Windows 10

  1. This policy setting configures a local override for the configuration of the number of days items should be kept in the Quarantine ...
  2. This policy setting configures a local override for the configuration of the scan type to use during a scheduled scan. This ...
  3. This policy setting configures a local override for the configuration of the time to run a scheduled full scan to complete ...
  4. This policy setting configures a local override for the configuration to join Microsoft MAPS. This setting can only be set ...
  5. This policy setting configures a local override for the configuration to turn on real-time protection. This setting can only ...
  6. This policy setting configures access to remote shells. If you enable this policy setting and set it to False, new remote ...
  7. This policy setting configures behaviour of samples submission when opt-in for MAPS telemetry is set. Possible options are: ...
  8. This policy setting configures File Explorer to always display the menu bar. Note: By default, the menu bar is not displayed ...
  9. This policy setting configures how a domain controller (DC) behaves when responding to a client whose IP address does not ...
  10. This policy setting configures how errors are reported to Microsoft, and what information is sent when Windows Error Reporting ...
  11. This policy setting configures how much of the TPM owner authorization information is stored in the registry of the local ...
  12. This policy setting configures how Windows Search adds shared folders to the search index. If you enable this policy setting, ...
  13. This policy setting configures Internet Explorer to automatically install new versions of Internet Explorer when they are ...
  14. This policy setting configures Internet Explorer to open Internet Explorer tiles on the desktop. If you enable this policy ...
  15. This policy setting configures Microsoft Support Diagnostic Tool (MSDT) interactive communication with the support provider. ...
  16. This policy setting configures secure access to UNC paths. If you enable this policy, Windows only allows access to the specified ...
  17. This policy setting configures the amount of time (in seconds) that the operating system waits to reboot in order to enforce ...
  18. This policy setting configures the cost of 3G connections on the local machine. If this policy setting is enabled, a drop-down ...
  19. This policy setting configures the cost of 4G connections on the local machine. If this policy setting is enabled, a drop-down ...
  20. This policy setting configures the cost of Wireless LAN (WLAN) connections on the local machine. If this policy setting is ...
  21. This policy setting configures the Kerberos client so that it can authenticate with interoperable Kerberos V5 realms, as ...
  22. This policy setting configures the Kerberos client's mapping to KDC proxy servers for domains based on their DNS suffix names. ...
  23. This policy setting configures the maximum number of concurrent shells any user can remotely open on the same system. Any ...
  24. This policy setting configures the maximum number of processes a remote shell is allowed to launch. If you enable this policy ...
  25. This policy setting configures the maximum number of users able to concurrently perform remote shell operations on the system. ...
  26. This policy setting configures the maximum time in milliseconds remote shell will stay open without any user activity until ...
  27. This policy setting configures the maximum total amount of memory in megabytes that can be allocated by any active remote ...
  28. This policy setting configures the number of minutes the system waits for the hung logon sessions before proceeding with ...
  29. This policy setting configures the Program Compatibility Assistant (PCA) to diagnose failures with application and driver ...
  30. This policy setting configures the time in minutes before a detection in the "additional action" state moves to the "cleared" ...
  31. This policy setting configures the time in minutes before a detection in the "completed" state moves to the "cleared" state. ...
  32. This policy setting configures the time in minutes before a detection in the "critically failed" state to moves to either ...
  33. This policy setting configures the time in minutes before a detection in the "non-critically failed" state moves to the "cleared" ...
  34. This policy setting configures what Internet Explorer displays when a new browsing session is started. By default, Internet ...
  35. This policy setting configures whether BitLocker protection is required for a computer to be able to write data to a removable ...
  36. This policy setting configures whether or not a password can be used to unlock an Enhanced Storage device. If you enable ...
  37. This policy setting configures whether or not fixed data drives formatted with the FAT file system can be unlocked and viewed ...
  38. This policy setting configures whether or not locations on removable drives can be added to libraries. If you enable this ...
  39. This policy setting configures whether or not non-Enhanced Storage removable devices are allowed on your computer. If you ...
  40. This policy setting configures whether or not only USB root hub connected Enhanced Storage devices are allowed. Allowing ...
  41. This policy setting configures whether or not removable data drives formatted with the FAT file system can be unlocked and ...
  42. This policy setting configures whether or not Windows will activate an Enhanced Storage device. If you enable this policy ...
  43. This policy setting configures whether the computers to which this setting is applied are more aggressive when trying to ...
  44. This policy setting controls computer restart performance at the risk of exposing BitLocker secrets. This policy setting ...
  45. This policy setting controls configuring the device's Active Directory account for compound authentication. Support for providing ...
  46. This policy setting controls Event Log behavior when the log file reaches its maximum size and takes effect only if the "Retain ...
  47. This policy setting controls Event Log behavior when the log file reaches its maximum size. If you enable this policy setting ...
  48. This policy setting controls how Internet Explorer displays local intranet content. Intranet content is defined as any webpage ...
  49. This policy setting controls how long Windows waits for a response from the network before logging on a user without a remote ...
  50. This policy setting controls how long Windows waits for a user response before it uses a default user profile for roaming ...
  51. This policy setting controls how the RPC server runtime handles unauthenticated RPC clients connecting to RPC servers. This ...
  52. This policy setting controls on a per-computer basis whether roaming profiles are downloaded on a user's primary computers ...
  53. This policy setting controls resource usage for the forwarder (source computer) by controlling the events/per second sent ...
  54. This policy setting controls the ability for users or administrators to remove Windows Installer based updates. This policy ...
  55. This policy setting controls the ability for users or administrators to remove Windows Installer based updates. This policy ...
  56. This policy setting controls the ability of non-administrators to install updates that have been digitally signed by the ...
  57. This policy setting controls the ability of users to view their Resultant Set of Policy (RSoP) data. By default, interactively ...
  58. This policy setting controls the ability to change the color of window frames. If you enable this policy setting, you prevent ...
  59. This policy setting controls the ability to prevent embedded UI. If you enable this policy setting, no packages on the system ...
  60. This policy setting controls the ability to turn off all patch optimizations. If you enable this policy setting, all Patch ...
  61. This policy setting controls the ability to turn off shared components. If you enable this policy setting, no packages on ...
  62. This policy setting controls the ActiveX Filtering feature for websites that are running ActiveX controls. The user can choose ...
  63. This policy setting controls the appearance of window animations such as those found when restoring, minimizing, and maximizing ...
  64. This policy setting controls the behavior of the Windows Error Reporting archive. If you enable this policy setting, you ...
  65. This policy setting controls the client Point and Print behavior, including the security prompts for Windows Vista computers. ...
  66. This policy setting controls the cloud candidates feature, which uses an online service to provide input suggestions that ...
  67. This policy setting controls the Compatibility View button that appears on the Command bar. This button allows the user to ...
  68. This policy setting controls the Compatibility View feature, which allows the user to fix website display problems that he ...
  69. This policy setting controls the default color for window frames when the user does not specify a color. If you enable this ...
  70. This policy setting controls the default Control Panel view, whether by category or icons. If this policy setting is enabled, ...
  71. This policy setting controls the first-run response that the user sees on a zone-by-zone basis. When the user encounters ...
  72. This policy setting controls the first-run response that the user sees on a zone-by-zone basis. When the user encounters ...
  73. This policy setting controls the idle connection timeout for RPC/HTTP connections. This policy setting is useful in cases ...
  74. This policy setting controls the installation of ActiveX controls for sites in Trusted zone. If you enable this policy setting, ...
  75. This policy setting controls the Kerberos client's behavior in validating the KDC certificate for smart card and system certificate ...