This policy setting defines threats which will be excluded from detection during network traffic inspection. Threats should be added under the Options for this setting. Each entry must be listed as a name value pair, where the name should be a string representation of a Threat ID. As an example, a Threat ID might be defined as: 2925110632. The value is not used and it is recommended that this be set to 0.
This policy setting defines the list of trusting forests that the Key Distribution Center (KDC) searches when attempting ...
This policy setting defines the maximum size (in kilobytes) of downloaded files and attachments that will be scanned. If ...
This policy setting defines the number of days items should be kept in the Quarantine folder before being removed. If you ...
This policy setting defines the number of days items should be kept in the scan history folder before being permanently removed. ...
This policy setting defines threats which will be excluded from detection during network traffic inspection. Threats should ...
This policy setting defines when the Shutdown Event Tracker System State Data feature is activated. The system state data ...
This policy setting defines whether a domain controller (DC) should attempt to verify the password provided by a client with ...
This policy setting defines whether a reference to an object is accessible when the user navigates within the same domain ...
This policy setting defines whether a reference to an object is accessible when the user navigates within the same domain ...