Enforce password history This security setting determines the number of unique new passwords that have to be associated with a user account before an old password can be reused. The value must be between 0 and 24 passwords. This policy enables administrators to enhance security by ensuring that old passwords are not reused continually. Default: 24 on domain controllers. 0 on stand-alone servers. Note: By default, member computers follow the configuration of their domain controllers. To maintain the effectiveness of the password history, do not allow passwords to be changed immediately after they were just changed by also enabling the Minimum password age security policy setting. For information about the minimum password age security policy setting, see Minimum password age.
Endpoint going offline. Endpoint Name: %2 Transport Name: %4 Guidance: You should expect this event on a Windows Failover ...
Endpoint Protection client is up and running in a healthy state. Platform version:%b%2 Engine version:%b%4 Signature version:%b%5 ...
Endpoint removed. Name: %2 Domain Name: %4 Transport Name: %6 Guidance: You should expect this event when the server stops ...
Ends localization of environment changes in a batch file. Environment changes made after ENDLOCAL has been issued are not ...
Enforce password history This security setting determines the number of unique new passwords that have to be associated with ...
Enforce user logon restrictions This security setting determines whether the Kerberos V5 Key Distribution Center (KDC) validates ...
Enforces group policy for removable mass-storage devices. Enables applications such as Windows Media Player and Image Import ...
Engine Glitch: CP Client Input Endpoint - pCCrossProcessClientInputEndpoint=[%1 Queue item does not match requested size ...
Engine Glitch: CP Client Output Endpoint - Read Pointer Overwrite: pCCrossProcessClientOutputEndpoint=[%1 WriteOffset=[%2 ...