Network security: Allow Local System to use computer identity for NTLM This policy setting allows Local System services that use Negotiate to use the computer identity when reverting to NTLM authentication. If you enable this policy setting, services running as Local System that use Negotiate will use the computer identity. This might cause some authentication requests between Windows operating systems to fail and log an error. If you do not configure this policy setting, services running as Local System that use Negotiate when reverting to NTLM authentication will authenticate anonymously. This was the behavior in previous versions of Windows. This policy is supported on at least Windows 7 or Windows Server 2008 R2.
Network Policy Server quarantined a user. Contact the Network Policy Server administrator for more information. User: Security ...
Network Policy Server This policy setting allows you to audit events generated by RADIUS (IAS) and Network Access Protection ...
Network Policy Server unlocked the user account. User: Security ID: %1 Account Name: %2 Account Domain: %3 Fully Qualified ...
Network Request Timeout} The session with a remote server has been disconnected because the time-out interval for a request ...
Network security: Allow Local System to use computer identity for NTLM This policy setting allows Local System services that ...
Network security: Allow LocalSystem NULL session fallback Allow NTLM to fall back to NULL session when used with LocalSystem. ...
Network security: Allow PKU2U authentication requests to this computer to use online identities. This policy will be turned ...
Network security: Configure encryption types allowed for Kerberos This policy setting allows you to set the encryption types ...
Network security: Do not store LAN Manager hash value on next password change This security setting determines if, at the ...