Windows 10

  1. This policy setting allows you to configure the maximum size of archive files such as .ZIP or .CAB that will be scanned. ...
  2. This policy setting allows you to configure the named proxy that should be used when the client attempts to connect to the ...
  3. This policy setting allows you to configure the number of seconds Windows waits for a device installation task to complete. ...
  4. This policy setting allows you to configure the recovery behavior for corrupted files to one of three states: Regular: Detection, ...
  5. This policy setting allows you to configure the recovery behavior for corrupted MSI files to one of three states: Prompt ...
  6. This policy setting allows you to configure the server address, refresh interval, and issuer certificate authority (CA) of ...
  7. This policy setting allows you to configure the Teredo refresh rate. Note: On a periodic basis (by default, every 30 seconds), ...
  8. This policy setting allows you to configure this server so that Kerberos can decrypt a ticket that contains this system-generated ...
  9. This policy setting allows you to configure UNC file share sources for downloading definition updates. Sources will be contacted ...
  10. This policy setting allows you to configure user installs. To configure this policy setting, set it to enabled and use the ...
  11. This policy setting allows you to configure whether BitLocker requires additional authentication each time the computer starts ...
  12. This policy setting allows you to configure whether Endpoint Protection automatically takes action on all detected threats. ...
  13. This policy setting allows you to configure whether newly installed add-ons are automatically activated in the Internet Explorer ...
  14. This policy setting allows you to configure whether or not enhanced startup PINs are used with BitLocker. Enhanced startup ...
  15. This policy setting allows you to configure whether or not standard users are allowed to change BitLocker volume PINs, provided ...
  16. This policy setting allows you to configure whether or not the antimalware service remains running when antivirus and antispyware ...
  17. This policy setting allows you to configure whether or not to display additional text to clients when they need to perform ...
  18. This policy setting allows you to configure whether or not to display AM UI to the users. If you enable this setting AM UI ...
  19. This policy setting allows you to configure whether or not to display notifications to clients when they need to perform ...
  20. This policy setting allows you to configure whether or not Watson events are sent. If you enable or do not configure this ...
  21. This policy setting allows you to configure whether power is automatically turned off when Windows shutdown completes. This ...
  22. This policy setting allows you to configure whether Secure Boot will be allowed as the platform integrity provider for BitLocker ...
  23. This policy setting allows you to configure whether Windows Defender automatically takes action on all detected threats. ...
  24. This policy setting allows you to configure Window Scaling Heuristics. Window Scaling Heuristics is an algorithm to identify ...
  25. This policy setting allows you to control a user's ability to invoke a computer policy refresh. If you enable this policy ...
  26. This policy setting allows you to control displaying or tracking items in Jump Lists from remote locations. The Start Menu ...
  27. This policy setting allows you to control how BitLocker-protected fixed data drives are recovered in the absence of the required ...
  28. This policy setting allows you to control how BitLocker-protected operating system drives are recovered in the absence of ...
  29. This policy setting allows you to control how BitLocker-protected removable data drives are recovered in the absence of the ...
  30. This policy setting allows you to control pinning items in Jump Lists. If you enable this policy setting, users cannot pin ...
  31. This policy setting allows you to control pinning programs to the Taskbar. If you enable this policy setting, users cannot ...
  32. This policy setting allows you to control pinning the Store app to the Taskbar. If you enable this policy setting, users ...
  33. This policy setting allows you to control the availability of RemoteFX on both a Remote Desktop Virtualization Host (RD Virtualization ...
  34. This policy setting allows you to control the domain controller (DC) location algorithm. By default, the DC location algorithm ...
  35. This policy setting allows you to control the processing of incoming mailslot messages by a local domain controller (DC). ...
  36. This policy setting allows you to control the redirection of smart card devices in a Remote Desktop Services session. If ...
  37. This policy setting allows you to control the SafeSearch setting used when performing a query in Search. If you enable this ...
  38. This policy setting allows you to control what information is shared with Bing in Search. If you enable this policy setting, ...
  39. This policy setting allows you to control whether a confirmation message is displayed when a smart card device driver is ...
  40. This policy setting allows you to control whether a domain user can sign in using a picture password. If you enable this ...
  41. This policy setting allows you to control whether a domain user can sign in using a PIN. If you enable this policy setting, ...
  42. This policy setting allows you to control whether all redirected shell folders, such as Contacts, Documents, Desktop, Favorites, ...
  43. This policy setting allows you to control whether anyone can interact with available networks UI on the logon screen. If ...
  44. This policy setting allows you to control whether elliptic curve cryptography (ECC) certificates on a smart card can be used ...
  45. This policy setting allows you to control whether individual redirected shell folders are available offline by default. For ...
  46. This policy setting allows you to control whether non-administrative users will receive update notifications based on the ...
  47. This policy setting allows you to control whether or not platform validation data is refreshed when Windows is started following ...
  48. This policy setting allows you to control whether or not Search can perform queries on the web over metered connections, ...
  49. This policy setting allows you to control whether or not Search can perform queries on the web, and if the web results are ...
  50. This policy setting allows you to control whether or not Search will use the user's current location when providing search ...
  51. This policy setting allows you to control whether or not the user may alter the time before a password is required when a ...
  52. This policy setting allows you to control whether Smart Card Plug and Play is enabled. If you enable or do not configure ...
  53. This policy setting allows you to control whether the BitLocker Drive Encryption setup wizard can display and specify BitLocker ...
  54. This policy setting allows you to control whether the BitLocker Drive Encryption setup wizard will be able to set up an additional ...
  55. This policy setting allows you to control whether users see detailed enhanced notification messages about featured software ...
  56. This policy setting allows you to control whether users see the first sign-in animation when signing in to the computer for ...
  57. This policy setting allows you to control which Domains are included in the discovery functionality of the Internet Explorer ...
  58. This policy setting allows you to create a list of IEEE 1667 silos, compliant with the Institute of Electrical and Electronics ...
  59. This policy setting allows you to create a system restore point on the computer on a daily basis prior to cleaning. If you ...
  60. This policy setting allows you to create new Group Policy object links in the disabled state. If you enable this setting, ...
  61. This policy setting allows you to customize the Internet Explorer version string as reported to web servers in the HTTP User ...
  62. This policy setting allows you to customize which automatic remediation action will be taken for each threat alert level.Threat ...
  63. This policy setting allows you to define applications and processes that can access the Clipboard without prompting the user. ...
  64. This policy setting allows you to define the number of consecutive scheduled scans that can be missed after which a catch-up ...
  65. This policy setting allows you to define the number of days after which a catch-up definition update will be required. By ...
  66. This policy setting allows you to define the number of days that must pass before spyware definitions are considered out ...
  67. This policy setting allows you to define the number of days that must pass before virus definitions are considered out of ...
  68. This policy setting allows you to define the order in which different definition update sources should be contacted. The ...
  69. This policy setting allows you to define the user experience related to how pop-up windows appear in tabbed browsing in Internet ...
  70. This policy setting allows you to determine how drivers signed by a Microsoft Windows Publisher certificate are ranked with ...
  71. This policy setting allows you to determine whether members of the Administrators group can install and update the drivers ...
  72. This policy setting allows you to disable browser geolocation support. This will prevent websites from requesting location ...
  73. This policy setting allows you to disable revocation check for the SSL certificate of the targeted KDC proxy server. If you ...
  74. This policy setting allows you to disable scheduled and real-time scanning for any file opened by any of the specified processes. ...
  75. This policy setting allows you to disable scheduled and real-time scanning for files under the paths specified or for the ...