Allows users to use the Add Printer Wizard to search the network for shared printers. If you enable this setting or do not configure it, when users choose to add a network printer by selecting the "A network printer, or a printer attached to another computer" radio button on Add Printer Wizard's page 2, and also check the "Connect to this printer (or to browse for a printer, select this option and click Next)" radio button on Add Printer Wizard's page 3, and do not specify a printer name in the adjacent "Name" edit box, then Add Printer Wizard displays the list of shared printers on the network and invites to choose a printer from the shown list. If you disable this setting, the network printer browse page is removed from within the Add Printer Wizard, and users cannot search the network but must type a printer name. Note: This setting affects the Add Printer Wizard only. It does not prevent users from using other programs to search for shared printers or to connect to network printers.
Allows this computer to receive unsolicited inbound Plug and Play messages sent by network devices, such as routers with ...
Allows unsolicited incoming messages from specified systems that authenticate using the IPsec transport. If you enable this ...
Allows UPnP devices to be hosted on this computer. If this service is stopped, any hosted UPnP devices will stop functioning ...
Allows users to connect interactively to a remote computer. Remote Desktop and Remote Desktop Session Host Server depend ...
Allows users to use the Add Printer Wizard to search the network for shared printers. If you enable this setting or do not ...
Allows Windows Firewall to record information about the unsolicited incoming messages that it receives. If you enable this ...
Allows you to analyze current systems settings against baseline settings that are stored in a database. The analysis results ...
Allows you to configure a system with security settings stored in a database. The syntax of this command is: secedit /configure ...
Allows you to disable System Restore configuration through System Protection. This policy setting allows you to turn off ...