Network security: Allow Local System to use computer identity for NTLM This policy setting allows Local System services that use Negotiate to use the computer identity when reverting to NTLM authentication. If you enable this policy setting, services running as Local System that use Negotiate will use the computer identity. This might cause some authentication requests between Windows operating systems to fail and log an error. If you disable this policy setting, services running as Local System that use Negotiate when reverting to NTLM authentication will authenticate anonymously. By default, this policy is enabled on Windows 7 and above. By default, this policy is disabled on Windows Vista. This policy is supported on at least Windows Vista or Windows Server 2008. Note: Windows Vista or Windows Server 2008 do not expose this setting in Group Policy.
Network Policy Server This policy setting allows you to audit events generated by RADIUS (IAS) and Network Access Protection ...
Network Policy Server unlocked the user account. User: Security ID: %1 Account Name: %2 Account Domain: %3 Fully Qualified ...
Network query initiated for the name %1 (is parallel query %2) on network index %3 with interface count %4 with first interface ...
Network Request Timeout} The session with a remote server has been disconnected because the time-out interval for a request ...
Network security: Allow Local System to use computer identity for NTLM This policy setting allows Local System services that ...
Network security: Allow LocalSystem NULL session fallback Allow NTLM to fall back to NULL session when used with LocalSystem. ...
Network security: Allow PKU2U authentication requests to this computer to use online identities. This policy will be turned ...
Network security: Configure encryption types allowed for Kerberos This policy setting allows you to set the encryption types ...
Network security: Do not store LAN Manager hash value on next password change This security setting determines if, at the ...