This policy setting configures the Kerberos client's mapping to KDC proxy servers for domains based on their DNS suffix names. If you enable this policy setting, the Kerberos client will use the KDC proxy server for a domain when a domain controller cannot be located based on the configured mappings. To map a KDC proxy server to a domain, enable the policy setting, click Show, and then map the KDC proxy server name(s) to the DNS name for the domain using the syntax described in the options pane. In the Show Contents dialog box in the Value Name column, type a DNS suffix name. In the Value column, type the list of proxy servers using the appropriate syntax format. To view the list of mappings, enable the policy setting and then click the Show button. To remove a mapping from the list, click the mapping entry to be removed, and then press the DELETE key. To edit a mapping, remove the current entry from the list and add a new one with different parameters. If you disable or do not configure this policy setting, the Kerberos client does not have KDC proxy servers settings defined by Group Policy.
This policy setting configures the cost of 3G connections on the local machine. If this policy setting is enabled, a drop-down ...
This policy setting configures the cost of 4G connections on the local machine. If this policy setting is enabled, a drop-down ...
This policy setting configures the cost of Wireless LAN (WLAN) connections on the local machine. If this policy setting is ...
This policy setting configures the Kerberos client so that it can authenticate with interoperable Kerberos V5 realms, as ...
This policy setting configures the Kerberos client's mapping to KDC proxy servers for domains based on their DNS suffix names. ...
This policy setting configures the maximum number of concurrent shells any user can remotely open on the same system. Any ...
This policy setting configures the maximum number of processes a remote shell is allowed to launch. If you enable this policy ...
This policy setting configures the maximum number of users able to concurrently perform remote shell operations on the system. ...
This policy setting configures the maximum time in milliseconds remote shell will stay open without any user activity until ...