This policy setting configures the Kerberos client so that it can authenticate with interoperable Kerberos V5 realms, as defined by this policy setting. If you enable this policy setting, you can view and change the list of interoperable Kerberos V5 realms and their settings. To view the list of interoperable Kerberos V5 realms, enable the policy setting and then click the Show button. To add an interoperable Kerberos V5 realm, enable the policy setting, note the syntax, and then click Show. In the Show Contents dialog box in the Value Name column, type the interoperable Kerberos V5 realm name. In the Value column, type the realm flags and host names of the host KDCs using the appropriate syntax format. To remove an interoperable Kerberos V5 realm Value Name or Value entry from the list, click the entry, and then press the DELETE key. To edit a mapping, remove the current entry from the list and add a new one with different parameters. If you disable this policy setting, the interoperable Kerberos V5 realm settings defined by Group Policy are deleted. If you do not configure this policy setting, the system uses the interoperable Kerberos V5 realm settings that are defined in the local registry, if they exist.
This policy setting configures the amount of time (in seconds) that the operating system waits to reboot in order to enforce ...
This policy setting configures the cost of 3G connections on the local machine. If this policy setting is enabled, a drop-down ...
This policy setting configures the cost of 4G connections on the local machine. If this policy setting is enabled, a drop-down ...
This policy setting configures the cost of Wireless LAN (WLAN) connections on the local machine. If this policy setting is ...
This policy setting configures the Kerberos client so that it can authenticate with interoperable Kerberos V5 realms, as ...
This policy setting configures the Kerberos client's mapping to KDC proxy servers for domains based on their DNS suffix names. ...
This policy setting configures the maximum number of concurrent shells any user can remotely open on the same system. Any ...
This policy setting configures the maximum number of processes a remote shell is allowed to launch. If you enable this policy ...
This policy setting configures the maximum number of users able to concurrently perform remote shell operations on the system. ...