This is usually safe. Do you want to allow these fonts to be ...