Windows 10

  1. This policy setting controls the legacy remote shutdown interface (named pipe). The named pipe remote shutdown interface ...
  2. This policy setting controls the load priority for the antimalware service. Increasing the load priority will allow for faster ...
  3. This policy setting controls the location of the log file. The location of the file must be writable by the Event Log service ...
  4. This policy setting controls the network latency and throughput thresholds that will cause a client computers to transition ...
  5. This policy setting controls the Start background visuals. If you enable this policy setting, the Start background will use ...
  6. This policy setting controls the state of Steps Recorder. Steps Recorder keeps a record of steps taken by the user. The data ...
  7. This policy setting controls the state of the Inventory Collector. The Inventory Collector inventories applications, files, ...
  8. This policy setting controls the state of the Program Compatibility Assistant (PCA). The PCA monitors applications run by ...
  9. This policy setting controls the Suggested Sites feature, which recommends websites based on the user's browsing activity. ...
  10. This policy setting controls the use of BitLocker on removable data drives. This policy setting is applied when you turn ...
  11. This policy setting controls the use of fast startup. If you enable this policy setting, the system requires hibernate to ...
  12. This policy setting controls when background synchronization occurs while operating in slow-link mode, and applies to any ...
  13. This policy setting controls whether a BitLocker-protected computer that is connected to a trusted wired Local Area Network ...
  14. This policy setting controls whether a computer requires that Kerberos message exchanges be armored when communicating with ...
  15. This policy setting controls whether a device always sends a compound authentication request when the resource domain requests ...
  16. This policy setting controls whether a device will automatically sign-in the last interactive user after Windows Update restarts ...
  17. This policy setting controls whether a device will request claims and compound authentication for Dynamic Access Control ...
  18. This policy setting controls whether additional data in support of error reports can be sent to Microsoft automatically. ...
  19. This policy setting controls whether administrator accounts are displayed when a user attempts to elevate a running application. ...
  20. This policy setting controls whether errors in general applications are included in reports when Windows Error Reporting ...
  21. This policy setting controls whether errors in the operating system are included Windows Error Reporting is enabled. If you ...
  22. This policy setting controls whether files read from file shares over a slow network are transparently cached in the Offline ...
  23. This policy setting controls whether folders are redirected on a user's primary computers only. This policy setting is useful ...
  24. This policy setting controls whether local sites which are not explicitly mapped into any Security Zone are forced into the ...
  25. This policy setting controls whether memory dumps in support of OS-generated error reports can be sent to Microsoft automatically. ...
  26. This policy setting controls whether or not complex list settings configured by a local administrator are merged with Group ...
  27. This policy setting controls whether or not errors are reported to Microsoft. Error Reporting is used to report information ...
  28. This policy setting controls whether or not local path information is sent when the user is uploading a file via an HTML ...
  29. This policy setting controls whether or not software can simulate the Secure Attention Sequence (SAS). If you enable this ...
  30. This policy setting controls whether or not the "Open File - Security Warning" message appears when the user tries to open ...
  31. This policy setting controls whether or not the Netlogon share created by the Net Logon service on a domain controller (DC) ...
  32. This policy setting controls whether or not the system displays information about previous logons and logon failures to the ...
  33. This policy setting controls whether or not the SYSVOL share created by the Net Logon service on a domain controller (DC) ...
  34. This policy setting controls whether or not the user is prompted to allow ActiveX controls to run on websites other than ...
  35. This policy setting controls whether or not unplanned shutdown events can be reported when error reporting is enabled. If ...
  36. This policy setting controls whether raw volume write notifications are sent to behavior monitoring. If you enable or do ...
  37. This policy setting controls whether RPC clients authenticate with the Endpoint Mapper Service when the call they are making ...
  38. This policy setting controls whether sites which bypass the proxy server are mapped into the local Intranet security zone. ...
  39. This policy setting controls whether SmartScreen Filter scans pages in this zone for malicious content. If you enable this ...
  40. This policy setting controls whether the Classification tab is displayed in the Properties dialog box in File Explorer. The ...
  41. This policy setting controls whether the contents of redirected folders is copied from the old location to the new location ...
  42. This policy setting controls whether the domain controller provides information about previous logons to client computers. ...
  43. This policy setting controls whether the lock screen appears for users. If you enable this policy setting, users that are ...
  44. This policy setting controls whether the LPRemove task will run to clean up language packs installed on a machine but are ...
  45. This policy setting controls whether the Net Logon service will allow the use of older cryptography algorithms that are used ...
  46. This policy setting controls whether the PC will boot to Windows To Go if a USB device containing a Windows To Go workspace ...
  47. This policy setting controls whether the QuickLaunch bar is displayed in the Taskbar. If you enable this policy setting, ...
  48. This policy setting controls whether the RPC runtime generates extended error information when an error occurs. Extended ...
  49. This policy setting controls whether the RPC Runtime ignores delegation failures when delegation is requested. The constrained ...
  50. This policy setting controls whether to have background synchronization for feeds and Web Slices. If you enable this policy ...
  51. This policy setting controls whether URLs representing UNCs are mapped into the local Intranet security zone. If you enable ...
  52. This policy setting controls whether users are shown an error dialog box that lets them report an error. If you enable this ...
  53. This policy setting controls whether websites can open new Internet Explorer windows that have no status bar or Address bar. ...
  54. This policy setting controls whether Windows Error Reporting saves its own events and error messages to the system event ...
  55. This policy setting controls whether Windows forcefully unloads the user's registry at logoff, even if there are open handles ...
  56. This policy setting controls whether Windows Store apps with Windows Runtime API access directly from web content can be ...
  57. This policy setting controls which Control Panel items such as Mouse, System, or Personalization, are displayed on the Control ...
  58. This policy setting controls which set of properties is available for classifying files on affected computers. Administrators ...
  59. This policy setting controls which UI language is used for computers with more than one UI language installed. If you enable ...
  60. This policy setting controls Windows Error Reporting behavior for errors in general applications when Windows Error Reporting ...
  61. This policy setting controls Windows Installer's interaction with the Restart Manager. The Restart Manager API can eliminate ...
  62. This policy setting controls Windows Installer's processing of the MsiLogging property. The MsiLogging property in an installation ...
  63. This policy setting customize which remediation action will be taken for each listed Threat ID when it is detected during ...
  64. This policy setting defines a list of TCP port numbers from which network traffic inspection will be disabled. Port numbers ...
  65. This policy setting defines a slow connection for purposes of applying and updating Group Policy. If the rate at which data ...
  66. This policy setting defines a slow connection for roaming user profiles and establishes thresholds for two tests of network ...
  67. This policy setting defines additional definition sets to enable for network traffic inspection. Definition set GUIDs should ...
  68. This policy setting defines processes from which outbound network traffic will not be inspected. Process names should be ...
  69. This policy setting defines the default behavior that the Background Intelligent Transfer Service (BITS) uses for background ...
  70. This policy setting defines the list of trusting forests that the Kerberos client searches when attempting to resolve two-part ...
  71. This policy setting defines the list of trusting forests that the Key Distribution Center (KDC) searches when attempting ...
  72. This policy setting defines the maximum size (in kilobytes) of downloaded files and attachments that will be scanned. If ...
  73. This policy setting defines the number of days items should be kept in the Quarantine folder before being removed. If you ...
  74. This policy setting defines the number of days items should be kept in the scan history folder before being permanently removed. ...
  75. This policy setting defines threats which will be excluded from detection during network traffic inspection. Threats should ...