Use this section to configure protocols used to communicate with other computers. When configured to communicate with computers running earlier versions of Windows, these protocols are vulnerable to exploits such as password cracking and man-in-the-middle attacks.
Use this option if there are computers on your network that do not support IPsec or have an incompatible IPsec configuration. ...
Use this option if you don't have a private key or wish to create a new private key to enhance security. You will be asked ...
Use this option to specify the days and times at which replication occurs by default. The initial replication schedule has ...
Use this section to configure auditing based on your auditing objectives. The auditing policy determines the success and ...
Use this section to configure protocols used to communicate with other computers. When configured to communicate with computers ...
Use this section to configure rules for Windows Firewall with Advanced Security based on the roles and administrative options ...
Use this section to configure services based on the selected server's roles and other features. These roles and other features ...
Use this section to save the policy you have created. You can apply it to the selected server now, or you can apply it to ...
Use this setting to control whether or not a user is given the choice to report an error. When Display Error Notification ...