This policy setting requires the user to enter Microsoft Windows credentials using a trusted path, to prevent a Trojan horse or other types of malicious code from stealing the user's Windows credentials. Note: This policy affects nonlogon authentication tasks only. As a security best practice, this policy should be enabled. If you enable this policy setting, users will be required to enter Windows credentials on the Secure Desktop by means of the trusted path mechanism. If you disable or do not configure this policy setting, users will enter Windows credentials within the user's desktop session, potentially allowing malicious code access to the user's Windows credentials.
This policy setting removes the Administrative options from the Region settings control panel. Administrative options include ...
This policy setting removes the option to change the user's geographical location (GeoID) from the Region settings control ...
This policy setting removes the option to change the user's menus and dialogs (UI) language from the Language and Regional ...
This policy setting removes the regional formats interface from the Region settings control panel. This policy setting is ...
This policy setting requires the user to enter Microsoft Windows credentials using a trusted path, to prevent a Trojan horse ...
This policy setting restores the definitions of the %HOMESHARE% and %HOMEPATH% environment variables to those used in Windows ...
This policy setting restricts the list of Accelerators that the user can access to only the set deployed through Group Policy. ...
This policy setting restricts the permitted system locales to the specified list. If the list is empty, it locks the system ...
This policy setting restricts the tool download policy for Microsoft Support Diagnostic Tool. Microsoft Support Diagnostic ...