Leaked source code of windows server 2003
You can not select more than 25 topics Topics must start with a letter or number, can include dashes ('-') and can be up to 35 characters long.

10942 lines
1.4 MiB

  1. ��#if version <= 2
  2. CLASS USER
  3. CATEGORY !!GPOnly
  4. POLICY !!GPOnlyPolicy
  5. KEYNAME "Software\Policies"
  6. PART !!GPOnly_Tip1 TEXT
  7. END PART
  8. PART !!GPOnly_Tip2 TEXT
  9. END PART
  10. PART !!GPOnly_Tip3 TEXT
  11. END PART
  12. PART !!GPOnly_Tip4 TEXT
  13. END PART
  14. PART !!GPOnly_Tip5 TEXT
  15. END PART
  16. END POLICY
  17. END CATEGORY
  18. CLASS MACHINE
  19. CATEGORY !!GPOnly
  20. POLICY !!GPOnlyPolicy
  21. KEYNAME "Software\Policies"
  22. PART !!GPOnly_Tip1 TEXT
  23. END PART
  24. PART !!GPOnly_Tip2 TEXT
  25. END PART
  26. PART !!GPOnly_Tip3 TEXT
  27. END PART
  28. PART !!GPOnly_Tip4 TEXT
  29. END PART
  30. PART !!GPOnly_Tip5 TEXT
  31. END PART
  32. END POLICY
  33. END CATEGORY
  34. #endif
  35. #if version >= 3
  36. CLASS MACHINE
  37. CATEGORY !!AdministrativeServices
  38. #if version >= 4
  39. EXPLAIN !!AdministrativeServices_Help
  40. #endif
  41. POLICY !!HelpQualifiedRootDir_Comp
  42. #if version >= 4
  43. SUPPORTED !!SUPPORTED_IE6SP1
  44. #endif
  45. KEYNAME "Software\Policies\Microsoft\Windows\System"
  46. EXPLAIN !!HelpQualifiedRootDir_Help
  47. PART !!HelpQualifiedRootDir_Edit EDITTEXT
  48. VALUENAME "HelpQualifiedRootDir"
  49. END PART
  50. PART !!HelpQualifiedRootDir_Example TEXT
  51. END PART
  52. END POLICY
  53. POLICY !!Do_not_display_Manage_Your_Server_page
  54. #if version >= 4
  55. SUPPORTED !!SUPPORTED_WindowsNET
  56. #endif
  57. KEYNAME "Software\Policies\Microsoft\Windows NT\CurrentVersion\MYS"
  58. EXPLAIN !!Do_not_display_Manage_Your_Server_page_Explain
  59. VALUENAME "DisableShowAtLogon"
  60. VALUEON NUMERIC 1
  61. VALUEOFF NUMERIC 0
  62. END POLICY
  63. POLICY !!ShutdownReason
  64. #if version >= 4
  65. SUPPORTED !!SUPPORTED_WindowsXP
  66. #endif
  67. EXPLAIN !!ShutdownReason_Help
  68. KEYNAME "Software\Policies\Microsoft\Windows NT\Reliability"
  69. VALUENAME "ShutdownReasonOn"
  70. VALUEON NUMERIC 1
  71. VALUEOFF NUMERIC 0
  72. PART !!ShutdownReason_Box DROPDOWNLIST REQUIRED
  73. VALUENAME "ShutdownReasonUI"
  74. ITEMLIST
  75. NAME !!ShutdownReason_Always VALUE NUMERIC 1 DEFAULT
  76. NAME !!ShutdownReason_WkstnOnly VALUE NUMERIC 2
  77. NAME !!ShutdownReason_SrvOnly VALUE NUMERIC 3
  78. END ITEMLIST
  79. END PART
  80. END POLICY
  81. POLICY !!ShutdownEventTrackerStateFile
  82. #if version >= 4
  83. SUPPORTED !!SUPPORTED_WindowsNET
  84. #endif
  85. EXPLAIN !!ShutdownEventTrackerStateFile_Help
  86. KEYNAME "Software\Policies\Microsoft\Windows NT\Reliability"
  87. VALUENAME "SnapShot"
  88. VALUEON NUMERIC 1
  89. VALUEOFF NUMERIC 0
  90. END POLICY
  91. POLICY !!EE_EnablePersistentTimeStamp
  92. #if version >= 4
  93. SUPPORTED !!SUPPORTED_WindowsNET
  94. #endif
  95. EXPLAIN !!EE_EnablePersistentTimeStamp_Help
  96. KEYNAME "Software\Policies\Microsoft\Windows NT\Reliability"
  97. VALUENAME "TimeStampEnabled"
  98. VALUEOFF NUMERIC 0
  99. VALUEON NUMERIC 1
  100. PART !!EE_EnablePersistentTimeStamp_Desc1 TEXT
  101. END PART
  102. PART !!EE_EnablePersistentTimeStamp_Desc2 TEXT
  103. END PART
  104. PART !!EE_EnablePersistentTimeStamp_Desc3 TEXT
  105. END PART
  106. PART !!EE_EnablePersistentTimeStamp_Desc4 NUMERIC REQUIRED
  107. VALUENAME "TimeStampInterval"
  108. MIN 1 MAX 86400 DEFAULT 60
  109. END PART
  110. END POLICY
  111. POLICY !!SetupSourcePath
  112. #if version >= 4
  113. SUPPORTED !!SUPPORTED_WindowsXP
  114. #endif
  115. EXPLAIN !!SetupSourcePath_Help
  116. KEYNAME "Software\Policies\Microsoft\Windows NT\Setup"
  117. PART !!SetupSourcePathBox EDITTEXT REQUIRED
  118. VALUENAME "SourcePath"
  119. END PART
  120. END POLICY
  121. POLICY !!ServicePackSourcePath
  122. #if version >= 4
  123. SUPPORTED !!SUPPORTED_WindowsXP
  124. #endif
  125. EXPLAIN !!ServicePackSourcePath_Help
  126. KEYNAME "Software\Policies\Microsoft\Windows NT\Setup"
  127. PART !!ServicePackSourcePathBox EDITTEXT REQUIRED
  128. VALUENAME "ServicePackSourcePath"
  129. END PART
  130. END POLICY
  131. POLICY !!DisableStatusMessages
  132. #if version >= 4
  133. SUPPORTED !!SUPPORTED_Win2k
  134. #endif
  135. KEYNAME "Software\Microsoft\Windows\CurrentVersion\Policies\System"
  136. EXPLAIN !!DisableStatusMessages_Help
  137. VALUENAME "DisableStatusMessages"
  138. END POLICY
  139. POLICY !!VerboseStatus
  140. #if version >= 4
  141. SUPPORTED !!SUPPORTED_Win2k
  142. #endif
  143. KEYNAME "Software\Microsoft\Windows\CurrentVersion\Policies\System"
  144. EXPLAIN !!VerboseStatus_Help
  145. VALUENAME "VerboseStatus"
  146. END POLICY
  147. POLICY !!RestrictRunFromHelp_Comp
  148. #if version >= 4
  149. SUPPORTED !!SUPPORTED_WindowsXP
  150. #endif
  151. KEYNAME "Software\Policies\Microsoft\Windows\System"
  152. EXPLAIN !!RestrictRunFromHelp_Help
  153. PART !!RestrictRunFromHelp_Edit EDITTEXT REQUIRED
  154. VALUENAME "DisableInHelp"
  155. END PART
  156. PART !!RestrictRunFromHelp_Example TEXT
  157. END PART
  158. END POLICY
  159. POLICY !!Autorun
  160. #if version >= 4
  161. SUPPORTED !!SUPPORTED_Win2k
  162. #endif
  163. KEYNAME "Software\Microsoft\Windows\CurrentVersion\Policies\Explorer"
  164. EXPLAIN !!Autorun_Help
  165. PART !!Autorun_Box DROPDOWNLIST REQUIRED
  166. VALUENAME "NoDriveTypeAutoRun"
  167. ITEMLIST
  168. NAME !!Autorun_NoCD VALUE NUMERIC 181 DEFAULT
  169. NAME !!Autorun_None VALUE NUMERIC 255
  170. END ITEMLIST
  171. END PART
  172. END POLICY
  173. POLICY !!NoEncryptOnMove
  174. #if version >= 4
  175. SUPPORTED !!SUPPORTED_Win2k
  176. #endif
  177. KEYNAME "Software\Microsoft\Windows\CurrentVersion\Policies\Explorer"
  178. EXPLAIN !!NoEncryptOnMove_Help
  179. VALUENAME "NoEncryptOnMove"
  180. END POLICY
  181. POLICY !!AppMgmt_COM_SearchForCLSID
  182. #if version >= 4
  183. SUPPORTED !!SUPPORTED_Win2k
  184. #endif
  185. KEYNAME "Software\Policies\Microsoft\Windows\App Management"
  186. EXPLAIN !!AppMgmt_COM_SearchForCLSID_Help
  187. VALUENAME "COMClassStore"
  188. END POLICY
  189. POLICY !!DLT_AllowDomainMode
  190. #if version >= 4
  191. SUPPORTED !!SUPPORTED_WindowsNET
  192. #endif
  193. KEYNAME "Software\Policies\Microsoft\Windows\System"
  194. EXPLAIN !!DLT_AllowDomainMode_Explain
  195. VALUENAME "DLT_AllowDomainMode"
  196. END POLICY
  197. CATEGORY !!UserProfiles
  198. #if version >= 4
  199. EXPLAIN !!UserProfiles_Help
  200. #endif
  201. POLICY !!CompatibleRUPSecurity
  202. #if version >= 4
  203. SUPPORTED !!SUPPORTED_WindowsXP_SP1_W2K_SP4_NETSERVER
  204. #endif
  205. EXPLAIN !!CompatibleRUPSecurity_Help
  206. KEYNAME "Software\Policies\Microsoft\Windows\System"
  207. VALUENAME "CompatibleRUPSecurity"
  208. END POLICY
  209. POLICY !!DeleteRoamingCachedProfiles
  210. #if version >= 4
  211. SUPPORTED !!SUPPORTED_Win2k
  212. #endif
  213. EXPLAIN !!DeleteRoamingCachedProfiles_Help
  214. KEYNAME "Software\Policies\Microsoft\Windows\System"
  215. VALUENAME "DeleteRoamingCache"
  216. END POLICY
  217. POLICY !!EnableSlowLinkDetect
  218. #if version >= 4
  219. SUPPORTED !!SUPPORTED_Win2k
  220. #endif
  221. EXPLAIN !!EnableSlowLinkDetect_Help
  222. KEYNAME "Software\Policies\Microsoft\Windows\System"
  223. VALUENAME "SlowLinkDetectEnabled"
  224. VALUEON NUMERIC 0
  225. VALUEOFF NUMERIC 1
  226. END POLICY
  227. POLICY !!SlowLinkTimeOut
  228. #if version >= 4
  229. SUPPORTED !!SUPPORTED_Win2k
  230. #endif
  231. EXPLAIN !!SlowLinkTimeOut_Help
  232. KEYNAME "Software\Policies\Microsoft\Windows\System"
  233. PART !!TransferRateOp NUMERIC
  234. MIN 0 MAX 4294967200 DEFAULT 500 SPIN 100
  235. VALUENAME "UserProfileMinTransferRate"
  236. END PART
  237. PART !!SlowLinkWaitInterval NUMERIC REQUIRED
  238. VALUENAME "SlowLinkTimeOut"
  239. MIN 0 MAX 20000 DEFAULT 120
  240. END PART
  241. END POLICY
  242. POLICY !!SlowLinkDefault
  243. #if version >= 4
  244. SUPPORTED !!SUPPORTED_Win2k
  245. #endif
  246. EXPLAIN !!SlowLinkDefault_Help
  247. KEYNAME "Software\Policies\Microsoft\Windows\System"
  248. VALUENAME "SlowLinkProfileDefault"
  249. END POLICY
  250. POLICY !!EnableSlowLinkUI
  251. #if version >= 4
  252. SUPPORTED !!SUPPORTED_Win2k
  253. #endif
  254. EXPLAIN !!EnableSlowLinkUI_Help
  255. KEYNAME "Software\Policies\Microsoft\Windows\System"
  256. VALUENAME "SlowLinkUIEnabled"
  257. END POLICY
  258. POLICY !!ProfileDlgTimeOut
  259. #if version >= 4
  260. SUPPORTED !!SUPPORTED_Win2k
  261. #endif
  262. EXPLAIN !!ProfileDlgTimeOut_Help
  263. KEYNAME "Software\Policies\Microsoft\Windows\System"
  264. PART !!ProfileDlgWaitInterval NUMERIC REQUIRED
  265. VALUENAME "ProfileDlgTimeOut"
  266. MIN 0 MAX 600 DEFAULT 30
  267. END PART
  268. END POLICY
  269. POLICY !!ProfileErrorAction
  270. #if version >= 4
  271. SUPPORTED !!SUPPORTED_Win2k
  272. #endif
  273. EXPLAIN !!ProfileErrorAction_Help
  274. KEYNAME "Software\Policies\Microsoft\Windows\System"
  275. VALUENAME "ProfileErrorAction"
  276. END POLICY
  277. POLICY !!ProfileUnloadTimeout
  278. #if version >= 4
  279. SUPPORTED !!SUPPORTED_Win2k
  280. #endif
  281. EXPLAIN !!ProfileUnloadTimeout_Help
  282. KEYNAME "Software\Policies\Microsoft\Windows\System"
  283. PART !!ProfileUnloadTimeoutPrompt NUMERIC REQUIRED
  284. VALUENAME "ProfileUnloadTimeout"
  285. MIN 0 MAX 4294967295 DEFAULT 60 SPIN 5
  286. END PART
  287. END POLICY
  288. POLICY !!AddAdminGroupToRUP
  289. #if version >= 4
  290. SUPPORTED !!SUPPORTED_WindowsXP
  291. #endif
  292. EXPLAIN !!AddAdminGroupToRUP_Help
  293. KEYNAME "Software\Policies\Microsoft\Windows\System"
  294. VALUENAME "AddAdminGroupToRUP"
  295. END POLICY
  296. POLICY !!Readonlyuserprofile
  297. #if version >= 4
  298. SUPPORTED !!SUPPORTED_WindowsXP
  299. #endif
  300. EXPLAIN !!Readonlyuserprofile_Help
  301. KEYNAME "Software\Policies\Microsoft\Windows\System"
  302. VALUENAME "ReadOnlyProfile"
  303. END POLICY
  304. POLICY !!LocalProfile
  305. #if version >= 4
  306. SUPPORTED !!SUPPORTED_WindowsXP
  307. #endif
  308. EXPLAIN !!LocalProfile_Help
  309. KEYNAME "Software\Policies\Microsoft\Windows\System"
  310. VALUENAME "LocalProfile"
  311. END POLICY
  312. END CATEGORY ; User Profiles
  313. CATEGORY !!Scripts
  314. #if version >= 4
  315. EXPLAIN !!Scripts
  316. #endif
  317. POLICY !!Run_Logon_Script_Sync
  318. #if version >= 4
  319. SUPPORTED !!SUPPORTED_Win2k
  320. #endif
  321. EXPLAIN !!Run_Logon_Script_Sync_Help
  322. KEYNAME "Software\Microsoft\Windows\CurrentVersion\Policies\System"
  323. VALUENAME "RunLogonScriptSync"
  324. VALUEON NUMERIC 1
  325. VALUEOFF NUMERIC 0
  326. END POLICY
  327. POLICY !!Run_Startup_Script_Sync
  328. #if version >= 4
  329. SUPPORTED !!SUPPORTED_Win2k
  330. #endif
  331. EXPLAIN !!Run_Startup_Script_Sync_Help
  332. KEYNAME "Software\Microsoft\Windows\CurrentVersion\Policies\System"
  333. VALUENAME "RunStartupScriptSync"
  334. VALUEON NUMERIC 0
  335. VALUEOFF NUMERIC 1
  336. END POLICY
  337. POLICY !!Run_Startup_Script_Visible
  338. #if version >= 4
  339. SUPPORTED !!SUPPORTED_Win2k
  340. #endif
  341. EXPLAIN !!Run_Startup_Script_Visible_Explain
  342. KEYNAME "Software\Microsoft\Windows\CurrentVersion\Policies\System"
  343. VALUENAME "HideStartupScripts"
  344. VALUEON NUMERIC 0
  345. VALUEOFF NUMERIC 1
  346. END POLICY
  347. POLICY !!Run_Shutdown_Script_Visible
  348. #if version >= 4
  349. SUPPORTED !!SUPPORTED_Win2k
  350. #endif
  351. EXPLAIN !!Run_Shutdown_Script_Visible_Explain
  352. KEYNAME "Software\Microsoft\Windows\CurrentVersion\Policies\System"
  353. VALUENAME "HideShutdownScripts"
  354. VALUEON NUMERIC 0
  355. VALUEOFF NUMERIC 1
  356. END POLICY
  357. POLICY !!MaxGPOScriptWaitPolicy
  358. #if version >= 4
  359. SUPPORTED !!SUPPORTED_Win2k
  360. #endif
  361. EXPLAIN !!MaxGPOScriptWaitPolicy_Help
  362. KEYNAME "Software\Microsoft\Windows\CurrentVersion\Policies\System"
  363. PART !!MaxGPOScriptWait NUMERIC REQUIRED
  364. VALUENAME "MaxGPOScriptWait"
  365. MIN 0 MAX 32000 DEFAULT 600
  366. END PART
  367. PART !!GPO_Script_Tip TEXT
  368. END PART
  369. END POLICY
  370. END CATEGORY ;Scripts
  371. CATEGORY !!Logon
  372. #if version >= 4
  373. EXPLAIN !!Logon_Help
  374. #endif
  375. POLICY !!NoWelcomeTips
  376. #if version >= 4
  377. SUPPORTED !!SUPPORTED_Win2kOnly
  378. #endif
  379. KEYNAME "Software\Microsoft\Windows\CurrentVersion\Policies\Explorer"
  380. EXPLAIN !!NoWelcomeTips_Help
  381. VALUENAME "NoWelcomeScreen"
  382. END POLICY
  383. POLICY !!LogonType
  384. KEYNAME "Software\Microsoft\Windows\CurrentVersion\Policies\System"
  385. #if version >= 4
  386. SUPPORTED !!SUPPORTED_WindowsXP
  387. #endif
  388. EXPLAIN !!LogonType_Help
  389. VALUENAME "LogonType"
  390. VALUEON NUMERIC 0
  391. VALUEOFF NUMERIC 1
  392. END POLICY
  393. POLICY !!Run
  394. #if version >= 4
  395. SUPPORTED !!SUPPORTED_Win2k
  396. #endif
  397. KEYNAME "Software\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run"
  398. EXPLAIN !!Run_Help
  399. PART !!RunListBox LISTBOX
  400. VALUEPREFIX ""
  401. END PART
  402. END POLICY
  403. POLICY !!DisableExplorerRunOnceLegacy
  404. #if version >= 4
  405. SUPPORTED !!SUPPORTED_Win2k
  406. #endif
  407. KEYNAME "Software\Microsoft\Windows\CurrentVersion\Policies\Explorer"
  408. EXPLAIN !!DisableExplorerRunOnceLegacy_Help
  409. VALUENAME "DisableLocalMachineRunOnce"
  410. END POLICY
  411. POLICY !!DisableExplorerRunLegacy
  412. #if version >= 4
  413. SUPPORTED !!SUPPORTED_Win2k
  414. #endif
  415. KEYNAME "Software\Microsoft\Windows\CurrentVersion\Policies\Explorer"
  416. EXPLAIN !!DisableExplorerRunLegacy_Help
  417. VALUENAME "DisableLocalMachineRun"
  418. END POLICY
  419. POLICY !!SyncForegroundPolicy
  420. KEYNAME "Software\Policies\Microsoft\Windows NT\CurrentVersion\Winlogon"
  421. #if version >= 4
  422. SUPPORTED !!SUPPORTED_WindowsXP
  423. #endif
  424. EXPLAIN !!SyncForegroundPolicy_Help
  425. VALUENAME "SyncForegroundPolicy"
  426. VALUEON NUMERIC 1
  427. VALUEOFF NUMERIC 0
  428. END POLICY
  429. END CATEGORY ; Logon
  430. CATEGORY !!DiskQuota
  431. #if version >= 4
  432. EXPLAIN !!DiskQuota_Help
  433. #endif
  434. KEYNAME "Software\Policies\Microsoft\Windows NT\DiskQuota"
  435. POLICY !!DQ_Enable
  436. #if version >= 4
  437. SUPPORTED !!SUPPORTED_Win2k
  438. #endif
  439. EXPLAIN !!DQ_Enable_Help
  440. VALUENAME "Enable"
  441. VALUEON NUMERIC 1
  442. VALUEOFF NUMERIC 0
  443. CLIENTEXT {3610eda5-77ef-11d2-8dc5-00c04fa31a66}
  444. END POLICY
  445. POLICY !!DQ_Enforce
  446. #if version >= 4
  447. SUPPORTED !!SUPPORTED_Win2k
  448. #endif
  449. EXPLAIN !!DQ_Enforce_Help
  450. VALUENAME "Enforce"
  451. VALUEON NUMERIC 1
  452. VALUEOFF NUMERIC 0
  453. CLIENTEXT {3610eda5-77ef-11d2-8dc5-00c04fa31a66}
  454. END POLICY
  455. POLICY !!DQ_Limit
  456. #if version >= 4
  457. SUPPORTED !!SUPPORTED_Win2k
  458. #endif
  459. EXPLAIN !!DQ_Limit_Help
  460. PART !!DQ_LimitTip1 TEXT
  461. END PART
  462. PART !!DQ_LimitTip2 TEXT
  463. END PART
  464. PART !!Blank TEXT
  465. END PART
  466. PART !!DQ_LimitLabel TEXT
  467. END PART
  468. PART !!Blank TEXT
  469. END PART
  470. PART !!DQ_LimitValue NUMERIC DEFAULT 100
  471. VALUENAME "Limit"
  472. MIN 0 MAX 1000 SPIN 10 REQUIRED
  473. CLIENTEXT {3610eda5-77ef-11d2-8dc5-00c04fa31a66}
  474. END PART
  475. PART !!DQ_LimitUnits DROPDOWNLIST NOSORT REQUIRED
  476. VALUENAME "LimitUnits"
  477. CLIENTEXT {3610eda5-77ef-11d2-8dc5-00c04fa31a66}
  478. ITEMLIST
  479. NAME !!DQ_UnitsKB VALUE NUMERIC 1
  480. NAME !!DQ_UnitsMB VALUE NUMERIC 2 DEFAULT
  481. NAME !!DQ_UnitsGB VALUE NUMERIC 3
  482. NAME !!DQ_UnitsTB VALUE NUMERIC 4
  483. NAME !!DQ_UnitsPB VALUE NUMERIC 5
  484. NAME !!DQ_UnitsEB VALUE NUMERIC 6
  485. END ITEMLIST
  486. END PART
  487. PART !!Blank TEXT
  488. END PART
  489. PART !!DQ_ThresholdLabel TEXT
  490. END PART
  491. PART !!Blank TEXT
  492. END PART
  493. PART !!DQ_ThresholdValue NUMERIC DEFAULT 100
  494. VALUENAME "Threshold"
  495. MIN 0 MAX 1000 SPIN 10 REQUIRED
  496. CLIENTEXT {3610eda5-77ef-11d2-8dc5-00c04fa31a66}
  497. END PART
  498. PART !!DQ_ThresholdUnits DROPDOWNLIST NOSORT REQUIRED
  499. VALUENAME "ThresholdUnits"
  500. CLIENTEXT {3610eda5-77ef-11d2-8dc5-00c04fa31a66}
  501. ITEMLIST
  502. NAME !!DQ_UnitsKB VALUE NUMERIC 1
  503. NAME !!DQ_UnitsMB VALUE NUMERIC 2 DEFAULT
  504. NAME !!DQ_UnitsGB VALUE NUMERIC 3
  505. NAME !!DQ_UnitsTB VALUE NUMERIC 4
  506. NAME !!DQ_UnitsPB VALUE NUMERIC 5
  507. NAME !!DQ_UnitsEB VALUE NUMERIC 6
  508. END ITEMLIST
  509. END PART
  510. END POLICY
  511. POLICY !!DQ_LogEventOverLimit
  512. #if version >= 4
  513. SUPPORTED !!SUPPORTED_Win2k
  514. #endif
  515. EXPLAIN !!DQ_LogEventOverLimit_Help
  516. VALUENAME "LogEventOverLimit"
  517. VALUEON NUMERIC 1
  518. VALUEOFF NUMERIC 0
  519. CLIENTEXT {3610eda5-77ef-11d2-8dc5-00c04fa31a66}
  520. END POLICY
  521. POLICY !!DQ_LogEventOverThreshold
  522. #if version >= 4
  523. SUPPORTED !!SUPPORTED_Win2k
  524. #endif
  525. EXPLAIN !!DQ_LogEventOverThreshold_Help
  526. VALUENAME "LogEventOverThreshold"
  527. VALUEON NUMERIC 1
  528. VALUEOFF NUMERIC 0
  529. CLIENTEXT {3610eda5-77ef-11d2-8dc5-00c04fa31a66}
  530. END POLICY
  531. POLICY !!DQ_RemovableMedia
  532. #if version >= 4
  533. SUPPORTED !!SUPPORTED_Win2k
  534. #endif
  535. EXPLAIN !!DQ_RemovableMedia_Help
  536. VALUENAME "ApplyToRemovableMedia"
  537. CLIENTEXT {3610eda5-77ef-11d2-8dc5-00c04fa31a66}
  538. END POLICY
  539. END CATEGORY ; DiskQuota
  540. CATEGORY !!Netlogon
  541. #if version >= 4
  542. EXPLAIN !!Netlogon_Help
  543. #endif
  544. POLICY !!Netlogon_ExpectedDialupDelay
  545. KEYNAME "Software\Policies\Microsoft\Netlogon\Parameters"
  546. #if version >= 4
  547. SUPPORTED !!SUPPORTED_WindowsXP
  548. #endif
  549. EXPLAIN !!Netlogon_ExpectedDialupDelay_Help
  550. PART !!Netlogon_ExpectedDialupDelayLabel NUMERIC
  551. MIN 0 MAX 600 DEFAULT 0 SPIN 100
  552. VALUENAME "ExpectedDialupDelay"
  553. END PART
  554. END POLICY
  555. POLICY !!Netlogon_SiteName
  556. KEYNAME "Software\Policies\Microsoft\Netlogon\Parameters"
  557. #if version >= 4
  558. SUPPORTED !!SUPPORTED_WindowsXP
  559. #endif
  560. EXPLAIN !!Netlogon_SiteName_Help
  561. PART !!Netlogon_SiteNameLabel EDITTEXT REQUIRED
  562. VALUENAME "SiteName"
  563. END PART
  564. END POLICY
  565. POLICY !!Netlogon_NegativeCachePeriod
  566. KEYNAME "Software\Policies\Microsoft\Netlogon\Parameters"
  567. #if version >= 4
  568. SUPPORTED !!SUPPORTED_WindowsXP
  569. #endif
  570. EXPLAIN !!Netlogon_NegativeCachePeriod_Help
  571. PART !!Netlogon_NegativeCachePeriodLabel NUMERIC
  572. MIN 0 MAX 604800 DEFAULT 45 SPIN 60
  573. VALUENAME "NegativeCachePeriod"
  574. END PART
  575. END POLICY
  576. POLICY !!Netlogon_BackgroundRetryInitialPeriod
  577. KEYNAME "Software\Policies\Microsoft\Netlogon\Parameters"
  578. #if version >= 4
  579. SUPPORTED !!SUPPORTED_WindowsXP
  580. #endif
  581. EXPLAIN !!Netlogon_BackgroundRetryInitialPeriod_Help
  582. PART !!Netlogon_BackgroundRetryInitialPeriodLabel NUMERIC
  583. MIN 0 MAX 4233600 DEFAULT 600 SPIN 600
  584. VALUENAME "BackgroundRetryInitialPeriod"
  585. END PART
  586. END POLICY
  587. POLICY !!Netlogon_BackgroundRetryMaximumPeriod
  588. KEYNAME "Software\Policies\Microsoft\Netlogon\Parameters"
  589. #if version >= 4
  590. SUPPORTED !!SUPPORTED_WindowsXP
  591. #endif
  592. EXPLAIN !!Netlogon_BackgroundRetryMaximumPeriod_Help
  593. PART !!Netlogon_BackgroundRetryMaximumPeriodLabel NUMERIC
  594. MIN 0 MAX 4233600 DEFAULT 3600 SPIN 3600
  595. VALUENAME "BackgroundRetryMaximumPeriod"
  596. END PART
  597. END POLICY
  598. POLICY !!Netlogon_BackgroundRetryQuitTime
  599. KEYNAME "Software\Policies\Microsoft\Netlogon\Parameters"
  600. #if version >= 4
  601. SUPPORTED !!SUPPORTED_WindowsXP
  602. #endif
  603. EXPLAIN !!Netlogon_BackgroundRetryQuitTime_Help
  604. PART !!Netlogon_BackgroundRetryQuitTimeLabel NUMERIC
  605. MIN 0 MAX 4233600 DEFAULT 0 SPIN 100
  606. VALUENAME "BackgroundRetryQuitTime"
  607. END PART
  608. END POLICY
  609. POLICY !!Netlogon_BackgroundSuccessfulRefreshPeriod
  610. KEYNAME "Software\Policies\Microsoft\Netlogon\Parameters"
  611. #if version >= 4
  612. SUPPORTED !!SUPPORTED_WindowsXP
  613. #endif
  614. EXPLAIN !!Netlogon_BackgroundSuccessfulRefreshPeriod_Help
  615. PART !!Netlogon_BackgroundSuccessfulRefreshPeriodLabel NUMERIC
  616. MIN 0 MAX 4294967200 DEFAULT 4294967200 SPIN 1000
  617. VALUENAME "BackgroundSuccessfulRefreshPeriod"
  618. END PART
  619. END POLICY
  620. POLICY !!Netlogon_NonBackgroundSuccessfulRefreshPeriod
  621. KEYNAME "Software\Policies\Microsoft\Netlogon\Parameters"
  622. #if version >= 4
  623. SUPPORTED !!SUPPORTED_WindowsXP
  624. #endif
  625. EXPLAIN !!Netlogon_NonBackgroundSuccessfulRefreshPeriod_Help
  626. PART !!Netlogon_NonBackgroundSuccessfulRefreshPeriodLabel NUMERIC
  627. MIN 0 MAX 4294967200 DEFAULT 1800 SPIN 1000
  628. VALUENAME "NonBackgroundSuccessfulRefreshPeriod"
  629. END PART
  630. END POLICY
  631. POLICY !!Netlogon_ScavengeInterval
  632. KEYNAME "Software\Policies\Microsoft\Netlogon\Parameters"
  633. #if version >= 4
  634. SUPPORTED !!SUPPORTED_WindowsXP
  635. #endif
  636. EXPLAIN !!Netlogon_ScavengeInterval_Help
  637. PART !!Netlogon_ScavengeIntervalLabel NUMERIC
  638. MIN 0 MAX 4294967200 DEFAULT 900 SPIN 900
  639. VALUENAME "ScavengeInterval"
  640. END PART
  641. END POLICY
  642. POLICY !!Netlogon_AvoidPdcOnWan
  643. KEYNAME "Software\Policies\Microsoft\Netlogon\Parameters"
  644. #if version >= 4
  645. SUPPORTED !!SUPPORTED_WindowsXP
  646. #endif
  647. EXPLAIN !!Netlogon_AvoidPdcOnWan_Help
  648. VALUENAME "AvoidPdcOnWan"
  649. VALUEON NUMERIC 0
  650. VALUEOFF NUMERIC 1
  651. END POLICY
  652. POLICY !!Netlogon_DebugFlag
  653. KEYNAME "Software\Policies\Microsoft\Netlogon\Parameters"
  654. #if version >= 4
  655. SUPPORTED !!SUPPORTED_WindowsNET
  656. #endif
  657. EXPLAIN !!Netlogon_DebugFlag_Help
  658. PART !!Netlogon_DebugFlagLabel NUMERIC REQUIRED
  659. MIN 0 MAX 4294967295 DEFAULT 536936447
  660. VALUENAME "dbFlag"
  661. END PART
  662. END POLICY
  663. POLICY !!Netlogon_MaximumLogFileSize
  664. KEYNAME "Software\Policies\Microsoft\Netlogon\Parameters"
  665. #if version >= 4
  666. SUPPORTED !!SUPPORTED_WindowsNET
  667. #endif
  668. EXPLAIN !!Netlogon_MaximumLogFileSize_Help
  669. PART !!Netlogon_MaximumLogFileSizeLabel NUMERIC REQUIRED
  670. MIN 0 MAX 4294967295 DEFAULT 536936447
  671. VALUENAME "MaximumLogFileSize"
  672. END PART
  673. END POLICY
  674. POLICY !!Netlogon_SysvolShareCompatibilityMode
  675. KEYNAME "Software\Policies\Microsoft\Netlogon\Parameters"
  676. #if version >= 4
  677. SUPPORTED !!SUPPORTED_WindowsNET
  678. #endif
  679. EXPLAIN !!Netlogon_SysvolShareCompatibilityMode_Help
  680. VALUENAME "AllowExclusiveSysvolShareAccess"
  681. VALUEON NUMERIC 1
  682. VALUEOFF NUMERIC 0
  683. END POLICY
  684. POLICY !!Netlogon_NetlogonShareCompatibilityMode
  685. KEYNAME "Software\Policies\Microsoft\Netlogon\Parameters"
  686. #if version >= 4
  687. SUPPORTED !!SUPPORTED_WindowsNET
  688. #endif
  689. EXPLAIN !!Netlogon_NetlogonShareCompatibilityMode_Help
  690. VALUENAME "AllowExclusiveScriptsShareAccess"
  691. VALUEON NUMERIC 1
  692. VALUEOFF NUMERIC 0
  693. END POLICY
  694. CATEGORY !!Netlogon_DC_Locator_DNS_Records
  695. #if version >= 4
  696. EXPLAIN !!Net_DC_Locator_DNS_Records_Help
  697. #endif
  698. POLICY !!Netlogon_UseDynamicDns
  699. KEYNAME "Software\Policies\Microsoft\Netlogon\Parameters"
  700. #if version >= 4
  701. SUPPORTED !!SUPPORTED_WindowsXP
  702. #endif
  703. EXPLAIN !!Netlogon_UseDynamicDns_Help
  704. VALUENAME "UseDynamicDns"
  705. VALUEON NUMERIC 1
  706. VALUEOFF NUMERIC 0
  707. END POLICY
  708. POLICY !!Netlogon_DnsAvoidRegisterRecords
  709. KEYNAME "Software\Policies\Microsoft\Netlogon\Parameters"
  710. #if version >= 4
  711. SUPPORTED !!SUPPORTED_WindowsXP
  712. #endif
  713. EXPLAIN !!Netlogon_DnsAvoidRegisterRecords_Help
  714. PART !!Netlogon_DnsAvoidRegisterRecordsLabel EDITTEXT REQUIRED
  715. VALUENAME "DnsAvoidRegisterRecords"
  716. END PART
  717. END POLICY
  718. POLICY !!Netlogon_DnsRefreshInterval
  719. KEYNAME "Software\Policies\Microsoft\Netlogon\Parameters"
  720. #if version >= 4
  721. SUPPORTED !!SUPPORTED_WindowsXP
  722. #endif
  723. EXPLAIN !!Netlogon_DnsRefreshInterval_Help
  724. PART !!Netlogon_DnsRefreshIntervalLabel NUMERIC
  725. MIN 1800 MAX 4294967200 DEFAULT 1800 SPIN 100
  726. VALUENAME "DnsRefreshInterval"
  727. END PART
  728. END POLICY
  729. POLICY !!Netlogon_LdapSrvWeight
  730. KEYNAME "Software\Policies\Microsoft\Netlogon\Parameters"
  731. #if version >= 4
  732. SUPPORTED !!SUPPORTED_WindowsXP
  733. #endif
  734. EXPLAIN !!Netlogon_LdapSrvWeight_Help
  735. PART !!Netlogon_LdapSrvWeightLabel NUMERIC
  736. MIN 0 MAX 65535 DEFAULT 100 SPIN 100
  737. VALUENAME "LdapSrvWeight"
  738. END PART
  739. END POLICY
  740. POLICY !!Netlogon_LdapSrvPriority
  741. KEYNAME "Software\Policies\Microsoft\Netlogon\Parameters"
  742. #if version >= 4
  743. SUPPORTED !!SUPPORTED_WindowsXP
  744. #endif
  745. EXPLAIN !!Netlogon_LdapSrvPriority_Help
  746. PART !!Netlogon_LdapSrvPriorityLabel NUMERIC
  747. MIN 0 MAX 65535 DEFAULT 0 SPIN 100
  748. VALUENAME "LdapSrvPriority"
  749. END PART
  750. END POLICY
  751. POLICY !!Netlogon_DnsTtl
  752. KEYNAME "Software\Policies\Microsoft\Netlogon\Parameters"
  753. #if version >= 4
  754. SUPPORTED !!SUPPORTED_WindowsXP
  755. #endif
  756. EXPLAIN !!Netlogon_DnsTtl_Help
  757. PART !!Netlogon_DnsTtlLabel NUMERIC
  758. MIN 0 MAX 4294967200 DEFAULT 600 SPIN 100
  759. VALUENAME "DnsTtl"
  760. END PART
  761. END POLICY
  762. POLICY !!Netlogon_AutoSiteCoverage
  763. KEYNAME "Software\Policies\Microsoft\Netlogon\Parameters"
  764. #if version >= 4
  765. SUPPORTED !!SUPPORTED_WindowsXP
  766. #endif
  767. EXPLAIN !!Netlogon_AutoSiteCoverage_Help
  768. VALUENAME "AutoSiteCoverage"
  769. VALUEON NUMERIC 1
  770. VALUEOFF NUMERIC 0
  771. END POLICY
  772. POLICY !!Netlogon_SiteCoverage
  773. KEYNAME "Software\Policies\Microsoft\Netlogon\Parameters"
  774. #if version >= 4
  775. SUPPORTED !!SUPPORTED_WindowsXP
  776. #endif
  777. EXPLAIN !!Netlogon_SiteCoverage_Help
  778. PART !!Netlogon_SiteCoverageLabel EDITTEXT REQUIRED
  779. VALUENAME "SiteCoverage"
  780. END PART
  781. END POLICY
  782. POLICY !!Netlogon_GcSiteCoverage
  783. KEYNAME "Software\Policies\Microsoft\Netlogon\Parameters"
  784. #if version >= 4
  785. SUPPORTED !!SUPPORTED_WindowsXP
  786. #endif
  787. EXPLAIN !!Netlogon_GcSiteCoverage_Help
  788. PART !!Netlogon_GcSiteCoverageLabel EDITTEXT REQUIRED
  789. VALUENAME "GcSiteCoverage"
  790. END PART
  791. END POLICY
  792. POLICY !!Netlogon_NdncSiteCoverage
  793. KEYNAME "Software\Policies\Microsoft\Netlogon\Parameters"
  794. #if version >= 4
  795. SUPPORTED !!SUPPORTED_WindowsXP
  796. #endif
  797. EXPLAIN !!Netlogon_NdncSiteCoverage_Help
  798. PART !!Netlogon_NdncSiteCoverageLabel EDITTEXT REQUIRED
  799. VALUENAME "NdncSiteCoverage"
  800. END PART
  801. END POLICY
  802. POLICY !!Netlogon_AllowSingleLabelDnsDomain
  803. KEYNAME "Software\Policies\Microsoft\Netlogon\Parameters"
  804. #if version >= 4
  805. SUPPORTED !!SUPPORTED_WindowsXP
  806. #endif
  807. EXPLAIN !!Netlogon_AllowSingleLabelDnsDomain_Help
  808. VALUENAME "AllowSingleLabelDnsDomain"
  809. VALUEON NUMERIC 1
  810. VALUEOFF NUMERIC 0
  811. END POLICY
  812. END CATEGORY ;Netlogon_DC_Locator_DNS_Records
  813. END CATEGORY ;Netlogon
  814. CATEGORY !!PolicyPolicies
  815. #if version >= 4
  816. EXPLAIN !!PolicyPolicies_Help
  817. #endif
  818. KEYNAME "Software\Microsoft\Windows\CurrentVersion\Policies\System"
  819. POLICY !!DisableBackgroundPolicy
  820. #if version >= 4
  821. SUPPORTED !!SUPPORTED_Win2k
  822. #endif
  823. EXPLAIN !!DisableBackgroundPolicy_Help
  824. VALUENAME "DisableBkGndGroupPolicy"
  825. END POLICY
  826. POLICY !!GroupPolicyRefreshRate
  827. KEYNAME "Software\Policies\Microsoft\Windows\System"
  828. #if version >= 4
  829. SUPPORTED !!SUPPORTED_Win2k
  830. #endif
  831. EXPLAIN !!GroupPolicyRefreshRate_Help
  832. PART !!GPRefreshRate_C_Desc1 TEXT
  833. END PART
  834. PART !!GPRefreshRate_C_Desc2 TEXT
  835. END PART
  836. PART !!GPRefreshRate NUMERIC REQUIRED
  837. MIN 0 MAX 64800 DEFAULT 90
  838. VALUENAME "GroupPolicyRefreshTime"
  839. END PART
  840. PART !!Blank TEXT
  841. END PART
  842. PART !!GPRefreshRateOffset_Desc1 TEXT
  843. END PART
  844. PART !!GPRefreshRateOffset_Desc2 TEXT
  845. END PART
  846. PART !!GPRefreshRateOffset_Desc3 TEXT
  847. END PART
  848. PART !!GPRefreshRateOffset NUMERIC REQUIRED
  849. MIN 0 MAX 1440 DEFAULT 30
  850. VALUENAME "GroupPolicyRefreshTimeOffset"
  851. END PART
  852. END POLICY
  853. POLICY !!GroupPolicyRefreshRateDC
  854. KEYNAME "Software\Policies\Microsoft\Windows\System"
  855. #if version >= 4
  856. SUPPORTED !!SUPPORTED_Win2k
  857. #endif
  858. EXPLAIN !!GroupPolicyRefreshRateDC_Help
  859. PART !!GPRefreshRate_DC_Desc1 TEXT
  860. END PART
  861. PART !!GPRefreshRate_DC_Desc2 TEXT
  862. END PART
  863. PART !!GPRefreshRate NUMERIC REQUIRED
  864. MIN 0 MAX 64800 DEFAULT 5
  865. VALUENAME "GroupPolicyRefreshTimeDC"
  866. END PART
  867. PART !!Blank TEXT
  868. END PART
  869. PART !!GPRefreshRateOffset_Desc1 TEXT
  870. END PART
  871. PART !!GPRefreshRateOffset_Desc2 TEXT
  872. END PART
  873. PART !!GPRefreshRateOffset_Desc3 TEXT
  874. END PART
  875. PART !!GPRefreshRateOffset NUMERIC REQUIRED
  876. MIN 0 MAX 1440 DEFAULT 0
  877. VALUENAME "GroupPolicyRefreshTimeOffsetDC"
  878. END PART
  879. END POLICY
  880. POLICY !!UserPolicyMode
  881. KEYNAME "Software\Policies\Microsoft\Windows\System"
  882. #if version >= 4
  883. SUPPORTED !!SUPPORTED_Win2k
  884. #endif
  885. EXPLAIN !!UserPolicyMode_Help
  886. PART !!UserPolicyModeOp DROPDOWNLIST NOSORT
  887. VALUENAME "UserPolicyMode"
  888. ITEMLIST
  889. NAME !!UserPolicyMode_Merge VALUE NUMERIC 1
  890. NAME !!UserPolicyMode_Replace VALUE NUMERIC 2 DEFAULT
  891. END ITEMLIST
  892. END PART
  893. END POLICY
  894. POLICY !!AllowX-ForestPolicy-and-RUP
  895. #if version >= 4
  896. SUPPORTED !!SUPPORTED_WindowsNET
  897. #endif
  898. EXPLAIN !!AllowX-ForestPolicy-and-RUP_Help
  899. KEYNAME "Software\Policies\Microsoft\Windows\System"
  900. VALUENAME "AllowX-ForestPolicy-and-RUP"
  901. VALUEON NUMERIC 1
  902. VALUEOFF NUMERIC 0
  903. END POLICY
  904. POLICY !!GPTransferRate
  905. KEYNAME "Software\Policies\Microsoft\Windows\System"
  906. #if version >= 4
  907. SUPPORTED !!SUPPORTED_Win2k
  908. #endif
  909. EXPLAIN !!GPTransferRate_Help
  910. PART !!TransferRateOp NUMERIC
  911. MIN 0 MAX 4294967200 DEFAULT 500 SPIN 100
  912. VALUENAME "GroupPolicyMinTransferRate"
  913. END PART
  914. PART !!Blank TEXT
  915. END PART
  916. PART !!TransferRateTip1 TEXT
  917. END PART
  918. END POLICY
  919. POLICY !!RSoPLogging
  920. KEYNAME "Software\Policies\Microsoft\Windows\System"
  921. #if version >= 4
  922. SUPPORTED !!SUPPORTED_WindowsXP
  923. #endif
  924. EXPLAIN !!RSoPLogging_Help
  925. VALUENAME "RSoPLogging"
  926. VALUEON NUMERIC 0
  927. VALUEOFF NUMERIC 1
  928. END POLICY
  929. POLICY !!DisableUsersFromMachGP
  930. KEYNAME "Software\Policies\Microsoft\Windows\System"
  931. #if version >= 4
  932. SUPPORTED !!SUPPORTED_WindowsXP
  933. #endif
  934. EXPLAIN !!DisableUsersFromMachGP_Help
  935. VALUENAME "DenyUsersFromMachGP"
  936. VALUEON NUMERIC 1
  937. VALUEOFF NUMERIC 0
  938. END POLICY
  939. POLICY !!DenyRsopToInteractiveUser
  940. KEYNAME "Software\Policies\Microsoft\Windows\System"
  941. #if version >= 4
  942. SUPPORTED !!SUPPORTED_WindowsXP
  943. #endif
  944. EXPLAIN !!DenyRsopToInteractiveUser_Help
  945. VALUENAME "DenyRsopToInteractiveUser"
  946. VALUEON NUMERIC 1
  947. VALUEOFF NUMERIC 0
  948. END POLICY
  949. POLICY !!CSE_Registry
  950. KEYNAME "Software\Policies\Microsoft\Windows\Group Policy\{35378EAC-683F-11D2-A89A-00C04FBBCFA2}"
  951. #if version >= 4
  952. SUPPORTED !!SUPPORTED_Win2k
  953. #endif
  954. EXPLAIN !!CSE_Registry_Help
  955. PART !!CSE_NOBACKGROUND CHECKBOX
  956. VALUENAME "NoBackgroundPolicy"
  957. VALUEON NUMERIC 1
  958. VALUEOFF NUMERIC 0
  959. END PART
  960. PART !!CSE_NOCHANGES CHECKBOX
  961. VALUENAME "NoGPOListChanges"
  962. VALUEON NUMERIC 0
  963. VALUEOFF NUMERIC 1
  964. END PART
  965. END POLICY
  966. POLICY !!CSE_IEM
  967. KEYNAME "Software\Policies\Microsoft\Windows\Group Policy\{A2E30F80-D7DE-11d2-BBDE-00C04F86AE3B}"
  968. #if version >= 4
  969. SUPPORTED !!SUPPORTED_Win2k
  970. #endif
  971. EXPLAIN !!CSE_IEM_Help
  972. PART !!CSE_SLOWLINK CHECKBOX
  973. VALUENAME "NoSlowLink"
  974. VALUEON NUMERIC 0
  975. VALUEOFF NUMERIC 1
  976. END PART
  977. PART !!CSE_NOBACKGROUND CHECKBOX
  978. VALUENAME "NoBackgroundPolicy"
  979. VALUEON NUMERIC 1
  980. VALUEOFF NUMERIC 0
  981. END PART
  982. PART !!CSE_NOCHANGES CHECKBOX
  983. VALUENAME "NoGPOListChanges"
  984. VALUEON NUMERIC 0
  985. VALUEOFF NUMERIC 1
  986. END PART
  987. END POLICY
  988. POLICY !!CSE_AppMgmt
  989. KEYNAME "Software\Policies\Microsoft\Windows\Group Policy\{c6dc5466-785a-11d2-84d0-00c04fb169f7}"
  990. #if version >= 4
  991. SUPPORTED !!SUPPORTED_Win2k
  992. #endif
  993. EXPLAIN !!CSE_AppMgmt_Help
  994. PART !!CSE_SLOWLINK CHECKBOX
  995. VALUENAME "NoSlowLink"
  996. VALUEON NUMERIC 0
  997. VALUEOFF NUMERIC 1
  998. END PART
  999. PART !!CSE_NOCHANGES CHECKBOX
  1000. VALUENAME "NoGPOListChanges"
  1001. VALUEON NUMERIC 0
  1002. VALUEOFF NUMERIC 1
  1003. END PART
  1004. END POLICY
  1005. POLICY !!CSE_FolderRedirection
  1006. KEYNAME "Software\Policies\Microsoft\Windows\Group Policy\{25537BA6-77A8-11D2-9B6C-0000F8080861}"
  1007. #if version >= 4
  1008. SUPPORTED !!SUPPORTED_Win2k
  1009. #endif
  1010. EXPLAIN !!CSE_FolderRedirection_Help
  1011. PART !!CSE_SLOWLINK CHECKBOX
  1012. VALUENAME "NoSlowLink"
  1013. VALUEON NUMERIC 0
  1014. VALUEOFF NUMERIC 1
  1015. END PART
  1016. PART !!CSE_NOCHANGES CHECKBOX
  1017. VALUENAME "NoGPOListChanges"
  1018. VALUEON NUMERIC 0
  1019. VALUEOFF NUMERIC 1
  1020. END PART
  1021. END POLICY
  1022. POLICY !!CSE_Scripts
  1023. KEYNAME "Software\Policies\Microsoft\Windows\Group Policy\{42B5FAAE-6536-11d2-AE5A-0000F87571E3}"
  1024. #if version >= 4
  1025. SUPPORTED !!SUPPORTED_Win2k
  1026. #endif
  1027. EXPLAIN !!CSE_Scripts_Help
  1028. PART !!CSE_SLOWLINK CHECKBOX
  1029. VALUENAME "NoSlowLink"
  1030. VALUEON NUMERIC 0
  1031. VALUEOFF NUMERIC 1
  1032. END PART
  1033. PART !!CSE_NOBACKGROUND CHECKBOX
  1034. VALUENAME "NoBackgroundPolicy"
  1035. VALUEON NUMERIC 1
  1036. VALUEOFF NUMERIC 0
  1037. END PART
  1038. PART !!CSE_NOCHANGES CHECKBOX
  1039. VALUENAME "NoGPOListChanges"
  1040. VALUEON NUMERIC 0
  1041. VALUEOFF NUMERIC 1
  1042. END PART
  1043. END POLICY
  1044. POLICY !!CSE_Security
  1045. KEYNAME "Software\Policies\Microsoft\Windows\Group Policy\{827D319E-6EAC-11D2-A4EA-00C04F79F83A}"
  1046. #if version >= 4
  1047. SUPPORTED !!SUPPORTED_Win2k
  1048. #endif
  1049. EXPLAIN !!CSE_Security_Help
  1050. PART !!CSE_NOBACKGROUND CHECKBOX
  1051. VALUENAME "NoBackgroundPolicy"
  1052. VALUEON NUMERIC 1
  1053. VALUEOFF NUMERIC 0
  1054. END PART
  1055. PART !!CSE_NOCHANGES CHECKBOX
  1056. VALUENAME "NoGPOListChanges"
  1057. VALUEON NUMERIC 0
  1058. VALUEOFF NUMERIC 1
  1059. END PART
  1060. END POLICY
  1061. POLICY !!CSE_IPSecurity
  1062. KEYNAME "Software\Policies\Microsoft\Windows\Group Policy\{e437bc1c-aa7d-11d2-a382-00c04f991e27}"
  1063. #if version >= 4
  1064. SUPPORTED !!SUPPORTED_Win2k
  1065. #endif
  1066. EXPLAIN !!CSE_IPSecurity_Help
  1067. PART !!CSE_SLOWLINK CHECKBOX
  1068. VALUENAME "NoSlowLink"
  1069. VALUEON NUMERIC 0
  1070. VALUEOFF NUMERIC 1
  1071. END PART
  1072. PART !!CSE_NOBACKGROUND CHECKBOX
  1073. VALUENAME "NoBackgroundPolicy"
  1074. VALUEON NUMERIC 1
  1075. VALUEOFF NUMERIC 0
  1076. END PART
  1077. PART !!CSE_NOCHANGES CHECKBOX
  1078. VALUENAME "NoGPOListChanges"
  1079. VALUEON NUMERIC 0
  1080. VALUEOFF NUMERIC 1
  1081. END PART
  1082. END POLICY
  1083. POLICY !!CSE_Wireless
  1084. KEYNAME "Software\Policies\Microsoft\Windows\Group Policy\{0ACDD40C-75AC-47ab-BAA0-BF6DE7E7FE63}"
  1085. #if version >= 4
  1086. SUPPORTED !!SUPPORTED_Win2k
  1087. #endif
  1088. EXPLAIN !!CSE_Wireless_Help
  1089. PART !!CSE_SLOWLINK CHECKBOX
  1090. VALUENAME "NoSlowLink"
  1091. VALUEON NUMERIC 0
  1092. VALUEOFF NUMERIC 1
  1093. END PART
  1094. PART !!CSE_NOBACKGROUND CHECKBOX
  1095. VALUENAME "NoBackgroundPolicy"
  1096. VALUEON NUMERIC 1
  1097. VALUEOFF NUMERIC 0
  1098. END PART
  1099. PART !!CSE_NOCHANGES CHECKBOX
  1100. VALUENAME "NoGPOListChanges"
  1101. VALUEON NUMERIC 0
  1102. VALUEOFF NUMERIC 1
  1103. END PART
  1104. END POLICY
  1105. POLICY !!CSE_EFSRecovery
  1106. KEYNAME "Software\Policies\Microsoft\Windows\Group Policy\{B1BE8D72-6EAC-11D2-A4EA-00C04F79F83A}"
  1107. #if version >= 4
  1108. SUPPORTED !!SUPPORTED_Win2k
  1109. #endif
  1110. EXPLAIN !!CSE_EFSRecovery_Help
  1111. PART !!CSE_SLOWLINK CHECKBOX
  1112. VALUENAME "NoSlowLink"
  1113. VALUEON NUMERIC 0
  1114. VALUEOFF NUMERIC 1
  1115. END PART
  1116. PART !!CSE_NOBACKGROUND CHECKBOX
  1117. VALUENAME "NoBackgroundPolicy"
  1118. VALUEON NUMERIC 1
  1119. VALUEOFF NUMERIC 0
  1120. END PART
  1121. PART !!CSE_NOCHANGES CHECKBOX
  1122. VALUENAME "NoGPOListChanges"
  1123. VALUEON NUMERIC 0
  1124. VALUEOFF NUMERIC 1
  1125. END PART
  1126. END POLICY
  1127. POLICY !!CSE_DiskQuota
  1128. KEYNAME "Software\Policies\Microsoft\Windows\Group Policy\{3610eda5-77ef-11d2-8dc5-00c04fa31a66}"
  1129. #if version >= 4
  1130. SUPPORTED !!SUPPORTED_Win2k
  1131. #endif
  1132. EXPLAIN !!CSE_DiskQuota_Help
  1133. PART !!CSE_SLOWLINK CHECKBOX
  1134. VALUENAME "NoSlowLink"
  1135. VALUEON NUMERIC 0
  1136. VALUEOFF NUMERIC 1
  1137. END PART
  1138. PART !!CSE_NOBACKGROUND CHECKBOX
  1139. VALUENAME "NoBackgroundPolicy"
  1140. VALUEON NUMERIC 1
  1141. VALUEOFF NUMERIC 0
  1142. END PART
  1143. PART !!CSE_NOCHANGES CHECKBOX
  1144. VALUENAME "NoGPOListChanges"
  1145. VALUEON NUMERIC 0
  1146. VALUEOFF NUMERIC 1
  1147. END PART
  1148. END POLICY
  1149. POLICY !!OnlyUseLocalAdminFiles
  1150. KEYNAME "Software\Policies\Microsoft\Windows\Group Policy"
  1151. #if version >= 4
  1152. SUPPORTED !!SUPPORTED_WindowsNET
  1153. #endif
  1154. EXPLAIN !!OnlyUseLocalAdminFiles_Help
  1155. VALUENAME "OnlyUseLocalAdminFiles"
  1156. VALUEON NUMERIC 1
  1157. VALUEOFF NUMERIC 0
  1158. END POLICY
  1159. END CATEGORY ; PolicyPolicies
  1160. CATEGORY !!RemoteAssist
  1161. #if version >= 4
  1162. EXPLAIN !!RemoteAssist_Help
  1163. #endif
  1164. POLICY !!RA_Solicit
  1165. #if version >= 4
  1166. SUPPORTED !!SUPPORTED_WindowsXP
  1167. #endif
  1168. EXPLAIN !!RA_Solicit_Help
  1169. KEYNAME "Software\policies\Microsoft\Windows NT\Terminal Services"
  1170. VALUENAME fAllowToGetHelp
  1171. VALUEON NUMERIC 1
  1172. VALUEOFF NUMERIC 0
  1173. PART !!RA_Solicit_Control_List DROPDOWNLIST NOSORT
  1174. KEYNAME "Software\policies\Microsoft\Windows NT\Terminal Services"
  1175. VALUENAME fAllowFullControl
  1176. ITEMLIST
  1177. NAME !!RA_Solicit_Control_Ctrl VALUE NUMERIC 1 DEFAULT
  1178. NAME !!RA_Solicit_Control_View VALUE NUMERIC 0
  1179. END ITEMLIST
  1180. END PART
  1181. PART !!RA_Solicit_ExpireValue_Edt NUMERIC
  1182. KEYNAME "Software\policies\Microsoft\Windows NT\Terminal Services"
  1183. VALUENAME MaxTicketExpiry
  1184. MIN 1 MAX 99 DEFAULT 1
  1185. END PART
  1186. PART !!RA_Solicit_ExpireUnits_List DROPDOWNLIST
  1187. KEYNAME "Software\policies\Microsoft\Windows NT\Terminal Services"
  1188. VALUENAME MaxTicketExpiryUnits
  1189. ITEMLIST
  1190. NAME !!RA_Solicit_Control_Minutes VALUE NUMERIC 0
  1191. NAME !!RA_Solicit_Control_Hours VALUE NUMERIC 1 DEFAULT
  1192. NAME !!RA_Solicit_Control_Days VALUE NUMERIC 2
  1193. END ITEMLIST
  1194. END PART
  1195. PART !!RA_Solicit_Mailto_List DROPDOWNLIST
  1196. KEYNAME "Software\policies\Microsoft\Windows NT\Terminal Services"
  1197. VALUENAME fUseMailto
  1198. ITEMLIST
  1199. NAME !!RA_Solicit_SimpleMapi VALUE NUMERIC 0
  1200. NAME !!RA_Solicit_Mailto VALUE NUMERIC 1 DEFAULT
  1201. END ITEMLIST
  1202. END PART
  1203. END POLICY
  1204. POLICY !!RA_Unsolicit
  1205. #if version >= 4
  1206. SUPPORTED !!SUPPORTED_WindowsXP
  1207. #endif
  1208. EXPLAIN !!RA_Unsolicit_Help
  1209. KEYNAME "Software\policies\Microsoft\Windows NT\Terminal Services"
  1210. VALUENAME fAllowUnsolicited
  1211. VALUEON NUMERIC 1
  1212. VALUEOFF NUMERIC 0
  1213. PART !!RA_Unsolicit_Control_List DROPDOWNLIST NOSORT
  1214. KEYNAME "Software\policies\Microsoft\Windows NT\Terminal Services"
  1215. VALUENAME fAllowUnsolicitedFullControl
  1216. ITEMLIST
  1217. NAME !!RA_Unsolicit_Control_Ctrl VALUE NUMERIC 1 DEFAULT
  1218. NAME !!RA_Unsolicit_Control_View VALUE NUMERIC 0
  1219. END ITEMLIST
  1220. END PART
  1221. PART !!RA_Unsolicit_DACL_Edit LISTBOX
  1222. KEYNAME "Software\policies\Microsoft\Windows NT\Terminal Services\RAUnsolicit"
  1223. END PART
  1224. END POLICY
  1225. END CATEGORY ;; RemoteAssist
  1226. CATEGORY !!SR
  1227. #if version >= 4
  1228. EXPLAIN !!SR_Help
  1229. #endif
  1230. KEYNAME "Software\Policies\Microsoft\Windows NT\SystemRestore"
  1231. POLICY !!SR_DisableSR
  1232. #if version >= 4
  1233. SUPPORTED !!SUPPORTED_WindowsXPOnly
  1234. #endif
  1235. EXPLAIN !!SR_DisableSR_Help
  1236. VALUENAME "DisableSR"
  1237. VALUEON NUMERIC 1
  1238. VALUEOFF NUMERIC 0
  1239. END POLICY
  1240. POLICY !!SR_DisableConfig
  1241. #if version >= 4
  1242. SUPPORTED !!SUPPORTED_WindowsXPOnly
  1243. #endif
  1244. EXPLAIN !!SR_DisableConfig_Help
  1245. VALUENAME "DisableConfig"
  1246. VALUEON NUMERIC 1
  1247. VALUEOFF NUMERIC 0
  1248. END POLICY
  1249. END CATEGORY ;SR
  1250. CATEGORY !!PCHealth
  1251. #if version >= 4
  1252. EXPLAIN !!PCHealth_Help
  1253. #endif
  1254. POLICY !!PCH_ShowUI
  1255. #if version >= 4
  1256. SUPPORTED !!SUPPORTED_WindowsXP
  1257. #endif
  1258. EXPLAIN !!PCH_ShowUI_Help
  1259. KEYNAME "Software\Policies\Microsoft\PCHealth\ErrorReporting"
  1260. VALUENAME ShowUI
  1261. VALUEON NUMERIC 1
  1262. VALUEOFF NUMERIC 0
  1263. ACTIONLISTON
  1264. KEYNAME "Software\Policies\Microsoft\PCHealth\ErrorReporting\DW"
  1265. VALUENAME DWAllowHeadless
  1266. VALUE NUMERIC 0
  1267. END ACTIONLISTON
  1268. ACTIONLISTOFF
  1269. KEYNAME "Software\Policies\Microsoft\PCHealth\ErrorReporting\DW"
  1270. VALUENAME DWAllowHeadless
  1271. VALUE NUMERIC 1
  1272. END ACTIONLISTOFF
  1273. END POLICY
  1274. POLICY !!PCH_DoReport
  1275. #if version >= 4
  1276. SUPPORTED !!SUPPORTED_WindowsXP
  1277. #endif
  1278. EXPLAIN !!PCH_DoReport_Help
  1279. KEYNAME "Software\Policies\Microsoft\PCHealth\ErrorReporting"
  1280. VALUENAME DoReport
  1281. VALUEON NUMERIC 1
  1282. VALUEOFF NUMERIC 0
  1283. PART !!PCH_NoExternalURL_Chk CHECKBOX
  1284. KEYNAME "Software\Policies\Microsoft\PCHealth\ErrorReporting\DW"
  1285. VALUENAME DWNoExternalURL
  1286. VALUEON NUMERIC 1
  1287. VALUEOFF NUMERIC 0
  1288. END PART
  1289. PART !!PCH_NoFileCollect_Chk CHECKBOX
  1290. KEYNAME "Software\Policies\Microsoft\PCHealth\ErrorReporting\DW"
  1291. VALUENAME DWNoFileCollection
  1292. VALUEON NUMERIC 1
  1293. VALUEOFF NUMERIC 0
  1294. END PART
  1295. PART !!PCH_NoLevelTwo_Chk CHECKBOX
  1296. KEYNAME "Software\Policies\Microsoft\PCHealth\ErrorReporting\DW"
  1297. VALUENAME DWNoSecondLevelCollection
  1298. VALUEON NUMERIC 1
  1299. VALUEOFF NUMERIC 0
  1300. END PART
  1301. PART !!PCH_ForceQ_Chk CHECKBOX
  1302. KEYNAME "Software\Policies\Microsoft\PCHealth\ErrorReporting"
  1303. VALUENAME ForceQueueMode
  1304. VALUEON NUMERIC 1
  1305. VALUEOFF NUMERIC 0
  1306. END PART
  1307. PART !!PCH_DumpPath_Edit EDITTEXT
  1308. KEYNAME "Software\Policies\Microsoft\PCHealth\ErrorReporting\DW"
  1309. VALUENAME DWFileTreeRoot
  1310. END PART
  1311. PART !!PCH_CompanyText_Edit EDITTEXT
  1312. KEYNAME "Software\Policies\Microsoft\PCHealth\ErrorReporting\DW"
  1313. VALUENAME DWReporteeName
  1314. END PART
  1315. END POLICY
  1316. CATEGORY !!PCH_AdvancedReporting
  1317. #if version >= 4
  1318. EXPLAIN !!PCH_AdvancedReporting_Help
  1319. #endif
  1320. KEYNAME "Software\Policies\Microsoft\PCHealth\ErrorReporting"
  1321. POLICY !!PCH_AllOrNoneDef
  1322. #if version >= 4
  1323. SUPPORTED !!SUPPORTED_WindowsXP
  1324. #endif
  1325. EXPLAIN !!PCH_AllOrNoneDef_Help
  1326. PART !!PCH_AllOrNoneDef_List DROPDOWNLIST NOSORT
  1327. KEYNAME "Software\Policies\Microsoft\PCHealth\ErrorReporting"
  1328. VALUENAME AllOrNone
  1329. ITEMLIST
  1330. NAME !!PCH_AllOrNoneDef_Include VALUE NUMERIC 1 DEFAULT
  1331. NAME !!PCH_AllOrNoneDef_Exclude VALUE NUMERIC 0
  1332. END ITEMLIST
  1333. END PART
  1334. PART !!PCH_AllOrNoneIncMS_Chk CHECKBOX DEFCHECKED
  1335. KEYNAME "Software\Policies\Microsoft\PCHealth\ErrorReporting"
  1336. VALUENAME IncludeMicrosoftApps
  1337. VALUEON NUMERIC 1
  1338. VALUEOFF NUMERIC 0
  1339. END PART
  1340. PART !!PCH_AllOrNoneWinComp_Chk CHECKBOX DEFCHECKED
  1341. KEYNAME "Software\Policies\Microsoft\PCHealth\ErrorReporting"
  1342. VALUENAME IncludeWindowsApps
  1343. VALUEON NUMERIC 1
  1344. VALUEOFF NUMERIC 0
  1345. END PART
  1346. END POLICY
  1347. POLICY !!PCH_AllOrNoneInc
  1348. EXPLAIN !!PCH_AllOrNoneInc_Help
  1349. #if version >= 4
  1350. SUPPORTED !!SUPPORTED_WindowsXP
  1351. #endif
  1352. PART !!PCH_AllOrNoneInc_List LISTBOX
  1353. KEYNAME "Software\Policies\Microsoft\PCHealth\ErrorReporting\InclusionList"
  1354. END PART
  1355. END POLICY
  1356. POLICY !!PCH_AllOrNoneEx
  1357. EXPLAIN !!PCH_AllOrNoneEx_Help
  1358. #if version >= 4
  1359. SUPPORTED !!SUPPORTED_WindowsXP
  1360. #endif
  1361. PART !!PCH_AllOrNoneEx_List LISTBOX
  1362. KEYNAME "Software\Policies\Microsoft\PCHealth\ErrorReporting\ExclusionList"
  1363. END PART
  1364. END POLICY
  1365. POLICY !!PCH_ReportOperatingSystemFaults
  1366. #if version >= 4
  1367. SUPPORTED !!SUPPORTED_WindowsXP
  1368. #endif
  1369. EXPLAIN !!PCH_ReportOperatingSystemFaults_Help
  1370. KEYNAME "Software\Policies\Microsoft\PCHealth\ErrorReporting"
  1371. VALUENAME IncludeKernelFaults
  1372. VALUEON NUMERIC 1
  1373. VALUEOFF NUMERIC 0
  1374. END POLICY
  1375. POLICY !!PCH_ReportShutdownEvents
  1376. #if version >= 4
  1377. SUPPORTED !!SUPPORTED_WindowsNET
  1378. #endif
  1379. EXPLAIN !!PCH_ReportShutdownEvents_Help
  1380. KEYNAME "Software\Policies\Microsoft\PCHealth\ErrorReporting"
  1381. VALUENAME IncludeShutdownErrs
  1382. VALUEON NUMERIC 1
  1383. VALUEOFF NUMERIC 0
  1384. END POLICY
  1385. END CATEGORY
  1386. END CATEGORY ; PCHealth
  1387. CATEGORY !!WFP
  1388. #if version >= 4
  1389. EXPLAIN !!WFP_Help
  1390. #endif
  1391. KEYNAME "Software\Policies\Microsoft\Windows NT\Windows File Protection"
  1392. POLICY !!WFPScan
  1393. #if version >= 4
  1394. SUPPORTED !!SUPPORTED_WindowsXP
  1395. #endif
  1396. EXPLAIN !!WFPScan_Help
  1397. PART !!WFPScanList DROPDOWNLIST REQUIRED
  1398. VALUENAME "SfcScan"
  1399. ITEMLIST
  1400. NAME !!WFPScan_NotAtBoot VALUE NUMERIC 0 DEFAULT
  1401. NAME !!WFPScan_AtBoot VALUE NUMERIC 1
  1402. END ITEMLIST
  1403. END PART
  1404. END POLICY
  1405. POLICY !!WFPShowProgress
  1406. #if version >= 4
  1407. SUPPORTED !!SUPPORTED_WindowsXP
  1408. #endif
  1409. EXPLAIN !!WFPShowProgress_Help
  1410. VALUENAME "SfcShowProgress"
  1411. VALUEON NUMERIC 0
  1412. VALUEOFF NUMERIC 1
  1413. END POLICY
  1414. POLICY !!WFPQuota
  1415. #if version >= 4
  1416. SUPPORTED !!SUPPORTED_WindowsXP
  1417. #endif
  1418. EXPLAIN !!WFPQuota_Help
  1419. PART !!WFPQuota_Tip1 TEXT
  1420. END PART
  1421. PART !!WFPQuota_Tip2 TEXT
  1422. END PART
  1423. PART !!WFPQuota_Size NUMERIC
  1424. MIN 0 MAX 4294967295 DEFAULT 50 SPIN 1
  1425. VALUENAME "SfcQuota"
  1426. END PART
  1427. END POLICY
  1428. POLICY !!WFPDllCacheDir
  1429. #if version >= 4
  1430. SUPPORTED !!SUPPORTED_WindowsXP
  1431. #endif
  1432. EXPLAIN !!WFPDllCacheDir_Help
  1433. PART !!WFPDllCacheDirBox EDITTEXT REQUIRED
  1434. VALUENAME "SFCDllCacheDir"
  1435. END PART
  1436. END POLICY
  1437. END CATEGORY ; WFP
  1438. CATEGORY !!Rpc
  1439. #if version >= 4
  1440. EXPLAIN !!RPC_Help
  1441. #endif
  1442. KEYNAME "Software\Policies\Microsoft\Windows NT\Rpc"
  1443. POLICY !!RpcStateInformation
  1444. #if version >= 4
  1445. SUPPORTED !!SUPPORTED_WindowsXP
  1446. #endif
  1447. EXPLAIN !!RpcStateInformation_Help
  1448. PART !!RpcStateInformationList DROPDOWNLIST REQUIRED
  1449. VALUENAME "StateInformation"
  1450. ITEMLIST
  1451. NAME !!RpcStateInfoNone VALUE NUMERIC 0
  1452. NAME !!RpcStateInfoAuto1 VALUE NUMERIC 1
  1453. NAME !!RpcStateInfoAuto2 VALUE NUMERIC 2 DEFAULT
  1454. NAME !!RpcStateInfoServer VALUE NUMERIC 3
  1455. NAME !!RpcStateInfoBoth VALUE NUMERIC 4
  1456. END ITEMLIST
  1457. END PART
  1458. END POLICY
  1459. POLICY !!RpcExtendedErrorInformation
  1460. #if version >= 4
  1461. SUPPORTED !!SUPPORTED_WindowsXP
  1462. #endif
  1463. EXPLAIN !!RpcExtendedErrorInformation_Help
  1464. PART !!RpcExtendedErrorInformationList DROPDOWNLIST REQUIRED
  1465. VALUENAME "ExtErrorInformation"
  1466. ITEMLIST
  1467. NAME !!RpcEEInfoOff VALUE NUMERIC 0 DEFAULT
  1468. NAME !!RpcEEInfoOnWithExc VALUE NUMERIC 1
  1469. NAME !!RpcEEInfoOffWithExc VALUE NUMERIC 2
  1470. NAME !!RpcEEInfoOn VALUE NUMERIC 3
  1471. END ITEMLIST
  1472. END PART
  1473. PART !!RpcExtErrorExceptions EDITTEXT
  1474. VALUENAME "ExtErrorInfoExceptions"
  1475. END PART
  1476. END POLICY
  1477. POLICY !!RpcIgnoreDelegationFailure
  1478. #if version >= 4
  1479. SUPPORTED !!SUPPORTED_WindowsNET
  1480. #endif
  1481. KEYNAME "Software\Policies\Microsoft\Windows NT\Rpc\IgnoreDelegationFailure"
  1482. EXPLAIN !!RpcIgnoreDelegationFailure_Help
  1483. PART !!RpcIgnoreDelegationFailureList DROPDOWNLIST REQUIRED
  1484. VALUENAME "IgnoreDelegationFailure"
  1485. ITEMLIST
  1486. NAME !!RpcIDFOff VALUE NUMERIC 0 DEFAULT
  1487. NAME !!RpcIDFOn VALUE NUMERIC 1
  1488. END ITEMLIST
  1489. END PART
  1490. END POLICY
  1491. POLICY !!RpcMinimumHttpConnectionTimeout
  1492. #if version >= 4
  1493. SUPPORTED !!SUPPORTED_WindowsXPSP1
  1494. #endif
  1495. KEYNAME "Software\Policies\Microsoft\Windows NT\Rpc\MinimumConnectionTimeout"
  1496. EXPLAIN !!RpcMinimumHttpConnectionTimeout_Help
  1497. PART !!RpcMinimumHttpConnectionTimeoutValue NUMERIC REQUIRED SPIN 10
  1498. VALUENAME "MinimumConnectionTimeout"
  1499. DEFAULT 900
  1500. MIN 90
  1501. END PART
  1502. END POLICY
  1503. END CATEGORY ; Rpc
  1504. CATEGORY !!W32TIME_ROOT
  1505. #if version >= 4
  1506. EXPLAIN !!W32TIME_Help
  1507. #endif
  1508. KEYNAME "Software\Policies\Microsoft\W32Time"
  1509. POLICY !!W32TIME_POLICY_CONFIG
  1510. #if version >= 4
  1511. SUPPORTED !!SUPPORTED_WindowsXP
  1512. #endif
  1513. EXPLAIN !!W32TIME_CONFIG_EXPLAIN
  1514. KEYNAME "Software\Policies\Microsoft\W32Time\Config"
  1515. PART !!W32TIME_ClockDisciplineParameters TEXT
  1516. END PART
  1517. PART !!W32TIME_FrequencyCorrectRate NUMERIC
  1518. VALUENAME "FrequencyCorrectRate"
  1519. DEFAULT 4
  1520. MIN 1
  1521. END PART
  1522. PART !!W32TIME_HoldPeriod NUMERIC
  1523. VALUENAME "HoldPeriod"
  1524. DEFAULT 5
  1525. MIN 1
  1526. END PART
  1527. PART !!W32TIME_LargePhaseOffset NUMERIC
  1528. VALUENAME "LargePhaseOffset"
  1529. DEFAULT 1280000
  1530. MAX 4294967295
  1531. END PART
  1532. PART !!W32TIME_MaxAllowedPhaseOffset NUMERIC
  1533. VALUENAME "MaxAllowedPhaseOffset"
  1534. DEFAULT 300
  1535. MIN 0
  1536. END PART
  1537. PART !!W32TIME_MaxNegPhaseCorrection NUMERIC
  1538. VALUENAME "MaxNegPhaseCorrection"
  1539. DEFAULT 54000
  1540. MIN 0
  1541. MAX 4294967295
  1542. END PART
  1543. PART !!W32TIME_MaxPosPhaseCorrection NUMERIC
  1544. VALUENAME "MaxPosPhaseCorrection"
  1545. DEFAULT 54000
  1546. MIN 0
  1547. MAX 4294967295
  1548. END PART
  1549. PART !!W32TIME_PhaseCorrectRate NUMERIC
  1550. VALUENAME "PhaseCorrectRate"
  1551. DEFAULT 1
  1552. MIN 1
  1553. END PART
  1554. PART !!W32TIME_PollAdjustFactor NUMERIC
  1555. VALUENAME "PollAdjustFactor"
  1556. DEFAULT 5
  1557. MIN 1
  1558. END PART
  1559. PART !!W32TIME_SpikeWatchPeriod NUMERIC
  1560. VALUENAME "SpikeWatchPeriod"
  1561. DEFAULT 90
  1562. MIN 1
  1563. END PART
  1564. PART !!W32TIME_UpdateInterval NUMERIC
  1565. VALUENAME "UpdateInterval"
  1566. DEFAULT 30000
  1567. MIN 1
  1568. MAX 4294967295
  1569. END PART
  1570. PART !!W32TIME_GeneralParameters TEXT
  1571. END PART
  1572. PART !!W32TIME_AnnounceFlags NUMERIC
  1573. VALUENAME "AnnounceFlags"
  1574. DEFAULT 10
  1575. MIN 0
  1576. MAX 16
  1577. END PART
  1578. PART !!W32TIME_EventLogFlags NUMERIC
  1579. VALUENAME "EventLogFlags"
  1580. DEFAULT 2
  1581. MIN 0
  1582. MAX 3
  1583. END PART
  1584. PART !!W32TIME_LocalClockDispersion NUMERIC
  1585. VALUENAME "LocalClockDispersion"
  1586. DEFAULT 10
  1587. MIN 0
  1588. MAX 16
  1589. END PART
  1590. PART !!W32TIME_MaxPollInterval NUMERIC
  1591. VALUENAME "MaxPollInterval"
  1592. DEFAULT 15
  1593. END PART
  1594. PART !!W32TIME_MinPollInterval NUMERIC
  1595. VALUENAME "MinPollInterval"
  1596. DEFAULT 10
  1597. MAX 15
  1598. END PART
  1599. END POLICY
  1600. CATEGORY !!W32TIME_TIMEPROVIDERS
  1601. #if version >= 4
  1602. EXPLAIN !!W32TIME_TIMEPROVIDERS_Help
  1603. #endif
  1604. POLICY !!W32TIME_POLICY_ENABLE_NTPCLIENT
  1605. #if version >= 4
  1606. SUPPORTED !!SUPPORTED_WindowsXP
  1607. #endif
  1608. EXPLAIN !!W32TIME_ENABLE_NTPCLIENT_EXPLAIN
  1609. KEYNAME "Software\Policies\Microsoft\W32time\TimeProviders\NtpClient"
  1610. VALUENAME "Enabled"
  1611. VALUEON NUMERIC 1
  1612. VALUEOFF NUMERIC 0
  1613. END POLICY
  1614. POLICY !!W32TIME_POLICY_CONFIGURE_NTPCLIENT
  1615. #if version >= 4
  1616. SUPPORTED !!SUPPORTED_WindowsXP
  1617. #endif
  1618. EXPLAIN !!W32TIME_CONFIGURE_NTPCLIENT_EXPLAIN
  1619. KEYNAME "Software\Policies\Microsoft\W32time\TimeProviders\NtpClient"
  1620. PART !!W32TIME_NtpServer EDITTEXT
  1621. KEYNAME "Software\Policies\Microsoft\W32time\Parameters"
  1622. VALUENAME "NtpServer"
  1623. DEFAULT "time.windows.com,0x1"
  1624. END PART
  1625. PART !!W32TIME_Type DROPDOWNLIST NOSORT
  1626. KEYNAME "Software\Policies\Microsoft\W32time\Parameters"
  1627. VALUENAME "Type"
  1628. ITEMLIST
  1629. NAME !!W32TIME_Type_NoSync VALUE "NoSync"
  1630. NAME !!W32TIME_Type_Ntp VALUE "NTP"
  1631. NAME !!W32TIME_Type_NT5DS VALUE "NT5DS" DEFAULT
  1632. NAME !!W32TIME_Type_AllSync VALUE "AllSync"
  1633. END ITEMLIST
  1634. END PART
  1635. PART !!W32TIME_CrossSiteSyncFlags NUMERIC
  1636. VALUENAME "CrossSiteSyncFlags"
  1637. DEFAULT 2
  1638. MIN 0
  1639. MAX 2
  1640. END PART
  1641. PART !!W32TIME_ResolvePeerBackoffMinutes NUMERIC
  1642. VALUENAME "ResolvePeerBackoffMinutes"
  1643. DEFAULT 15
  1644. END PART
  1645. PART !!W32TIME_ResolvePeerBackoffMaxTimes NUMERIC
  1646. VALUENAME "ResolvePeerBackoffMaxTimes"
  1647. DEFAULT 7
  1648. END PART
  1649. PART !!W32TIME_SpecialPollInterval NUMERIC
  1650. VALUENAME "SpecialPollInterval"
  1651. DEFAULT 3600
  1652. MAX 4294967295
  1653. END PART
  1654. PART !!W32TIME_EventLogFlags NUMERIC
  1655. VALUENAME "EventLogFlags"
  1656. DEFAULT 0
  1657. MIN 0
  1658. MAX 3
  1659. END PART
  1660. END POLICY
  1661. POLICY !!W32TIME_POLICY_ENABLE_NTPSERVER
  1662. #if version >= 4
  1663. SUPPORTED !!SUPPORTED_WindowsXP
  1664. #endif
  1665. EXPLAIN !!W32TIME_ENABLE_NTPSERVER_EXPLAIN
  1666. KEYNAME "Software\Policies\Microsoft\W32Time\TimeProviders\NtpServer"
  1667. VALUENAME "Enabled"
  1668. VALUEON NUMERIC 1
  1669. VALUEOFF NUMERIC 0
  1670. END POLICY
  1671. END CATEGORY ;; W32TIME_CATEGORY_TIMEPROVIDERS
  1672. END CATEGORY ;; W32TIME_CATEGORY_ROOT
  1673. END CATEGORY ; AdministrativeServices
  1674. CATEGORY !!Network
  1675. #if version >= 4
  1676. EXPLAIN !!Network_Help
  1677. #endif
  1678. CATEGORY !!DNS_Client
  1679. #if version >= 4
  1680. EXPLAIN !!DNS_Client_Help
  1681. #endif
  1682. POLICY !!DNS_PrimaryDnsSuffix
  1683. KEYNAME "Software\Policies\Microsoft\System\DNSClient"
  1684. #if version >= 4
  1685. SUPPORTED !!SUPPORTED_Win2k
  1686. #endif
  1687. EXPLAIN !!DNS_PrimaryDnsSuffix_Help
  1688. PART !!DNS_PrimaryDnsSuffixBox EDITTEXT
  1689. VALUENAME "NV PrimaryDnsSuffix"
  1690. END PART
  1691. END POLICY
  1692. POLICY !!DNS_RegistrationEnabled
  1693. KEYNAME "Software\Policies\Microsoft\Windows NT\DNSClient"
  1694. #if version >= 4
  1695. SUPPORTED !!SUPPORTED_WindowsXP
  1696. #endif
  1697. EXPLAIN !!DNS_RegistrationEnabled_Help
  1698. VALUENAME "RegistrationEnabled"
  1699. VALUEON NUMERIC 1
  1700. VALUEOFF NUMERIC 0
  1701. END POLICY
  1702. POLICY !!DNS_SearchList
  1703. KEYNAME "Software\Policies\Microsoft\Windows NT\DNSClient"
  1704. #if version >= 4
  1705. SUPPORTED !!SUPPORTED_WindowsXP
  1706. #endif
  1707. EXPLAIN !!DNS_SearchList_Help
  1708. PART !!DNS_SearchListLabel EDITTEXT REQUIRED
  1709. VALUENAME "SearchList"
  1710. END PART
  1711. END POLICY
  1712. POLICY !!DNS_UseDomainNameDevolution
  1713. KEYNAME "Software\Policies\Microsoft\Windows NT\DNSClient"
  1714. #if version >= 4
  1715. SUPPORTED !!SUPPORTED_WindowsXP
  1716. #endif
  1717. EXPLAIN !!DNS_UseDomainNameDevolution_Help
  1718. VALUENAME "UseDomainNameDevolution"
  1719. VALUEON NUMERIC 1
  1720. VALUEOFF NUMERIC 0
  1721. END POLICY
  1722. POLICY !!DNS_RegisterReverseLookup
  1723. KEYNAME "Software\Policies\Microsoft\Windows NT\DNSClient"
  1724. #if version >= 4
  1725. SUPPORTED !!SUPPORTED_WindowsXP
  1726. #endif
  1727. EXPLAIN !!DNS_RegisterReverseLookup_Help
  1728. PART !!DNS_RegisterReverseLookup_Box DROPDOWNLIST REQUIRED
  1729. VALUENAME "RegisterReverseLookup"
  1730. ITEMLIST
  1731. NAME !!DNS_RegisterReverseLookup_RegisterOnlyIfASucceeds VALUE NUMERIC 2 DEFAULT
  1732. NAME !!DNS_RegisterReverseLookup_Register VALUE NUMERIC 1
  1733. NAME !!DNS_RegisterReverseLookup_DoNotRegister VALUE NUMERIC 0
  1734. END ITEMLIST
  1735. END PART
  1736. END POLICY
  1737. POLICY !!DNS_RegistrationRefreshInterval
  1738. KEYNAME "Software\Policies\Microsoft\Windows NT\DNSClient"
  1739. #if version >= 4
  1740. SUPPORTED !!SUPPORTED_WindowsXP
  1741. #endif
  1742. EXPLAIN !!DNS_RegistrationRefreshInterval_Help
  1743. PART !!DNS_RegistrationRefreshIntervalLabel NUMERIC
  1744. MIN 1800 MAX 4294967200 DEFAULT 1800 SPIN 100
  1745. VALUENAME "RegistrationRefreshInterval"
  1746. END PART
  1747. END POLICY
  1748. POLICY !!DNS_RegistrationOverwritesInConflict
  1749. KEYNAME "Software\Policies\Microsoft\Windows NT\DNSClient"
  1750. #if version >= 4
  1751. SUPPORTED !!SUPPORTED_WindowsXPOnly
  1752. #endif
  1753. EXPLAIN !!DNS_RegistrationOverwritesInConflict_Help
  1754. VALUENAME "RegistrationOverwritesInConflict"
  1755. VALUEON NUMERIC 1
  1756. VALUEOFF NUMERIC 0
  1757. END POLICY
  1758. POLICY !!DNS_NameServer
  1759. KEYNAME "Software\Policies\Microsoft\Windows NT\DNSClient"
  1760. #if version >= 4
  1761. SUPPORTED !!SUPPORTED_WindowsXPOnly
  1762. #endif
  1763. EXPLAIN !!DNS_NameServer_Help
  1764. PART !!DNS_NameServerLabel EDITTEXT REQUIRED
  1765. VALUENAME "NameServer"
  1766. END PART
  1767. END POLICY
  1768. POLICY !!DNS_Domain
  1769. KEYNAME "Software\Policies\Microsoft\Windows NT\DNSClient"
  1770. #if version >= 4
  1771. SUPPORTED !!SUPPORTED_WindowsXPOnly
  1772. #endif
  1773. EXPLAIN !!DNS_Domain_Help
  1774. PART !!DNS_DomainLabel EDITTEXT REQUIRED
  1775. VALUENAME "AdapterDomainName"
  1776. END PART
  1777. END POLICY
  1778. POLICY !!DNS_RegisterAdapterName
  1779. KEYNAME "Software\Policies\Microsoft\Windows NT\DNSClient"
  1780. #if version >= 4
  1781. SUPPORTED !!SUPPORTED_WindowsXP
  1782. #endif
  1783. EXPLAIN !!DNS_RegisterAdapterName_Help
  1784. VALUENAME "RegisterAdapterName"
  1785. VALUEON NUMERIC 1
  1786. VALUEOFF NUMERIC 0
  1787. END POLICY
  1788. POLICY !!DNS_RegistrationTtl
  1789. KEYNAME "Software\Policies\Microsoft\Windows NT\DNSClient"
  1790. #if version >= 4
  1791. SUPPORTED !!SUPPORTED_WindowsXP
  1792. #endif
  1793. EXPLAIN !!DNS_RegistrationTtl_Help
  1794. PART !!DNS_RegistrationTtlLabel NUMERIC
  1795. MIN 0 MAX 4294967200 DEFAULT 600 SPIN 100
  1796. VALUENAME "RegistrationTtl"
  1797. END PART
  1798. END POLICY
  1799. POLICY !!DNS_UpdateSecurityLevel
  1800. KEYNAME "Software\Policies\Microsoft\Windows NT\DNSClient"
  1801. #if version >= 4
  1802. SUPPORTED !!SUPPORTED_WindowsXP
  1803. #endif
  1804. EXPLAIN !!DNS_UpdateSecurityLevel_Help
  1805. PART !!DNS_UpdateSecurityLevel_Box DROPDOWNLIST REQUIRED
  1806. VALUENAME "UpdateSecurityLevel"
  1807. ITEMLIST
  1808. NAME !!DNS_UpdateSecurityLevel_OnlySecure VALUE NUMERIC 256
  1809. NAME !!DNS_UpdateSecurityLevel_OnlyUnsecure VALUE NUMERIC 16
  1810. NAME !!DNS_UpdateSecurityLevel_UnsecureFollowedBySecure VALUE NUMERIC 0 DEFAULT
  1811. END ITEMLIST
  1812. END PART
  1813. END POLICY
  1814. POLICY !!DNS_UpdateTopLevelDomainZones
  1815. KEYNAME "Software\Policies\Microsoft\Windows NT\DNSClient"
  1816. #if version >= 4
  1817. SUPPORTED !!SUPPORTED_WindowsXP
  1818. #endif
  1819. EXPLAIN !!DNS_UpdateTopLevelDomainZones_Help
  1820. VALUENAME "UpdateTopLevelDomainZones"
  1821. VALUEON NUMERIC 1
  1822. VALUEOFF NUMERIC 0
  1823. END POLICY
  1824. ; Postponed until next Windows release.
  1825. ; POLICY !!DNS_AppendToMultiLabelName
  1826. ; KEYNAME "Software\Policies\Microsoft\Windows NT\DNSClient"
  1827. ; #if version >= 4
  1828. ; SUPPORTED !!SUPPORTED_WindowsXP
  1829. ; #endif
  1830. ;
  1831. ; EXPLAIN !!DNS_AppendToMultiLabelName_Help
  1832. ; VALUENAME "AppendToMultiLabelName"
  1833. ; VALUEON NUMERIC 1
  1834. ; VALUEOFF NUMERIC 0
  1835. ; END POLICY
  1836. END CATEGORY ;DNS_Client
  1837. CATEGORY !!Cat_OfflineFiles
  1838. #if version >= 4
  1839. EXPLAIN !!Cat_OfflineFiles_Help
  1840. #endif
  1841. KEYNAME "Software\Policies\Microsoft\Windows\NetCache"
  1842. POLICY !!Pol_Enabled
  1843. #if version >= 4
  1844. SUPPORTED !!SUPPORTED_Win2k
  1845. #endif
  1846. EXPLAIN !!Pol_Enabled_Help
  1847. VALUENAME "Enabled"
  1848. VALUEON NUMERIC 1
  1849. VALUEOFF NUMERIC 0
  1850. PART !!Lbl_EnabledHelp1 TEXT
  1851. END PART
  1852. PART !!Lbl_EnabledHelp2 TEXT
  1853. END PART
  1854. PART !!Lbl_EnabledHelp3 TEXT
  1855. END PART
  1856. END POLICY
  1857. POLICY !!Pol_NoConfigCache
  1858. #if version >= 4
  1859. SUPPORTED !!SUPPORTED_Win2k
  1860. #endif
  1861. EXPLAIN !!Pol_NoConfigCache_Help
  1862. VALUENAME "NoConfigCache"
  1863. PART !!Lbl_NoConfigCacheHelp1 TEXT
  1864. END PART
  1865. END POLICY
  1866. POLICY !!Pol_SyncAtLogon
  1867. #if version >= 4
  1868. SUPPORTED !!SUPPORTED_Win2k
  1869. #endif
  1870. EXPLAIN !!Pol_SyncAtLogon_Help
  1871. VALUENAME "SyncAtLogon"
  1872. VALUEON NUMERIC 1
  1873. VALUEOFF NUMERIC 0
  1874. END POLICY
  1875. POLICY !!Pol_SyncAtLogoff
  1876. #if version >= 4
  1877. SUPPORTED !!SUPPORTED_Win2k
  1878. #endif
  1879. EXPLAIN !!Pol_SyncAtLogoff_Help
  1880. VALUENAME "SyncAtLogoff"
  1881. VALUEON NUMERIC 1
  1882. VALUEOFF NUMERIC 0
  1883. END POLICY
  1884. POLICY !!Pol_SyncAtSuspend
  1885. #if version >= 4
  1886. SUPPORTED !!SUPPORTED_Win2k
  1887. #endif
  1888. EXPLAIN !!Pol_SyncAtSuspend_Help
  1889. PART !!Lbl_SyncAtSuspendHelp1 TEXT
  1890. END PART
  1891. PART !!Blank TEXT
  1892. END PART
  1893. PART !!Lbl_SyncAtSuspendCombo DROPDOWNLIST REQUIRED
  1894. VALUENAME "SyncAtSuspend"
  1895. ITEMLIST
  1896. NAME !!Lbl_QuickSync VALUE NUMERIC 0 DEFAULT
  1897. NAME !!Lbl_FullSync VALUE NUMERIC 1
  1898. END ITEMLIST
  1899. END PART
  1900. END POLICY
  1901. POLICY !!Pol_DefCacheSize
  1902. #if version >= 4
  1903. SUPPORTED !!SUPPORTED_Win2k
  1904. #endif
  1905. EXPLAIN !!Pol_DefCacheSize_Help
  1906. PART !!Lbl_DefCacheSizeHelp1 TEXT
  1907. END PART
  1908. PART !!Lbl_DefCacheSizeHelp2 TEXT
  1909. END PART
  1910. PART !!Blank TEXT
  1911. END PART
  1912. PART !!Lbl_DefCacheSizeSpin NUMERIC DEFAULT 1000 MIN 0 MAX 10000 SPIN 100
  1913. VALUENAME "DefCacheSize"
  1914. END PART
  1915. END POLICY
  1916. POLICY !!Pol_GoOfflineAction
  1917. #if version >= 4
  1918. SUPPORTED !!SUPPORTED_Win2k
  1919. #endif
  1920. EXPLAIN !!Pol_GoOfflineAction_Help
  1921. PART !!Lbl_GoOfflineActionHelp1 TEXT
  1922. END PART
  1923. PART !!Lbl_GoOfflineActionHelp2 TEXT
  1924. END PART
  1925. PART !!Blank TEXT
  1926. END PART
  1927. PART !!Lbl_GoOfflineActionCombo DROPDOWNLIST REQUIRED
  1928. VALUENAME "GoOfflineAction"
  1929. ITEMLIST
  1930. NAME !!Lbl_WorkOffline VALUE NUMERIC 0 DEFAULT
  1931. NAME !!Lbl_Fail VALUE NUMERIC 1
  1932. END ITEMLIST
  1933. END PART
  1934. PART !!Blank TEXT
  1935. END PART
  1936. PART !!Lbl_GoOfflineActionHelp3 TEXT
  1937. END PART
  1938. PART !!Lbl_GoOfflineActionHelp4 TEXT
  1939. END PART
  1940. END POLICY
  1941. POLICY !!Pol_CustomGoOfflineActions
  1942. #if version >= 4
  1943. SUPPORTED !!SUPPORTED_Win2k
  1944. #endif
  1945. EXPLAIN !!Pol_CustomGoOfflineActions_Help
  1946. KEYNAME "Software\Policies\Microsoft\Windows\NetCache\CustomGoOfflineActions"
  1947. PART !!Lbl_CustomGoOfflineActionsHelp1 TEXT
  1948. END PART
  1949. PART !!Lbl_CustomGoOfflineActionsHelp2 TEXT
  1950. END PART
  1951. PART !!Blank TEXT
  1952. END PART
  1953. PART !!Lbl_CustomGoOfflineActionsList LISTBOX EXPLICITVALUE
  1954. END PART
  1955. PART !!Lbl_CustomGoOfflineActionsHelp3 TEXT
  1956. END PART
  1957. PART !!Lbl_CustomGoOfflineActionsHelp4 TEXT
  1958. END PART
  1959. PART !!Lbl_CustomGoOfflineActionsHelp5 TEXT
  1960. END PART
  1961. END POLICY
  1962. POLICY !!Pol_NoMakeAvailableOffline
  1963. #if version >= 4
  1964. SUPPORTED !!SUPPORTED_Win2k
  1965. #endif
  1966. EXPLAIN !!Pol_NoMakeAvailableOffline_Help
  1967. VALUENAME "NoMakeAvailableOffline"
  1968. END POLICY
  1969. POLICY !!Pol_NoCacheViewer
  1970. #if version >= 4
  1971. SUPPORTED !!SUPPORTED_Win2k
  1972. #endif
  1973. EXPLAIN !!Pol_NoCacheViewer_Help
  1974. VALUENAME "NoCacheViewer"
  1975. END POLICY
  1976. POLICY !!Pol_ExtExclusionList
  1977. #if version >= 4
  1978. SUPPORTED !!SUPPORTED_Win2k
  1979. #endif
  1980. EXPLAIN !!Pol_ExtExclusionList_Help
  1981. PART !!Lbl_ExtExclusionListHelp1 TEXT
  1982. END PART
  1983. PART !!Lbl_ExtExclusionListHelp2 TEXT
  1984. END PART
  1985. PART !!Lbl_ExtExclusionListHelp3 TEXT
  1986. END PART
  1987. PART !!Blank TEXT
  1988. END PART
  1989. PART !!Lbl_ExtExclusionListEdit EDITTEXT
  1990. VALUENAME "ExcludeExtensions"
  1991. END PART
  1992. END POLICY
  1993. POLICY !!Pol_AssignedOfflineFiles
  1994. KEYNAME "Software\Policies\Microsoft\Windows\NetCache\AssignedOfflineFolders"
  1995. #if version >= 4
  1996. SUPPORTED !!SUPPORTED_Win2k
  1997. #endif
  1998. EXPLAIN !!Pol_AssignedOfflineFiles_Help
  1999. PART !!Lbl_AssignedOfflineFilesHelp1 TEXT
  2000. END PART
  2001. PART !!Lbl_AssignedOfflineFilesHelp2 TEXT
  2002. END PART
  2003. PART !!Lbl_AssignedOfflineFilesHelp3 TEXT
  2004. END PART
  2005. PART !!Blank TEXT
  2006. END PART
  2007. PART !!Lbl_AssignedOfflineFilesList LISTBOX EXPLICITVALUE ADDITIVE
  2008. END PART
  2009. END POLICY
  2010. POLICY !!Pol_NoReminders
  2011. #if version >= 4
  2012. SUPPORTED !!SUPPORTED_Win2k
  2013. #endif
  2014. EXPLAIN !!Pol_NoReminders_Help
  2015. VALUENAME "NoReminders"
  2016. VALUEON NUMERIC 1
  2017. VALUEOFF NUMERIC 0
  2018. END POLICY
  2019. POLICY !!Pol_ReminderFreq
  2020. #if version >= 4
  2021. SUPPORTED !!SUPPORTED_Win2k
  2022. #endif
  2023. EXPLAIN !!Pol_ReminderFreq_Help
  2024. PART !!Lbl_ReminderFreqHelp1 TEXT
  2025. END PART
  2026. PART !!Blank TEXT
  2027. END PART
  2028. PART !!Lbl_ReminderFreqSpin NUMERIC DEFAULT 60
  2029. MIN 0 MAX 1440 SPIN 10
  2030. VALUENAME "ReminderFreqMinutes"
  2031. END PART
  2032. END POLICY
  2033. POLICY !!Pol_ReminderInitTimeout
  2034. #if version >= 4
  2035. SUPPORTED !!SUPPORTED_Win2k
  2036. #endif
  2037. EXPLAIN !!Pol_ReminderInitTimeout_Help
  2038. PART !!Lbl_ReminderInitTimeoutHelp1 TEXT
  2039. END PART
  2040. PART !!Lbl_ReminderInitTimeoutHelp2 TEXT
  2041. END PART
  2042. PART !!Blank TEXT
  2043. END PART
  2044. PART !!Lbl_ReminderInitTimeoutSpin NUMERIC DEFAULT 30
  2045. MIN 10 MAX 60 SPIN 1
  2046. VALUENAME "InitialBalloonTimeoutSeconds"
  2047. END PART
  2048. END POLICY
  2049. POLICY !!Pol_ReminderTimeout
  2050. #if version >= 4
  2051. SUPPORTED !!SUPPORTED_Win2k
  2052. #endif
  2053. EXPLAIN !!Pol_ReminderTimeout_Help
  2054. PART !!Lbl_ReminderTimeoutHelp1 TEXT
  2055. END PART
  2056. PART !!Lbl_ReminderTimeoutHelp2 TEXT
  2057. END PART
  2058. PART !!Blank TEXT
  2059. END PART
  2060. PART !!Lbl_ReminderTimeoutSpin NUMERIC DEFAULT 15
  2061. MIN 10 MAX 60 SPIN 1
  2062. VALUENAME "ReminderBalloonTimeoutSeconds"
  2063. END PART
  2064. END POLICY
  2065. POLICY !!Pol_PurgeAtLogoff
  2066. #if version >= 4
  2067. SUPPORTED !!SUPPORTED_Win2k
  2068. #endif
  2069. EXPLAIN !!Pol_PurgeAtLogoff_Help
  2070. VALUENAME "PurgeAtLogoff"
  2071. PART !!Lbl_PurgeAtLogoffHelp1 TEXT
  2072. END PART
  2073. PART !!Lbl_PurgeAtLogoffHelp2 TEXT
  2074. END PART
  2075. PART !!Blank TEXT
  2076. END PART
  2077. PART !!Lbl_PurgeOnlyAutoCachedFiles CHECKBOX
  2078. VALUENAME "PurgeOnlyAutoCacheAtLogoff"
  2079. VALUEON NUMERIC 1
  2080. VALUEOFF NUMERIC 0
  2081. END PART
  2082. END POLICY
  2083. POLICY !!Pol_EventLoggingLevel
  2084. #if version >= 4
  2085. SUPPORTED !!SUPPORTED_Win2k
  2086. #endif
  2087. EXPLAIN !!Pol_EventLoggingLevel_Help
  2088. PART !!Blank TEXT
  2089. END PART
  2090. PART !!Lbl_EventLoggingLevelSpin NUMERIC DEFAULT 0
  2091. MIN 0 MAX 3 SPIN 1
  2092. VALUENAME "EventLoggingLevel"
  2093. END PART
  2094. PART !!Blank TEXT
  2095. END PART
  2096. PART !!Lbl_EventLoggingLevelHelp1 TEXT
  2097. END PART
  2098. PART !!Lbl_EventLoggingLevelHelp2 TEXT
  2099. END PART
  2100. PART !!Lbl_EventLoggingLevelHelp3 TEXT
  2101. END PART
  2102. PART !!Lbl_EventLoggingLevelHelp4 TEXT
  2103. END PART
  2104. END POLICY
  2105. POLICY !!Pol_AlwaysPinSubFolders
  2106. #if version >= 4
  2107. SUPPORTED !!SUPPORTED_Win2k
  2108. #endif
  2109. EXPLAIN !!Pol_AlwaysPinSubFolders_Help
  2110. VALUENAME "AlwaysPinSubFolders"
  2111. PART !!Lbl_AlwaysPinSubFoldersHelp1 TEXT
  2112. END PART
  2113. PART !!Lbl_AlwaysPinSubFoldersHelp2 TEXT
  2114. END PART
  2115. END POLICY
  2116. POLICY !!Pol_EncryptOfflineFiles
  2117. #if version >= 4
  2118. SUPPORTED !!SUPPORTED_WindowsXP
  2119. #endif
  2120. VALUENAME "EncryptCache"
  2121. EXPLAIN !!Pol_EncryptOfflineFiles_Help
  2122. VALUEON NUMERIC 1
  2123. VALUEOFF NUMERIC 0
  2124. END POLICY
  2125. POLICY !!Pol_NoPinFiles
  2126. KEYNAME "Software\Policies\Microsoft\Windows\NetCache\NoMakeAvailableOfflineList"
  2127. #if version >= 4
  2128. SUPPORTED !!SUPPORTED_WindowsXP
  2129. #endif
  2130. EXPLAIN !!Pol_NoPinFiles_Help
  2131. PART !!Lbl_NoPinFilesHelp1 TEXT
  2132. END PART
  2133. PART !!Blank TEXT
  2134. END PART
  2135. PART !!Lbl_NoPinFilesList LISTBOX EXPLICITVALUE ADDITIVE
  2136. END PART
  2137. END POLICY
  2138. POLICY !!Pol_SlowLinkSpeed
  2139. #if version >= 4
  2140. SUPPORTED !!SUPPORTED_WindowsXP
  2141. #endif
  2142. EXPLAIN !!Pol_SlowLinkSpeed_Help
  2143. PART !!Lbl_SlowLinkSpeed_Help1 TEXT
  2144. END PART
  2145. PART !!Lbl_SlowLinkSpeedSpin NUMERIC DEFAULT 640
  2146. MIN 0 MAX 100000000 SPIN 10
  2147. VALUENAME "SlowLinkSpeed"
  2148. END PART
  2149. END POLICY
  2150. END CATEGORY ; Cat_OfflineFiles
  2151. CATEGORY !!NetworkConnections
  2152. #if version >= 4
  2153. EXPLAIN !!NetworkConnections_Comp_Help
  2154. #endif
  2155. KEYNAME "Software\Policies\Microsoft\Windows\Network Connections"
  2156. POLICY !!NC_ShowSharedAccessUI
  2157. #if version >= 4
  2158. SUPPORTED !!SUPPORTED_Win2kSP1
  2159. #endif
  2160. EXPLAIN !!NC_ShowSharedAccessUI_Help
  2161. VALUENAME "NC_ShowSharedAccessUI"
  2162. VALUEON NUMERIC 0
  2163. VALUEOFF NUMERIC 1
  2164. END POLICY
  2165. POLICY !!NC_PersonalFirewallConfig
  2166. #if version >= 4
  2167. SUPPORTED !!SUPPORTED_WindowsXP
  2168. #endif
  2169. EXPLAIN !!NC_PersonalFirewallConfig_Help
  2170. VALUENAME "NC_PersonalFirewallConfig"
  2171. VALUEON NUMERIC 0
  2172. VALUEOFF NUMERIC 1
  2173. END POLICY
  2174. POLICY !!NC_AllowNetBridge_NLA
  2175. #if version >= 4
  2176. SUPPORTED !!SUPPORTED_WindowsXP
  2177. #endif
  2178. EXPLAIN !!NC_AllowNetBridge_NLA_Help
  2179. VALUENAME "NC_AllowNetBridge_NLA"
  2180. VALUEON NUMERIC 0
  2181. VALUEOFF NUMERIC 1
  2182. END POLICY
  2183. POLICY !!NC_8021XCAName
  2184. KEYNAME "Software\Policies\Microsoft\Windows\Network Connections\8021X"
  2185. #if version >= 4
  2186. SUPPORTED !!SUPPORTED_WindowsXP
  2187. #endif
  2188. EXPLAIN !!NC_8021XCAName_Help
  2189. PART !!NC_8021xCertAuth EDITTEXT
  2190. VALUENAME "8021XCARootHash"
  2191. END PART
  2192. END POLICY
  2193. END CATEGORY ;NetworkConnections
  2194. CATEGORY !!QosPsched
  2195. #if version >= 4
  2196. EXPLAIN !!QosPsched_Help
  2197. #endif
  2198. KEYNAME "Software\Policies\Microsoft\Windows\Psched"
  2199. POLICY !!QosNonBestEffortLimit
  2200. #if version >= 4
  2201. SUPPORTED !!SUPPORTED_WindowsXP
  2202. #endif
  2203. EXPLAIN !!QosNonBestEffortLimit_Help
  2204. PART !!QosNonBestEffortLimit_Box NUMERIC REQUIRED
  2205. VALUENAME "NonBestEffortLimit"
  2206. CLIENTEXT {426031c0-0b47-4852-b0ca-ac3d37bfcb39}
  2207. MIN 0 MAX 100 DEFAULT 20 SPIN 10
  2208. END PART
  2209. END POLICY
  2210. POLICY !!QosMaxOutstandingSends
  2211. #if version >= 4
  2212. SUPPORTED !!SUPPORTED_WindowsXP
  2213. #endif
  2214. EXPLAIN !!QosMaxOutstandingSends_Help
  2215. PART !!QosMaxOutstandingSends_Box NUMERIC REQUIRED
  2216. VALUENAME "MaxOutstandingSends"
  2217. CLIENTEXT {426031c0-0b47-4852-b0ca-ac3d37bfcb39}
  2218. MIN 0 MAX 4000000000 DEFAULT 65535
  2219. END PART
  2220. END POLICY
  2221. POLICY !!QosTimerResolution
  2222. #if version >= 4
  2223. SUPPORTED !!SUPPORTED_WindowsXP
  2224. #endif
  2225. EXPLAIN !!QosTimerResolution_Help
  2226. PART !!QosTimerResolution_Box NUMERIC REQUIRED
  2227. VALUENAME "TimerResolution"
  2228. CLIENTEXT {426031c0-0b47-4852-b0ca-ac3d37bfcb39}
  2229. MIN 0 MAX 4000000000 DEFAULT 10
  2230. END PART
  2231. END POLICY
  2232. CATEGORY !!QosDiffservByteMappingConforming
  2233. #if version >= 4
  2234. EXPLAIN !!QoSDSCP_Comforming_Help
  2235. #endif
  2236. KEYNAME "Software\Policies\Microsoft\Windows\Psched\DiffservByteMappingConforming"
  2237. POLICY !!QosServiceTypeBestEffort_C
  2238. #if version >= 4
  2239. SUPPORTED !!SUPPORTED_WindowsXP
  2240. #endif
  2241. EXPLAIN !!QosDBMC_BestEffort_Help
  2242. PART !!QosDBMC_Tip TEXT
  2243. END PART
  2244. PART !!QosServiceTypeBestEffort TEXT
  2245. END PART
  2246. PART !!Blank TEXT
  2247. END PART
  2248. PART !!QosDSCPValue NUMERIC REQUIRED
  2249. VALUENAME "ServiceTypeBestEffort"
  2250. CLIENTEXT {426031c0-0b47-4852-b0ca-ac3d37bfcb39}
  2251. MIN 0 MAX 63 DEFAULT 0
  2252. END PART
  2253. END POLICY
  2254. POLICY !!QosServiceTypeControlledLoad_C
  2255. #if version >= 4
  2256. SUPPORTED !!SUPPORTED_WindowsXP
  2257. #endif
  2258. EXPLAIN !!QosDBMC_ControlledLoad_Help
  2259. PART !!QosDBMC_Tip TEXT
  2260. END PART
  2261. PART !!QosServiceTypeControlledLoad TEXT
  2262. END PART
  2263. PART !!Blank TEXT
  2264. END PART
  2265. PART !!QosDSCPValue NUMERIC REQUIRED
  2266. VALUENAME "ServiceTypeControlledLoad"
  2267. CLIENTEXT {426031c0-0b47-4852-b0ca-ac3d37bfcb39}
  2268. MIN 0 MAX 63 DEFAULT 24
  2269. END PART
  2270. END POLICY
  2271. POLICY !!QosServiceTypeGuaranteed_C
  2272. #if version >= 4
  2273. SUPPORTED !!SUPPORTED_WindowsXP
  2274. #endif
  2275. EXPLAIN !!QosDBMC_Guaranteed_Help
  2276. PART !!QosDBMC_Tip TEXT
  2277. END PART
  2278. PART !!QosServiceTypeGuaranteed TEXT
  2279. END PART
  2280. PART !!Blank TEXT
  2281. END PART
  2282. PART !!QosDSCPValue NUMERIC REQUIRED
  2283. VALUENAME "ServiceTypeGuaranteed"
  2284. CLIENTEXT {426031c0-0b47-4852-b0ca-ac3d37bfcb39}
  2285. MIN 0 MAX 63 DEFAULT 40
  2286. END PART
  2287. END POLICY
  2288. POLICY !!QosServiceTypeNetworkControl_C
  2289. #if version >= 4
  2290. SUPPORTED !!SUPPORTED_WindowsXP
  2291. #endif
  2292. EXPLAIN !!QosDBMC_NetworkControl_Help
  2293. PART !!QosDBMC_Tip TEXT
  2294. END PART
  2295. PART !!QosServiceTypeNetworkControl TEXT
  2296. END PART
  2297. PART !!Blank TEXT
  2298. END PART
  2299. PART !!QosDSCPValue NUMERIC REQUIRED
  2300. VALUENAME "ServiceTypeNetworkControl"
  2301. CLIENTEXT {426031c0-0b47-4852-b0ca-ac3d37bfcb39}
  2302. MIN 0 MAX 63 DEFAULT 48
  2303. END PART
  2304. END POLICY
  2305. POLICY !!QosServiceTypeQualitative_C
  2306. #if version >= 4
  2307. SUPPORTED !!SUPPORTED_WindowsXP
  2308. #endif
  2309. EXPLAIN !!QosDBMC_Qualitative_Help
  2310. PART !!QosDBMC_Tip TEXT
  2311. END PART
  2312. PART !!QosServiceTypeQualitative TEXT
  2313. END PART
  2314. PART !!Blank TEXT
  2315. END PART
  2316. PART !!QosDSCPValue NUMERIC REQUIRED
  2317. VALUENAME "ServiceTypeQualitative"
  2318. CLIENTEXT {426031c0-0b47-4852-b0ca-ac3d37bfcb39}
  2319. MIN 0 MAX 63 DEFAULT 0
  2320. END PART
  2321. END POLICY
  2322. END CATEGORY ;QosDiffservByteMappingConforming
  2323. CATEGORY !!QosDiffservByteMappingNonConforming
  2324. #if version >= 4
  2325. EXPLAIN !!QoSDSCP_NonComforming_Help
  2326. #endif
  2327. KEYNAME "Software\Policies\Microsoft\Windows\Psched\DiffservByteMappingNonConforming"
  2328. POLICY !!QosServiceTypeBestEffort_NC
  2329. #if version >= 4
  2330. SUPPORTED !!SUPPORTED_WindowsXP
  2331. #endif
  2332. EXPLAIN !!QosDBMNC_BestEffort_Help
  2333. PART !!QosDBMNC_Tip TEXT
  2334. END PART
  2335. PART !!QosServiceTypeBestEffort TEXT
  2336. END PART
  2337. PART !!Blank TEXT
  2338. END PART
  2339. PART !!QosDSCPValue NUMERIC REQUIRED
  2340. VALUENAME "ServiceTypeBestEffort"
  2341. CLIENTEXT {426031c0-0b47-4852-b0ca-ac3d37bfcb39}
  2342. MIN 0 MAX 63 DEFAULT 0
  2343. END PART
  2344. END POLICY
  2345. POLICY !!QosServiceTypeControlledLoad_NC
  2346. #if version >= 4
  2347. SUPPORTED !!SUPPORTED_WindowsXP
  2348. #endif
  2349. EXPLAIN !!QosDBMNC_ControlledLoad_Help
  2350. PART !!QosDBMNC_Tip TEXT
  2351. END PART
  2352. PART !!QosServiceTypeControlledLoad TEXT
  2353. END PART
  2354. PART !!Blank TEXT
  2355. END PART
  2356. PART !!QosDSCPValue NUMERIC REQUIRED
  2357. VALUENAME "ServiceTypeControlledLoad"
  2358. CLIENTEXT {426031c0-0b47-4852-b0ca-ac3d37bfcb39}
  2359. MIN 0 MAX 63 DEFAULT 0
  2360. END PART
  2361. END POLICY
  2362. POLICY !!QosServiceTypeGuaranteed_NC
  2363. #if version >= 4
  2364. SUPPORTED !!SUPPORTED_WindowsXP
  2365. #endif
  2366. EXPLAIN !!QosDBMNC_Guaranteed_Help
  2367. PART !!QosDBMNC_Tip TEXT
  2368. END PART
  2369. PART !!QosServiceTypeGuaranteed TEXT
  2370. END PART
  2371. PART !!Blank TEXT
  2372. END PART
  2373. PART !!QosDSCPValue NUMERIC REQUIRED
  2374. VALUENAME "ServiceTypeGuaranteed"
  2375. CLIENTEXT {426031c0-0b47-4852-b0ca-ac3d37bfcb39}
  2376. MIN 0 MAX 63 DEFAULT 0
  2377. END PART
  2378. END POLICY
  2379. POLICY !!QosServiceTypeNetworkControl_NC
  2380. #if version >= 4
  2381. SUPPORTED !!SUPPORTED_WindowsXP
  2382. #endif
  2383. EXPLAIN !!QosDBMNC_NetworkControl_Help
  2384. PART !!QosDBMNC_Tip TEXT
  2385. END PART
  2386. PART !!QosServiceTypeNetworkControl TEXT
  2387. END PART
  2388. PART !!Blank TEXT
  2389. END PART
  2390. PART !!QosDSCPValue NUMERIC REQUIRED
  2391. VALUENAME "ServiceTypeNetworkControl"
  2392. CLIENTEXT {426031c0-0b47-4852-b0ca-ac3d37bfcb39}
  2393. MIN 0 MAX 63 DEFAULT 0
  2394. END PART
  2395. END POLICY
  2396. POLICY !!QosServiceTypeQualitative_NC
  2397. #if version >= 4
  2398. SUPPORTED !!SUPPORTED_WindowsXP
  2399. #endif
  2400. EXPLAIN !!QosDBMNC_Qualitative_Help
  2401. PART !!QosDBMNC_Tip TEXT
  2402. END PART
  2403. PART !!QosServiceTypeQualitative TEXT
  2404. END PART
  2405. PART !!Blank TEXT
  2406. END PART
  2407. PART !!QosDSCPValue NUMERIC REQUIRED
  2408. VALUENAME "ServiceTypeQualitative"
  2409. CLIENTEXT {426031c0-0b47-4852-b0ca-ac3d37bfcb39}
  2410. MIN 0 MAX 63 DEFAULT 0
  2411. END PART
  2412. END POLICY
  2413. END CATEGORY ;QosDiffservByteMappingNonConforming
  2414. CATEGORY !!QosUserPriorityMapping
  2415. #if version >= 4
  2416. EXPLAIN !!QosLayer2Priority_Help
  2417. #endif
  2418. KEYNAME "Software\Policies\Microsoft\Windows\Psched\UserPriorityMapping"
  2419. POLICY !!QosServiceTypeNonConforming
  2420. #if version >= 4
  2421. SUPPORTED !!SUPPORTED_WindowsXP
  2422. #endif
  2423. EXPLAIN !!QosUPM_NonConforming_Help
  2424. PART !!QosUPM_TipNC TEXT
  2425. END PART
  2426. PART !!Blank TEXT
  2427. END PART
  2428. PART !!QosPriorityValue NUMERIC REQUIRED
  2429. VALUENAME "ServiceTypeNonConforming"
  2430. CLIENTEXT {426031c0-0b47-4852-b0ca-ac3d37bfcb39}
  2431. MIN 0 MAX 7 DEFAULT 1
  2432. END PART
  2433. END POLICY
  2434. POLICY !!QosServiceTypeBestEffort_PV
  2435. #if version >= 4
  2436. SUPPORTED !!SUPPORTED_WindowsXP
  2437. #endif
  2438. EXPLAIN !!QosUPM_BestEffort_Help
  2439. PART !!QosUPM_Tip TEXT
  2440. END PART
  2441. PART !!QosServiceTypeBestEffort TEXT
  2442. END PART
  2443. PART !!Blank TEXT
  2444. END PART
  2445. PART !!QosPriorityValue NUMERIC REQUIRED
  2446. VALUENAME "ServiceTypeBestEffort"
  2447. CLIENTEXT {426031c0-0b47-4852-b0ca-ac3d37bfcb39}
  2448. MIN 0 MAX 7 DEFAULT 0
  2449. END PART
  2450. END POLICY
  2451. POLICY !!QosServiceTypeControlledLoad_PV
  2452. #if version >= 4
  2453. SUPPORTED !!SUPPORTED_WindowsXP
  2454. #endif
  2455. EXPLAIN !!QosUPM_ControlledLoad_Help
  2456. PART !!QosUPM_Tip TEXT
  2457. END PART
  2458. PART !!QosServiceTypeControlledLoad TEXT
  2459. END PART
  2460. PART !!Blank TEXT
  2461. END PART
  2462. PART !!QosPriorityValue NUMERIC REQUIRED
  2463. VALUENAME "ServiceTypeControlledLoad"
  2464. CLIENTEXT {426031c0-0b47-4852-b0ca-ac3d37bfcb39}
  2465. MIN 0 MAX 7 DEFAULT 4
  2466. END PART
  2467. END POLICY
  2468. POLICY !!QosServiceTypeGuaranteed_PV
  2469. #if version >= 4
  2470. SUPPORTED !!SUPPORTED_WindowsXP
  2471. #endif
  2472. EXPLAIN !!QosUPM_Guaranteed_Help
  2473. PART !!QosUPM_Tip TEXT
  2474. END PART
  2475. PART !!QosServiceTypeGuaranteed TEXT
  2476. END PART
  2477. PART !!Blank TEXT
  2478. END PART
  2479. PART !!QosPriorityValue NUMERIC REQUIRED
  2480. VALUENAME "ServiceTypeGuaranteed"
  2481. CLIENTEXT {426031c0-0b47-4852-b0ca-ac3d37bfcb39}
  2482. MIN 0 MAX 7 DEFAULT 5
  2483. END PART
  2484. END POLICY
  2485. POLICY !!QosServiceTypeNetworkControl_PV
  2486. #if version >= 4
  2487. SUPPORTED !!SUPPORTED_WindowsXP
  2488. #endif
  2489. EXPLAIN !!QosUPM_NetworkControl_Help
  2490. PART !!QosUPM_Tip TEXT
  2491. END PART
  2492. PART !!QosServiceTypeNetworkControl TEXT
  2493. END PART
  2494. PART !!Blank TEXT
  2495. END PART
  2496. PART !!QosPriorityValue NUMERIC REQUIRED
  2497. VALUENAME "ServiceTypeNetworkControl"
  2498. CLIENTEXT {426031c0-0b47-4852-b0ca-ac3d37bfcb39}
  2499. MIN 0 MAX 7 DEFAULT 7
  2500. END PART
  2501. END POLICY
  2502. POLICY !!QosServiceTypeQualitative_PV
  2503. #if version >= 4
  2504. SUPPORTED !!SUPPORTED_WindowsXP
  2505. #endif
  2506. EXPLAIN !!QosUPM_Qualitative_Help
  2507. PART !!QosUPM_Tip TEXT
  2508. END PART
  2509. PART !!QosServiceTypeQualitative TEXT
  2510. END PART
  2511. PART !!Blank TEXT
  2512. END PART
  2513. PART !!QosPriorityValue NUMERIC REQUIRED
  2514. VALUENAME "ServiceTypeQualitative"
  2515. CLIENTEXT {426031c0-0b47-4852-b0ca-ac3d37bfcb39}
  2516. MIN 0 MAX 7 DEFAULT 0
  2517. END PART
  2518. END POLICY
  2519. END CATEGORY ;QosUserPriorityMapping
  2520. END CATEGORY ; QosPsched
  2521. CATEGORY !!SNMP_SNMP
  2522. #if version >= 4
  2523. EXPLAIN !!SNMP_Help
  2524. #endif
  2525. POLICY !!SNMP_Communities
  2526. KEYNAME "Software\Policies\SNMP\Parameters\ValidCommunities"
  2527. #if version >= 4
  2528. SUPPORTED !!SUPPORTED_WindowsXP
  2529. #endif
  2530. EXPLAIN !!SNMP_ValidCommunities_Help
  2531. PART !!SNMP_CommunitiesListbox LISTBOX
  2532. VALUEPREFIX ""
  2533. END PART
  2534. END POLICY
  2535. POLICY !!SNMP_PermittedManagers
  2536. KEYNAME "Software\Policies\SNMP\Parameters\PermittedManagers"
  2537. #if version >= 4
  2538. SUPPORTED !!SUPPORTED_WindowsXP
  2539. #endif
  2540. EXPLAIN !!SNMP_PermittedManagers_Help
  2541. PART !!SNMP_PermittedManagersListbox LISTBOX
  2542. VALUEPREFIX ""
  2543. END PART
  2544. END POLICY
  2545. POLICY !!SNMP_Traps_Public
  2546. KEYNAME "Software\Policies\SNMP\Parameters\TrapConfiguration\public"
  2547. #if version >= 4
  2548. SUPPORTED !!SUPPORTED_WindowsXP
  2549. #endif
  2550. EXPLAIN !!SNMP_TrapDestinations_Help
  2551. PART !!SNMP_Traps_PublicListbox LISTBOX
  2552. VALUEPREFIX ""
  2553. END PART
  2554. END POLICY
  2555. END CATEGORY; SNMP
  2556. POLICY !!BITS_Job_Timeout
  2557. KEYNAME "Software\Policies\Microsoft\Windows\BITS"
  2558. #if version >= 4
  2559. SUPPORTED !!SUPPORTED_WindowsXP
  2560. #endif
  2561. EXPLAIN !!BITS_Job_Timeout_Help
  2562. PART !!BITS_Job_Timeout_Time NUMERIC
  2563. MIN 1 MAX 999 DEFAULT 90 SPIN 1
  2564. VALUENAME "JobInactivityTimeout"
  2565. END PART
  2566. END POLICY
  2567. POLICY !!DFSDiscoverDC
  2568. KEYNAME "Software\Policies\Microsoft\System\DFSClient"
  2569. #if version >= 4
  2570. SUPPORTED !!SUPPORTED_WindowsXP
  2571. #endif
  2572. EXPLAIN !!DFSDiscoverDC_Help
  2573. PART !!DFSDiscoverDialog NUMERIC
  2574. MIN 15 MAX 360 DEFAULT 15 SPIN 1
  2575. VALUENAME "DfsDcNameDelay"
  2576. END PART
  2577. END POLICY
  2578. END CATEGORY ; Network
  2579. CATEGORY !!Printers
  2580. #if version >= 4
  2581. EXPLAIN !!Printers_Help
  2582. #endif
  2583. POLICY !!PublishPrinters
  2584. KEYNAME "Software\Policies\Microsoft\Windows NT\Printers"
  2585. #if version >= 4
  2586. SUPPORTED !!SUPPORTED_Win2k
  2587. #endif
  2588. EXPLAIN !!PublishPrinters_Help
  2589. VALUENAME "PublishPrinters"
  2590. VALUEON NUMERIC 1
  2591. VALUEOFF NUMERIC 0
  2592. END POLICY
  2593. POLICY !!ImmortalPrintQueue
  2594. KEYNAME "Software\Policies\Microsoft\Windows NT\Printers"
  2595. #if version >= 4
  2596. SUPPORTED !!SUPPORTED_Win2k
  2597. #endif
  2598. EXPLAIN !!ImmortalPrintQueue_Help
  2599. VALUENAME "Immortal"
  2600. VALUEON NUMERIC 0
  2601. VALUEOFF NUMERIC 1
  2602. END POLICY
  2603. POLICY !!AutoPublishing
  2604. KEYNAME "Software\Policies\Microsoft\Windows NT\Printers\Wizard"
  2605. #if version >= 4
  2606. SUPPORTED !!SUPPORTED_Win2k
  2607. #endif
  2608. EXPLAIN !!AutoPublishing_Help
  2609. VALUENAME "Auto Publishing"
  2610. VALUEON NUMERIC 1
  2611. VALUEOFF NUMERIC 0
  2612. END POLICY
  2613. POLICY !!VerifyPublishedState
  2614. KEYNAME "Software\Policies\Microsoft\Windows NT\Printers"
  2615. #if version >= 4
  2616. SUPPORTED !!SUPPORTED_Win2k
  2617. #endif
  2618. EXPLAIN !!VerifyPublishedState_Help
  2619. PART !!VerifyPublishedState_Tip1 TEXT
  2620. END PART
  2621. PART !!VerifyPublishedStateTitle DROPDOWNLIST NOSORT
  2622. VALUENAME "VerifyPublishedState"
  2623. ITEMLIST
  2624. NAME !!VerifyPublishedState30Minutes VALUE NUMERIC 30
  2625. NAME !!VerifyPublishedState1Hour VALUE NUMERIC 60
  2626. NAME !!VerifyPublishedState4Hours VALUE NUMERIC 240
  2627. NAME !!VerifyPublishedState8Hours VALUE NUMERIC 480
  2628. NAME !!VerifyPublishedState12Hours VALUE NUMERIC 720
  2629. NAME !!VerifyPublishedState1Day VALUE NUMERIC 1440
  2630. NAME !!VerifyPublishedStateNever VALUE NUMERIC 4294967295 DEFAULT
  2631. END ITEMLIST
  2632. END PART
  2633. END POLICY
  2634. POLICY !!PhysicalLocation
  2635. KEYNAME "Software\Policies\Microsoft\Windows NT\Printers"
  2636. #if version >= 4
  2637. SUPPORTED !!SUPPORTED_Win2k
  2638. #endif
  2639. EXPLAIN !!PhysicalLocation_Help
  2640. PART !!PhysicalLocation_Tip1 TEXT
  2641. END PART
  2642. PART !!PhysicalLocation_Tip2 TEXT
  2643. END PART
  2644. PART !!PhysicalLocation_Name EDITTEXT
  2645. VALUENAME "PhysicalLocation"
  2646. MAXLEN 259
  2647. END PART
  2648. END POLICY
  2649. POLICY !!CustomizedSupportUrl
  2650. KEYNAME "Software\Policies\Microsoft\Windows NT\Printers"
  2651. #if version >= 4
  2652. SUPPORTED !!SUPPORTED_Win2k
  2653. #endif
  2654. EXPLAIN !!CustomizedSupportUrl_Help
  2655. PART !!CustomizedSupportUrl_Tip1 TEXT
  2656. END PART
  2657. PART !!CustomizedSupportUrl_Link EDITTEXT
  2658. VALUENAME "SupportLink"
  2659. MAXLEN 255
  2660. END PART
  2661. END POLICY
  2662. POLICY !!PruningInterval
  2663. KEYNAME "Software\Policies\Microsoft\Windows NT\Printers"
  2664. #if version >= 4
  2665. SUPPORTED !!SUPPORTED_Win2k
  2666. #endif
  2667. EXPLAIN !!PruningInterval_Help
  2668. PART !!PruningInterval_Tip1 TEXT
  2669. END PART
  2670. PART !!PruningInterval_Tip2 TEXT
  2671. END PART
  2672. PART !!PruningIntervalTitle DROPDOWNLIST NOSORT
  2673. VALUENAME "PruningInterval"
  2674. ITEMLIST
  2675. NAME !!PruningImmediately VALUE NUMERIC 0
  2676. NAME !!Pruning10Minutes VALUE NUMERIC 10
  2677. NAME !!Pruning30Minutes VALUE NUMERIC 30
  2678. NAME !!Pruning1Hour VALUE NUMERIC 60
  2679. NAME !!Pruning4Hours VALUE NUMERIC 240
  2680. NAME !!Pruning8Hours VALUE NUMERIC 480 DEFAULT
  2681. NAME !!Pruning12Hours VALUE NUMERIC 720
  2682. NAME !!Pruning1Day VALUE NUMERIC 1440
  2683. NAME !!Pruning2Days VALUE NUMERIC 2880
  2684. NAME !!Pruning3Days VALUE NUMERIC 4320
  2685. NAME !!Pruning4Days VALUE NUMERIC 5760
  2686. NAME !!Pruning5Days VALUE NUMERIC 7200
  2687. NAME !!Pruning6Days VALUE NUMERIC 8640
  2688. NAME !!Pruning1Week VALUE NUMERIC 10080
  2689. NAME !!Pruning2Weeks VALUE NUMERIC 20160
  2690. NAME !!Pruning3Weeks VALUE NUMERIC 30240
  2691. NAME !!Pruning4Weeks VALUE NUMERIC 40320
  2692. NAME !!Pruning5Weeks VALUE NUMERIC 50400
  2693. NAME !!Pruning6Weeks VALUE NUMERIC 60480
  2694. NAME !!Pruning7Weeks VALUE NUMERIC 70560
  2695. NAME !!PruningNever VALUE NUMERIC 4294967295
  2696. END ITEMLIST
  2697. END PART
  2698. END POLICY
  2699. POLICY !!PruningPriority
  2700. KEYNAME "Software\Policies\Microsoft\Windows NT\Printers"
  2701. #if version >= 4
  2702. SUPPORTED !!SUPPORTED_Win2k
  2703. #endif
  2704. EXPLAIN !!PruningPriority_Help
  2705. PART !!PruningPriority_Tip1 TEXT
  2706. END PART
  2707. PART !!PriorityLevel DROPDOWNLIST NOSORT
  2708. VALUENAME "PruningPriority"
  2709. ITEMLIST
  2710. NAME !!ThreadLowest VALUE NUMERIC 4294967294
  2711. NAME !!ThreadBelowNormal VALUE NUMERIC 4294967295
  2712. NAME !!ThreadNormal VALUE NUMERIC 0 DEFAULT
  2713. NAME !!ThreadAboveNormal VALUE NUMERIC 1
  2714. NAME !!ThreadHighest VALUE NUMERIC 2
  2715. END ITEMLIST
  2716. END PART
  2717. END POLICY
  2718. POLICY !!PruningRetries
  2719. KEYNAME "Software\Policies\Microsoft\Windows NT\Printers"
  2720. #if version >= 4
  2721. SUPPORTED !!SUPPORTED_Win2k
  2722. #endif
  2723. EXPLAIN !!PruningRetries_Help
  2724. PART !!PruningRetriesTitle DROPDOWNLIST NOSORT
  2725. VALUENAME "PruningRetries"
  2726. ITEMLIST
  2727. NAME !!PruningRetries0 VALUE NUMERIC 0
  2728. NAME !!PruningRetries1 VALUE NUMERIC 1
  2729. NAME !!PruningRetries2 VALUE NUMERIC 2 DEFAULT
  2730. NAME !!PruningRetries3 VALUE NUMERIC 3
  2731. NAME !!PruningRetries4 VALUE NUMERIC 4
  2732. NAME !!PruningRetries5 VALUE NUMERIC 5
  2733. NAME !!PruningRetries6 VALUE NUMERIC 6
  2734. END ITEMLIST
  2735. END PART
  2736. END POLICY
  2737. POLICY !!KMPrintersAreBlocked
  2738. KEYNAME "Software\Policies\Microsoft\Windows NT\Printers"
  2739. #if version >= 4
  2740. SUPPORTED !!SUPPORTED_WindowsXP
  2741. #endif
  2742. EXPLAIN !!KMPrintersAreBlocked_Help
  2743. VALUENAME "KMPrintersAreBlocked"
  2744. VALUEON NUMERIC 1
  2745. VALUEOFF NUMERIC 0
  2746. END POLICY
  2747. POLICY !!PruningRetryLog
  2748. KEYNAME "Software\Policies\Microsoft\Windows NT\Printers"
  2749. #if version >= 4
  2750. SUPPORTED !!SUPPORTED_WindowsXP
  2751. #endif
  2752. EXPLAIN !!PruningRetryLog_Help
  2753. VALUENAME "PruningRetryLog"
  2754. VALUEON NUMERIC 1
  2755. VALUEOFF NUMERIC 0
  2756. END POLICY
  2757. POLICY !!PhysicalLocationSupport
  2758. KEYNAME "Software\Policies\Microsoft\Windows NT\Printers"
  2759. #if version >= 4
  2760. SUPPORTED !!SUPPORTED_Win2k
  2761. #endif
  2762. EXPLAIN !!PhysicalLocationSupport_Help
  2763. VALUENAME "PhysicalLocationSupport"
  2764. VALUEON NUMERIC 1
  2765. VALUEOFF NUMERIC 0
  2766. END POLICY
  2767. POLICY !!PrinterServerThread
  2768. KEYNAME "Software\Policies\Microsoft\Windows NT\Printers"
  2769. #if version >= 4
  2770. SUPPORTED !!SUPPORTED_Win2k
  2771. #endif
  2772. EXPLAIN !!PrinterServerThread_Help
  2773. VALUENAME "ServerThread"
  2774. VALUEON NUMERIC 1
  2775. VALUEOFF NUMERIC 0
  2776. END POLICY
  2777. POLICY !!PruneDownlevel
  2778. KEYNAME "Software\Policies\Microsoft\Windows NT\Printers"
  2779. #if version >= 4
  2780. SUPPORTED !!SUPPORTED_Win2k
  2781. #endif
  2782. EXPLAIN !!PruneDownlevel_Help
  2783. PART !!PruneDownlevel_Tip1 TEXT
  2784. END PART
  2785. PART !!PruneDownlevelTitle DROPDOWNLIST NOSORT
  2786. VALUENAME "PruneDownlevel"
  2787. ITEMLIST
  2788. NAME !!PruneDownlevel_Never VALUE NUMERIC 0 DEFAULT
  2789. NAME !!PruneDownlevel_Found VALUE NUMERIC 1
  2790. NAME !!PruneDownlevel_NotFound VALUE NUMERIC 2
  2791. END ITEMLIST
  2792. END PART
  2793. END POLICY
  2794. POLICY !!RegisterSpoolerRemoteRpcEndPoint
  2795. KEYNAME "Software\Policies\Microsoft\Windows NT\Printers"
  2796. #if version >= 4
  2797. SUPPORTED !!SUPPORTED_WindowsNET
  2798. #endif
  2799. EXPLAIN !!RegisterSpoolerRemoteRpcEndPoint_Help
  2800. VALUENAME "RegisterSpoolerRemoteRpcEndPoint"
  2801. VALUEON NUMERIC 1
  2802. VALUEOFF NUMERIC 2
  2803. END POLICY
  2804. POLICY !!AllowWebPrinting
  2805. KEYNAME "Software\Policies\Microsoft\Windows NT\Printers"
  2806. #if version >= 4
  2807. SUPPORTED !!AllowWebPrinting_SupportedOn
  2808. #endif
  2809. EXPLAIN !!AllowWebPrinting_Help
  2810. VALUENAME "DisableWebPrinting"
  2811. VALUEON NUMERIC 0
  2812. VALUEOFF NUMERIC 1
  2813. END POLICY
  2814. END CATEGORY ; PRINTERS
  2815. CATEGORY !!WindowsComponents
  2816. #if version >= 4
  2817. EXPLAIN !!WindowsComponents_Help
  2818. #endif
  2819. CATEGORY !!AppCompat
  2820. #if version >= 4
  2821. EXPLAIN !!AppCompat_Help
  2822. #endif
  2823. POLICY !!AppCompatTurnOffEngine
  2824. #if version >= 4
  2825. SUPPORTED !!SUPPORTED_WindowsXPSP1
  2826. #endif
  2827. EXPLAIN !!AppCompat_TurnOffEngine_Help
  2828. KEYNAME "Software\Policies\Microsoft\Windows\AppCompat"
  2829. VALUENAME "DisableEngine"
  2830. END POLICY
  2831. POLICY !!AppCompatTurnOffProgramCompatWizard
  2832. #if version >= 4
  2833. SUPPORTED !!SUPPORTED_WindowsXPSP1
  2834. #endif
  2835. EXPLAIN !!AppCompat_TurnOffProgramCompatWizard_Help
  2836. KEYNAME "Software\Policies\Microsoft\Windows\AppCompat"
  2837. VALUENAME "DisableWizard"
  2838. END POLICY
  2839. POLICY !!AppCompatRemoveProgramCompatPropPage
  2840. #if version >= 4
  2841. SUPPORTED !!SUPPORTED_WindowsXPSP1
  2842. #endif
  2843. EXPLAIN !!AppCompat_RemoveProgramCompatPropPage_Help
  2844. KEYNAME "Software\Policies\Microsoft\Windows\AppCompat"
  2845. VALUENAME "DisablePropPage"
  2846. END POLICY
  2847. POLICY !!AppCompatTurnOffAppLogEvents
  2848. #if version >= 4
  2849. SUPPORTED !!SUPPORTED_WindowsXPSP1
  2850. #endif
  2851. EXPLAIN !!AppCompat_TurnOffAppLogEvents_Help
  2852. KEYNAME "Software\Policies\Microsoft\Windows\AppCompat"
  2853. VALUENAME "LogAppHelpEvents"
  2854. END POLICY
  2855. POLICY !!AppCompatPrevent16BitMach
  2856. #if version >= 4
  2857. SUPPORTED !!SUPPORTED_WindowsXPSP1
  2858. #endif
  2859. EXPLAIN !!AppCompat_Prevent16BitMach_Help
  2860. KEYNAME "Software\Policies\Microsoft\Windows\AppCompat"
  2861. VALUENAME "VDMDisallowed"
  2862. VALUEON NUMERIC 1
  2863. VALUEOFF NUMERIC 0
  2864. END POLICY
  2865. END CATEGORY ; AppCompat
  2866. CATEGORY !!IIS
  2867. POLICY !!PreventIISInstall
  2868. KEYNAME "Software\Policies\Microsoft\Windows NT\IIS"
  2869. #if version >= 4
  2870. SUPPORTED !!SUPPORTED_WindowsNET
  2871. #endif
  2872. EXPLAIN !!PreventIISInstall_Help
  2873. VALUENAME "PreventIISInstall"
  2874. VALUEON NUMERIC 1
  2875. VALUEOFF NUMERIC 0
  2876. END POLICY
  2877. END CATEGORY ; IIS
  2878. CATEGORY !!TaskScheduler
  2879. #if version >= 4
  2880. EXPLAIN !!TaskScheduler_Help
  2881. #endif
  2882. KEYNAME "Software\Policies\Microsoft\Windows\Task Scheduler5.0"
  2883. POLICY !!PropertyPages
  2884. #if version >= 4
  2885. SUPPORTED !!SUPPORTED_Win2k
  2886. #endif
  2887. EXPLAIN !!PropertyPagesHelp
  2888. VALUENAME "Property Pages"
  2889. END POLICY
  2890. POLICY !!Execution
  2891. #if version >= 4
  2892. SUPPORTED !!SUPPORTED_Win2k
  2893. #endif
  2894. EXPLAIN !!ExecutionHelp
  2895. VALUENAME "Execution"
  2896. END POLICY
  2897. POLICY !!DragAndDrop
  2898. #if version >= 4
  2899. SUPPORTED !!SUPPORTED_Win2k
  2900. #endif
  2901. EXPLAIN !!DragAndDropHelp
  2902. VALUENAME "DragAndDrop"
  2903. END POLICY
  2904. POLICY !!TaskCreation
  2905. #if version >= 4
  2906. SUPPORTED !!SUPPORTED_Win2k
  2907. #endif
  2908. EXPLAIN !!TaskCreationHelp
  2909. VALUENAME "Task Creation"
  2910. END POLICY
  2911. POLICY !!TaskDeletion
  2912. #if version >= 4
  2913. SUPPORTED !!SUPPORTED_Win2k
  2914. #endif
  2915. EXPLAIN !!TaskDeletionHelp
  2916. VALUENAME "Task Deletion"
  2917. END POLICY
  2918. POLICY !!DisableAdvanced
  2919. #if version >= 4
  2920. SUPPORTED !!SUPPORTED_Win2k
  2921. #endif
  2922. EXPLAIN !!DisableAdvancedHelp
  2923. VALUENAME "Disable Advanced"
  2924. END POLICY
  2925. POLICY !!AllowBrowse
  2926. #if version >= 4
  2927. SUPPORTED !!SUPPORTED_Win2k
  2928. #endif
  2929. EXPLAIN !!AllowBrowseHelp
  2930. VALUENAME "Allow Browse"
  2931. END POLICY
  2932. END CATEGORY ; Task Scheduler
  2933. CATEGORY !!TS_GP_NODE
  2934. #if version >= 4
  2935. EXPLAIN !!TS_Comp_Help
  2936. #endif
  2937. KEYNAME "SOFTWARE\Policies\Microsoft\Windows NT\Terminal Services"
  2938. POLICY !!TS_KEEP_ALIVE
  2939. #if version >= 4
  2940. SUPPORTED !!TS_SUPPORTED_WindowsXP
  2941. #endif
  2942. EXPLAIN !!TS_KEEP_ALIVE_EXPLAIN
  2943. VALUENAME "KeepAliveEnable"
  2944. VALUEON NUMERIC 1
  2945. VALUEOFF NUMERIC 0
  2946. PART !!TS_KEEP_ALIVE_INTERVAL NUMERIC
  2947. MIN 1 MAX 999999 DEFAULT 1 SPIN 1
  2948. VALUENAME "KeepAliveInterval"
  2949. END PART
  2950. END POLICY
  2951. POLICY !!TS_AUTO_RECONNECT
  2952. #if version >= 4
  2953. SUPPORTED !!TS_SUPPORTED_WindowsXP
  2954. #endif
  2955. EXPLAIN !!TS_AUTO_RECONNECT_EXPLAIN
  2956. VALUENAME "fDisableAutoReconnect"
  2957. VALUEON NUMERIC 0
  2958. VALUEOFF NUMERIC 1
  2959. END POLICY
  2960. POLICY !!TS_SINGLE_SESSION
  2961. #if version >= 4
  2962. SUPPORTED !!TS_SUPPORTED_WindowsXP
  2963. #endif
  2964. EXPLAIN !!TS_SINGLE_SESSION_EXPLAIN
  2965. VALUENAME "fSingleSessionPerUser"
  2966. VALUEON NUMERIC 1
  2967. VALUEOFF NUMERIC 0
  2968. END POLICY
  2969. POLICY !!TS_DISABLE_REMOTE_DESKTOP_WALLPAPER
  2970. #if version >= 4
  2971. SUPPORTED !!TS_SUPPORTED_WindowsXP
  2972. #endif
  2973. EXPLAIN !!TS_DISABLE_REMOTE_DESKTOP_WALLPAPER_EXPLAIN
  2974. VALUENAME "fNoRemoteDesktopWallpaper"
  2975. VALUEON NUMERIC 1
  2976. VALUEOFF NUMERIC 0
  2977. END POLICY
  2978. POLICY !!TS_FORCIBLE_LOGOFF
  2979. #if version >= 4
  2980. SUPPORTED !!SUPPORTED_WindowsNET
  2981. #endif
  2982. EXPLAIN !!TS_FORCIBLE_LOGOFF_EXPLAIN
  2983. VALUENAME "fDisableForcibleLogoff"
  2984. VALUEON NUMERIC 1
  2985. VALUEOFF NUMERIC 0
  2986. END POLICY
  2987. CATEGORY !!TS_REDIRECTION
  2988. #if version >= 4
  2989. EXPLAIN !!TS_REDIRECTION_Help
  2990. #endif
  2991. POLICY !!TS_TIME_ZONE
  2992. #if version >= 4
  2993. SUPPORTED !!TS_SUPPORTED_WindowsXP
  2994. #endif
  2995. EXPLAIN !!TS_TIME_ZONE_EXPLAIN
  2996. VALUENAME "fEnableTimeZoneRedirection"
  2997. VALUEON NUMERIC 1
  2998. VALUEOFF NUMERIC 0
  2999. END POLICY
  3000. POLICY !!TS_CLIENT_CLIPBOARD
  3001. #if version >= 4
  3002. SUPPORTED !!TS_SUPPORTED_WindowsXP
  3003. #endif
  3004. EXPLAIN !!TS_CLIPBOARDMAP_EXPLAIN
  3005. VALUENAME "fDisableClip"
  3006. VALUEON NUMERIC 1
  3007. VALUEOFF NUMERIC 0
  3008. END POLICY
  3009. POLICY !!TS_SMART_CARD
  3010. #if version >= 4
  3011. SUPPORTED !!TS_SUPPORTED_WindowsXP
  3012. #endif
  3013. EXPLAIN !!TS_SMART_CARD_EXPLAIN
  3014. VALUENAME "fEnableSmartCard"
  3015. VALUEON NUMERIC 0
  3016. VALUEOFF NUMERIC 1
  3017. END POLICY
  3018. POLICY !!TS_CLIENT_AUDIO
  3019. #if version >= 4
  3020. SUPPORTED !!TS_SUPPORTED_WindowsXP
  3021. #endif
  3022. EXPLAIN !!TS_AUDIOMAP_EXPLAIN
  3023. VALUENAME "fDisableCam"
  3024. VALUEON NUMERIC 0
  3025. VALUEOFF NUMERIC 1
  3026. END POLICY
  3027. POLICY !!TS_CLIENT_COM
  3028. #if version >= 4
  3029. SUPPORTED !!TS_SUPPORTED_WindowsXP
  3030. #endif
  3031. EXPLAIN !!TS_COMPORTMAP_EXPLAIN
  3032. VALUENAME "fDisableCcm"
  3033. VALUEON NUMERIC 1
  3034. VALUEOFF NUMERIC 0
  3035. END POLICY
  3036. POLICY !!TS_CLIENT_PRINTER
  3037. #if version >= 4
  3038. SUPPORTED !!TS_SUPPORTED_WindowsXP
  3039. #endif
  3040. EXPLAIN !!TS_PRINTERMAP_EXPLAIN
  3041. VALUENAME "fDisableCpm"
  3042. VALUEON NUMERIC 1
  3043. VALUEOFF NUMERIC 0
  3044. END POLICY
  3045. POLICY !!TS_CLIENT_LPT
  3046. #if version >= 4
  3047. SUPPORTED !!TS_SUPPORTED_WindowsXP
  3048. #endif
  3049. EXPLAIN !!TS_LPTPORTMAP_EXPLAIN
  3050. VALUENAME "fDisableLPT"
  3051. VALUEON NUMERIC 1
  3052. VALUEOFF NUMERIC 0
  3053. END POLICY
  3054. POLICY !!TS_CLIENT_DRIVE_M
  3055. #if version >= 4
  3056. SUPPORTED !!TS_SUPPORTED_WindowsXP
  3057. #endif
  3058. EXPLAIN !!TS_CLIENT_DRIVE_EXPLAIN_M
  3059. VALUENAME "fDisableCdm"
  3060. VALUEON NUMERIC 1
  3061. VALUEOFF NUMERIC 0
  3062. END POLICY
  3063. POLICY !!TS_CLIENT_DEFAULT_M
  3064. #if version >= 4
  3065. SUPPORTED !!TS_SUPPORTED_WindowsXP
  3066. #endif
  3067. EXPLAIN !!TS_CLIENT_DEFAULT_EXPLAIN_M
  3068. VALUENAME "fForceClientLptDef"
  3069. VALUEON NUMERIC 0
  3070. VALUEOFF NUMERIC 1
  3071. END POLICY
  3072. END CATEGORY
  3073. CATEGORY !!TS_EP
  3074. #if version >= 4
  3075. EXPLAIN !!TS_EP_Help
  3076. #endif
  3077. POLICY !!TS_PASSWORD
  3078. #if version >= 4
  3079. SUPPORTED !!TS_SUPPORTED_WindowsXP
  3080. #endif
  3081. EXPLAIN !!TS_PROMPT_PASSWORD_EXPLAIN
  3082. VALUENAME "fPromptForPassword"
  3083. VALUEON NUMERIC 1
  3084. VALUEOFF NUMERIC 0
  3085. END POLICY
  3086. POLICY !!TS_ENCRYPTION_POLICY
  3087. #if version >= 4
  3088. SUPPORTED !!TS_SUPPORTED_WindowsXP
  3089. #endif
  3090. EXPLAIN !!TS_ENCRYPTION_EXPLAIN
  3091. PART !!TS_ENCRYPTION_LEVEL DROPDOWNLIST
  3092. VALUENAME "MinEncryptionLevel"
  3093. ITEMLIST
  3094. NAME !!TS_Low_Level VALUE NUMERIC 1
  3095. NAME !!TS_Client_Compatible VALUE NUMERIC 2 DEFAULT
  3096. NAME !!TS_High_Level VALUE NUMERIC 3
  3097. END ITEMLIST
  3098. END PART
  3099. PART !!TS_ENCRYPTION TEXT
  3100. END PART
  3101. END POLICY
  3102. CATEGORY !!TS_RPC_EP
  3103. POLICY !!TS_RPC_ENCRYPTION
  3104. #if version >= 4
  3105. SUPPORTED !!SUPPORTED_WindowsNET
  3106. #endif
  3107. EXPLAIN !!TS_RPC_ENCRYPTION_EXPLAIN
  3108. VALUENAME "fEncryptRPCTraffic"
  3109. VALUEON NUMERIC 1
  3110. VALUEOFF NUMERIC 0
  3111. END POLICY
  3112. END CATEGORY
  3113. END CATEGORY
  3114. POLICY !!TS_MAX_CON_POLICY
  3115. #if version >= 4
  3116. SUPPORTED !!TS_SUPPORTED_WindowsXP
  3117. #endif
  3118. EXPLAIN !!TS_MAX_CON_EXPLAIN
  3119. PART !!TS_Maximum_Connections_allowed NUMERIC
  3120. MIN 1 MAX 999999 DEFAULT 1 SPIN 1
  3121. VALUENAME "MaxInstanceCount"
  3122. END PART
  3123. PART !!TS_MAX_CON TEXT
  3124. END PART
  3125. END POLICY
  3126. POLICY !!TS_COLORDEPTH
  3127. #if version >= 4
  3128. SUPPORTED !!TS_SUPPORTED_WindowsXP
  3129. #endif
  3130. EXPLAIN !!TS_COLOR_EXPLAIN
  3131. PART !!TS_Color_Depth DROPDOWNLIST NOSORT
  3132. VALUENAME "ColorDepth"
  3133. ITEMLIST
  3134. NAME !!TS_Client_Compatible VALUE NUMERIC 999 DEFAULT
  3135. NAME !!TS_8_bit VALUE NUMERIC 1
  3136. NAME !!TS_15_bit VALUE NUMERIC 2
  3137. NAME !!TS_16_bit VALUE NUMERIC 3
  3138. NAME !!TS_24_bit VALUE NUMERIC 4
  3139. END ITEMLIST
  3140. END PART
  3141. END POLICY
  3142. POLICY !!TS_DISABLE_CONNECTIONS
  3143. #if version >= 4
  3144. SUPPORTED !!TS_SUPPORTED_WindowsXP
  3145. #endif
  3146. EXPLAIN !!TS_DISABLE_CONNECTIONS_EXPLAIN
  3147. ACTIONLISTON
  3148. VALUENAME "fDenyTSConnections" VALUE NUMERIC 0
  3149. END ACTIONLISTON
  3150. ACTIONLISTOFF
  3151. VALUENAME "fDenyTSConnections" VALUE NUMERIC 1
  3152. END ACTIONLISTOFF
  3153. END POLICY
  3154. POLICY !!TS_TSCC_PERMISSIONS_POLICY
  3155. #if version >= 4
  3156. SUPPORTED !!TS_SUPPORTED_WindowsXP
  3157. #endif
  3158. EXPLAIN !!TS_TSCC_EXPLAIN
  3159. VALUENAME "fWritableTSCCPermTab"
  3160. VALUEON NUMERIC 0
  3161. VALUEOFF NUMERIC 1
  3162. END POLICY
  3163. POLICY !!TS_NoSecurityMenu
  3164. #if version >= 4
  3165. SUPPORTED !!TS_SUPPORTED_Win2k
  3166. #endif
  3167. KEYNAME "Software\Microsoft\Windows\CurrentVersion\Policies\Explorer"
  3168. EXPLAIN !!TS_NoSecurityMenu_Help
  3169. VALUENAME "NoNTSecurity"
  3170. END POLICY
  3171. POLICY !!TS_NoDisconnectMenu
  3172. #if version >= 4
  3173. SUPPORTED !!TS_SUPPORTED_Win2k
  3174. #endif
  3175. KEYNAME "Software\Microsoft\Windows\CurrentVersion\Policies\Explorer"
  3176. EXPLAIN !!TS_NoDisconnectMenu_Help
  3177. VALUENAME "NoDisconnect"
  3178. END POLICY
  3179. CATEGORY !!TS_License
  3180. #if version >= 4
  3181. EXPLAIN !!TS_License_Help
  3182. #endif
  3183. KEYNAME "Software\Policies\Microsoft\Windows NT\Terminal Services"
  3184. POLICY !!TS_LICENSE_SECGROUP
  3185. #if version >= 4
  3186. SUPPORTED !!TS_SUPPORTED_WindowsXP
  3187. #endif
  3188. EXPLAIN !!TS_LICENSE_SECGROUP_HELP
  3189. VALUENAME "fSecureLicensing"
  3190. VALUEON NUMERIC 1
  3191. VALUEOFF NUMERIC 0
  3192. END POLICY
  3193. POLICY !!TS_PreventLicenseUpgrade
  3194. #if version >= 4
  3195. SUPPORTED !!TS_SUPPORTED_WindowsXP
  3196. #endif
  3197. EXPLAIN !!TS_PreventLicenseUpgrade_Help
  3198. VALUENAME "fPreventLicenseUpgrade"
  3199. VALUEON NUMERIC 1
  3200. VALUEOFF NUMERIC 0
  3201. END POLICY
  3202. END CATEGORY ; TS_License
  3203. CATEGORY !!TS_TEMP
  3204. #if version >= 4
  3205. EXPLAIN !!TS_TEMP_Help
  3206. #endif
  3207. POLICY !!TS_TEMP_PER_SESSION
  3208. #if version >= 4
  3209. SUPPORTED !!TS_SUPPORTED_WindowsXP
  3210. #endif
  3211. EXPLAIN !!TS_TEMP_EXPLAIN
  3212. VALUENAME "PerSessionTempDir"
  3213. VALUEON NUMERIC 0
  3214. VALUEOFF NUMERIC 1
  3215. END POLICY
  3216. POLICY !!TS_TEMP_DELETE
  3217. #if version >= 4
  3218. SUPPORTED !!TS_SUPPORTED_WindowsXP
  3219. #endif
  3220. EXPLAIN !!TS_TEMP_DELETE_EXPLAIN
  3221. VALUENAME "DeleteTempDirsOnExit"
  3222. VALUEON NUMERIC 0
  3223. VALUEOFF NUMERIC 1
  3224. END POLICY
  3225. END CATEGORY
  3226. CATEGORY !!TS_SD_Node
  3227. #if version >= 4
  3228. EXPLAIN !!TS_Sessions_Help
  3229. #endif
  3230. KEYNAME "SOFTWARE\Policies\Microsoft\Windows NT\Terminal Services"
  3231. POLICY !!TS_SD_EXPOSE_ADDRESS
  3232. #if version >= 4
  3233. SUPPORTED !!SUPPORTED_WindowsNET_Enterprise
  3234. #endif
  3235. EXPLAIN !!TS_SD_EXPOSE_ADDRESS_Explain
  3236. VALUENAME "SessionDirectoryExposeServerIP"
  3237. VALUEON NUMERIC 1
  3238. VALUEOFF NUMERIC 0
  3239. END POLICY
  3240. POLICY !!TS_JOIN_SESSION_DIRECTORY
  3241. #if version >= 4
  3242. SUPPORTED !!SUPPORTED_WindowsNET_Enterprise
  3243. #endif
  3244. EXPLAIN !!TS_JOIN_SESSION_DIRECTORY_EXPLAIN
  3245. VALUENAME "SessionDirectoryActive"
  3246. VALUEON NUMERIC 1
  3247. VALUEOFF NUMERIC 0
  3248. END POLICY
  3249. POLICY !!TS_SD_Loc
  3250. #if version >= 4
  3251. SUPPORTED !!SUPPORTED_WindowsNET_Enterprise
  3252. #endif
  3253. EXPLAIN !!TS_SD_Loc_Explain
  3254. PART !!TS_SD_Loc EDITTEXT REQUIRED
  3255. VALUENAME "SessionDirectoryLocation"
  3256. END PART
  3257. END POLICY
  3258. POLICY !!TS_SD_ClustName
  3259. #if version >= 4
  3260. SUPPORTED !!SUPPORTED_WindowsNET_Enterprise
  3261. #endif
  3262. EXPLAIN !!TS_SD_ClustName_Explain
  3263. PART !!TS_SD_ClustName EDITTEXT REQUIRED
  3264. VALUENAME "SessionDirectoryClusterName"
  3265. END PART
  3266. END POLICY
  3267. END CATEGORY
  3268. CATEGORY !!TS_Sessions
  3269. #if version >= 4
  3270. EXPLAIN !!TS_Sessions_Comp_Help
  3271. #endif
  3272. POLICY !!TS_Sessions_Disconnected_Timeout
  3273. #if version >= 4
  3274. SUPPORTED !!TS_SUPPORTED_WindowsXP
  3275. #endif
  3276. EXPLAIN !!TS_SESSIONS_DISCONNECTED_TIMEOUT_EXPLAIN
  3277. ACTIONLISTOFF
  3278. VALUENAME "MaxDisconnectionTime" VALUE "0"
  3279. END ACTIONLISTOFF
  3280. PART !!TS_Sessions_EndDisconnected DROPDOWNLIST NOSORT
  3281. VALUENAME "MaxDisconnectionTime"
  3282. ITEMLIST
  3283. NAME !!TS_TIME_NEVER VALUE NUMERIC 0 DEFAULT
  3284. NAME !!TS_TIME_1MIN VALUE NUMERIC 60000
  3285. NAME !!TS_TIME_5MIN VALUE NUMERIC 300000
  3286. NAME !!TS_TIME_10MIN VALUE NUMERIC 600000
  3287. NAME !!TS_TIME_15MIN VALUE NUMERIC 900000
  3288. NAME !!TS_TIME_30MIN VALUE NUMERIC 1800000
  3289. NAME !!TS_TIME_1HR VALUE NUMERIC 3600000
  3290. NAME !!TS_TIME_2HR VALUE NUMERIC 7200000
  3291. NAME !!TS_TIME_3HR VALUE NUMERIC 10800000
  3292. NAME !!TS_TIME_1DAY VALUE NUMERIC 86400000
  3293. NAME !!TS_TIME_2DAY VALUE NUMERIC 172800000
  3294. END ITEMLIST
  3295. END PART
  3296. END POLICY
  3297. POLICY !!TS_Sessions_Limits
  3298. #if version >= 4
  3299. SUPPORTED !!TS_SUPPORTED_WindowsXP
  3300. #endif
  3301. EXPLAIN !!TS_SESSIONS_LIMITS_EXPLAIN
  3302. PART !!TS_Sessions_ActiveLimit DROPDOWNLIST NOSORT
  3303. VALUENAME "MaxConnectionTime"
  3304. ITEMLIST
  3305. NAME !!TS_TIME_NEVER VALUE NUMERIC 0 DEFAULT
  3306. NAME !!TS_TIME_1MIN VALUE NUMERIC 60000
  3307. NAME !!TS_TIME_5MIN VALUE NUMERIC 300000
  3308. NAME !!TS_TIME_10MIN VALUE NUMERIC 600000
  3309. NAME !!TS_TIME_15MIN VALUE NUMERIC 900000
  3310. NAME !!TS_TIME_30MIN VALUE NUMERIC 1800000
  3311. NAME !!TS_TIME_1HR VALUE NUMERIC 3600000
  3312. NAME !!TS_TIME_2HR VALUE NUMERIC 7200000
  3313. NAME !!TS_TIME_3HR VALUE NUMERIC 10800000
  3314. NAME !!TS_TIME_1DAY VALUE NUMERIC 86400000
  3315. NAME !!TS_TIME_2DAY VALUE NUMERIC 172800000
  3316. END ITEMLIST
  3317. END PART
  3318. END POLICY
  3319. POLICY !!TS_Sessions_Idle_Limit
  3320. #if version >= 4
  3321. SUPPORTED !!TS_SUPPORTED_WindowsXP
  3322. #endif
  3323. EXPLAIN !!TS_SESSIONS_IDLE_LIMIT_EXPLAIN
  3324. PART !!TS_Sessions_IdleLimitText DROPDOWNLIST NOSORT
  3325. VALUENAME "MaxIdleTime" REQUIRED
  3326. ITEMLIST
  3327. NAME !!TS_TIME_NEVER VALUE NUMERIC 0 DEFAULT
  3328. NAME !!TS_TIME_1MIN VALUE NUMERIC 60000
  3329. NAME !!TS_TIME_5MIN VALUE NUMERIC 300000
  3330. NAME !!TS_TIME_10MIN VALUE NUMERIC 600000
  3331. NAME !!TS_TIME_15MIN VALUE NUMERIC 900000
  3332. NAME !!TS_TIME_30MIN VALUE NUMERIC 1800000
  3333. NAME !!TS_TIME_1HR VALUE NUMERIC 3600000
  3334. NAME !!TS_TIME_2HR VALUE NUMERIC 7200000
  3335. NAME !!TS_TIME_3HR VALUE NUMERIC 10800000
  3336. NAME !!TS_TIME_1DAY VALUE NUMERIC 86400000
  3337. NAME !!TS_TIME_2DAY VALUE NUMERIC 172800000
  3338. END ITEMLIST
  3339. END PART
  3340. END POLICY
  3341. POLICY !!TS_Sessions_Reconnect_Same
  3342. #if version >= 4
  3343. SUPPORTED !!TS_SUPPORTED_WindowsXP
  3344. #endif
  3345. EXPLAIN !!TS_SESSIONS_RECONNECT_SAME_EXPLAIN
  3346. VALUENAME "fReconnectSame"
  3347. VALUEON NUMERIC 1
  3348. VALUEOFF NUMERIC 0
  3349. END POLICY
  3350. POLICY !!TS_Session_End_On_Limit
  3351. EXPLAIN !!TS_SESSION_END_ON_LIMIT_EXPLAIN
  3352. VALUENAME "fResetBroken"
  3353. VALUEON NUMERIC 1
  3354. VALUEOFF NUMERIC 0
  3355. END POLICY
  3356. END CATEGORY
  3357. POLICY !!TS_USER_PROFILES
  3358. #if version >= 4
  3359. SUPPORTED !!TS_SUPPORTED_WindowsXP
  3360. #endif
  3361. EXPLAIN !!TS_USER_PROFILE_EXPLAIN
  3362. PART !!TS_PROFILE_PATH EDITTEXT REQUIRED
  3363. VALUENAME "WFProfilePath"
  3364. END PART
  3365. PART !!TS_PATH_NOTE TEXT
  3366. END PART
  3367. END POLICY
  3368. POLICY !!TS_USER_HOME
  3369. #if version >= 4
  3370. SUPPORTED !!TS_SUPPORTED_WindowsXP
  3371. #endif
  3372. EXPLAIN !!TS_USER_HOME_EXPLAIN
  3373. PART !!TS_USER_HOME_LOCATION DROPDOWNLIST NOSORT
  3374. VALUENAME "WFHomeDirUNC"
  3375. ITEMLIST
  3376. NAME !!TS_On_the_Network VALUE NUMERIC 1 DEFAULT
  3377. NAME !!TS_on_the_Local_machine VALUE NUMERIC 0
  3378. END ITEMLIST
  3379. END PART
  3380. PART !!TS_HOME_DIR EDITTEXT REQUIRED
  3381. VALUENAME "WFHomeDir"
  3382. END PART
  3383. PART !!TS_DRIVE_NOTE TEXT
  3384. END PART
  3385. PART !!TS_DRIVE_LETTER DROPDOWNLIST
  3386. VALUENAME "WFHomeDirDrive"
  3387. ITEMLIST
  3388. NAME !!TS_DRIVE_G VALUE "G:"
  3389. NAME !!TS_DRIVE_H VALUE "H:"
  3390. NAME !!TS_DRIVE_I VALUE "I:"
  3391. NAME !!TS_DRIVE_J VALUE "J:"
  3392. NAME !!TS_DRIVE_K VALUE "K:"
  3393. NAME !!TS_DRIVE_L VALUE "L:"
  3394. NAME !!TS_DRIVE_M VALUE "M:"
  3395. NAME !!TS_DRIVE_N VALUE "N:"
  3396. NAME !!TS_DRIVE_O VALUE "O:"
  3397. NAME !!TS_DRIVE_P VALUE "P:"
  3398. NAME !!TS_DRIVE_Q VALUE "Q:"
  3399. NAME !!TS_DRIVE_R VALUE "R:"
  3400. NAME !!TS_DRIVE_S VALUE "S:"
  3401. NAME !!TS_DRIVE_T VALUE "T:"
  3402. NAME !!TS_DRIVE_U VALUE "U:"
  3403. NAME !!TS_DRIVE_V VALUE "V:"
  3404. NAME !!TS_DRIVE_W VALUE "W:"
  3405. NAME !!TS_DRIVE_X VALUE "X:"
  3406. NAME !!TS_DRIVE_Y VALUE "Y:"
  3407. NAME !!TS_DRIVE_Z VALUE "Z:" DEFAULT
  3408. END ITEMLIST
  3409. END PART
  3410. END POLICY
  3411. POLICY !!TS_RemoteControl
  3412. #if version >= 4
  3413. SUPPORTED !!TS_SUPPORTED_WindowsXP
  3414. #endif
  3415. EXPLAIN !!TS_RemoteControl_EXPLAIN
  3416. PART !!TS_RemoteControl_Levels DROPDOWNLIST NOSORT
  3417. VALUENAME "Shadow"
  3418. ITEMLIST
  3419. NAME !!TS_RemoteControl_0 VALUE NUMERIC 0 DEFAULT
  3420. NAME !!TS_RemoteControl_1 VALUE NUMERIC 1
  3421. NAME !!TS_RemoteControl_2 VALUE NUMERIC 2
  3422. NAME !!TS_RemoteControl_3 VALUE NUMERIC 3
  3423. NAME !!TS_RemoteControl_4 VALUE NUMERIC 4
  3424. END ITEMLIST
  3425. END PART
  3426. END POLICY
  3427. POLICY !!TS_START_PROGRAM
  3428. #if version >= 4
  3429. SUPPORTED !!TS_SUPPORTED_WindowsXP
  3430. #endif
  3431. EXPLAIN !!TS_START_PROGRAM_EXPLAIN
  3432. PART !!TS_PROGRAM_NAME EDITTEXT REQUIRED
  3433. VALUENAME "InitialProgram"
  3434. END PART
  3435. PART !!TS_WORKDIR EDITTEXT
  3436. VALUENAME "WorkDirectory"
  3437. END PART
  3438. END POLICY
  3439. END CATEGORY ; TS_GP_NODE
  3440. CATEGORY !!MSI
  3441. #if version >= 4
  3442. EXPLAIN !!MSI_Help
  3443. #endif
  3444. KEYNAME "Software\Policies\Microsoft\Windows\Installer"
  3445. POLICY !!DisableMSI
  3446. #if version >= 4
  3447. SUPPORTED !!SUPPORTED_Win2k
  3448. #endif
  3449. EXPLAIN !!DisableMSI_Help
  3450. PART !!DisableMSI DROPDOWNLIST NOSORT REQUIRED
  3451. VALUENAME "DisableMSI"
  3452. ITEMLIST
  3453. NAME !!DisableAlways VALUE NUMERIC 2
  3454. NAME !!DisableNonManaged VALUE NUMERIC 1 DEFAULT
  3455. NAME !!DisableNever VALUE NUMERIC 0
  3456. END ITEMLIST
  3457. END PART
  3458. END POLICY
  3459. POLICY !!AlwaysInstallElevated
  3460. #if version >= 4
  3461. SUPPORTED !!SUPPORTED_Win2k
  3462. #endif
  3463. EXPLAIN !!AlwaysInstallElevated_Help
  3464. VALUENAME "AlwaysInstallElevated"
  3465. VALUEON NUMERIC 1
  3466. VALUEOFF NUMERIC 0
  3467. PART !!Blank TEXT
  3468. END PART
  3469. PART !!UserANDMachineT TEXT
  3470. END PART
  3471. END POLICY
  3472. POLICY !!DisableRollback
  3473. #if version >= 4
  3474. SUPPORTED !!SUPPORTED_Win2k
  3475. #endif
  3476. EXPLAIN !!DisableRollback_Help
  3477. VALUENAME "DisableRollback"
  3478. VALUEON NUMERIC 1
  3479. VALUEOFF NUMERIC 0
  3480. PART !!Blank TEXT
  3481. END PART
  3482. PART !!UserORMachineT TEXT
  3483. END PART
  3484. END POLICY
  3485. POLICY !!DisableBrowse
  3486. #if version >= 4
  3487. SUPPORTED !!SUPPORTED_Win2k
  3488. #endif
  3489. EXPLAIN !!DisableBrowse_Help
  3490. VALUENAME "DisableBrowse"
  3491. VALUEON NUMERIC 1
  3492. VALUEOFF NUMERIC 0
  3493. END POLICY
  3494. POLICY !!DisablePatch
  3495. #if version >= 4
  3496. SUPPORTED !!SUPPORTED_Win2k
  3497. #endif
  3498. EXPLAIN !!DisablePatch_Help
  3499. VALUENAME "DisablePatch"
  3500. VALUEON NUMERIC 1
  3501. VALUEOFF NUMERIC 0
  3502. END POLICY
  3503. POLICY !!SafeForScripting
  3504. #if version >= 4
  3505. SUPPORTED !!SUPPORTED_Win2k
  3506. #endif
  3507. EXPLAIN !!SafeForScripting_Help
  3508. VALUENAME "SafeForScripting"
  3509. VALUEON NUMERIC 1
  3510. VALUEOFF NUMERIC 0
  3511. END POLICY
  3512. POLICY !!EnableUserControl
  3513. #if version >= 4
  3514. SUPPORTED !!SUPPORTED_Win2k
  3515. #endif
  3516. EXPLAIN !!EnableUserControl_Help
  3517. VALUENAME "EnableUserControl"
  3518. VALUEON NUMERIC 1
  3519. VALUEOFF NUMERIC 0
  3520. END POLICY
  3521. POLICY !!AllowLockdownBrowse
  3522. #if version >= 4
  3523. SUPPORTED !!SUPPORTED_Win2k
  3524. #endif
  3525. EXPLAIN !!AllowLockdownBrowse_Help
  3526. VALUENAME "AllowLockdownBrowse"
  3527. VALUEON NUMERIC 1
  3528. VALUEOFF NUMERIC 0
  3529. END POLICY
  3530. POLICY !!AllowLockdownMedia
  3531. #if version >= 4
  3532. SUPPORTED !!SUPPORTED_Win2k
  3533. #endif
  3534. EXPLAIN !!AllowLockdownMedia_Help
  3535. VALUENAME "AllowLockdownMedia"
  3536. VALUEON NUMERIC 1
  3537. VALUEOFF NUMERIC 0
  3538. END POLICY
  3539. POLICY !!AllowLockdownPatch
  3540. #if version >= 4
  3541. SUPPORTED !!SUPPORTED_Win2k
  3542. #endif
  3543. EXPLAIN !!AllowLockdownPatch_Help
  3544. VALUENAME "AllowLockdownPatch"
  3545. VALUEON NUMERIC 1
  3546. VALUEOFF NUMERIC 0
  3547. END POLICY
  3548. POLICY !!EnableAdminTSRemote
  3549. #if version >= 4
  3550. SUPPORTED !!SUPPORTED_Win2k
  3551. #endif
  3552. EXPLAIN !!EnableAdminTSRemote_Help
  3553. VALUENAME "EnableAdminTSRemote"
  3554. VALUEON NUMERIC 1
  3555. VALUEOFF NUMERIC 0
  3556. END POLICY
  3557. POLICY !!TransformsSecure
  3558. #if version >= 4
  3559. SUPPORTED !!SUPPORTED_Win2k
  3560. #endif
  3561. EXPLAIN !!TransformsSecure_Help
  3562. VALUENAME "TransformsSecure"
  3563. VALUEON NUMERIC 1
  3564. VALUEOFF NUMERIC 0
  3565. END POLICY
  3566. POLICY !!MSILogging
  3567. #if version >= 4
  3568. SUPPORTED !!SUPPORTED_Win2k
  3569. #endif
  3570. EXPLAIN !!MSILogging_Help
  3571. PART !!MSILogging EDITTEXT
  3572. VALUENAME "Logging"
  3573. DEFAULT iweap
  3574. END PART
  3575. PART !!MSILoggingT1 TEXT
  3576. END PART
  3577. PART !!MSILoggingT2 TEXT
  3578. END PART
  3579. PART !!MSILoggingT3 TEXT
  3580. END PART
  3581. PART !!MSILoggingT4 TEXT
  3582. END PART
  3583. PART !!MSILoggingT5 TEXT
  3584. END PART
  3585. PART !!MSILoggingT6 TEXT
  3586. END PART
  3587. PART !!MSILoggingT7 TEXT
  3588. END PART
  3589. PART !!MSILoggingT8 TEXT
  3590. END PART
  3591. PART !!MSILoggingT9 TEXT
  3592. END PART
  3593. PART !!MSILoggingT10 TEXT
  3594. END PART
  3595. PART !!MSILoggingT11 TEXT
  3596. END PART
  3597. PART !!MSILoggingT12 TEXT
  3598. END PART
  3599. PART !!MSILoggingT13 TEXT
  3600. END PART
  3601. END POLICY
  3602. POLICY !!MSI_DisableUserInstalls
  3603. #if version >= 4
  3604. SUPPORTED !!SUPPORTED_MSI15
  3605. #endif
  3606. EXPLAIN !!MSI_DisableUserInstalls_Help
  3607. PART !!MSI_DisableUserInstallsBox DROPDOWNLIST NOSORT REQUIRED
  3608. VALUENAME "DisableUserInstalls"
  3609. ITEMLIST
  3610. NAME !!MSI_AllowUser VALUE NUMERIC 0
  3611. NAME !!MSI_HideUser VALUE NUMERIC 1 DEFAULT
  3612. NAME !!MSI_DisAllowUser VALUE NUMERIC 2
  3613. END ITEMLIST
  3614. END PART
  3615. END POLICY
  3616. POLICY !!MSI_DisableSRCheckPoints
  3617. #if version >= 4
  3618. SUPPORTED !!SUPPORTED_WindowsXPOnly
  3619. #endif
  3620. EXPLAIN !!MSI_DisableSRCheckPoints_Help
  3621. VALUENAME "LimitSystemRestoreCheckpointing"
  3622. END POLICY
  3623. END CATEGORY ; MSI
  3624. CATEGORY !!WinMSG_WindowsMsg
  3625. #if version >= 4
  3626. EXPLAIN !!WinMSG_WindowsMsg_Help
  3627. #endif
  3628. KEYNAME "Software\Policies\Microsoft\Messenger\Client"
  3629. POLICY !!WinMSG_NoWindowsMsg_Comp
  3630. #if version >= 4
  3631. SUPPORTED !!SUPPORTED_WindowsXP
  3632. #endif
  3633. EXPLAIN !!WinMSG_NoWindowsMsg_Help
  3634. VALUENAME "PreventRun"
  3635. VALUEON NUMERIC 1
  3636. VALUEOFF NUMERIC 0
  3637. END POLICY
  3638. POLICY !!WinMSG_NoAutoStartWindowsMsg_Comp
  3639. #if version >= 4
  3640. SUPPORTED !!SUPPORTED_WindowsXP
  3641. #endif
  3642. EXPLAIN !!WinMSG_NoAutoStartWindowsMsg_Help
  3643. VALUENAME "PreventAutoRun"
  3644. VALUEON NUMERIC 1
  3645. VALUEOFF NUMERIC 0
  3646. END POLICY
  3647. END CATEGORY ; WindowsMsg
  3648. CATEGORY !!WMDRMCat
  3649. POLICY !!DisableOnline
  3650. KEYNAME "Software\Policies\Microsoft\WMDRM"
  3651. #if version >= 4
  3652. SUPPORTED !!SUPPORTED_WindowsNET
  3653. #endif
  3654. EXPLAIN !!DisableOnlineExplain
  3655. VALUENAME "DisableOnline"
  3656. VALUEON NUMERIC 1
  3657. VALUEOFF NUMERIC 0
  3658. END POLICY
  3659. END CATEGORY ; WMDRMCat
  3660. END CATEGORY ; WindowsComponents
  3661. ;**************************************************************************************************
  3662. CLASS USER
  3663. CATEGORY !!StartMenu
  3664. #if version >= 4
  3665. EXPLAIN !!StartMenu_Help
  3666. #endif
  3667. KEYNAME "Software\Microsoft\Windows\CurrentVersion\Policies\Explorer"
  3668. POLICY !!NoStartMenuSubFolders
  3669. #if version >= 4
  3670. SUPPORTED !!SUPPORTED_Win2k
  3671. #endif
  3672. EXPLAIN !!NoStartMenuSubFolders_Help
  3673. VALUENAME "NoStartMenuSubFolders"
  3674. END POLICY
  3675. POLICY !!NoWindowsUpdate
  3676. #if version >= 4
  3677. SUPPORTED !!SUPPORTED_Win2k
  3678. #endif
  3679. EXPLAIN !!NoWindowsUpdate_Help
  3680. VALUENAME "NoWindowsUpdate"
  3681. END POLICY
  3682. POLICY !!NoCommonGroups
  3683. #if version >= 4
  3684. SUPPORTED !!SUPPORTED_Win2k
  3685. #endif
  3686. EXPLAIN !!NoCommonGroups_Help
  3687. VALUENAME "NoCommonGroups"
  3688. END POLICY
  3689. POLICY !!NoSMMyDocuments
  3690. #if version >= 4
  3691. SUPPORTED !!SUPPORTED_Win2k
  3692. #endif
  3693. EXPLAIN !!NoSMMyDocuments_Help
  3694. VALUENAME "NoSMMyDocs"
  3695. END POLICY
  3696. POLICY !!NoRecentDocsMenu
  3697. #if version >= 4
  3698. SUPPORTED !!SUPPORTED_Win2k
  3699. #endif
  3700. EXPLAIN !!NoRecentDocsMenu_Help
  3701. VALUENAME "NoRecentDocsMenu"
  3702. END POLICY
  3703. POLICY !!NoSetFolders
  3704. #if version >= 4
  3705. SUPPORTED !!SUPPORTED_Win2k
  3706. #endif
  3707. EXPLAIN !!NoSetFolders_Help
  3708. VALUENAME "NoSetFolders"
  3709. END POLICY
  3710. POLICY !!NoNetAndDialupConnect
  3711. #if version >= 4
  3712. SUPPORTED !!SUPPORTED_Win2k
  3713. #endif
  3714. EXPLAIN !!NoNetAndDialupConnect_Help
  3715. VALUENAME "NoNetworkConnections"
  3716. END POLICY
  3717. POLICY !!NoFavoritesMenu
  3718. #if version >= 4
  3719. SUPPORTED !!SUPPORTED_Win2k
  3720. #endif
  3721. EXPLAIN !!NoFavoritesMenu_Help
  3722. VALUENAME "NoFavoritesMenu"
  3723. END POLICY
  3724. POLICY !!NoFind
  3725. #if version >= 4
  3726. SUPPORTED !!SUPPORTED_Win2k
  3727. #endif
  3728. EXPLAIN !!NoFind_Help
  3729. VALUENAME "NoFind"
  3730. END POLICY
  3731. POLICY !!NoHelp
  3732. #if version >= 4
  3733. SUPPORTED !!SUPPORTED_Win2k
  3734. #endif
  3735. EXPLAIN !!NoHelp_Help
  3736. VALUENAME "NoSMHelp"
  3737. END POLICY
  3738. POLICY !!NoRun
  3739. #if version >= 4
  3740. SUPPORTED !!SUPPORTED_Win2k
  3741. #endif
  3742. EXPLAIN !!NoRun_Help
  3743. VALUENAME "NoRun"
  3744. END POLICY
  3745. POLICY !!NoSMMyPictures
  3746. #if version >= 4
  3747. SUPPORTED !!SUPPORTED_WindowsXP
  3748. #endif
  3749. EXPLAIN !!NoSMMyPictures_Help
  3750. VALUENAME "NoSMMyPictures"
  3751. END POLICY
  3752. POLICY !!NoSMMyMusic
  3753. #if version >= 4
  3754. SUPPORTED !!SUPPORTED_WindowsXP
  3755. #endif
  3756. EXPLAIN !!NoSMMyMusic_Help
  3757. VALUENAME "NoStartMenuMyMusic"
  3758. END POLICY
  3759. POLICY !!NoSMMyNetworkPlaces
  3760. #if version >= 4
  3761. SUPPORTED !!SUPPORTED_WindowsXP
  3762. #endif
  3763. EXPLAIN !!NoSMMyNetworkPlaces_Help
  3764. VALUENAME "NoStartMenuNetworkPlaces"
  3765. END POLICY
  3766. POLICY !!ForceStartMenuLogOff
  3767. #if version >= 4
  3768. SUPPORTED !!SUPPORTED_Win2k
  3769. #endif
  3770. EXPLAIN !!ForceStartMenuLogOff_Help
  3771. VALUENAME "ForceStartMenuLogOff"
  3772. END POLICY
  3773. POLICY !!StartMenuLogOff
  3774. #if version >= 4
  3775. SUPPORTED !!SUPPORTED_Win2k
  3776. #endif
  3777. EXPLAIN !!StartMenuLogOff_Help
  3778. VALUENAME "StartMenuLogOff"
  3779. END POLICY
  3780. POLICY !!NoClose
  3781. #if version >= 4
  3782. SUPPORTED !!SUPPORTED_Win2k
  3783. #endif
  3784. EXPLAIN !!NoClose_Help
  3785. VALUENAME "NoClose"
  3786. END POLICY
  3787. POLICY !!NoChangeStartMenu
  3788. #if version >= 4
  3789. SUPPORTED !!SUPPORTED_Win2k
  3790. #endif
  3791. EXPLAIN !!NoChangeStartMenu_Help
  3792. VALUENAME "NoChangeStartMenu"
  3793. END POLICY
  3794. POLICY !!NoSetTaskbar
  3795. #if version >= 4
  3796. SUPPORTED !!SUPPORTED_Win2k
  3797. #endif
  3798. EXPLAIN !!NoSetTaskbar_Help
  3799. VALUENAME "NoSetTaskbar"
  3800. END POLICY
  3801. POLICY !!NoTrayContextMenu
  3802. #if version >= 4
  3803. SUPPORTED !!SUPPORTED_Win2k
  3804. #endif
  3805. EXPLAIN !!NoTrayContextMenu_Help
  3806. VALUENAME "NoTrayContextMenu"
  3807. END POLICY
  3808. POLICY !!NoRecentDocsHistory
  3809. #if version >= 4
  3810. SUPPORTED !!SUPPORTED_Win2k
  3811. #endif
  3812. EXPLAIN !!NoRecentDocsHistory_Help
  3813. VALUENAME "NoRecentDocsHistory"
  3814. END POLICY
  3815. POLICY !!ClearRecentDocsOnExit
  3816. #if version >= 4
  3817. SUPPORTED !!SUPPORTED_Win2k
  3818. #endif
  3819. EXPLAIN !!ClearRecentDocsOnExit_Help
  3820. VALUENAME "ClearRecentDocsOnExit"
  3821. END POLICY
  3822. POLICY !!Intellimenus
  3823. #if version >= 4
  3824. SUPPORTED !!SUPPORTED_Win2k
  3825. #endif
  3826. EXPLAIN !!Intellimenus_Help
  3827. VALUENAME "Intellimenus"
  3828. END POLICY
  3829. POLICY !!NoInstrumentation
  3830. #if version >= 4
  3831. SUPPORTED !!SUPPORTED_Win2k
  3832. #endif
  3833. EXPLAIN !!NoInstrumentation_Help
  3834. VALUENAME "NoInstrumentation"
  3835. END POLICY
  3836. POLICY !!MemCheckBoxInRunDlg
  3837. #if version >= 4
  3838. SUPPORTED !!SUPPORTED_Win2k
  3839. #endif
  3840. EXPLAIN !!MemCheckBoxInRunDlg_Help
  3841. VALUENAME "MemCheckBoxInRunDlg"
  3842. END POLICY
  3843. POLICY !!NoResolveSearch
  3844. #if version >= 4
  3845. SUPPORTED !!SUPPORTED_Win2k
  3846. #endif
  3847. EXPLAIN !!NoResolveSearch_Help
  3848. VALUENAME "NoResolveSearch"
  3849. END POLICY
  3850. POLICY !!NoResolveTrack
  3851. #if version >= 4
  3852. SUPPORTED !!SUPPORTED_Win2k
  3853. #endif
  3854. EXPLAIN !!NoResolveTrack_Help
  3855. VALUENAME "NoResolveTrack"
  3856. END POLICY
  3857. POLICY !!GreyMSIAds
  3858. #if version >= 4
  3859. SUPPORTED !!SUPPORTED_Win2k
  3860. #endif
  3861. EXPLAIN !!GreyMSIAds_Help
  3862. VALUENAME "GreyMSIAds"
  3863. END POLICY
  3864. POLICY !!NoTaskGrouping
  3865. EXPLAIN !!NoTaskGrouping_Help
  3866. #if version >= 4
  3867. SUPPORTED !!SUPPORTED_WindowsXP
  3868. #endif
  3869. VALUENAME "NoTaskGrouping"
  3870. END POLICY
  3871. POLICY !!NoAutoTrayNotify
  3872. EXPLAIN !!NoAutoTrayNotify_Help
  3873. #if version >= 4
  3874. SUPPORTED !!SUPPORTED_WindowsXP
  3875. #endif
  3876. VALUENAME "NoAutoTrayNotify"
  3877. END POLICY
  3878. POLICY !!LockTaskbar
  3879. EXPLAIN !!LockTaskbar_Help
  3880. #if version >= 4
  3881. SUPPORTED !!SUPPORTED_WindowsXP
  3882. #endif
  3883. VALUENAME "LockTaskbar"
  3884. END POLICY
  3885. POLICY !!NoStartPage
  3886. EXPLAIN !!NoStartPage_Help
  3887. #if version >= 4
  3888. SUPPORTED !!SUPPORTED_WindowsXP
  3889. #endif
  3890. VALUENAME "NoSimpleStartMenu"
  3891. END POLICY
  3892. POLICY !!NoBalloonTip
  3893. EXPLAIN !!NoBalloonTip_Help
  3894. #if version >= 4
  3895. SUPPORTED !!SUPPORTED_WindowsXP
  3896. #endif
  3897. VALUENAME "NoSMBalloonTip"
  3898. END POLICY
  3899. POLICY !!NoPinnedPrograms
  3900. EXPLAIN !!NoPinnedPrograms_Help
  3901. #if version >= 4
  3902. SUPPORTED !!SUPPORTED_WindowsXP
  3903. #endif
  3904. VALUENAME "NoStartMenuPinnedList"
  3905. END POLICY
  3906. POLICY !!NoFrequentUsedPrograms
  3907. EXPLAIN !!NoFrequentUsedPrograms_Help
  3908. #if version >= 4
  3909. SUPPORTED !!SUPPORTED_WindowsXP
  3910. #endif
  3911. VALUENAME "NoStartMenuMFUprogramsList"
  3912. END POLICY
  3913. POLICY !!NoMoreProgramsList
  3914. EXPLAIN !!NoMoreProgramsList_Help
  3915. #if version >= 4
  3916. SUPPORTED !!SUPPORTED_WindowsXP
  3917. #endif
  3918. VALUENAME "NoStartMenuMorePrograms"
  3919. END POLICY
  3920. POLICY !!RemoveUnDockPCButton
  3921. EXPLAIN !!RemoveUnDockPCButton_Help
  3922. #if version >= 4
  3923. SUPPORTED !!SUPPORTED_WindowsXP
  3924. #endif
  3925. VALUENAME "NoStartMenuEjectPC"
  3926. END POLICY
  3927. POLICY !!NoUserNameOnStartMenu
  3928. EXPLAIN !!NoUserNameOnStartMenu
  3929. #if version >= 4
  3930. SUPPORTED !!SUPPORTED_WindowsXP
  3931. #endif
  3932. VALUENAME "NoUserNameInStartMenu"
  3933. END POLICY
  3934. POLICY !!NoTaskBarClock
  3935. EXPLAIN !!NoTaskBarClock_Help
  3936. #if version >= 4
  3937. SUPPORTED !!SUPPORTED_WindowsXP
  3938. #endif
  3939. VALUENAME "HideClock"
  3940. END POLICY
  3941. POLICY !!NoTrayItemsDisplay
  3942. EXPLAIN !!NoTrayItemsDisplay_Help
  3943. #if version >= 4
  3944. SUPPORTED !!SUPPORTED_WindowsXP
  3945. #endif
  3946. VALUENAME "NoTrayItemsDisplay"
  3947. END POLICY
  3948. POLICY !!NoToolbarsOnTaskbar
  3949. EXPLAIN !!NoToolbarsOnTaskbar_Help
  3950. #if version >= 4
  3951. SUPPORTED !!SUPPORTED_WindowsXP
  3952. #endif
  3953. VALUENAME "NoToolbarsOnTaskbar"
  3954. END POLICY
  3955. POLICY !!NoSMConfigurePrograms
  3956. EXPLAIN !!NoSMConfigurePrograms_Help
  3957. #if version >= 4
  3958. SUPPORTED !!SUPPORTED_Win2kSP3_Or_XPSP1
  3959. #endif
  3960. VALUENAME "NoSMConfigurePrograms"
  3961. END POLICY
  3962. END CATEGORY ; StartMenu
  3963. CATEGORY !!Desktop
  3964. #if version >= 4
  3965. EXPLAIN !!Desktop_Help
  3966. #endif
  3967. KEYNAME "Software\Microsoft\Windows\CurrentVersion\Policies\Explorer"
  3968. POLICY !!NoDesktop
  3969. #if version >= 4
  3970. SUPPORTED !!SUPPORTED_Win2k
  3971. #endif
  3972. EXPLAIN !!NoDesktop_Help
  3973. VALUENAME "NoDesktop"
  3974. END POLICY
  3975. POLICY !!NoMyDocumentsIcon
  3976. KEYNAME "Software\Microsoft\Windows\CurrentVersion\Policies\NonEnum"
  3977. #if version >= 4
  3978. SUPPORTED !!SUPPORTED_Win2k
  3979. #endif
  3980. EXPLAIN !!NoMyDocumentsIcon_Help
  3981. VALUENAME "{450D8FBA-AD25-11D0-98A8-0800361B1103}"
  3982. END POLICY
  3983. POLICY !!NoMyComputerIcon
  3984. KEYNAME "Software\Microsoft\Windows\CurrentVersion\Policies\NonEnum"
  3985. #if version >= 4
  3986. SUPPORTED !!SUPPORTED_WindowsXP
  3987. #endif
  3988. EXPLAIN !!NoMyComputerIcon_Help
  3989. VALUENAME "{20D04FE0-3AEA-1069-A2D8-08002B30309D}"
  3990. VALUEON NUMERIC 1
  3991. VALUEOFF NUMERIC 0
  3992. END POLICY
  3993. POLICY !!NoRecycleBinIcon
  3994. KEYNAME "Software\Microsoft\Windows\CurrentVersion\Policies\NonEnum"
  3995. #if version >= 4
  3996. SUPPORTED !!SUPPORTED_WindowsXP
  3997. #endif
  3998. EXPLAIN !!NoRecycleBinIcon_Help
  3999. VALUENAME "{645FF040-5081-101B-9F08-00AA002F954E}"
  4000. END POLICY
  4001. POLICY !!NoPropertiesMyDocuments
  4002. KEYNAME "Software\Microsoft\Windows\CurrentVersion\Policies\Explorer"
  4003. #if version >= 4
  4004. SUPPORTED !!SUPPORTED_Win2kSP3
  4005. #endif
  4006. EXPLAIN !!NoPropertiesMyDocuments_Help
  4007. VALUENAME "NoPropertiesMyDocuments"
  4008. END POLICY
  4009. POLICY !!NoPropertiesMyComputer
  4010. KEYNAME "Software\Microsoft\Windows\CurrentVersion\Policies\Explorer"
  4011. #if version >= 4
  4012. SUPPORTED !!SUPPORTED_Win2kSP3
  4013. #endif
  4014. EXPLAIN !!NoPropertiesMyComputer_Help
  4015. VALUENAME "NoPropertiesMyComputer"
  4016. END POLICY
  4017. POLICY !!NoRecycleBinProperties
  4018. KEYNAME "Software\Microsoft\Windows\CurrentVersion\Policies\Explorer"
  4019. #if version >= 4
  4020. SUPPORTED !!SUPPORTED_WindowsXP
  4021. #endif
  4022. EXPLAIN !!NoRecycleBinProperties_Help
  4023. VALUENAME "NoPropertiesRecycleBin"
  4024. END POLICY
  4025. POLICY !!NoNetHood
  4026. #if version >= 4
  4027. SUPPORTED !!SUPPORTED_Win2k
  4028. #endif
  4029. EXPLAIN !!NoNetHood_Help
  4030. VALUENAME "NoNetHood"
  4031. END POLICY
  4032. POLICY !!NoInternetIcon
  4033. #if version >= 4
  4034. SUPPORTED !!SUPPORTED_Win2k
  4035. #endif
  4036. EXPLAIN !!NoInternetIcon_Help
  4037. VALUENAME "NoInternetIcon"
  4038. END POLICY
  4039. POLICY !!NoRecentDocsNetHood
  4040. #if version >= 4
  4041. SUPPORTED !!SUPPORTED_Win2k
  4042. #endif
  4043. EXPLAIN !!NoRecentDocsNetHood_Help
  4044. VALUENAME "NoRecentDocsNetHood"
  4045. END POLICY
  4046. POLICY !!DisablePersonalDirChange
  4047. #if version >= 4
  4048. SUPPORTED !!SUPPORTED_Win2k
  4049. #endif
  4050. EXPLAIN !!DisablePersonalDirChange_Help
  4051. VALUENAME "DisablePersonalDirChange"
  4052. END POLICY
  4053. POLICY !!sz_DB_DragDropClose
  4054. #if version >= 4
  4055. SUPPORTED !!SUPPORTED_Win2k
  4056. #endif
  4057. EXPLAIN !!NoCloseDragDropBands_Help
  4058. VALUENAME "NoCloseDragDropBands"
  4059. END POLICY
  4060. POLICY !!sz_DB_Moving
  4061. #if version >= 4
  4062. SUPPORTED !!SUPPORTED_Win2k
  4063. #endif
  4064. EXPLAIN !!NoMovingBands_Help
  4065. VALUENAME "NoMovingBands"
  4066. END POLICY
  4067. POLICY !!NoSaveSettings
  4068. #if version >= 4
  4069. SUPPORTED !!SUPPORTED_Win2k
  4070. #endif
  4071. EXPLAIN !!NoSaveSettings_Help
  4072. VALUENAME "NoSaveSettings"
  4073. END POLICY
  4074. POLICY !!NoDesktopCleanupWizard
  4075. #if version >= 4
  4076. SUPPORTED !!SUPPORTED_WindowsXP
  4077. #endif
  4078. EXPLAIN !!NoDesktopCleanupWizard_Help
  4079. VALUENAME "NoDesktopCleanupWizard"
  4080. END POLICY
  4081. CATEGORY !!ActiveDesktop
  4082. #if version >= 4
  4083. EXPLAIN !!ActiveDesktop_Help
  4084. #endif
  4085. POLICY !!ForceActiveDesktopOn
  4086. KEYNAME "Software\Microsoft\Windows\CurrentVersion\Policies\Explorer"
  4087. #if version >= 4
  4088. SUPPORTED !!SUPPORTED_Win2k
  4089. #endif
  4090. EXPLAIN !!ForceActiveDesktopOn_Help
  4091. VALUENAME "ForceActiveDesktopOn"
  4092. PART !!ForceActiveDesktopOn_Tip TEXT
  4093. END PART
  4094. END POLICY
  4095. POLICY !!NoActiveDesktop
  4096. KEYNAME "Software\Microsoft\Windows\CurrentVersion\Policies\Explorer"
  4097. #if version >= 4
  4098. SUPPORTED !!SUPPORTED_Win2k
  4099. #endif
  4100. EXPLAIN !!NoActiveDesktop_Help
  4101. VALUENAME "NoActiveDesktop"
  4102. PART !!NoActiveDesktop_Tip TEXT
  4103. END PART
  4104. END POLICY
  4105. POLICY !!sz_ATC_NoComponents
  4106. KEYNAME "Software\Microsoft\Windows\CurrentVersion\Policies\ActiveDesktop"
  4107. #if version >= 4
  4108. SUPPORTED !!SUPPORTED_Win2k
  4109. #endif
  4110. EXPLAIN !!ATC_NoComponents_Help
  4111. VALUENAME "NoComponents"
  4112. END POLICY
  4113. POLICY !!NoActiveDesktopChanges
  4114. KEYNAME "Software\Microsoft\Windows\CurrentVersion\Policies\Explorer"
  4115. #if version >= 4
  4116. SUPPORTED !!SUPPORTED_Win2k
  4117. #endif
  4118. EXPLAIN !!NoActiveDesktopChanges_Help
  4119. VALUENAME "NoActiveDesktopChanges"
  4120. END POLICY
  4121. POLICY !!sz_ATC_DisableAdd
  4122. KEYNAME "Software\Microsoft\Windows\CurrentVersion\Policies\ActiveDesktop"
  4123. EXPLAIN !!NoAddingComponents_Help
  4124. #if version >= 4
  4125. SUPPORTED !!SUPPORTED_Win2k
  4126. #endif
  4127. VALUENAME "NoAddingComponents"
  4128. END POLICY
  4129. POLICY !!sz_ATC_DisableDel
  4130. KEYNAME "Software\Microsoft\Windows\CurrentVersion\Policies\ActiveDesktop"
  4131. #if version >= 4
  4132. SUPPORTED !!SUPPORTED_Win2k
  4133. #endif
  4134. EXPLAIN !!NoDeletingComponents_Help
  4135. VALUENAME "NoDeletingComponents"
  4136. END POLICY
  4137. POLICY !!sz_ATC_DisableEdit
  4138. KEYNAME "Software\Microsoft\Windows\CurrentVersion\Policies\ActiveDesktop"
  4139. #if version >= 4
  4140. SUPPORTED !!SUPPORTED_Win2k
  4141. #endif
  4142. EXPLAIN !!NoEditingComponents_Help
  4143. VALUENAME "NoEditingComponents"
  4144. END POLICY
  4145. POLICY !!sz_ATC_DisableClose
  4146. KEYNAME "Software\Microsoft\Windows\CurrentVersion\Policies\ActiveDesktop"
  4147. #if version >= 4
  4148. SUPPORTED !!SUPPORTED_Win2k
  4149. #endif
  4150. EXPLAIN !!NoClosingComponents_Help
  4151. VALUENAME "NoClosingComponents"
  4152. END POLICY
  4153. POLICY !!sz_AdminComponents_Title
  4154. KEYNAME "Software\Microsoft\Windows\CurrentVersion\Policies\ActiveDesktop\AdminComponent"
  4155. #if version >= 4
  4156. SUPPORTED !!SUPPORTED_Win2k
  4157. #endif
  4158. EXPLAIN !!AdminComponents_Help
  4159. PART !!sz_ATC_AdminAddItem EDITTEXT
  4160. VALUENAME "Add"
  4161. END PART
  4162. PART !!sz_ATC_AdminDeleteItem EDITTEXT
  4163. VALUENAME "Delete"
  4164. END PART
  4165. END POLICY
  4166. POLICY !!Wallpaper
  4167. KEYNAME "Software\Microsoft\Windows\CurrentVersion\Policies\System"
  4168. #if version >= 4
  4169. SUPPORTED !!SUPPORTED_Win2k
  4170. #endif
  4171. EXPLAIN !!Wallpaper_Help
  4172. PART !!WallpaperName EDITTEXT REQUIRED
  4173. VALUENAME "Wallpaper"
  4174. END PART
  4175. PART !!Wallpaper_Tip1 TEXT END PART
  4176. PART !!Wallpaper_Tip2 TEXT END PART
  4177. PART !!WallpaperStyle DROPDOWNLIST REQUIRED
  4178. VALUENAME "WallpaperStyle"
  4179. ITEMLIST
  4180. NAME !!WallpaperStyle_Center VALUE "0" DEFAULT
  4181. NAME !!WallpaperStyle_Tile VALUE "1"
  4182. NAME !!WallpaperStyle_Stretch VALUE "2"
  4183. END ITEMLIST
  4184. END PART
  4185. END POLICY
  4186. POLICY !!sz_DWP_NoHTMLPaper
  4187. KEYNAME "Software\Microsoft\Windows\CurrentVersion\Policies\ActiveDesktop"
  4188. #if version >= 4
  4189. SUPPORTED !!SUPPORTED_Win2k
  4190. #endif
  4191. EXPLAIN !!NoHTMLWallPaper_Help
  4192. VALUENAME "NoHTMLWallPaper"
  4193. END POLICY
  4194. END CATEGORY ;ActiveDesktop
  4195. CATEGORY !!ActiveDirectory
  4196. #if version >= 4
  4197. EXPLAIN !!ActiveDirectory_Help
  4198. #endif
  4199. KEYNAME "Software\Policies\Microsoft\Windows\Directory UI"
  4200. POLICY !!AD_QueryLimit
  4201. #if version >= 4
  4202. SUPPORTED !!SUPPORTED_Win2k
  4203. #endif
  4204. EXPLAIN !!AD_QueryLimit_Help
  4205. PART !!AD_QueryLimit_Box NUMERIC REQUIRED
  4206. VALUENAME "QueryLimit"
  4207. MIN 0 MAX 4000000000 DEFAULT 10000 SPIN 100
  4208. END PART
  4209. END POLICY
  4210. POLICY !!AD_EnableFilter
  4211. #if version >= 4
  4212. SUPPORTED !!SUPPORTED_Win2k
  4213. #endif
  4214. EXPLAIN !!AD_EnableFilter_Help
  4215. VALUENAME "EnableFilter"
  4216. END POLICY
  4217. POLICY !!AD_HideDirectoryFolder
  4218. #if version >= 4
  4219. SUPPORTED !!SUPPORTED_Win2kOnly
  4220. #endif
  4221. EXPLAIN !!AD_HideDirectoryFolder_Help
  4222. VALUENAME "HideDirectoryFolder"
  4223. END POLICY
  4224. END CATEGORY ; ActiveDirectory
  4225. END CATEGORY ;Desktop
  4226. CATEGORY !!Cpl
  4227. #if version >= 4
  4228. EXPLAIN !!Cpl_Help
  4229. #endif
  4230. KEYNAME "Software\Microsoft\Windows\CurrentVersion\Policies\Explorer"
  4231. POLICY !!NoControlPanel
  4232. KEYNAME "Software\Microsoft\Windows\CurrentVersion\Policies\Explorer"
  4233. #if version >= 4
  4234. SUPPORTED !!SUPPORTED_Win2k
  4235. #endif
  4236. EXPLAIN !!NoControlPanel_Help
  4237. VALUENAME "NoControlPanel"
  4238. END POLICY
  4239. POLICY !!DisallowCpls
  4240. KEYNAME "Software\Microsoft\Windows\CurrentVersion\Policies\Explorer"
  4241. #if version >= 4
  4242. SUPPORTED !!SUPPORTED_Win2k
  4243. #endif
  4244. EXPLAIN !!DisallowCpls_Help
  4245. VALUENAME "DisallowCpl"
  4246. PART !!DisallowCplsList LISTBOX
  4247. KEYNAME "Software\Microsoft\Windows\CurrentVersion\Policies\Explorer\DisallowCpl"
  4248. VALUEPREFIX ""
  4249. END PART
  4250. END POLICY
  4251. POLICY !!RestrictCpls
  4252. KEYNAME "Software\Microsoft\Windows\CurrentVersion\Policies\Explorer"
  4253. #if version >= 4
  4254. SUPPORTED !!SUPPORTED_Win2k
  4255. #endif
  4256. EXPLAIN !!RestrictCpls_Help
  4257. VALUENAME "RestrictCpl"
  4258. PART !!RestrictCplsList LISTBOX
  4259. KEYNAME "Software\Microsoft\Windows\CurrentVersion\Policies\Explorer\RestrictCpl"
  4260. VALUEPREFIX ""
  4261. END PART
  4262. PART !!RestrictCpls_Tip1 TEXT
  4263. END PART
  4264. PART !!RestrictCpls_Tip2 TEXT
  4265. END PART
  4266. PART !!RestrictCpls_Tip3 TEXT
  4267. END PART
  4268. PART !!RestrictCpls_Tip4 TEXT
  4269. END PART
  4270. END POLICY
  4271. POLICY !!ForceClassicControlPanel
  4272. EXPLAIN !!ForceClassicControlPanel_Help
  4273. #if version >= 4
  4274. SUPPORTED !!SUPPORTED_WindowsXP
  4275. #endif
  4276. VALUENAME "ForceClassicControlPanel"
  4277. VALUEON NUMERIC 1
  4278. VALUEOFF NUMERIC 0
  4279. END POLICY
  4280. CATEGORY !!Arp
  4281. #if version >= 4
  4282. EXPLAIN !!ARP_Help
  4283. #endif
  4284. KEYNAME "Software\Microsoft\Windows\CurrentVersion\Policies\Uninstall"
  4285. POLICY !!NoAddRemovePrograms
  4286. #if version >= 4
  4287. SUPPORTED !!SUPPORTED_Win2k
  4288. #endif
  4289. EXPLAIN !!NoAddRemovePrograms_Help
  4290. VALUENAME "NoAddRemovePrograms"
  4291. END POLICY
  4292. POLICY !!NoRemovePage
  4293. #if version >= 4
  4294. SUPPORTED !!SUPPORTED_Win2k
  4295. #endif
  4296. EXPLAIN !!NoRemovePage_Help
  4297. VALUENAME "NoRemovePage"
  4298. END POLICY
  4299. POLICY !!NoAddPage
  4300. #if version >= 4
  4301. SUPPORTED !!SUPPORTED_Win2k
  4302. #endif
  4303. EXPLAIN !!NoAddPage_Help
  4304. VALUENAME "NoAddPage"
  4305. END POLICY
  4306. POLICY !!NoWindowsSetupPage
  4307. #if version >= 4
  4308. SUPPORTED !!SUPPORTED_Win2k
  4309. #endif
  4310. EXPLAIN !!NoWindowsSetupPage_Help
  4311. VALUENAME "NoWindowsSetupPage"
  4312. END POLICY
  4313. POLICY !!NoChooseProgramsPage
  4314. #if version >= 4
  4315. SUPPORTED !!SUPPORTED_Win2kSP3_Or_XPSP1
  4316. #endif
  4317. EXPLAIN !!NoChooseProgramsPage_Help
  4318. VALUENAME "NoChooseProgramsPage"
  4319. END POLICY
  4320. POLICY !!NoAddFromCDorFloppy
  4321. #if version >= 4
  4322. SUPPORTED !!SUPPORTED_Win2k
  4323. #endif
  4324. EXPLAIN !!NoAddFromCDorFloppy_Help
  4325. VALUENAME "NoAddFromCDorFloppy"
  4326. END POLICY
  4327. POLICY !!NoAddFromInternet
  4328. #if version >= 4
  4329. SUPPORTED !!SUPPORTED_Win2k
  4330. #endif
  4331. EXPLAIN !!NoAddFromInternet_Help
  4332. VALUENAME "NoAddFromInternet"
  4333. END POLICY
  4334. POLICY !!NoAddFromNetwork
  4335. #if version >= 4
  4336. SUPPORTED !!SUPPORTED_Win2k
  4337. #endif
  4338. EXPLAIN !!NoAddFromNetwork_Help
  4339. VALUENAME "NoAddFromNetwork"
  4340. END POLICY
  4341. POLICY !!NoServices
  4342. #if version >= 4
  4343. SUPPORTED !!SUPPORTED_Win2k
  4344. #endif
  4345. EXPLAIN !!NoServices_Help
  4346. VALUENAME "NoServices"
  4347. END POLICY
  4348. POLICY !!NoSupportInfo
  4349. #if version >= 4
  4350. SUPPORTED !!SUPPORTED_Win2k
  4351. #endif
  4352. EXPLAIN !!NoSupportInfo_Help
  4353. VALUENAME "NoSupportInfo"
  4354. END POLICY
  4355. POLICY !!DefaultCategory
  4356. #if version >= 4
  4357. SUPPORTED !!SUPPORTED_Win2k
  4358. #endif
  4359. EXPLAIN !!DefaultCategory_Help
  4360. PART !!DefaultCategoryBox EDITTEXT REQUIRED
  4361. VALUENAME "DefaultCategory"
  4362. END PART
  4363. END POLICY
  4364. END CATEGORY ; ARP
  4365. CATEGORY !!Display
  4366. #if version >= 4
  4367. EXPLAIN !!Display_Explain
  4368. #endif
  4369. KEYNAME "Software\Microsoft\Windows\CurrentVersion\Policies\System"
  4370. POLICY !!CPL_Display_Disable
  4371. #if version >= 4
  4372. SUPPORTED !!SUPPORTED_Win2k
  4373. #endif
  4374. EXPLAIN !!NoDispCpl_Help
  4375. VALUENAME "NoDispCPL"
  4376. END POLICY
  4377. POLICY !!CPL_Display_HideBkgnd
  4378. #if version >= 4
  4379. SUPPORTED !!SUPPORTED_Win2k
  4380. #endif
  4381. EXPLAIN !!NoDispBackgroundPage_Help
  4382. VALUENAME "NoDispBackgroundPage"
  4383. END POLICY
  4384. POLICY !!sz_DWP_DisableChanges
  4385. KEYNAME "Software\Microsoft\Windows\CurrentVersion\Policies\ActiveDesktop"
  4386. #if version >= 4
  4387. SUPPORTED !!SUPPORTED_Win2k
  4388. #endif
  4389. EXPLAIN !!NoChangingWallPaper_Help
  4390. VALUENAME "NoChangingWallPaper"
  4391. END POLICY
  4392. POLICY !!CPL_Display_HideAppearance
  4393. #if version >= 4
  4394. SUPPORTED !!SUPPORTED_Win2k
  4395. #endif
  4396. EXPLAIN !!NoDispAppearancePage_Help
  4397. VALUENAME "NoDispAppearancePage"
  4398. END POLICY
  4399. POLICY !!CPL_Display_HideSettings
  4400. #if version >= 4
  4401. SUPPORTED !!SUPPORTED_Win2k
  4402. #endif
  4403. EXPLAIN !!NoDispSettingsPage_Help
  4404. VALUENAME "NoDispSettingsPage"
  4405. END POLICY
  4406. POLICY !!CPL_Display_HideScrsav
  4407. #if version >= 4
  4408. SUPPORTED !!SUPPORTED_Win2k
  4409. #endif
  4410. EXPLAIN !!NoDispScrSavPage_Help
  4411. VALUENAME "NoDispScrSavPage"
  4412. END POLICY
  4413. POLICY !!ScreenSaverActive
  4414. KEYNAME "Software\Policies\Microsoft\Windows\Control Panel\Desktop"
  4415. #if version >= 4
  4416. SUPPORTED !!SUPPORTED_Win2kSP1
  4417. #endif
  4418. EXPLAIN !!ScreenSaverActive_Help
  4419. VALUENAME "ScreenSaveActive"
  4420. VALUEON 1
  4421. VALUEOFF 0
  4422. END POLICY
  4423. POLICY !!ScreenSaverFilename
  4424. KEYNAME "Software\Policies\Microsoft\Windows\Control Panel\Desktop"
  4425. #if version >= 4
  4426. SUPPORTED !!SUPPORTED_Win2kSP1
  4427. #endif
  4428. EXPLAIN !!ScreenSaverFilename_Help
  4429. PART !!ScreenSaverFilename EDITTEXT
  4430. VALUENAME "SCRNSAVE.EXE"
  4431. END PART
  4432. END POLICY
  4433. POLICY !!ScreenSaverIsSecure
  4434. KEYNAME "Software\Policies\Microsoft\Windows\Control Panel\Desktop"
  4435. #if version >= 4
  4436. SUPPORTED !!SUPPORTED_Win2kSP1
  4437. #endif
  4438. EXPLAIN !!ScreenSaverIsSecure_Help
  4439. VALUENAME "ScreenSaverIsSecure"
  4440. VALUEON 1
  4441. VALUEOFF 0
  4442. END POLICY
  4443. POLICY !!ScreenSaverTimeOut
  4444. KEYNAME "Software\Policies\Microsoft\Windows\Control Panel\Desktop"
  4445. #if version >= 4
  4446. SUPPORTED !!SUPPORTED_Win2kSP1
  4447. #endif
  4448. EXPLAIN !!ScreenSaverTimeOut_Help
  4449. PART !!ScreenSaverTimeOut_Tip1 TEXT
  4450. END PART
  4451. PART !!Blank TEXT
  4452. END PART
  4453. PART !!ScreenSaverTimeOutFreqSpin NUMERIC DEFAULT 900
  4454. MIN 0 MAX 599940 SPIN 60
  4455. TXTCONVERT
  4456. VALUENAME "ScreenSaveTimeOut"
  4457. END PART
  4458. END POLICY
  4459. CATEGORY !!Themes
  4460. #if version >= 4
  4461. EXPLAIN !!Themes_Help
  4462. #endif
  4463. KEYNAME "Software\Microsoft\Windows\CurrentVersion\Policies\Explorer"
  4464. POLICY !!Themes_Disable_Options
  4465. #if version >= 4
  4466. SUPPORTED !!SUPPORTED_WindowsXP
  4467. #endif
  4468. EXPLAIN !!Themes_Disable_Options_Help
  4469. VALUENAME "NoThemesTab"
  4470. END POLICY
  4471. POLICY !!Themes_Disable_VisualStyle
  4472. KEYNAME "Software\Microsoft\Windows\CurrentVersion\Policies\System"
  4473. #if version >= 4
  4474. SUPPORTED !!SUPPORTED_WindowsXP
  4475. #endif
  4476. EXPLAIN !!Themes_Disable_VisualStyle_Help
  4477. VALUENAME "NoVisualStyleChoice"
  4478. END POLICY
  4479. POLICY !!Themes_Lock_Themesize
  4480. KEYNAME "Software\Microsoft\Windows\CurrentVersion\Policies\System"
  4481. #if version >= 4
  4482. SUPPORTED !!SUPPORTED_WindowsXP
  4483. #endif
  4484. EXPLAIN !!Themes_Lock_Themesize_Help
  4485. VALUENAME "NoSizeChoice"
  4486. END POLICY
  4487. POLICY !!Themes_Disable_Color_Select
  4488. KEYNAME "Software\Microsoft\Windows\CurrentVersion\Policies\System"
  4489. #if version >= 4
  4490. SUPPORTED !!SUPPORTED_WindowsXP
  4491. #endif
  4492. EXPLAIN !!Themes_Disable_Color_Select_Help
  4493. VALUENAME "NoColorChoice"
  4494. END POLICY
  4495. POLICY !!Themes_Load_Theme
  4496. KEYNAME "Software\Microsoft\Windows\CurrentVersion\Policies\System"
  4497. #if version >= 4
  4498. SUPPORTED !!SUPPORTED_WindowsXP
  4499. #endif
  4500. EXPLAIN !!Themes_Load_Theme_Help
  4501. PART !!Themes_Name EDITTEXT
  4502. VALUENAME "SetVisualStyle"
  4503. END PART
  4504. PART !!Themes_Load_Tip1 TEXT END PART
  4505. PART !!Themes_Load_Tip2 TEXT END PART
  4506. PART !!Themes_Load_Tip3 TEXT END PART
  4507. PART !!Themes_Load_Tip4 TEXT END PART
  4508. PART !!Themes_Load_Tip5 TEXT END PART
  4509. PART !!Themes_Load_Tip6 TEXT END PART
  4510. PART !!Themes_Load_Tip7 TEXT END PART
  4511. PART !!Themes_Load_Tip8 TEXT END PART
  4512. END POLICY
  4513. END CATEGORY ; Themes
  4514. END CATEGORY ;Display
  4515. CATEGORY !!Printers
  4516. #if version >= 4
  4517. EXPLAIN !!Printers_Help
  4518. #endif
  4519. KEYNAME "Software\Microsoft\Windows\CurrentVersion\Policies\Explorer"
  4520. POLICY !!IntranetPrintersUrl
  4521. KEYNAME "Software\Policies\Microsoft\Windows NT\Printers\Wizard"
  4522. #if version >= 4
  4523. SUPPORTED !!SUPPORTED_Win2k
  4524. #endif
  4525. EXPLAIN !!IntranetPrintersUrl_Help
  4526. PART !!IntranetPrintersUrl_Tip1 TEXT
  4527. END PART
  4528. PART !!IntranetPrintersUrl_Tip2 TEXT
  4529. END PART
  4530. PART !!IntranetPrintersUrl_Tip3 TEXT
  4531. END PART
  4532. PART !!IntranetPrintersUrl_Tip4 TEXT
  4533. END PART
  4534. PART !!IntranetPrintersUrl_Tip5 TEXT
  4535. END PART
  4536. PART !!IntranetPrintersUrl_Link EDITTEXT REQUIRED
  4537. VALUENAME "Printers Page URL"
  4538. MAXLEN 255
  4539. END PART
  4540. END POLICY
  4541. POLICY !!DownlevelBrowse
  4542. KEYNAME "Software\Policies\Microsoft\Windows NT\Printers\Wizard"
  4543. #if version >= 4
  4544. SUPPORTED !!SUPPORTED_Win2k
  4545. #endif
  4546. EXPLAIN !!DownlevelBrowse_Help
  4547. VALUENAME "Downlevel Browse"
  4548. VALUEON NUMERIC 1
  4549. VALUEOFF NUMERIC 0
  4550. END POLICY
  4551. POLICY !!PrinterDirectorySearchScope
  4552. KEYNAME "Software\Policies\Microsoft\Windows NT\Printers\Wizard"
  4553. #if version >= 4
  4554. SUPPORTED !!SUPPORTED_Win2k
  4555. #endif
  4556. EXPLAIN !!PrinterDirectorySearchScope_Help
  4557. PART !!PrinterDirectorySearchScope_Name EDITTEXT
  4558. VALUENAME "Default Search Scope"
  4559. MAXLEN 255
  4560. END PART
  4561. PART !!PrinterDirectorySearchScope_Tip1 TEXT
  4562. END PART
  4563. END POLICY
  4564. POLICY !!PointAndPrint_Restrictions
  4565. KEYNAME "Software\Policies\Microsoft\Windows NT\Printers\PointAndPrint"
  4566. #if version >= 4
  4567. SUPPORTED !!SUPPORTED_WindowsXPSP1
  4568. #endif
  4569. EXPLAIN !!PointAndPrint_Restrictions_Help
  4570. VALUENAME "Restricted"
  4571. VALUEON NUMERIC 1
  4572. VALUEOFF NUMERIC 0
  4573. PART !!PointAndPrint_TrustedForest_Chk CHECKBOX
  4574. VALUENAME "InForest"
  4575. VALUEON NUMERIC 1
  4576. VALUEOFF NUMERIC 0
  4577. END PART
  4578. PART !!PointAndPrint_TrustedServers_Chk CHECKBOX
  4579. VALUENAME "TrustedServers"
  4580. VALUEON NUMERIC 1
  4581. VALUEOFF NUMERIC 0
  4582. END PART
  4583. PART !!PointAndPrint_TrustedServers_Edit EDITTEXT
  4584. VALUENAME "ServerList"
  4585. END PART
  4586. END POLICY
  4587. POLICY !!NoAddPrinter
  4588. #if version >= 4
  4589. SUPPORTED !!SUPPORTED_Win2k
  4590. #endif
  4591. EXPLAIN !!NoAddPrinter_Help
  4592. VALUENAME "NoAddPrinter"
  4593. END POLICY
  4594. POLICY !!NoDeletePrinter
  4595. #if version >= 4
  4596. SUPPORTED !!SUPPORTED_Win2k
  4597. #endif
  4598. EXPLAIN !!NoDeletePrinter_Help
  4599. VALUENAME "NoDeletePrinter"
  4600. END POLICY
  4601. END CATEGORY ; Printers
  4602. CATEGORY !!RegionalOptions
  4603. #if version >= 4
  4604. EXPLAIN !!RegionalOptions_Help
  4605. #endif
  4606. POLICY !!RestrictUILangSelect
  4607. KEYNAME "Software\Policies\Microsoft\Control Panel\Desktop"
  4608. #if version >= 4
  4609. SUPPORTED !!SUPPORTED_Win2k
  4610. #endif
  4611. EXPLAIN !!RestrictUILangSelect_Help
  4612. PART !!UILangSelect DROPDOWNLIST NOSORT REQUIRED
  4613. VALUENAME "MultiUILanguageID"
  4614. ITEMLIST
  4615. NAME !!UILang1 VALUE 00000409 DEFAULT
  4616. NAME !!UILang2 VALUE 00000411
  4617. NAME !!UILang3 VALUE 00000412
  4618. NAME !!UILang4 VALUE 00000407
  4619. NAME !!UILang5 VALUE 00000804
  4620. NAME !!UILang6 VALUE 00000404
  4621. NAME !!UILang7 VALUE 0000040c
  4622. NAME !!UILang8 VALUE 00000c0a
  4623. NAME !!UILang9 VALUE 00000410
  4624. NAME !!UILang10 VALUE 0000041d
  4625. NAME !!UILang11 VALUE 00000413
  4626. NAME !!UILang12 VALUE 00000416
  4627. NAME !!UILang13 VALUE 0000040b
  4628. NAME !!UILang14 VALUE 00000414
  4629. NAME !!UILang15 VALUE 00000406
  4630. NAME !!UILang16 VALUE 0000040e
  4631. NAME !!UILang17 VALUE 00000415
  4632. NAME !!UILang18 VALUE 00000419
  4633. NAME !!UILang19 VALUE 00000405
  4634. NAME !!UILang20 VALUE 00000408
  4635. NAME !!UILang21 VALUE 00000816
  4636. NAME !!UILang22 VALUE 0000041f
  4637. NAME !!UILang23 VALUE 00000401
  4638. NAME !!UILang24 VALUE 0000040d
  4639. NAME !!UILang25 VALUE 0000041b
  4640. NAME !!UILang26 VALUE 00000424
  4641. NAME !!UILang27 VALUE 00000418
  4642. NAME !!UILang28 VALUE 0000041a
  4643. NAME !!UILang29 VALUE 00000402
  4644. NAME !!UILang30 VALUE 00000425
  4645. NAME !!UILang31 VALUE 00000427
  4646. NAME !!UILang32 VALUE 00000426
  4647. NAME !!UILang33 VALUE 0000041e
  4648. END ITEMLIST
  4649. END PART
  4650. END POLICY
  4651. END CATEGORY ;;RegionalOptions
  4652. END CATEGORY ;;cpl
  4653. CATEGORY !!SharedFolders
  4654. #if version >= 4
  4655. EXPLAIN !!SharedFolders_Help
  4656. #endif
  4657. POLICY !!PublishSharedFolders
  4658. KEYNAME "Software\Policies\Microsoft\Windows NT\SharedFolders"
  4659. #if version >= 4
  4660. SUPPORTED !!SUPPORTED_WindowsXP
  4661. #endif
  4662. EXPLAIN !!PublishSharedFolders_Help
  4663. VALUENAME "PublishSharedFolders"
  4664. VALUEON NUMERIC 1
  4665. VALUEOFF NUMERIC 0
  4666. END POLICY
  4667. POLICY !!PublishDfsRoots
  4668. KEYNAME "Software\Policies\Microsoft\Windows NT\SharedFolders"
  4669. #if version >= 4
  4670. SUPPORTED !!SUPPORTED_WindowsXP
  4671. #endif
  4672. EXPLAIN !!PublishDfsRoots_Help
  4673. VALUENAME "PublishDfsRoots"
  4674. VALUEON NUMERIC 1
  4675. VALUEOFF NUMERIC 0
  4676. END POLICY
  4677. END CATEGORY ; SharedFolders
  4678. CATEGORY !!Network
  4679. #if version >= 4
  4680. EXPLAIN !!Network_Help
  4681. #endif
  4682. CATEGORY !!Cat_OfflineFiles
  4683. #if version >= 4
  4684. EXPLAIN !!Cat_OfflineFiles_Help
  4685. #endif
  4686. KEYNAME "Software\Policies\Microsoft\Windows\NetCache"
  4687. POLICY !!Pol_NoConfigCache
  4688. #if version >= 4
  4689. SUPPORTED !!SUPPORTED_Win2k
  4690. #endif
  4691. EXPLAIN !!Pol_NoConfigCache_Help
  4692. VALUENAME "NoConfigCache"
  4693. PART !!Lbl_NoConfigCacheHelp1 TEXT
  4694. END PART
  4695. END POLICY
  4696. POLICY !!Pol_SyncAtLogon
  4697. #if version >= 4
  4698. SUPPORTED !!SUPPORTED_Win2k
  4699. #endif
  4700. EXPLAIN !!Pol_SyncAtLogon_Help
  4701. VALUENAME "SyncAtLogon"
  4702. VALUEON NUMERIC 1
  4703. VALUEOFF NUMERIC 0
  4704. END POLICY
  4705. POLICY !!Pol_SyncAtLogoff
  4706. #if version >= 4
  4707. SUPPORTED !!SUPPORTED_Win2k
  4708. #endif
  4709. EXPLAIN !!Pol_SyncAtLogoff_Help
  4710. VALUENAME "SyncAtLogoff"
  4711. VALUEON NUMERIC 1
  4712. VALUEOFF NUMERIC 0
  4713. END POLICY
  4714. POLICY !!Pol_SyncAtSuspend
  4715. #if version >= 4
  4716. SUPPORTED !!SUPPORTED_Win2k
  4717. #endif
  4718. EXPLAIN !!Pol_SyncAtSuspend_Help
  4719. PART !!Lbl_SyncAtSuspendHelp1 TEXT
  4720. END PART
  4721. PART !!Blank TEXT
  4722. END PART
  4723. PART !!Lbl_SyncAtSuspendCombo DROPDOWNLIST REQUIRED
  4724. VALUENAME "SyncAtSuspend"
  4725. ITEMLIST
  4726. NAME !!Lbl_QuickSync VALUE NUMERIC 0 DEFAULT
  4727. NAME !!Lbl_FullSync VALUE NUMERIC 1
  4728. END ITEMLIST
  4729. END PART
  4730. END POLICY
  4731. POLICY !!Pol_GoOfflineAction
  4732. #if version >= 4
  4733. SUPPORTED !!SUPPORTED_Win2k
  4734. #endif
  4735. EXPLAIN !!Pol_GoOfflineAction_Help
  4736. PART !!Lbl_GoOfflineActionHelp1 TEXT
  4737. END PART
  4738. PART !!Lbl_GoOfflineActionHelp2 TEXT
  4739. END PART
  4740. PART !!Blank TEXT
  4741. END PART
  4742. PART !!Lbl_GoOfflineActionCombo DROPDOWNLIST REQUIRED
  4743. VALUENAME "GoOfflineAction"
  4744. ITEMLIST
  4745. NAME !!Lbl_WorkOffline VALUE NUMERIC 0 DEFAULT
  4746. NAME !!Lbl_Fail VALUE NUMERIC 1
  4747. END ITEMLIST
  4748. END PART
  4749. PART !!Blank TEXT
  4750. END PART
  4751. PART !!Lbl_GoOfflineActionHelp3 TEXT
  4752. END PART
  4753. PART !!Lbl_GoOfflineActionHelp4 TEXT
  4754. END PART
  4755. END POLICY
  4756. POLICY !!Pol_CustomGoOfflineActions
  4757. KEYNAME "Software\Policies\Microsoft\Windows\NetCache\CustomGoOfflineActions"
  4758. #if version >= 4
  4759. SUPPORTED !!SUPPORTED_Win2k
  4760. #endif
  4761. EXPLAIN !!Pol_CustomGoOfflineActions_Help
  4762. PART !!Lbl_CustomGoOfflineActionsHelp1 TEXT
  4763. END PART
  4764. PART !!Lbl_CustomGoOfflineActionsHelp2 TEXT
  4765. END PART
  4766. PART !!Blank TEXT
  4767. END PART
  4768. PART !!Lbl_CustomGoOfflineActionsList LISTBOX EXPLICITVALUE
  4769. END PART
  4770. PART !!Lbl_CustomGoOfflineActionsHelp3 TEXT
  4771. END PART
  4772. PART !!Lbl_CustomGoOfflineActionsHelp4 TEXT
  4773. END PART
  4774. PART !!Lbl_CustomGoOfflineActionsHelp5 TEXT
  4775. END PART
  4776. END POLICY
  4777. POLICY !!Pol_NoMakeAvailableOffline
  4778. #if version >= 4
  4779. SUPPORTED !!SUPPORTED_Win2k
  4780. #endif
  4781. EXPLAIN !!Pol_NoMakeAvailableOffline_Help
  4782. VALUENAME "NoMakeAvailableOffline"
  4783. END POLICY
  4784. POLICY !!Pol_NoCacheViewer
  4785. #if version >= 4
  4786. SUPPORTED !!SUPPORTED_Win2k
  4787. #endif
  4788. EXPLAIN !!Pol_NoCacheViewer_Help
  4789. VALUENAME "NoCacheViewer"
  4790. END POLICY
  4791. POLICY !!Pol_AssignedOfflineFiles
  4792. KEYNAME "Software\Policies\Microsoft\Windows\NetCache\AssignedOfflineFolders"
  4793. #if version >= 4
  4794. SUPPORTED !!SUPPORTED_Win2k
  4795. #endif
  4796. EXPLAIN !!Pol_AssignedOfflineFiles_Help
  4797. PART !!Lbl_AssignedOfflineFilesHelp1 TEXT
  4798. END PART
  4799. PART !!Lbl_AssignedOfflineFilesHelp2 TEXT
  4800. END PART
  4801. PART !!Lbl_AssignedOfflineFilesHelp3 TEXT
  4802. END PART
  4803. PART !!Blank TEXT
  4804. END PART
  4805. PART !!Lbl_AssignedOfflineFilesList LISTBOX EXPLICITVALUE ADDITIVE
  4806. END PART
  4807. END POLICY
  4808. POLICY !!Pol_NoReminders
  4809. #if version >= 4
  4810. SUPPORTED !!SUPPORTED_Win2k
  4811. #endif
  4812. EXPLAIN !!Pol_NoReminders_Help
  4813. VALUENAME "NoReminders"
  4814. VALUEON NUMERIC 1
  4815. VALUEOFF NUMERIC 0
  4816. END POLICY
  4817. POLICY !!Pol_ReminderFreq
  4818. #if version >= 4
  4819. SUPPORTED !!SUPPORTED_Win2k
  4820. #endif
  4821. EXPLAIN !!Pol_ReminderFreq_Help
  4822. PART !!Lbl_ReminderFreqHelp1 TEXT
  4823. END PART
  4824. PART !!Blank TEXT
  4825. END PART
  4826. PART !!Lbl_ReminderFreqSpin NUMERIC DEFAULT 60
  4827. MIN 0 MAX 1440 SPIN 10
  4828. VALUENAME "ReminderFreqMinutes"
  4829. END PART
  4830. END POLICY
  4831. POLICY !!Pol_ReminderInitTimeout
  4832. #if version >= 4
  4833. SUPPORTED !!SUPPORTED_Win2k
  4834. #endif
  4835. EXPLAIN !!Pol_ReminderInitTimeout_Help
  4836. PART !!Lbl_ReminderInitTimeoutHelp1 TEXT
  4837. END PART
  4838. PART !!Lbl_ReminderInitTimeoutHelp2 TEXT
  4839. END PART
  4840. PART !!Blank TEXT
  4841. END PART
  4842. PART !!Lbl_ReminderInitTimeoutSpin NUMERIC DEFAULT 30
  4843. MIN 10 MAX 60 SPIN 1
  4844. VALUENAME "InitialBalloonTimeoutSeconds"
  4845. END PART
  4846. END POLICY
  4847. POLICY !!Pol_ReminderTimeout
  4848. #if version >= 4
  4849. SUPPORTED !!SUPPORTED_Win2k
  4850. #endif
  4851. EXPLAIN !!Pol_ReminderTimeout_Help
  4852. PART !!Lbl_ReminderTimeoutHelp1 TEXT
  4853. END PART
  4854. PART !!Lbl_ReminderTimeoutHelp2 TEXT
  4855. END PART
  4856. PART !!Blank TEXT
  4857. END PART
  4858. PART !!Lbl_ReminderTimeoutSpin NUMERIC DEFAULT 15
  4859. MIN 10 MAX 60 SPIN 1
  4860. VALUENAME "ReminderBalloonTimeoutSeconds"
  4861. END PART
  4862. END POLICY
  4863. POLICY !!Pol_EventLoggingLevel
  4864. #if version >= 4
  4865. SUPPORTED !!SUPPORTED_Win2k
  4866. #endif
  4867. EXPLAIN !!Pol_EventLoggingLevel_Help
  4868. PART !!Blank TEXT
  4869. END PART
  4870. PART !!Lbl_EventLoggingLevelSpin NUMERIC DEFAULT 0
  4871. MIN 0 MAX 3 SPIN 1
  4872. VALUENAME "EventLoggingLevel"
  4873. END PART
  4874. PART !!Blank TEXT
  4875. END PART
  4876. PART !!Lbl_EventLoggingLevelHelp1 TEXT
  4877. END PART
  4878. PART !!Lbl_EventLoggingLevelHelp2 TEXT
  4879. END PART
  4880. PART !!Lbl_EventLoggingLevelHelp3 TEXT
  4881. END PART
  4882. PART !!Lbl_EventLoggingLevelHelp4 TEXT
  4883. END PART
  4884. END POLICY
  4885. POLICY !!Pol_NoPinFiles
  4886. KEYNAME "Software\Policies\Microsoft\Windows\NetCache\NoMakeAvailableOfflineList"
  4887. #if version >= 4
  4888. SUPPORTED !!SUPPORTED_WindowsXP
  4889. #endif
  4890. EXPLAIN !!Pol_NoPinFiles_Help
  4891. PART !!Lbl_NoPinFilesHelp1 TEXT
  4892. END PART
  4893. PART !!Blank TEXT
  4894. END PART
  4895. PART !!Lbl_NoPinFilesList LISTBOX EXPLICITVALUE ADDITIVE
  4896. END PART
  4897. END POLICY
  4898. POLICY !!DisableFRAdminPin
  4899. #if version >= 4
  4900. SUPPORTED !!SUPPORTED_WindowsXP
  4901. #endif
  4902. EXPLAIN !!DisableFRAdminPin_Help
  4903. VALUENAME "DisableFRAdminPin"
  4904. VALUEON NUMERIC 1
  4905. VALUEOFF NUMERIC 0
  4906. END POLICY
  4907. END CATEGORY ; Cat_OfflineFiles
  4908. CATEGORY !!NetworkConnections
  4909. #if version >= 4
  4910. EXPLAIN !!NetworkConnections_User_Help
  4911. #endif
  4912. KEYNAME "Software\Policies\Microsoft\Windows\Network Connections"
  4913. POLICY !!NC_RenameConnection
  4914. #if version >= 4
  4915. SUPPORTED !!SUPPORTED_Win2kSP1
  4916. #endif
  4917. EXPLAIN !!NC_RenameConnection_Help
  4918. VALUENAME "NC_RenameConnection"
  4919. VALUEON NUMERIC 1
  4920. VALUEOFF NUMERIC 0
  4921. END POLICY
  4922. POLICY !!NC_LanChangeProperties
  4923. #if version >= 4
  4924. SUPPORTED !!SUPPORTED_Win2kSP1
  4925. #endif
  4926. EXPLAIN !!NC_LanChangeProperties_Help
  4927. VALUENAME "NC_LanChangeProperties"
  4928. VALUEON NUMERIC 0
  4929. VALUEOFF NUMERIC 1
  4930. END POLICY
  4931. POLICY !!NC_RasChangeProperties
  4932. #if version >= 4
  4933. SUPPORTED !!SUPPORTED_Win2kSP1
  4934. #endif
  4935. EXPLAIN !!NC_RasChangeProperties_Help
  4936. VALUENAME "NC_RasChangeProperties"
  4937. VALUEON NUMERIC 0
  4938. VALUEOFF NUMERIC 1
  4939. END POLICY
  4940. POLICY !!NC_AllowAdvancedTCPIPConfig
  4941. #if version >= 4
  4942. SUPPORTED !!SUPPORTED_Win2kSP1
  4943. #endif
  4944. EXPLAIN !!NC_AllowAdvancedTCPIPConfig_Help
  4945. VALUENAME "NC_AllowAdvancedTCPIPConfig"
  4946. VALUEON NUMERIC 0
  4947. VALUEOFF NUMERIC 1
  4948. END POLICY
  4949. POLICY !!NC_AdvancedSettings
  4950. #if version >= 4
  4951. SUPPORTED !!SUPPORTED_Win2kSP1
  4952. #endif
  4953. EXPLAIN !!NC_AdvancedSettings_Help
  4954. VALUENAME "NC_AdvancedSettings"
  4955. VALUEON NUMERIC 0
  4956. VALUEOFF NUMERIC 1
  4957. END POLICY
  4958. POLICY !!NC_AddRemoveComponents
  4959. #if version >= 4
  4960. SUPPORTED !!SUPPORTED_Win2kSP1
  4961. #endif
  4962. EXPLAIN !!NC_AddRemoveComponents_Help
  4963. VALUENAME "NC_AddRemoveComponents"
  4964. VALUEON NUMERIC 0
  4965. VALUEOFF NUMERIC 1
  4966. END POLICY
  4967. POLICY !!NC_LanProperties
  4968. #if version >= 4
  4969. SUPPORTED !!SUPPORTED_Win2kSP1
  4970. #endif
  4971. EXPLAIN !!NC_LanProperties_Help
  4972. VALUENAME "NC_LanProperties"
  4973. VALUEON NUMERIC 0
  4974. VALUEOFF NUMERIC 1
  4975. END POLICY
  4976. POLICY !!NC_ChangeBindState
  4977. #if version >= 4
  4978. SUPPORTED !!SUPPORTED_Win2kSP1
  4979. #endif
  4980. EXPLAIN !!NC_ChangeBindState_Help
  4981. VALUENAME "NC_ChangeBindState"
  4982. VALUEON NUMERIC 0
  4983. VALUEOFF NUMERIC 1
  4984. END POLICY
  4985. POLICY !!NC_RasAllUserProperties
  4986. #if version >= 4
  4987. SUPPORTED !!SUPPORTED_Win2kSP1
  4988. #endif
  4989. EXPLAIN !!NC_RasAllUserProperties_Help
  4990. VALUENAME "NC_RasAllUserProperties"
  4991. VALUEON NUMERIC 1
  4992. VALUEOFF NUMERIC 0
  4993. END POLICY
  4994. POLICY !!NC_RasMyProperties
  4995. #if version >= 4
  4996. SUPPORTED !!SUPPORTED_Win2kSP1
  4997. #endif
  4998. EXPLAIN !!NC_RasMyProperties_Help
  4999. VALUENAME "NC_RasMyProperties"
  5000. VALUEON NUMERIC 0
  5001. VALUEOFF NUMERIC 1
  5002. END POLICY
  5003. POLICY !!NC_DeleteConnection
  5004. #if version >= 4
  5005. SUPPORTED !!SUPPORTED_Win2kSP1
  5006. #endif
  5007. EXPLAIN !!NC_DeleteConnection_Help
  5008. VALUENAME "NC_DeleteConnection"
  5009. VALUEON NUMERIC 0
  5010. VALUEOFF NUMERIC 1
  5011. END POLICY
  5012. POLICY !!NC_DeleteAllUserConnection
  5013. #if version >= 4
  5014. SUPPORTED !!SUPPORTED_Win2kSP1
  5015. #endif
  5016. EXPLAIN !!NC_DeleteAllUserConnection_Help
  5017. VALUENAME "NC_DeleteAllUserConnection"
  5018. VALUEON NUMERIC 1
  5019. VALUEOFF NUMERIC 0
  5020. END POLICY
  5021. POLICY !!NC_RasConnect
  5022. #if version >= 4
  5023. SUPPORTED !!SUPPORTED_Win2kSP1
  5024. #endif
  5025. EXPLAIN !!NC_RasConnect_Help
  5026. VALUENAME "NC_RasConnect"
  5027. VALUEON NUMERIC 0
  5028. VALUEOFF NUMERIC 1
  5029. END POLICY
  5030. POLICY !!NC_LanConnect
  5031. #if version >= 4
  5032. SUPPORTED !!SUPPORTED_Win2kSP1
  5033. #endif
  5034. EXPLAIN !!NC_LanConnect_Help
  5035. VALUENAME "NC_LanConnect"
  5036. VALUEON NUMERIC 1
  5037. VALUEOFF NUMERIC 0
  5038. END POLICY
  5039. POLICY !!NC_NewConnectionWizard
  5040. #if version >= 4
  5041. SUPPORTED !!SUPPORTED_Win2kSP1
  5042. #endif
  5043. EXPLAIN !!NC_NewConnectionWizard_Help
  5044. VALUENAME "NC_NewConnectionWizard"
  5045. VALUEON NUMERIC 0
  5046. VALUEOFF NUMERIC 1
  5047. END POLICY
  5048. POLICY !!NC_RenameLanConnection
  5049. #if version >= 4
  5050. SUPPORTED !!SUPPORTED_WindowsXP
  5051. #endif
  5052. EXPLAIN !!NC_RenameLanConnection_Help
  5053. VALUENAME "NC_RenameLanConnection"
  5054. VALUEON NUMERIC 1
  5055. VALUEOFF NUMERIC 0
  5056. END POLICY
  5057. POLICY !!NC_RenameAllUserRasConnection
  5058. #if version >= 4
  5059. SUPPORTED !!SUPPORTED_WindowsXP
  5060. #endif
  5061. EXPLAIN !!NC_RenameAllUserRasConnection_Help
  5062. VALUENAME "NC_RenameAllUserRasConnection"
  5063. VALUEON NUMERIC 1
  5064. VALUEOFF NUMERIC 0
  5065. END POLICY
  5066. POLICY !!NC_RenameMyRasConnection
  5067. #if version >= 4
  5068. SUPPORTED !!SUPPORTED_Win2kSP1
  5069. #endif
  5070. EXPLAIN !!NC_RenameMyRasConnection_Help
  5071. VALUENAME "NC_RenameMyRasConnection"
  5072. VALUEON NUMERIC 0
  5073. VALUEOFF NUMERIC 1
  5074. END POLICY
  5075. POLICY !!NC_DialupPrefs
  5076. #if version >= 4
  5077. SUPPORTED !!SUPPORTED_Win2kSP1
  5078. #endif
  5079. EXPLAIN !!NC_DialupPrefs_Help
  5080. VALUENAME "NC_DialupPrefs"
  5081. VALUEON NUMERIC 0
  5082. VALUEOFF NUMERIC 1
  5083. END POLICY
  5084. POLICY !!NC_Statistics
  5085. #if version >= 4
  5086. SUPPORTED !!SUPPORTED_Win2kSP1
  5087. #endif
  5088. EXPLAIN !!NC_Statistics_Help
  5089. VALUENAME "NC_Statistics"
  5090. VALUEON NUMERIC 0
  5091. VALUEOFF NUMERIC 1
  5092. END POLICY
  5093. POLICY !!NC_EnableAdminProhibits
  5094. #if version >= 4
  5095. SUPPORTED !!SUPPORTED_WindowsxP
  5096. #endif
  5097. EXPLAIN !!NC_EnableAdminProhibits_Help
  5098. VALUENAME "NC_EnableAdminProhibits"
  5099. VALUEON NUMERIC 1
  5100. VALUEOFF NUMERIC 0
  5101. END POLICY
  5102. END CATEGORY ;NetworkConnections
  5103. END CATEGORY ;Network
  5104. CATEGORY !!AdministrativeServices
  5105. #if version >= 4
  5106. EXPLAIN !!AdministrativeServices_Help
  5107. #endif
  5108. POLICY !!NoWelcomeTips
  5109. KEYNAME "Software\Microsoft\Windows\CurrentVersion\Policies\Explorer"
  5110. #if version >= 4
  5111. SUPPORTED !!SUPPORTED_Win2kOnly
  5112. #endif
  5113. EXPLAIN !!NoWelcomeTips_Help
  5114. VALUENAME "NoWelcomeScreen"
  5115. END POLICY
  5116. POLICY !!Y2K
  5117. KEYNAME "Software\Policies\Microsoft\Control Panel\International\Calendars\TwoDigitYearMax"
  5118. #if version >= 4
  5119. SUPPORTED !!SUPPORTED_Win2k
  5120. #endif
  5121. EXPLAIN !!Y2K_Help
  5122. PART !!Y2KSysCtrl TEXT
  5123. END PART
  5124. PART !!Y2KYear NUMERIC
  5125. VALUENAME "1"
  5126. MIN 2001 MAX 2099 DEFAULT 2029
  5127. TXTCONVERT
  5128. END PART
  5129. END POLICY
  5130. POLICY !!DriverSearchPlaces
  5131. KEYNAME Software\Policies\Microsoft\Windows\DriverSearching
  5132. #if version >= 4
  5133. SUPPORTED !!SUPPORTED_WindowsXP
  5134. #endif
  5135. EXPLAIN !!DriverSearchPlaces_Help
  5136. PART !!DriverSearchPlaces_Floppies CHECKBOX
  5137. VALUENAME "DontSearchFloppies"
  5138. END PART
  5139. PART !!DriverSearchPlaces_CD CHECKBOX
  5140. VALUENAME "DontSearchCD"
  5141. END PART
  5142. PART !!DriverSearchPlaces_WindowsUpdate CHECKBOX
  5143. VALUENAME "DontSearchWindowsUpdate"
  5144. END PART
  5145. END POLICY
  5146. POLICY !!DriverSigning
  5147. KEYNAME "Software\Policies\Microsoft\Windows NT\Driver Signing"
  5148. #if version >= 4
  5149. SUPPORTED !!SUPPORTED_Win2k
  5150. #endif
  5151. EXPLAIN !!DriverSigning_Help
  5152. PART !!DriverSigningOp DROPDOWNLIST NOSORT
  5153. VALUENAME "BehaviorOnFailedVerify"
  5154. ITEMLIST
  5155. NAME !!DriverSign_None VALUE NUMERIC 0
  5156. NAME !!DriverSign_Warn VALUE NUMERIC 1 DEFAULT
  5157. NAME !!DriverSign_Block VALUE NUMERIC 2
  5158. END ITEMLIST
  5159. END PART
  5160. END POLICY
  5161. POLICY !!ShellName
  5162. KEYNAME "Software\Microsoft\Windows\CurrentVersion\Policies\System"
  5163. #if version >= 4
  5164. SUPPORTED !!SUPPORTED_Win2k
  5165. #endif
  5166. EXPLAIN !!ShellName_Help
  5167. PART !!ShellNameInst EDITTEXT REQUIRED
  5168. VALUENAME "Shell"
  5169. END PART
  5170. END POLICY
  5171. POLICY !!DisableCMD
  5172. KEYNAME "Software\Policies\Microsoft\Windows\System"
  5173. #if version >= 4
  5174. SUPPORTED !!SUPPORTED_Win2k
  5175. #endif
  5176. EXPLAIN !!DisableCMD_Help
  5177. PART !!DisableCMDScripts DROPDOWNLIST NOSORT
  5178. VALUENAME "DisableCMD"
  5179. ITEMLIST
  5180. NAME !!DisableCMD_YES VALUE NUMERIC 1
  5181. NAME !!DisableCMD_NO VALUE NUMERIC 2 DEFAULT
  5182. END ITEMLIST
  5183. END PART
  5184. END POLICY
  5185. POLICY !!DisableRegedit
  5186. KEYNAME "Software\Microsoft\Windows\CurrentVersion\Policies\System"
  5187. #if version >= 4
  5188. SUPPORTED !!SUPPORTED_Win2k
  5189. #endif
  5190. EXPLAIN !!DisableRegedit_Help
  5191. VALUENAME "DisableRegistryTools"
  5192. END POLICY
  5193. POLICY !!RestrictApps
  5194. KEYNAME "Software\Microsoft\Windows\CurrentVersion\Policies\Explorer"
  5195. #if version >= 4
  5196. SUPPORTED !!SUPPORTED_Win2k
  5197. #endif
  5198. EXPLAIN !!RestrictApps_Help
  5199. VALUENAME "RestrictRun"
  5200. PART !!RestrictAppsList LISTBOX
  5201. KEYNAME "Software\Microsoft\Windows\CurrentVersion\Policies\Explorer\RestrictRun"
  5202. VALUEPREFIX ""
  5203. END PART
  5204. END POLICY
  5205. POLICY !!DisallowApps
  5206. KEYNAME "Software\Microsoft\Windows\CurrentVersion\Policies\Explorer"
  5207. #if version >= 4
  5208. SUPPORTED !!SUPPORTED_Win2k
  5209. #endif
  5210. EXPLAIN !!DisallowApps_Help
  5211. VALUENAME "DisallowRun"
  5212. PART !!DisallowAppsList LISTBOX
  5213. KEYNAME "Software\Microsoft\Windows\CurrentVersion\Policies\Explorer\DisallowRun"
  5214. VALUEPREFIX ""
  5215. END PART
  5216. END POLICY
  5217. POLICY !!Autorun
  5218. KEYNAME "Software\Microsoft\Windows\CurrentVersion\Policies\Explorer"
  5219. #if version >= 4
  5220. SUPPORTED !!SUPPORTED_Win2k
  5221. #endif
  5222. EXPLAIN !!Autorun_Help
  5223. PART !!Autorun_Box DROPDOWNLIST REQUIRED
  5224. VALUENAME "NoDriveTypeAutoRun"
  5225. ITEMLIST
  5226. NAME !!Autorun_NoCD VALUE NUMERIC 181 DEFAULT
  5227. NAME !!Autorun_None VALUE NUMERIC 255
  5228. END ITEMLIST
  5229. END PART
  5230. END POLICY
  5231. POLICY !!RestrictRunFromHelp
  5232. #if version >= 4
  5233. SUPPORTED !!SUPPORTED_WindowsXP
  5234. #endif
  5235. KEYNAME "Software\Policies\Microsoft\Windows\System"
  5236. EXPLAIN !!RestrictRunFromHelp_Help
  5237. PART !!RestrictRunFromHelp_Edit EDITTEXT REQUIRED
  5238. VALUENAME "DisableInHelp"
  5239. END PART
  5240. PART !!RestrictRunFromHelp_Example TEXT
  5241. END PART
  5242. END POLICY
  5243. POLICY !!AppMgmt_COM_SearchForCLSID
  5244. KEYNAME "Software\Policies\Microsoft\Windows\App Management"
  5245. #if version >= 4
  5246. SUPPORTED !!SUPPORTED_Win2k
  5247. #endif
  5248. EXPLAIN !!AppMgmt_COM_SearchForCLSID_Help
  5249. VALUENAME "COMClassStore"
  5250. END POLICY
  5251. POLICY !!NoAutoUpdate
  5252. KEYNAME "Software\Microsoft\Windows\CurrentVersion\Policies\Explorer"
  5253. #if version >= 4
  5254. SUPPORTED !!SUPPORTED_WindowsXPOnly
  5255. #endif
  5256. EXPLAIN !!NoAutoUpdate_Help
  5257. VALUENAME "NoAutoUpdate"
  5258. VALUEON NUMERIC 1
  5259. VALUEOFF NUMERIC 0
  5260. END POLICY
  5261. CATEGORY !!UserProfiles
  5262. #if version >= 4
  5263. EXPLAIN !!UserProfiles_Help
  5264. #endif
  5265. POLICY !!Connect_HomeDir_ToRoot
  5266. KEYNAME "Software\Microsoft\Windows\CurrentVersion\Policies\System"
  5267. #if version >= 4
  5268. SUPPORTED !!SUPPORTED_Win2k
  5269. #endif
  5270. EXPLAIN !!Connect_HomeDir_ToRoot_Explain
  5271. VALUENAME "ConnectHomeDirToRoot"
  5272. VALUEON NUMERIC 1
  5273. VALUEOFF NUMERIC 0
  5274. END POLICY
  5275. POLICY !!LimitSize
  5276. KEYNAME "Software\Microsoft\Windows\CurrentVersion\Policies\System"
  5277. #if version >= 4
  5278. SUPPORTED !!SUPPORTED_Win2k
  5279. #endif
  5280. EXPLAIN !!LimitSize_Help
  5281. VALUENAME "EnableProfileQuota"
  5282. PART !!SizeMessage EDITTEXT
  5283. DEFAULT !!DefaultSizeMessage
  5284. VALUENAME "ProfileQuotaMessage"
  5285. END PART
  5286. PART !!ProfileSize NUMERIC REQUIRED SPIN 100
  5287. VALUENAME "MaxProfileSize"
  5288. DEFAULT 30000
  5289. MAX 30000
  5290. MIN 300
  5291. END PART
  5292. PART !!IncludeRegInProQuota CHECKBOX
  5293. VALUENAME "IncludeRegInProQuota"
  5294. END PART
  5295. PART !!WarnUser CHECKBOX
  5296. VALUENAME "WarnUser"
  5297. END PART
  5298. PART !!WarnUserTimeout NUMERIC REQUIRED SPIN 5
  5299. VALUENAME "WarnUserTimeout"
  5300. DEFAULT 15
  5301. MIN 0
  5302. END PART
  5303. END POLICY
  5304. POLICY !!ExcludeDirectories
  5305. KEYNAME "Software\Policies\Microsoft\Windows\System"
  5306. #if version >= 4
  5307. SUPPORTED !!SUPPORTED_Win2k
  5308. #endif
  5309. EXPLAIN !!ExcludeDirectories_Help
  5310. PART !!ExcludeMessage EDITTEXT
  5311. VALUENAME "ExcludeProfileDirs"
  5312. MAXLEN 260
  5313. END PART
  5314. PART !!Exclude_Tip1 TEXT
  5315. END PART
  5316. PART !!Exclude_Tip2 TEXT
  5317. END PART
  5318. END POLICY
  5319. END CATEGORY ; User Profiles
  5320. CATEGORY !!Scripts
  5321. #if version >= 4
  5322. EXPLAIN !!Scripts_Help
  5323. #endif
  5324. POLICY !!Run_Logon_Script_Sync
  5325. KEYNAME "Software\Microsoft\Windows\CurrentVersion\Policies\System"
  5326. #if version >= 4
  5327. SUPPORTED !!SUPPORTED_Win2k
  5328. #endif
  5329. EXPLAIN !!Run_Logon_Script_Sync_Help
  5330. VALUENAME "RunLogonScriptSync"
  5331. END POLICY
  5332. POLICY !!Run_Legacy_Logon_Script_Hidden
  5333. KEYNAME "Software\Microsoft\Windows\CurrentVersion\Policies\System"
  5334. #if version >= 4
  5335. SUPPORTED !!SUPPORTED_Win2k
  5336. #endif
  5337. EXPLAIN !!Run_Legacy_Logon_Script_Hidden_Explain
  5338. VALUENAME "HideLegacyLogonScripts"
  5339. VALUEON NUMERIC 1
  5340. VALUEOFF NUMERIC 0
  5341. END POLICY
  5342. POLICY !!Run_Logon_Script_Visible
  5343. KEYNAME "Software\Microsoft\Windows\CurrentVersion\Policies\System"
  5344. #if version >= 4
  5345. SUPPORTED !!SUPPORTED_Win2k
  5346. #endif
  5347. EXPLAIN !!Run_Logon_Script_Visible_Explain
  5348. VALUENAME "HideLogonScripts"
  5349. VALUEON NUMERIC 0
  5350. VALUEOFF NUMERIC 1
  5351. END POLICY
  5352. POLICY !!Run_Logoff_Script_Visible
  5353. KEYNAME "Software\Microsoft\Windows\CurrentVersion\Policies\System"
  5354. #if version >= 4
  5355. SUPPORTED !!SUPPORTED_Win2k
  5356. #endif
  5357. EXPLAIN !!Run_Logoff_Script_Visible_Explain
  5358. VALUENAME "HideLogoffScripts"
  5359. VALUEON NUMERIC 0
  5360. VALUEOFF NUMERIC 1
  5361. END POLICY
  5362. END CATEGORY ; Scripts
  5363. CATEGORY !!CADOptions
  5364. #if version >= 4
  5365. EXPLAIN !!CADOptions_Help
  5366. #endif
  5367. KEYNAME "Software\Microsoft\Windows\CurrentVersion\Policies\System"
  5368. POLICY !!DisableTaskMgr
  5369. #if version >= 4
  5370. SUPPORTED !!SUPPORTED_Win2k
  5371. #endif
  5372. EXPLAIN !!DisableTaskMgr_Help
  5373. VALUENAME "DisableTaskMgr"
  5374. END POLICY
  5375. POLICY !!DisableLockComputer
  5376. #if version >= 4
  5377. SUPPORTED !!SUPPORTED_Win2k
  5378. #endif
  5379. EXPLAIN !!DisableLockComputer_Help
  5380. VALUENAME "DisableLockWorkstation"
  5381. END POLICY
  5382. POLICY !!DisableChangePassword
  5383. #if version >= 4
  5384. SUPPORTED !!SUPPORTED_Win2k
  5385. #endif
  5386. EXPLAIN !!DisableChangePassword_Help
  5387. VALUENAME "DisableChangePassword"
  5388. END POLICY
  5389. POLICY !!NoLogoff
  5390. KEYNAME "Software\Microsoft\Windows\CurrentVersion\Policies\Explorer"
  5391. #if version >= 4
  5392. SUPPORTED !!SUPPORTED_Win2k
  5393. #endif
  5394. EXPLAIN !!NoLogOff_Help
  5395. VALUENAME "NoLogoff"
  5396. END POLICY
  5397. END CATEGORY ; Ctrl+Alt+Del options
  5398. CATEGORY !!Logon
  5399. #if version >= 4
  5400. EXPLAIN !!Logon_Help
  5401. #endif
  5402. POLICY !!Run
  5403. KEYNAME "Software\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run"
  5404. #if version >= 4
  5405. SUPPORTED !!SUPPORTED_Win2k
  5406. #endif
  5407. EXPLAIN !!Run_Help
  5408. PART !!RunListBox LISTBOX
  5409. VALUEPREFIX ""
  5410. END PART
  5411. END POLICY
  5412. POLICY !!DisableExplorerRunOnceLegacy
  5413. KEYNAME "Software\Microsoft\Windows\CurrentVersion\Policies\Explorer"
  5414. #if version >= 4
  5415. SUPPORTED !!SUPPORTED_Win2k
  5416. #endif
  5417. EXPLAIN !!DisableExplorerRunOnceLegacy_Help
  5418. VALUENAME "DisableCurrentUserRunOnce"
  5419. END POLICY
  5420. POLICY !!DisableExplorerRunLegacy
  5421. KEYNAME "Software\Microsoft\Windows\CurrentVersion\Policies\Explorer"
  5422. #if version >= 4
  5423. SUPPORTED !!SUPPORTED_Win2k
  5424. #endif
  5425. EXPLAIN !!DisableExplorerRunLegacy_Help
  5426. VALUENAME "DisableCurrentUserRun"
  5427. END POLICY
  5428. END CATEGORY ; Logon
  5429. CATEGORY !!PolicyPolicies
  5430. #if version >= 4
  5431. EXPLAIN !!PolicyPolicies_Help
  5432. #endif
  5433. POLICY !!GroupPolicyRefreshRateUser
  5434. KEYNAME "Software\Policies\Microsoft\Windows\System"
  5435. #if version >= 4
  5436. SUPPORTED !!SUPPORTED_Win2k
  5437. #endif
  5438. EXPLAIN !!GroupPolicyRefreshRateUser_Help
  5439. PART !!GPRefreshRate_U_Desc1 TEXT
  5440. END PART
  5441. PART !!GPRefreshRate_U_Desc2 TEXT
  5442. END PART
  5443. PART !!GPRefreshRate NUMERIC REQUIRED
  5444. MIN 0 MAX 64800 DEFAULT 90
  5445. VALUENAME "GroupPolicyRefreshTime"
  5446. END PART
  5447. PART !!Blank TEXT
  5448. END PART
  5449. PART !!GPRefreshRateOffset_Desc1 TEXT
  5450. END PART
  5451. PART !!GPRefreshRateOffset_Desc2 TEXT
  5452. END PART
  5453. PART !!GPRefreshRateOffset_Desc3 TEXT
  5454. END PART
  5455. PART !!GPRefreshRateOffset NUMERIC REQUIRED
  5456. MIN 0 MAX 1440 DEFAULT 30
  5457. VALUENAME "GroupPolicyRefreshTimeOffset"
  5458. END PART
  5459. END POLICY
  5460. POLICY !!GPTransferRate
  5461. KEYNAME "Software\Policies\Microsoft\Windows\System"
  5462. #if version >= 4
  5463. SUPPORTED !!SUPPORTED_Win2k
  5464. #endif
  5465. EXPLAIN !!GPTransferRate_Help
  5466. PART !!TransferRateOp NUMERIC
  5467. MIN 0 MAX 4294967200 DEFAULT 500 SPIN 100
  5468. VALUENAME "GroupPolicyMinTransferRate"
  5469. END PART
  5470. PART !!Blank TEXT
  5471. END PART
  5472. PART !!TransferRateTip1 TEXT
  5473. END PART
  5474. END POLICY
  5475. POLICY !!GPDCOptions
  5476. KEYNAME "Software\Policies\Microsoft\Windows\Group Policy Editor"
  5477. #if version >= 4
  5478. SUPPORTED !!SUPPORTED_Win2k
  5479. #endif
  5480. EXPLAIN !!GPDCOptions_Help
  5481. PART !!GPDCOptionsDesc DROPDOWNLIST NOSORT
  5482. VALUENAME "DCOption"
  5483. ITEMLIST
  5484. NAME !!GPDCOptionPDC VALUE NUMERIC 1 DEFAULT
  5485. NAME !!GPDCOptionInherit VALUE NUMERIC 2
  5486. NAME !!GPDCOptionAny VALUE NUMERIC 3
  5487. END ITEMLIST
  5488. END PART
  5489. END POLICY
  5490. POLICY !!NewGPOLinksDisabled
  5491. KEYNAME "Software\Policies\Microsoft\Windows\Group Policy Editor"
  5492. #if version >= 4
  5493. SUPPORTED !!SUPPORTED_Win2k
  5494. #endif
  5495. EXPLAIN !!NewGPOLinksDisabled_Help
  5496. VALUENAME "NewGPOLinksDisabled"
  5497. END POLICY
  5498. POLICY !!NewGPODisplayName
  5499. KEYNAME "Software\Policies\Microsoft\Windows\Group Policy Editor"
  5500. #if version >= 4
  5501. SUPPORTED !!SUPPORTED_Win2k
  5502. #endif
  5503. EXPLAIN !!NewGPODisplayName_Help
  5504. PART !!NewGPODisplayNameHeading EDITTEXT REQUIRED
  5505. VALUENAME "GPODisplayName"
  5506. MAXLEN 255
  5507. END PART
  5508. END POLICY
  5509. POLICY !!EnforcePoliciesOnly
  5510. KEYNAME "Software\Policies\Microsoft\Windows\Group Policy Editor"
  5511. #if version >= 4
  5512. SUPPORTED !!SUPPORTED_Win2k
  5513. #endif
  5514. EXPLAIN !!EnforcePoliciesOnly_Help
  5515. VALUENAME "ShowPoliciesOnly"
  5516. END POLICY
  5517. POLICY !!DisableAutoADMUpdate
  5518. KEYNAME "Software\Policies\Microsoft\Windows\Group Policy Editor"
  5519. #if version >= 4
  5520. SUPPORTED !!SUPPORTED_Win2k
  5521. #endif
  5522. EXPLAIN !!DisableAutoADMUpdate_Help
  5523. VALUENAME "DisableAutoADMUpdate"
  5524. END POLICY
  5525. POLICY !!DenyRsopToInteractiveUser
  5526. KEYNAME "Software\Policies\Microsoft\Windows\System"
  5527. #if version >= 4
  5528. SUPPORTED !!SUPPORTED_WindowsXP
  5529. #endif
  5530. EXPLAIN !!DenyRsopToInteractiveUser_Help
  5531. VALUENAME "DenyRsopToInteractiveUser"
  5532. VALUEON NUMERIC 1
  5533. VALUEOFF NUMERIC 0
  5534. END POLICY
  5535. END CATEGORY ; PolicyPolicies
  5536. CATEGORY !!PW_Power
  5537. #if version >= 4
  5538. EXPLAIN !!PW_Power_Help
  5539. #endif
  5540. POLICY !!PW_PromptPasswordOnResume
  5541. KEYNAME "Software\Policies\Microsoft\Windows\System\Power"
  5542. #if version >= 4
  5543. SUPPORTED !!SUPPORTED_WindowsXP
  5544. #endif
  5545. EXPLAIN !!PW_PromptPasswordOnResume_Help
  5546. VALUENAME "PromptPasswordOnResume"
  5547. END POLICY
  5548. END CATEGORY ;; POWER
  5549. END CATEGORY ; AdministrativeServices
  5550. CATEGORY !!WindowsComponents
  5551. #if version >= 4
  5552. EXPLAIN !!WindowsComponents_Help
  5553. #endif
  5554. CATEGORY !!AppCompat
  5555. POLICY !!AppCompatPrevent16Bit
  5556. #if version >= 4
  5557. SUPPORTED !!SUPPORTED_WindowsXPSP1
  5558. #endif
  5559. EXPLAIN !!AppCompat_Prevent16Bit_Help
  5560. KEYNAME "Software\Policies\Microsoft\Windows\AppCompat"
  5561. VALUENAME "VDMDisallowed"
  5562. VALUEON NUMERIC 1
  5563. VALUEOFF NUMERIC 0
  5564. END POLICY
  5565. END CATEGORY ; AppCompat
  5566. CATEGORY !!HSS_HelpCenterPolicies
  5567. #if version >= 4
  5568. EXPLAIN !!HSS_HelpCenterPolicies_Explain
  5569. #endif
  5570. KEYNAME "Software\Policies\Microsoft\PCHealth\HelpSvc"
  5571. POLICY !!HSS_HeadlinesPolicy
  5572. #if version >= 4
  5573. SUPPORTED !!SUPPORTED_WindowsNET
  5574. #endif
  5575. EXPLAIN !!HSS_HeadlinesPolicy_Explain
  5576. VALUENAME "Headlines"
  5577. VALUEON NUMERIC 1
  5578. VALUEOFF NUMERIC 0
  5579. END POLICY
  5580. END CATEGORY ; HelpCenterPolicies
  5581. CATEGORY !!WindowsExplorer
  5582. #if version >= 4
  5583. EXPLAIN !!WindowsExplorer_Help
  5584. #endif
  5585. KEYNAME "Software\Microsoft\Windows\CurrentVersion\Policies\Explorer"
  5586. POLICY !!ClassicShell
  5587. #if version >= 4
  5588. SUPPORTED !!SUPPORTED_Win2k
  5589. #endif
  5590. EXPLAIN !!ClassicShell_Help
  5591. VALUENAME "ClassicShell"
  5592. END POLICY
  5593. POLICY !!NoFolderOptions
  5594. #if version >= 4
  5595. SUPPORTED !!SUPPORTED_Win2k
  5596. #endif
  5597. EXPLAIN !!NoFolderOptions_Help
  5598. VALUENAME "NoFolderOptions"
  5599. END POLICY
  5600. POLICY !!NoFileMenu
  5601. #if version >= 4
  5602. SUPPORTED !!SUPPORTED_Win2k
  5603. #endif
  5604. EXPLAIN !!NoFileMenu_Help
  5605. VALUENAME "NoFileMenu"
  5606. END POLICY
  5607. POLICY !!NoNetConnectDisconnect
  5608. #if version >= 4
  5609. SUPPORTED !!SUPPORTED_Win2k
  5610. #endif
  5611. EXPLAIN !!NoNetConnectDisconnect_Help
  5612. VALUENAME "NoNetConnectDisconnect"
  5613. END POLICY
  5614. POLICY !!NoShellSearchButton
  5615. #if version >= 4
  5616. SUPPORTED !!SUPPORTED_Win2k
  5617. #endif
  5618. EXPLAIN !!NoShellSearchButton_Help
  5619. VALUENAME "NoShellSearchButton"
  5620. END POLICY
  5621. POLICY !!NoViewContextMenu
  5622. #if version >= 4
  5623. SUPPORTED !!SUPPORTED_Win2k
  5624. #endif
  5625. EXPLAIN !!NoViewContextMenu_Help
  5626. VALUENAME "NoViewContextMenu"
  5627. END POLICY
  5628. POLICY !!NoManageMyComputerVerb
  5629. #if version >= 4
  5630. SUPPORTED !!SUPPORTED_Win2k
  5631. #endif
  5632. EXPLAIN !!NoManageMyComputerVerb_Help
  5633. VALUENAME "NoManageMyComputerVerb"
  5634. END POLICY
  5635. POLICY !!EnforceShellExtensionSecurity
  5636. #if version >= 4
  5637. SUPPORTED !!SUPPORTED_Win2k
  5638. #endif
  5639. EXPLAIN !!EnforceShellExtensionSecurity_Help
  5640. VALUENAME "EnforceShellExtensionSecurity"
  5641. END POLICY
  5642. POLICY !!LinkResolveIgnoreLinkInfo
  5643. #if version >= 4
  5644. SUPPORTED !!SUPPORTED_Win2k
  5645. #endif
  5646. EXPLAIN !!LinkResolveIgnoreLinkInfo_Help
  5647. VALUENAME "LinkResolveIgnoreLinkInfo"
  5648. END POLICY
  5649. POLICY !!NoDrives
  5650. #if version >= 4
  5651. SUPPORTED !!SUPPORTED_Win2k
  5652. #endif
  5653. EXPLAIN !!NoDrives_Help
  5654. PART !!NoDrivesDropdown DROPDOWNLIST NOSORT REQUIRED
  5655. VALUENAME "NoDrives"
  5656. ITEMLIST
  5657. NAME !!ABOnly VALUE NUMERIC 3
  5658. NAME !!COnly VALUE NUMERIC 4
  5659. NAME !!DOnly VALUE NUMERIC 8
  5660. NAME !!ABConly VALUE NUMERIC 7
  5661. NAME !!ABCDOnly VALUE NUMERIC 15
  5662. NAME !!ALLDrives VALUE NUMERIC 67108863 DEFAULT
  5663. ; low 26 bits on (1 bit per drive)
  5664. NAME !!RestNoDrives VALUE NUMERIC 0
  5665. END ITEMLIST
  5666. END PART
  5667. END POLICY
  5668. POLICY !!NoViewOnDrive
  5669. #if version >= 4
  5670. SUPPORTED !!SUPPORTED_Win2k
  5671. #endif
  5672. EXPLAIN !!NoViewOnDrive_Help
  5673. PART !!NoDrivesDropdown DROPDOWNLIST NOSORT REQUIRED
  5674. VALUENAME "NoViewOnDrive"
  5675. ITEMLIST
  5676. NAME !!ABOnly VALUE NUMERIC 3
  5677. NAME !!COnly VALUE NUMERIC 4
  5678. NAME !!DOnly VALUE NUMERIC 8
  5679. NAME !!ABConly VALUE NUMERIC 7
  5680. NAME !!ABCDOnly VALUE NUMERIC 15
  5681. NAME !!ALLDrives VALUE NUMERIC 67108863 DEFAULT
  5682. ; low 26 bits on (1 bit per drive)
  5683. NAME !!RestNoDrives VALUE NUMERIC 0
  5684. END ITEMLIST
  5685. END PART
  5686. END POLICY
  5687. POLICY !!NoHardwareTab
  5688. #if version >= 4
  5689. SUPPORTED !!SUPPORTED_Win2k
  5690. #endif
  5691. EXPLAIN !!NoHardwareTab_Help
  5692. VALUENAME "NoHardwareTab"
  5693. END POLICY
  5694. POLICY !!NoDFSTab
  5695. #if version >= 4
  5696. SUPPORTED !!SUPPORTED_Win2k
  5697. #endif
  5698. EXPLAIN !!NoDFSTab_Help
  5699. VALUENAME "NoDFSTab"
  5700. END POLICY
  5701. POLICY !!NoSecurityTab
  5702. #if version >= 4
  5703. SUPPORTED !!SUPPORTED_WindowsXP
  5704. #endif
  5705. EXPLAIN !!NoSecurityTab_Help
  5706. VALUENAME "NoSecurityTab"
  5707. END POLICY
  5708. POLICY !!NoChangeAnimation
  5709. #if version >= 4
  5710. SUPPORTED !!SUPPORTED_Win2k
  5711. #endif
  5712. EXPLAIN !!NoChangeAnimation_Help
  5713. VALUENAME "NoChangeAnimation"
  5714. END POLICY
  5715. POLICY !!NoChangeKeyboardNavigationIndicators
  5716. #if version >= 4
  5717. SUPPORTED !!SUPPORTED_Win2k
  5718. #endif
  5719. EXPLAIN !!NoChangeKeyboardNavigationIndicators_Help
  5720. VALUENAME "NoChangeKeyboardNavigationIndicators"
  5721. END POLICY
  5722. POLICY !!NoWorkgroupContents
  5723. #if version >= 4
  5724. SUPPORTED !!SUPPORTED_Win2k
  5725. #endif
  5726. KEYNAME "Software\Microsoft\Windows\CurrentVersion\Policies\Explorer"
  5727. EXPLAIN !!NoWorkgroupContents_Help
  5728. VALUENAME "NoComputersNearMe"
  5729. END POLICY
  5730. POLICY !!NoEntireNetwork
  5731. KEYNAME "Software\Microsoft\Windows\CurrentVersion\Policies\Network"
  5732. #if version >= 4
  5733. SUPPORTED !!SUPPORTED_Win2k
  5734. #endif
  5735. EXPLAIN !!NoEntireNetwork_Help
  5736. VALUENAME "NoEntireNetwork"
  5737. END POLICY
  5738. POLICY !!MaxRecentDocs
  5739. EXPLAIN !!MaxRecentDocs_Help
  5740. #if version >= 4
  5741. SUPPORTED !!SUPPORTED_Win2k
  5742. #endif
  5743. PART !!MaxRecentDocs NUMERIC REQUIRED
  5744. VALUENAME "MaxRecentDocs"
  5745. DEFAULT 15
  5746. END PART
  5747. END POLICY
  5748. POLICY !!NoRunAsInstallPrompt
  5749. #if version >= 4
  5750. SUPPORTED !!SUPPORTED_Win2k
  5751. #endif
  5752. EXPLAIN !!NoRunAsInstallPrompt_Help
  5753. VALUENAME "NoRunasInstallPrompt"
  5754. END POLICY
  5755. POLICY !!PromptRunasInstallNetPath
  5756. #if version >= 4
  5757. SUPPORTED !!SUPPORTED_Win2k
  5758. #endif
  5759. EXPLAIN !!PromptRunasInstallNetPath_Help
  5760. VALUENAME "PromptRunasInstallNetPath"
  5761. END POLICY
  5762. POLICY !!NoCDBurning
  5763. #if version >= 4
  5764. SUPPORTED !!SUPPORTED_WindowsXP
  5765. #endif
  5766. EXPLAIN !!NoCDBurning_Help
  5767. VALUENAME "NoCDBurning"
  5768. END POLICY
  5769. POLICY !!NoRecycleFiles
  5770. #if version >= 4
  5771. SUPPORTED !!SUPPORTED_WindowsXP
  5772. #endif
  5773. EXPLAIN !!NoRecycleFiles_Help
  5774. VALUENAME "NoRecycleFiles"
  5775. END POLICY
  5776. POLICY !!ConfirmFileDelete
  5777. #if version >= 4
  5778. SUPPORTED !!SUPPORTED_WindowsXP
  5779. #endif
  5780. EXPLAIN !!ConfirmFileDelete_Help
  5781. VALUENAME "ConfirmFileDelete"
  5782. END POLICY
  5783. POLICY !!RecycleBinSize
  5784. #if version >= 4
  5785. SUPPORTED !!SUPPORTED_WindowsXP
  5786. #endif
  5787. EXPLAIN !!RecycleBinSize_Help
  5788. PART !!RecycleBinSizeHelp1 TEXT
  5789. END PART
  5790. PART !!Blank TEXT
  5791. END PART
  5792. PART !!RecycleBinSizeSpin NUMERIC DEFAULT 10 MIN 0 MAX 100 SPIN 10
  5793. VALUENAME "RecycleBinSize"
  5794. END PART
  5795. END POLICY
  5796. POLICY !!NoMyComputerSharedDocuments
  5797. #if version >= 4
  5798. SUPPORTED !!SUPPORTED_WindowsXPOnly
  5799. #endif
  5800. EXPLAIN !!NoMyComputerSharedDocuments_Help
  5801. VALUENAME "NoSharedDocuments"
  5802. END POLICY
  5803. POLICY !!NoCacheThumbNailPictures
  5804. #if version >= 4
  5805. SUPPORTED !!SUPPORTED_WindowsXP
  5806. #endif
  5807. EXPLAIN !!NoCacheThumbNailPictures_Help
  5808. VALUENAME "NoThumbnailCache"
  5809. END POLICY
  5810. POLICY !!NoWindowsHotKeys
  5811. #if version >= 4
  5812. SUPPORTED !!SUPPORTED_WindowsNET
  5813. #endif
  5814. EXPLAIN !!NoWindowsHotKeys_Help
  5815. VALUENAME "NoWinKeys"
  5816. END POLICY
  5817. POLICY !!ShellRemovePublishToWeb
  5818. #if version >= 4
  5819. SUPPORTED !!SUPPORTED_WindowsNET
  5820. #endif
  5821. EXPLAIN !!ShellRemovePublishToWeb_HELP
  5822. VALUENAME "NoPublishingWizard"
  5823. VALUEON NUMERIC 1
  5824. VALUEOFF NUMERIC 0
  5825. END POLICY
  5826. POLICY !!ShellPreventWPWDownload
  5827. #if version >= 4
  5828. SUPPORTED !!SUPPORTED_WindowsNET
  5829. #endif
  5830. EXPLAIN !!ShellPreventWPWDownload_HELP
  5831. VALUENAME "NoWebServices"
  5832. VALUEON NUMERIC 1
  5833. VALUEOFF NUMERIC 0
  5834. END POLICY
  5835. POLICY !!ShellRemoveOrderPrints
  5836. #if version >= 4
  5837. SUPPORTED !!SUPPORTED_WindowsNET
  5838. #endif
  5839. EXPLAIN !!ShellRemoveOrderPrints_HELP
  5840. VALUENAME "NoOnlinePrintsWizard"
  5841. VALUEON NUMERIC 1
  5842. VALUEOFF NUMERIC 0
  5843. END POLICY
  5844. CATEGORY !!Comdlg
  5845. #if version >= 4
  5846. EXPLAIN !!Comdlg_Help
  5847. #endif
  5848. KEYNAME "Software\Microsoft\Windows\CurrentVersion\Policies\Comdlg32"
  5849. POLICY !!PlacesBar
  5850. KEYNAME "Software\Microsoft\Windows\CurrentVersion\Policies\comdlg32\Placesbar"
  5851. #if version >= 4
  5852. SUPPORTED !!SUPPORTED_WindowsXP
  5853. #endif
  5854. EXPLAIN !!PlacesBar_Help
  5855. PART !!Places TEXT
  5856. END PART
  5857. PART !!Places0 EDITTEXT
  5858. VALUENAME "Place0"
  5859. END PART
  5860. PART !!Places1 EDITTEXT
  5861. VALUENAME "Place1"
  5862. END PART
  5863. PART !!Places2 EDITTEXT
  5864. VALUENAME "Place2"
  5865. END PART
  5866. PART !!Places3 EDITTEXT
  5867. VALUENAME "Place3"
  5868. END PART
  5869. PART !!Places4 EDITTEXT
  5870. VALUENAME "Place4"
  5871. END PART
  5872. END POLICY
  5873. POLICY !!NoPlacesBar
  5874. #if version >= 4
  5875. SUPPORTED !!SUPPORTED_Win2k
  5876. #endif
  5877. EXPLAIN !!NoPlacesBar_Help
  5878. VALUENAME "NoPlacesBar"
  5879. END POLICY
  5880. POLICY !!NoBackButton
  5881. #if version >= 4
  5882. SUPPORTED !!SUPPORTED_Win2k
  5883. #endif
  5884. EXPLAIN !!NoBackButton_Help
  5885. VALUENAME "NoBackButton"
  5886. END POLICY
  5887. POLICY !!NoFileMRU
  5888. #if version >= 4
  5889. SUPPORTED !!SUPPORTED_Win2k
  5890. #endif
  5891. EXPLAIN !!NoFileMRU_Help
  5892. VALUENAME "NoFileMru"
  5893. END POLICY
  5894. END CATEGORY ;;comdlg
  5895. END CATEGORY ;; WindowsExplorer
  5896. CATEGORY !!MMC
  5897. #if version >= 4
  5898. EXPLAIN !!MMC_Help
  5899. #endif
  5900. KEYNAME "Software\Policies\Microsoft\MMC"
  5901. POLICY !!MMC_Restrict_Author
  5902. #if version >= 4
  5903. SUPPORTED !!SUPPORTED_Win2k
  5904. #endif
  5905. EXPLAIN !!MMC_restrict_Author_Explain
  5906. VALUENAME "RestrictAuthorMode"
  5907. VALUEON NUMERIC 1
  5908. VALUEOFF NUMERIC 0
  5909. END POLICY
  5910. POLICY !!MMC_Restrict_To_Permitted_Snapins
  5911. #if version >= 4
  5912. SUPPORTED !!SUPPORTED_Win2k
  5913. #endif
  5914. EXPLAIN !!MMC_restrict_To_Permitted_Snapins_Explain
  5915. VALUENAME "RestrictToPermittedSnapins"
  5916. VALUEON NUMERIC 1
  5917. VALUEOFF NUMERIC 0
  5918. END POLICY
  5919. CATEGORY !!MMC_RESTRICT
  5920. #if version >= 4
  5921. EXPLAIN !!MMC_RESTRICT_Help
  5922. #endif
  5923. POLICY !!MMC_ActiveDirUsersComp
  5924. KEYNAME "Software\Policies\Microsoft\MMC\{E355E538-1C2E-11D0-8C37-00C04FD8FE93}"
  5925. #if version >= 4
  5926. SUPPORTED !!SUPPORTED_Win2k
  5927. #endif
  5928. EXPLAIN !!MMC_Restrict_Explain
  5929. VALUENAME "Restrict_Run"
  5930. VALUEON NUMERIC 0
  5931. VALUEOFF NUMERIC 1
  5932. END POLICY
  5933. POLICY !!MMC_ActiveDirDomTrusts
  5934. KEYNAME "Software\Policies\Microsoft\MMC\{EBC53A38-A23F-11D0-B09B-00C04FD8DCA6}"
  5935. #if version >= 4
  5936. SUPPORTED !!SUPPORTED_Win2k
  5937. #endif
  5938. EXPLAIN !!MMC_Restrict_Explain
  5939. VALUENAME "Restrict_Run"
  5940. VALUEON NUMERIC 0
  5941. VALUEOFF NUMERIC 1
  5942. END POLICY
  5943. POLICY !!MMC_ActiveDirSitesServices
  5944. KEYNAME "Software\Policies\Microsoft\MMC\{D967F824-9968-11D0-B936-00C04FD8D5B0}"
  5945. #if version >= 4
  5946. SUPPORTED !!SUPPORTED_Win2k
  5947. #endif
  5948. EXPLAIN !!MMC_Restrict_Explain
  5949. VALUENAME "Restrict_Run"
  5950. VALUEON NUMERIC 0
  5951. VALUEOFF NUMERIC 1
  5952. END POLICY
  5953. POLICY !!MMC_ADSI
  5954. KEYNAME "Software\Policies\Microsoft\MMC\{1C5DACFA-16BA-11D2-81D0-0000F87A7AA3}"
  5955. #if version >= 4
  5956. SUPPORTED !!SUPPORTED_WindowsXP
  5957. #endif
  5958. EXPLAIN !!MMC_Restrict_Explain
  5959. VALUENAME "Restrict_Run"
  5960. VALUEON NUMERIC 0
  5961. VALUEOFF NUMERIC 1
  5962. END POLICY
  5963. POLICY !!MMC_ActiveXControl
  5964. KEYNAME "Software\Policies\Microsoft\MMC\{C96401CF-0E17-11D3-885B-00C04F72C717}"
  5965. #if version >= 4
  5966. SUPPORTED !!SUPPORTED_WindowsXP
  5967. #endif
  5968. EXPLAIN !!MMC_Restrict_Explain
  5969. VALUENAME "Restrict_Run"
  5970. VALUEON NUMERIC 0
  5971. VALUEOFF NUMERIC 1
  5972. END POLICY
  5973. POLICY !!MMC_Certs
  5974. KEYNAME "Software\Policies\Microsoft\MMC\{53D6AB1D-2488-11D1-A28C-00C04FB94F17}"
  5975. #if version >= 4
  5976. SUPPORTED !!SUPPORTED_Win2k
  5977. #endif
  5978. EXPLAIN !!MMC_Restrict_Explain
  5979. VALUENAME "Restrict_Run"
  5980. VALUEON NUMERIC 0
  5981. VALUEOFF NUMERIC 1
  5982. END POLICY
  5983. POLICY !!MMC_CertAuth
  5984. KEYNAME "Software\Policies\Microsoft\MMC\{de751566-4cc6-11d1-8ca0-00c04fc297eb}"
  5985. #if version >= 4
  5986. SUPPORTED !!SUPPORTED_Win2k
  5987. #endif
  5988. EXPLAIN !!MMC_Restrict_Explain
  5989. VALUENAME "Restrict_Run"
  5990. VALUEON NUMERIC 0
  5991. VALUEOFF NUMERIC 1
  5992. END POLICY
  5993. POLICY !!MMC_CertsTemplate
  5994. KEYNAME "Software\Policies\Microsoft\MMC\{A994E107-6854-4F3D-917C-E6F01670F6D3}"
  5995. #if version >= 4
  5996. SUPPORTED !!SUPPORTED_WindowsNET
  5997. #endif
  5998. EXPLAIN !!MMC_Restrict_Explain
  5999. VALUENAME "Restrict_Run"
  6000. VALUEON NUMERIC 0
  6001. VALUEOFF NUMERIC 1
  6002. END POLICY
  6003. POLICY !!MMC_WirelessMon
  6004. KEYNAME "Software\Policies\Microsoft\MMC\{23DC5869-BD9F-46fd-AADD-1F869BA64FC3}"
  6005. #if version >= 4
  6006. SUPPORTED !!SUPPORTED_Win2k
  6007. #endif
  6008. EXPLAIN !!MMC_Restrict_Explain
  6009. VALUENAME "Restrict_Run"
  6010. VALUEON NUMERIC 0
  6011. VALUEOFF NUMERIC 1
  6012. END POLICY
  6013. POLICY !!MMC_ComponentServices
  6014. KEYNAME "Software\Policies\Microsoft\MMC\{C9BC92DF-5B9A-11D1-8F00-00C04FC2C17B}"
  6015. #if version >= 4
  6016. SUPPORTED !!SUPPORTED_Win2k
  6017. #endif
  6018. EXPLAIN !!MMC_Restrict_Explain
  6019. VALUENAME "Restrict_Run"
  6020. VALUEON NUMERIC 0
  6021. VALUEOFF NUMERIC 1
  6022. END POLICY
  6023. POLICY !!MMC_ComputerManagement
  6024. KEYNAME "Software\Policies\Microsoft\MMC\{58221C67-EA27-11CF-ADCF-00AA00A80033}"
  6025. #if version >= 4
  6026. SUPPORTED !!SUPPORTED_Win2k
  6027. #endif
  6028. EXPLAIN !!MMC_Restrict_Explain
  6029. VALUENAME "Restrict_Run"
  6030. VALUEON NUMERIC 0
  6031. VALUEOFF NUMERIC 1
  6032. END POLICY
  6033. POLICY !!MMC_DeviceManager
  6034. KEYNAME "Software\Policies\Microsoft\MMC\{90087284-d6d6-11d0-8353-00a0c90640bf}"
  6035. #if version >= 4
  6036. SUPPORTED !!SUPPORTED_Win2k
  6037. #endif
  6038. EXPLAIN !!MMC_Restrict_Explain
  6039. VALUENAME "Restrict_Run"
  6040. VALUEON NUMERIC 0
  6041. VALUEOFF NUMERIC 1
  6042. END POLICY
  6043. POLICY !!MMC_DiskMgmt
  6044. KEYNAME "Software\Policies\Microsoft\MMC\{8EAD3A12-B2C1-11d0-83AA-00A0C92C9D5D}"
  6045. #if version >= 4
  6046. SUPPORTED !!SUPPORTED_Win2k
  6047. #endif
  6048. EXPLAIN !!MMC_Restrict_Explain
  6049. VALUENAME "Restrict_Run"
  6050. VALUEON NUMERIC 0
  6051. VALUEOFF NUMERIC 1
  6052. END POLICY
  6053. POLICY !!MMC_DiskDefrag
  6054. KEYNAME "Software\Policies\Microsoft\MMC\{43668E21-2636-11D1-A1CE-0080C88593A5}"
  6055. #if version >= 4
  6056. SUPPORTED !!SUPPORTED_Win2k
  6057. #endif
  6058. EXPLAIN !!MMC_Restrict_Explain
  6059. VALUENAME "Restrict_Run"
  6060. VALUEON NUMERIC 0
  6061. VALUEOFF NUMERIC 1
  6062. END POLICY
  6063. POLICY !!MMC_DFS
  6064. KEYNAME "Software\Policies\Microsoft\MMC\{677A2D94-28D9-11D1-A95B-008048918FB1}"
  6065. #if version >= 4
  6066. SUPPORTED !!SUPPORTED_Win2k
  6067. #endif
  6068. EXPLAIN !!MMC_Restrict_Explain
  6069. VALUENAME "Restrict_Run"
  6070. VALUEON NUMERIC 0
  6071. VALUEOFF NUMERIC 1
  6072. END POLICY
  6073. POLICY !!MMC_EventViewer
  6074. KEYNAME "Software\Policies\Microsoft\MMC\{975797FC-4E2A-11D0-B702-00C04FD8DBF7}"
  6075. #if version >= 4
  6076. SUPPORTED !!SUPPORTED_Win2k
  6077. #endif
  6078. EXPLAIN !!MMC_Restrict_Explain
  6079. VALUENAME "Restrict_Run"
  6080. VALUEON NUMERIC 0
  6081. VALUEOFF NUMERIC 1
  6082. END POLICY
  6083. POLICY !!MMC_FAXService
  6084. KEYNAME "Software\Policies\Microsoft\MMC\{753EDB4D-2E1B-11D1-9064-00A0C90AB504}"
  6085. #if version >= 4
  6086. SUPPORTED !!SUPPORTED_Win2k
  6087. #endif
  6088. EXPLAIN !!MMC_Restrict_Explain
  6089. VALUENAME "Restrict_Run"
  6090. VALUEON NUMERIC 0
  6091. VALUEOFF NUMERIC 1
  6092. END POLICY
  6093. POLICY !!MMC_FrontPageExt
  6094. KEYNAME "Software\Policies\Microsoft\MMC\{FF5903A8-78D6-11D1-92F6-006097B01056}"
  6095. #if version >= 4
  6096. SUPPORTED !!SUPPORTED_WindowsXP
  6097. #endif
  6098. EXPLAIN !!MMC_Restrict_Explain
  6099. VALUENAME "Restrict_Run"
  6100. VALUEON NUMERIC 0
  6101. VALUEOFF NUMERIC 1
  6102. END POLICY
  6103. POLICY !!MMC_IndexingService
  6104. KEYNAME "Software\Policies\Microsoft\MMC\{95AD72F0-44CE-11D0-AE29-00AA004B9986}"
  6105. #if version >= 4
  6106. SUPPORTED !!SUPPORTED_Win2k
  6107. #endif
  6108. EXPLAIN !!MMC_Restrict_Explain
  6109. VALUENAME "Restrict_Run"
  6110. VALUEON NUMERIC 0
  6111. VALUEOFF NUMERIC 1
  6112. END POLICY
  6113. POLICY !!MMC_Net_Framework
  6114. KEYNAME "Software\Policies\Microsoft\MMC\{18BA7139-D98B-43c2-94DA-2604E34E175D}"
  6115. #if version >= 4
  6116. SUPPORTED !!SUPPORTED_Win2k
  6117. #endif
  6118. EXPLAIN !!MMC_Restrict_Explain
  6119. VALUENAME "Restrict_Run"
  6120. VALUEON NUMERIC 0
  6121. VALUEOFF NUMERIC 1
  6122. END POLICY
  6123. POLICY !!MMC_IAS
  6124. KEYNAME "Software\Policies\Microsoft\MMC\{8F8F8DC0-5713-11D1-9551-0060B0576642}"
  6125. #if version >= 4
  6126. SUPPORTED !!SUPPORTED_Win2k
  6127. #endif
  6128. EXPLAIN !!MMC_Restrict_Explain
  6129. VALUENAME "Restrict_Run"
  6130. VALUEON NUMERIC 0
  6131. VALUEOFF NUMERIC 1
  6132. END POLICY
  6133. POLICY !!MMC_IIS
  6134. KEYNAME "Software\Policies\Microsoft\MMC\{A841B6C2-7577-11D0-BB1F-00A0C922E79C}"
  6135. #if version >= 4
  6136. SUPPORTED !!SUPPORTED_Win2k
  6137. #endif
  6138. EXPLAIN !!MMC_Restrict_Explain
  6139. VALUENAME "Restrict_Run"
  6140. VALUEON NUMERIC 0
  6141. VALUEOFF NUMERIC 1
  6142. END POLICY
  6143. POLICY !!MMC_IpSecManage
  6144. KEYNAME "Software\Policies\Microsoft\MMC\{DEA8AFA0-CC85-11d0-9CE2-0080C7221EBD}"
  6145. #if version >= 4
  6146. SUPPORTED !!SUPPORTED_WindowsXP
  6147. #endif
  6148. EXPLAIN !!MMC_Restrict_Explain
  6149. VALUENAME "Restrict_Run"
  6150. VALUEON NUMERIC 0
  6151. VALUEOFF NUMERIC 1
  6152. END POLICY
  6153. POLICY !!MMC_IpSecMonitor
  6154. KEYNAME "Software\Policies\Microsoft\MMC\{57C596D0-9370-40C0-BA0D-AB491B63255D}"
  6155. #if version >= 4
  6156. SUPPORTED !!SUPPORTED_WindowsXP
  6157. #endif
  6158. EXPLAIN !!MMC_Restrict_Explain
  6159. VALUENAME "Restrict_Run"
  6160. VALUEON NUMERIC 0
  6161. VALUEOFF NUMERIC 1
  6162. END POLICY
  6163. POLICY !!MMC_LinkToWeb
  6164. KEYNAME "Software\Policies\Microsoft\MMC\{C96401D1-0E17-11D3-885B-00C04F72C717}"
  6165. #if version >= 4
  6166. SUPPORTED !!SUPPORTED_WindowsXP
  6167. #endif
  6168. EXPLAIN !!MMC_Restrict_Explain
  6169. VALUENAME "Restrict_Run"
  6170. VALUEON NUMERIC 0
  6171. VALUEOFF NUMERIC 1
  6172. END POLICY
  6173. POLICY !!MMC_LocalUsersGroups
  6174. KEYNAME "Software\Policies\Microsoft\MMC\{5D6179C8-17EC-11D1-9AA9-00C04FD8FE93}"
  6175. #if version >= 4
  6176. SUPPORTED !!SUPPORTED_Win2k
  6177. #endif
  6178. EXPLAIN !!MMC_Restrict_Explain
  6179. VALUENAME "Restrict_Run"
  6180. VALUEON NUMERIC 0
  6181. VALUEOFF NUMERIC 1
  6182. END POLICY
  6183. POLICY !!MMC_PerfLogsAlerts
  6184. KEYNAME "Software\Policies\Microsoft\MMC\{7478EF61-8C46-11d1-8D99-00A0C913CAD4}"
  6185. #if version >= 4
  6186. SUPPORTED !!SUPPORTED_Win2k
  6187. #endif
  6188. EXPLAIN !!MMC_Restrict_Explain
  6189. VALUENAME "Restrict_Run"
  6190. VALUEON NUMERIC 0
  6191. VALUEOFF NUMERIC 1
  6192. END POLICY
  6193. POLICY !!MMC_QoSAdmission
  6194. KEYNAME "Software\Policies\Microsoft\MMC\{FD57D297-4FD9-11D1-854E-00C04FC31FD3}"
  6195. #if version >= 4
  6196. SUPPORTED !!SUPPORTED_Win2k
  6197. #endif
  6198. EXPLAIN !!MMC_Restrict_Explain
  6199. VALUENAME "Restrict_Run"
  6200. VALUEON NUMERIC 0
  6201. VALUEOFF NUMERIC 1
  6202. END POLICY
  6203. POLICY !!MMC_RemoteDesktop
  6204. KEYNAME "Software\Policies\Microsoft\MMC\{3D5D035E-7721-4B83-A645-6C07A3D403B7}"
  6205. #if version >= 4
  6206. SUPPORTED !!SUPPORTED_WindowsXP
  6207. #endif
  6208. EXPLAIN !!MMC_Restrict_Explain
  6209. VALUENAME "Restrict_Run"
  6210. VALUEON NUMERIC 0
  6211. VALUEOFF NUMERIC 1
  6212. END POLICY
  6213. POLICY !!MMC_RSM
  6214. KEYNAME "Software\Policies\Microsoft\MMC\{3CB6973D-3E6F-11D0-95DB-00A024D77700}"
  6215. #if version >= 4
  6216. SUPPORTED !!SUPPORTED_Win2k
  6217. #endif
  6218. EXPLAIN !!MMC_Restrict_Explain
  6219. VALUENAME "Restrict_Run"
  6220. VALUEON NUMERIC 0
  6221. VALUEOFF NUMERIC 1
  6222. END POLICY
  6223. POLICY !!MMC_RRA
  6224. KEYNAME "Software\Policies\Microsoft\MMC\{1AA7F839-C7F5-11D0-A376-00C04FC9DA04}"
  6225. #if version >= 4
  6226. SUPPORTED !!SUPPORTED_Win2k
  6227. #endif
  6228. EXPLAIN !!MMC_Restrict_Explain
  6229. VALUENAME "Restrict_Run"
  6230. VALUEON NUMERIC 0
  6231. VALUEOFF NUMERIC 1
  6232. END POLICY
  6233. POLICY !!MMC_SCA
  6234. KEYNAME "Software\Policies\Microsoft\MMC\{011BE22D-E453-11D1-945A-00C04FB984F9}"
  6235. #if version >= 4
  6236. SUPPORTED !!SUPPORTED_Win2k
  6237. #endif
  6238. EXPLAIN !!MMC_Restrict_Explain
  6239. VALUENAME "Restrict_Run"
  6240. VALUEON NUMERIC 0
  6241. VALUEOFF NUMERIC 1
  6242. END POLICY
  6243. POLICY !!MMC_SecurityTemplates
  6244. KEYNAME "Software\Policies\Microsoft\MMC\{5ADF5BF6-E452-11D1-945A-00C04FB984F9}"
  6245. #if version >= 4
  6246. SUPPORTED !!SUPPORTED_Win2k
  6247. #endif
  6248. EXPLAIN !!MMC_Restrict_Explain
  6249. VALUENAME "Restrict_Run"
  6250. VALUEON NUMERIC 0
  6251. VALUEOFF NUMERIC 1
  6252. END POLICY
  6253. POLICY !!MMC_Services
  6254. KEYNAME "Software\Policies\Microsoft\MMC\{58221C66-EA27-11CF-ADCF-00AA00A80033}"
  6255. #if version >= 4
  6256. SUPPORTED !!SUPPORTED_Win2k
  6257. #endif
  6258. EXPLAIN !!MMC_Restrict_Explain
  6259. VALUENAME "Restrict_Run"
  6260. VALUEON NUMERIC 0
  6261. VALUEOFF NUMERIC 1
  6262. END POLICY
  6263. POLICY !!MMC_SharedFolders
  6264. KEYNAME "Software\Policies\Microsoft\MMC\{58221C65-EA27-11CF-ADCF-00AA00A80033}"
  6265. #if version >= 4
  6266. SUPPORTED !!SUPPORTED_Win2k
  6267. #endif
  6268. EXPLAIN !!MMC_Restrict_Explain
  6269. VALUENAME "Restrict_Run"
  6270. VALUEON NUMERIC 0
  6271. VALUEOFF NUMERIC 1
  6272. END POLICY
  6273. POLICY !!MMC_SysInfo
  6274. KEYNAME "Software\Policies\Microsoft\MMC\{45ac8c63-23e2-11d1-a696-00c04fd58bc3}"
  6275. #if version >= 4
  6276. SUPPORTED !!SUPPORTED_Win2k
  6277. #endif
  6278. EXPLAIN !!MMC_Restrict_Explain
  6279. VALUENAME "Restrict_Run"
  6280. VALUEON NUMERIC 0
  6281. VALUEOFF NUMERIC 1
  6282. END POLICY
  6283. POLICY !!MMC_Telephony
  6284. KEYNAME "Software\Policies\Microsoft\MMC\{E26D02A0-4C1F-11D1-9AA1-00C04FC3357A}"
  6285. #if version >= 4
  6286. SUPPORTED !!SUPPORTED_Win2k
  6287. #endif
  6288. EXPLAIN !!MMC_Restrict_Explain
  6289. VALUENAME "Restrict_Run"
  6290. VALUEON NUMERIC 0
  6291. VALUEOFF NUMERIC 1
  6292. END POLICY
  6293. POLICY !!MMC_TerminalServices
  6294. KEYNAME "Software\Policies\Microsoft\MMC\{B91B6008-32D2-11D2-9888-00A0C925F917}"
  6295. #if version >= 4
  6296. SUPPORTED !!SUPPORTED_Win2k
  6297. #endif
  6298. EXPLAIN !!MMC_Restrict_Explain
  6299. VALUENAME "Restrict_Run"
  6300. VALUEON NUMERIC 0
  6301. VALUEOFF NUMERIC 1
  6302. END POLICY
  6303. POLICY !!MMC_WMI
  6304. KEYNAME "Software\Policies\Microsoft\MMC\{5C659257-E236-11D2-8899-00104B2AFB46}"
  6305. #if version >= 4
  6306. SUPPORTED !!SUPPORTED_Win2k
  6307. #endif
  6308. EXPLAIN !!MMC_Restrict_Explain
  6309. VALUENAME "Restrict_Run"
  6310. VALUEON NUMERIC 0
  6311. VALUEOFF NUMERIC 1
  6312. END POLICY
  6313. CATEGORY !!MMC_ExtensionSnapins
  6314. #if version >= 4
  6315. EXPLAIN !!MMC_ExtensionSnapins_Help
  6316. #endif
  6317. POLICY !!MMC_AppleTalkRouting
  6318. KEYNAME "Software\Policies\Microsoft\MMC\{1AA7F83C-C7F5-11D0-A376-00C04FC9DA04}"
  6319. #if version >= 4
  6320. SUPPORTED !!SUPPORTED_Win2k
  6321. #endif
  6322. EXPLAIN !!MMC_Restrict_Explain
  6323. VALUENAME "Restrict_Run"
  6324. VALUEON NUMERIC 0
  6325. VALUEOFF NUMERIC 1
  6326. END POLICY
  6327. POLICY !!MMC_AuthMan
  6328. KEYNAME "Software\Policies\Microsoft\MMC\{1F5EEC01-1214-4D94-80C5-4BDCD2014DDD}"
  6329. #if version >= 4
  6330. SUPPORTED !!SUPPORTED_Win2k
  6331. #endif
  6332. EXPLAIN !!MMC_Restrict_Explain
  6333. VALUENAME "Restrict_Run"
  6334. VALUEON NUMERIC 0
  6335. VALUEOFF NUMERIC 1
  6336. END POLICY
  6337. POLICY !!MMC_CertAuthPolSet
  6338. KEYNAME "Software\Policies\Microsoft\MMC\{3F276EB4-70EE-11D1-8A0F-00C04FB93753}"
  6339. #if version >= 4
  6340. SUPPORTED !!SUPPORTED_Win2k
  6341. #endif
  6342. EXPLAIN !!MMC_Restrict_Explain
  6343. VALUENAME "Restrict_Run"
  6344. VALUEON NUMERIC 0
  6345. VALUEOFF NUMERIC 1
  6346. END POLICY
  6347. POLICY !!MMC_ConnectionSharingNAT
  6348. KEYNAME "Software\Policies\Microsoft\MMC\{C2FE450B-D6C2-11D0-A37B-00C04FC9DA04}"
  6349. #if version >= 4
  6350. SUPPORTED !!SUPPORTED_Win2k
  6351. #endif
  6352. EXPLAIN !!MMC_Restrict_Explain
  6353. VALUENAME "Restrict_Run"
  6354. VALUEON NUMERIC 0
  6355. VALUEOFF NUMERIC 1
  6356. END POLICY
  6357. POLICY !!MMC_DCOMCFG
  6358. KEYNAME "Software\Policies\Microsoft\MMC\{9EC88934-C774-11d1-87F4-00C04FC2C17B}"
  6359. #if version >= 4
  6360. SUPPORTED !!SUPPORTED_Win2k
  6361. #endif
  6362. EXPLAIN !!MMC_Restrict_Explain
  6363. VALUENAME "Restrict_Run"
  6364. VALUEON NUMERIC 0
  6365. VALUEOFF NUMERIC 1
  6366. END POLICY
  6367. POLICY !!MMC_DeviceManager
  6368. KEYNAME "Software\Policies\Microsoft\MMC\{74246bfc-4c96-11d0-abef-0020af6b0b7a}"
  6369. #if version >= 4
  6370. SUPPORTED !!SUPPORTED_Win2k
  6371. #endif
  6372. EXPLAIN !!MMC_Restrict_Explain
  6373. VALUENAME "Restrict_Run"
  6374. VALUEON NUMERIC 0
  6375. VALUEOFF NUMERIC 1
  6376. END POLICY
  6377. POLICY !!MMC_DHCPRelayMgmt
  6378. KEYNAME "Software\Policies\Microsoft\MMC\{C2FE4502-D6C2-11D0-A37B-00C04FC9DA04}"
  6379. #if version >= 4
  6380. SUPPORTED !!SUPPORTED_Win2k
  6381. #endif
  6382. EXPLAIN !!MMC_Restrict_Explain
  6383. VALUENAME "Restrict_Run"
  6384. VALUEON NUMERIC 0
  6385. VALUEOFF NUMERIC 1
  6386. END POLICY
  6387. POLICY !!MMC_EventViewer
  6388. KEYNAME "Software\Policies\Microsoft\MMC\{394C052E-B830-11D0-9A86-00C04FD8DBF7}"
  6389. #if version >= 4
  6390. SUPPORTED !!SUPPORTED_Win2k
  6391. #endif
  6392. EXPLAIN !!MMC_Restrict_Explain
  6393. VALUENAME "Restrict_Run"
  6394. VALUEON NUMERIC 0
  6395. VALUEOFF NUMERIC 1
  6396. END POLICY
  6397. POLICY !!MMC_ExtendView
  6398. KEYNAME "Software\Policies\Microsoft\MMC\{B708457E-DB61-4C55-A92F-0D4B5E9B1224}"
  6399. #if version >= 4
  6400. SUPPORTED !!SUPPORTED_WindowsXP
  6401. #endif
  6402. EXPLAIN !!MMC_Restrict_Explain
  6403. VALUENAME "Restrict_Run"
  6404. VALUEON NUMERIC 0
  6405. VALUEOFF NUMERIC 1
  6406. END POLICY
  6407. POLICY !!MMC_IASLogging
  6408. KEYNAME "Software\Policies\Microsoft\MMC\{2E19B602-48EB-11d2-83CA-00104BCA42CF}"
  6409. #if version >= 4
  6410. SUPPORTED !!SUPPORTED_Win2k
  6411. #endif
  6412. EXPLAIN !!MMC_Restrict_Explain
  6413. VALUENAME "Restrict_Run"
  6414. VALUEON NUMERIC 0
  6415. VALUEOFF NUMERIC 1
  6416. END POLICY
  6417. POLICY !!MMC_IGMPRouting
  6418. KEYNAME "Software\Policies\Microsoft\MMC\{C2FE4508-D6C2-11D0-A37B-00C04FC9DA04}"
  6419. #if version >= 4
  6420. SUPPORTED !!SUPPORTED_Win2k
  6421. #endif
  6422. EXPLAIN !!MMC_Restrict_Explain
  6423. VALUENAME "Restrict_Run"
  6424. VALUEON NUMERIC 0
  6425. VALUEOFF NUMERIC 1
  6426. END POLICY
  6427. POLICY !!MMC_IPRouting
  6428. KEYNAME "Software\Policies\Microsoft\MMC\{C2FE4500-D6C2-11D0-A37B-00C04FC9DA04}"
  6429. #if version >= 4
  6430. SUPPORTED !!SUPPORTED_Win2k
  6431. #endif
  6432. EXPLAIN !!MMC_Restrict_Explain
  6433. VALUENAME "Restrict_Run"
  6434. VALUEON NUMERIC 0
  6435. VALUEOFF NUMERIC 1
  6436. END POLICY
  6437. POLICY !!MMC_IPXRIPRouting
  6438. KEYNAME "Software\Policies\Microsoft\MMC\{90810502-38F1-11D1-9345-00C04FC9DA04}"
  6439. #if version >= 4
  6440. SUPPORTED !!SUPPORTED_Win2k
  6441. #endif
  6442. EXPLAIN !!MMC_Restrict_Explain
  6443. VALUENAME "Restrict_Run"
  6444. VALUEON NUMERIC 0
  6445. VALUEOFF NUMERIC 1
  6446. END POLICY
  6447. POLICY !!MMC_IPXRouting
  6448. KEYNAME "Software\Policies\Microsoft\MMC\{90810500-38F1-11D1-9345-00C04FC9DA04}"
  6449. #if version >= 4
  6450. SUPPORTED !!SUPPORTED_Win2k
  6451. #endif
  6452. EXPLAIN !!MMC_Restrict_Explain
  6453. VALUENAME "Restrict_Run"
  6454. VALUEON NUMERIC 0
  6455. VALUEOFF NUMERIC 1
  6456. END POLICY
  6457. POLICY !!MMC_IPXSAPRouting
  6458. KEYNAME "Software\Policies\Microsoft\MMC\{90810504-38F1-11D1-9345-00C04FC9DA04}"
  6459. #if version >= 4
  6460. SUPPORTED !!SUPPORTED_Win2k
  6461. #endif
  6462. EXPLAIN !!MMC_Restrict_Explain
  6463. VALUENAME "Restrict_Run"
  6464. VALUEON NUMERIC 0
  6465. VALUEOFF NUMERIC 1
  6466. END POLICY
  6467. POLICY !!MMC_LogicalMappedDrives
  6468. KEYNAME "Software\Policies\Microsoft\MMC\{6E8E0081-19CD-11D1-AD91-00AA00B8E05A}"
  6469. #if version >= 4
  6470. SUPPORTED !!SUPPORTED_Win2k
  6471. #endif
  6472. EXPLAIN !!MMC_Restrict_Explain
  6473. VALUENAME "Restrict_Run"
  6474. VALUEON NUMERIC 0
  6475. VALUEOFF NUMERIC 1
  6476. END POLICY
  6477. POLICY !!MMC_OSPFRouting
  6478. KEYNAME "Software\Policies\Microsoft\MMC\{C2FE4506-D6C2-11D0-A37B-00C04FC9DA04}"
  6479. #if version >= 4
  6480. SUPPORTED !!SUPPORTED_Win2k
  6481. #endif
  6482. EXPLAIN !!MMC_Restrict_Explain
  6483. VALUENAME "Restrict_Run"
  6484. VALUEON NUMERIC 0
  6485. VALUEOFF NUMERIC 1
  6486. END POLICY
  6487. POLICY !!MMC_PublicKey
  6488. KEYNAME "Software\Policies\Microsoft\MMC\{34AB8E82-C27E-11D1-A6C0-00C04FB94F17}"
  6489. #if version >= 4
  6490. SUPPORTED !!SUPPORTED_Win2k
  6491. #endif
  6492. EXPLAIN !!MMC_Restrict_Explain
  6493. VALUENAME "Restrict_Run"
  6494. VALUEON NUMERIC 0
  6495. VALUEOFF NUMERIC 1
  6496. END POLICY
  6497. POLICY !!MMC_RAS_DialinUser
  6498. KEYNAME "Software\Policies\Microsoft\MMC\{B52C1E50-1DD2-11D1-BC43-00C04FC31FD3}"
  6499. #if version >= 4
  6500. SUPPORTED !!SUPPORTED_Win2k
  6501. #endif
  6502. EXPLAIN !!MMC_Restrict_Explain
  6503. VALUENAME "Restrict_Run"
  6504. VALUEON NUMERIC 0
  6505. VALUEOFF NUMERIC 1
  6506. END POLICY
  6507. POLICY !!MMC_RemoteAccess
  6508. KEYNAME "Software\Policies\Microsoft\MMC\{5880CD5C-8EC0-11d1-9570-0060B0576642}"
  6509. #if version >= 4
  6510. SUPPORTED !!SUPPORTED_Win2k
  6511. #endif
  6512. EXPLAIN !!MMC_Restrict_Explain
  6513. VALUENAME "Restrict_Run"
  6514. VALUEON NUMERIC 0
  6515. VALUEOFF NUMERIC 1
  6516. END POLICY
  6517. POLICY !!MMC_RemStore
  6518. KEYNAME "Software\Policies\Microsoft\MMC\{243E20B0-48ED-11D2-97DA-00A024D77700}"
  6519. #if version >= 4
  6520. SUPPORTED !!SUPPORTED_Win2k
  6521. #endif
  6522. EXPLAIN !!MMC_Restrict_Explain
  6523. VALUENAME "Restrict_Run"
  6524. VALUEON NUMERIC 0
  6525. VALUEOFF NUMERIC 1
  6526. END POLICY
  6527. POLICY !!MMC_RIPRouting
  6528. KEYNAME "Software\Policies\Microsoft\MMC\{C2FE4504-D6C2-11D0-A37B-00C04FC9DA04}"
  6529. #if version >= 4
  6530. SUPPORTED !!SUPPORTED_Win2k
  6531. #endif
  6532. EXPLAIN !!MMC_Restrict_Explain
  6533. VALUENAME "Restrict_Run"
  6534. VALUEON NUMERIC 0
  6535. VALUEOFF NUMERIC 1
  6536. END POLICY
  6537. POLICY !!MMC_Routing
  6538. KEYNAME "Software\Policies\Microsoft\MMC\{DAB1A262-4FD7-11D1-842C-00C04FB6C218}"
  6539. #if version >= 4
  6540. SUPPORTED !!SUPPORTED_Win2k
  6541. #endif
  6542. EXPLAIN !!MMC_Restrict_Explain
  6543. VALUENAME "Restrict_Run"
  6544. VALUEON NUMERIC 0
  6545. VALUEOFF NUMERIC 1
  6546. END POLICY
  6547. POLICY !!MMC_SharedFolders_Ext
  6548. KEYNAME "Software\Policies\Microsoft\MMC\{58221C69-EA27-11CF-ADCF-00AA00A80033}"
  6549. #if version >= 4
  6550. SUPPORTED !!SUPPORTED_Win2k
  6551. #endif
  6552. EXPLAIN !!MMC_Restrict_Explain
  6553. VALUENAME "Restrict_Run"
  6554. VALUEON NUMERIC 0
  6555. VALUEOFF NUMERIC 1
  6556. END POLICY
  6557. POLICY !!MMC_SendConsoleMessage
  6558. KEYNAME "Software\Policies\Microsoft\MMC\{B1AFF7D0-0C49-11D1-BB12-00C04FC9A3A3}"
  6559. #if version >= 4
  6560. SUPPORTED !!SUPPORTED_Win2k
  6561. #endif
  6562. EXPLAIN !!MMC_Restrict_Explain
  6563. VALUENAME "Restrict_Run"
  6564. VALUEON NUMERIC 0
  6565. VALUEOFF NUMERIC 1
  6566. END POLICY
  6567. POLICY !!MMC_ServiceDependencies
  6568. #if version >= 4
  6569. SUPPORTED !!SUPPORTED_Win2k
  6570. #endif
  6571. KEYNAME "Software\Policies\Microsoft\MMC\{BD95BA60-2E26-AAD1-AD99-00AA00B8E05A}"
  6572. EXPLAIN !!MMC_Restrict_Explain
  6573. VALUENAME "Restrict_Run"
  6574. VALUEON NUMERIC 0
  6575. VALUEOFF NUMERIC 1
  6576. END POLICY
  6577. POLICY !!MMC_SMTPProtocol
  6578. #if version >= 4
  6579. SUPPORTED !!SUPPORTED_Win2k
  6580. #endif
  6581. KEYNAME "Software\Policies\Microsoft\MMC\{03f1f940-a0f2-11d0-bb77-00aa00a1eab7}"
  6582. EXPLAIN !!MMC_Restrict_Explain
  6583. VALUENAME "Restrict_Run"
  6584. VALUEON NUMERIC 0
  6585. VALUEOFF NUMERIC 1
  6586. END POLICY
  6587. POLICY !!MMC_SNMP
  6588. KEYNAME "Software\Policies\Microsoft\MMC\{7AF60DD3-4979-11D1-8A6C-00C04FC33566}"
  6589. #if version >= 4
  6590. SUPPORTED !!SUPPORTED_Win2k
  6591. #endif
  6592. EXPLAIN !!MMC_Restrict_Explain
  6593. VALUENAME "Restrict_Run"
  6594. VALUEON NUMERIC 0
  6595. VALUEOFF NUMERIC 1
  6596. END POLICY
  6597. POLICY !!MMC_SysProp
  6598. KEYNAME "Software\Policies\Microsoft\MMC\{0F3621F1-23C6-11D1-AD97-00AA00B88E5A}"
  6599. #if version >= 4
  6600. SUPPORTED !!SUPPORTED_Win2k
  6601. #endif
  6602. EXPLAIN !!MMC_Restrict_Explain
  6603. VALUENAME "Restrict_Run"
  6604. VALUEON NUMERIC 0
  6605. VALUEOFF NUMERIC 1
  6606. END POLICY
  6607. END CATEGORY ;; MMC_ExtensionSnapins
  6608. CATEGORY !!MMC_GroupPolicy
  6609. #if version >= 4
  6610. EXPLAIN !!MMC_GroupPolicy_Help
  6611. #endif
  6612. POLICY !!MMC_GroupPolicyManagementSnapIn
  6613. KEYNAME "Software\Policies\Microsoft\MMC\{E12BBB5D-D59D-4E61-947A-301D25AE8C23}"
  6614. #if version >= 4
  6615. SUPPORTED !!SUPPORTED_WindowsXPSP1
  6616. #endif
  6617. EXPLAIN !!MMC_Restrict_Explain
  6618. VALUENAME "Restrict_Run"
  6619. VALUEON NUMERIC 0
  6620. VALUEOFF NUMERIC 1
  6621. END POLICY
  6622. POLICY !!MMC_GroupPolicySnapIn
  6623. KEYNAME "Software\Policies\Microsoft\MMC\{8FC0B734-A0E1-11D1-A7D3-0000F87571E3}"
  6624. #if version >= 4
  6625. SUPPORTED !!SUPPORTED_Win2k
  6626. #endif
  6627. EXPLAIN !!MMC_Restrict_Explain
  6628. VALUENAME "Restrict_Run"
  6629. VALUEON NUMERIC 0
  6630. VALUEOFF NUMERIC 1
  6631. END POLICY
  6632. POLICY !!MMC_GroupPolicyTab
  6633. KEYNAME "Software\Policies\Microsoft\MMC\{D70A2BEA-A63E-11D1-A7D4-0000F87571E3}"
  6634. #if version >= 4
  6635. SUPPORTED !!SUPPORTED_Win2k
  6636. #endif
  6637. EXPLAIN !!MMC_GroupPolicyTab_Explain
  6638. VALUENAME "Restrict_Run"
  6639. VALUEON NUMERIC 0
  6640. VALUEOFF NUMERIC 1
  6641. END POLICY
  6642. POLICY !!MMC_ResultantSetOfPolicySnapIn
  6643. KEYNAME "Software\Policies\Microsoft\MMC\{6DC3804B-7212-458D-ADB0-9A07E2AE1FA2}"
  6644. #if version >= 4
  6645. SUPPORTED !!SUPPORTED_WindowsXP
  6646. #endif
  6647. EXPLAIN !!MMC_Restrict_Explain
  6648. VALUENAME "Restrict_Run"
  6649. VALUEON NUMERIC 0
  6650. VALUEOFF NUMERIC 1
  6651. END POLICY
  6652. CATEGORY !!MMC_GroupPolicy_GPSnapin
  6653. #if version >= 4
  6654. EXPLAIN !!MMC_GroupPolicy_GPSnapin_Help
  6655. #endif
  6656. POLICY !!MMC_ADMComputers
  6657. KEYNAME "Software\Policies\Microsoft\MMC\{0F6B957D-509E-11D1-A7CC-0000F87571E3}"
  6658. #if version >= 4
  6659. SUPPORTED !!SUPPORTED_Win2k
  6660. #endif
  6661. EXPLAIN !!MMC_Restrict_Explain
  6662. VALUENAME "Restrict_Run"
  6663. VALUEON NUMERIC 0
  6664. VALUEOFF NUMERIC 1
  6665. END POLICY
  6666. POLICY !!MMC_ADMUsers
  6667. KEYNAME "Software\Policies\Microsoft\MMC\{0F6B957E-509E-11D1-A7CC-0000F87571E3}"
  6668. #if version >= 4
  6669. SUPPORTED !!SUPPORTED_Win2k
  6670. #endif
  6671. EXPLAIN !!MMC_Restrict_Explain
  6672. VALUENAME "Restrict_Run"
  6673. VALUEON NUMERIC 0
  6674. VALUEOFF NUMERIC 1
  6675. END POLICY
  6676. POLICY !!MMC_FolderRedirection
  6677. KEYNAME "Software\Policies\Microsoft\MMC\{88E729D6-BDC1-11D1-BD2A-00C04FB9603F}"
  6678. #if version >= 4
  6679. SUPPORTED !!SUPPORTED_Win2k
  6680. #endif
  6681. EXPLAIN !!MMC_Restrict_Explain
  6682. VALUENAME "Restrict_Run"
  6683. VALUEON NUMERIC 0
  6684. VALUEOFF NUMERIC 1
  6685. END POLICY
  6686. POLICY !!MMC_IEMaintenance
  6687. KEYNAME "Software\Policies\Microsoft\MMC\{FC715823-C5FB-11D1-9EEF-00A0C90347FF}"
  6688. #if version >= 4
  6689. SUPPORTED !!SUPPORTED_Win2k
  6690. #endif
  6691. EXPLAIN !!MMC_Restrict_Explain
  6692. VALUENAME "Restrict_Run"
  6693. VALUEON NUMERIC 0
  6694. VALUEOFF NUMERIC 1
  6695. END POLICY
  6696. POLICY !!MMC_RIS
  6697. KEYNAME "Software\Policies\Microsoft\MMC\{3060E8CE-7020-11D2-842D-00C04FA372D4}"
  6698. #if version >= 4
  6699. SUPPORTED !!SUPPORTED_Win2k
  6700. #endif
  6701. EXPLAIN !!MMC_Restrict_Explain
  6702. VALUENAME "Restrict_Run"
  6703. VALUEON NUMERIC 0
  6704. VALUEOFF NUMERIC 1
  6705. END POLICY
  6706. POLICY !!MMC_ScriptsUser
  6707. KEYNAME "Software\Policies\Microsoft\MMC\{40B66650-4972-11D1-A7CA-0000F87571E3}"
  6708. #if version >= 4
  6709. SUPPORTED !!SUPPORTED_Win2k
  6710. #endif
  6711. EXPLAIN !!MMC_Restrict_Explain
  6712. VALUENAME "Restrict_Run"
  6713. VALUEON NUMERIC 0
  6714. VALUEOFF NUMERIC 1
  6715. END POLICY
  6716. POLICY !!MMC_ScriptsMachine
  6717. KEYNAME "Software\Policies\Microsoft\MMC\{40B6664F-4972-11D1-A7CA-0000F87571E3}"
  6718. #if version >= 4
  6719. SUPPORTED !!SUPPORTED_Win2k
  6720. #endif
  6721. EXPLAIN !!MMC_Restrict_Explain
  6722. VALUENAME "Restrict_Run"
  6723. VALUEON NUMERIC 0
  6724. VALUEOFF NUMERIC 1
  6725. END POLICY
  6726. POLICY !!MMC_SecuritySettings
  6727. KEYNAME "Software\Policies\Microsoft\MMC\{803E14A0-B4FB-11D0-A0D0-00A0C90F574B}"
  6728. #if version >= 4
  6729. SUPPORTED !!SUPPORTED_Win2k
  6730. #endif
  6731. EXPLAIN !!MMC_Restrict_Explain
  6732. VALUENAME "Restrict_Run"
  6733. VALUEON NUMERIC 0
  6734. VALUEOFF NUMERIC 1
  6735. END POLICY
  6736. POLICY !!MMC_SoftwareInstalationComputers
  6737. KEYNAME "Software\Policies\Microsoft\MMC\{942A8E4F-A261-11D1-A760-00C04FB9603F}"
  6738. #if version >= 4
  6739. SUPPORTED !!SUPPORTED_Win2k
  6740. #endif
  6741. EXPLAIN !!MMC_Restrict_Explain
  6742. VALUENAME "Restrict_Run"
  6743. VALUEON NUMERIC 0
  6744. VALUEOFF NUMERIC 1
  6745. END POLICY
  6746. POLICY !!MMC_SoftwareInstallationUsers
  6747. KEYNAME "Software\Policies\Microsoft\MMC\{BACF5C8A-A3C7-11D1-A760-00C04FB9603F}"
  6748. #if version >= 4
  6749. SUPPORTED !!SUPPORTED_Win2k
  6750. #endif
  6751. EXPLAIN !!MMC_Restrict_Explain
  6752. VALUENAME "Restrict_Run"
  6753. VALUEON NUMERIC 0
  6754. VALUEOFF NUMERIC 1
  6755. END POLICY
  6756. POLICY !!MMC_WirelessNetworkPolicy
  6757. KEYNAME "Software\Policies\Microsoft\MMC\{2DA6AA7F-8C88-4194-A558-0D36E7FD3E64}"
  6758. #if version >= 4
  6759. SUPPORTED !!SUPPORTED_Win2k
  6760. #endif
  6761. EXPLAIN !!MMC_Restrict_Explain
  6762. VALUENAME "Restrict_Run"
  6763. VALUEON NUMERIC 0
  6764. VALUEOFF NUMERIC 1
  6765. END POLICY
  6766. END CATEGORY ;; MMC_GroupPolicy_GPSnapin
  6767. CATEGORY !!MMC_GroupPolicy_RSoPSnapin
  6768. #if version >= 4
  6769. EXPLAIN !!MMC_GroupPolicy_RSoPSnapin_Help
  6770. #endif
  6771. POLICY !!MMC_ADMComputers
  6772. KEYNAME "Software\Policies\Microsoft\MMC\{B6F9C8AE-EF3A-41C8-A911-37370C331DD4}"
  6773. #if version >= 4
  6774. SUPPORTED !!SUPPORTED_WindowsXP
  6775. #endif
  6776. EXPLAIN !!MMC_Restrict_Explain
  6777. VALUENAME "Restrict_Run"
  6778. VALUEON NUMERIC 0
  6779. VALUEOFF NUMERIC 1
  6780. END POLICY
  6781. POLICY !!MMC_ADMUsers
  6782. KEYNAME "Software\Policies\Microsoft\MMC\{B6F9C8AF-EF3A-41C8-A911-37370C331DD4}"
  6783. #if version >= 4
  6784. SUPPORTED !!SUPPORTED_WindowsXP
  6785. #endif
  6786. EXPLAIN !!MMC_Restrict_Explain
  6787. VALUENAME "Restrict_Run"
  6788. VALUEON NUMERIC 0
  6789. VALUEOFF NUMERIC 1
  6790. END POLICY
  6791. POLICY !!MMC_FolderRedirection
  6792. KEYNAME "Software\Policies\Microsoft\MMC\{c40d66a0-e90c-46c6-aa3b-473e38c72bf2}"
  6793. #if version >= 4
  6794. SUPPORTED !!SUPPORTED_WindowsXP
  6795. #endif
  6796. EXPLAIN !!MMC_Restrict_Explain
  6797. VALUENAME "Restrict_Run"
  6798. VALUEON NUMERIC 0
  6799. VALUEOFF NUMERIC 1
  6800. END POLICY
  6801. POLICY !!MMC_IEMaintenance
  6802. KEYNAME "Software\Policies\Microsoft\MMC\{d524927d-6c08-46bf-86af-391534d779d3}"
  6803. #if version >= 4
  6804. SUPPORTED !!SUPPORTED_WindowsXP
  6805. #endif
  6806. EXPLAIN !!MMC_Restrict_Explain
  6807. VALUENAME "Restrict_Run"
  6808. VALUEON NUMERIC 0
  6809. VALUEOFF NUMERIC 1
  6810. END POLICY
  6811. POLICY !!MMC_ScriptsUser
  6812. KEYNAME "Software\Policies\Microsoft\MMC\{40B66661-4972-11d1-A7CA-0000F87571E3}"
  6813. #if version >= 4
  6814. SUPPORTED !!SUPPORTED_WindowsXP
  6815. #endif
  6816. EXPLAIN !!MMC_Restrict_Explain
  6817. VALUENAME "Restrict_Run"
  6818. VALUEON NUMERIC 0
  6819. VALUEOFF NUMERIC 1
  6820. END POLICY
  6821. POLICY !!MMC_ScriptsMachine
  6822. KEYNAME "Software\Policies\Microsoft\MMC\{40B66660-4972-11d1-A7CA-0000F87571E3}"
  6823. #if version >= 4
  6824. SUPPORTED !!SUPPORTED_WindowsXP
  6825. #endif
  6826. EXPLAIN !!MMC_Restrict_Explain
  6827. VALUENAME "Restrict_Run"
  6828. VALUEON NUMERIC 0
  6829. VALUEOFF NUMERIC 1
  6830. END POLICY
  6831. POLICY !!MMC_SecuritySettings
  6832. KEYNAME "Software\Policies\Microsoft\MMC\{fe883157-cebd-4570-b7a2-e4fe06abe626}"
  6833. #if version >= 4
  6834. SUPPORTED !!SUPPORTED_WindowsXP
  6835. #endif
  6836. EXPLAIN !!MMC_Restrict_Explain
  6837. VALUENAME "Restrict_Run"
  6838. VALUEON NUMERIC 0
  6839. VALUEOFF NUMERIC 1
  6840. END POLICY
  6841. POLICY !!MMC_SoftwareInstalationComputers
  6842. KEYNAME "Software\Policies\Microsoft\MMC\{7E45546F-6D52-4D10-B702-9C2E67232E62}"
  6843. #if version >= 4
  6844. SUPPORTED !!SUPPORTED_WindowsXP
  6845. #endif
  6846. EXPLAIN !!MMC_Restrict_Explain
  6847. VALUENAME "Restrict_Run"
  6848. VALUEON NUMERIC 0
  6849. VALUEOFF NUMERIC 1
  6850. END POLICY
  6851. POLICY !!MMC_SoftwareInstallationUsers
  6852. KEYNAME "Software\Policies\Microsoft\MMC\{1BC972D6-555C-4FF7-BE2C-C584021A0A6A}"
  6853. #if version >= 4
  6854. SUPPORTED !!SUPPORTED_WindowsXP
  6855. #endif
  6856. EXPLAIN !!MMC_Restrict_Explain
  6857. VALUENAME "Restrict_Run"
  6858. VALUEON NUMERIC 0
  6859. VALUEOFF NUMERIC 1
  6860. END POLICY
  6861. END CATEGORY ;; MMC_GroupPolicy_RSOPSnapin
  6862. END CATEGORY ;; MMC_GroupPolicy
  6863. END CATEGORY ;; MMC_RESTRICT
  6864. END CATEGORY ;; MMC
  6865. CATEGORY !!TaskScheduler
  6866. #if version >= 4
  6867. EXPLAIN !!TaskScheduler_Help
  6868. #endif
  6869. KEYNAME "Software\Policies\Microsoft\Windows\Task Scheduler5.0"
  6870. POLICY !!PropertyPages
  6871. EXPLAIN !!PropertyPagesHelp
  6872. #if version >= 4
  6873. SUPPORTED !!SUPPORTED_Win2k
  6874. #endif
  6875. VALUENAME "Property Pages"
  6876. END POLICY
  6877. POLICY !!Execution
  6878. #if version >= 4
  6879. SUPPORTED !!SUPPORTED_Win2k
  6880. #endif
  6881. EXPLAIN !!ExecutionHelp
  6882. VALUENAME "Execution"
  6883. END POLICY
  6884. POLICY !!DragAndDrop
  6885. #if version >= 4
  6886. SUPPORTED !!SUPPORTED_Win2k
  6887. #endif
  6888. EXPLAIN !!DragAndDropHelp
  6889. VALUENAME "DragAndDrop"
  6890. END POLICY
  6891. POLICY !!TaskCreation
  6892. #if version >= 4
  6893. SUPPORTED !!SUPPORTED_Win2k
  6894. #endif
  6895. EXPLAIN !!TaskCreationHelp
  6896. VALUENAME "Task Creation"
  6897. END POLICY
  6898. POLICY !!TaskDeletion
  6899. #if version >= 4
  6900. SUPPORTED !!SUPPORTED_Win2k
  6901. #endif
  6902. EXPLAIN !!TaskDeletionHelp
  6903. VALUENAME "Task Deletion"
  6904. END POLICY
  6905. POLICY !!DisableAdvanced
  6906. #if version >= 4
  6907. SUPPORTED !!SUPPORTED_Win2k
  6908. #endif
  6909. EXPLAIN !!DisableAdvancedHelp
  6910. VALUENAME "Disable Advanced"
  6911. END POLICY
  6912. POLICY !!AllowBrowse
  6913. #if version >= 4
  6914. SUPPORTED !!SUPPORTED_Win2k
  6915. #endif
  6916. EXPLAIN !!AllowBrowseHelp
  6917. VALUENAME "Allow Browse"
  6918. END POLICY
  6919. END CATEGORY ;Task Scheduler
  6920. CATEGORY !!TS_GP_NODE
  6921. #if version >= 4
  6922. EXPLAIN !!TS_User_Help
  6923. #endif
  6924. KEYNAME "SOFTWARE\Policies\Microsoft\Windows NT\Terminal Services"
  6925. POLICY !!TS_START_PROGRAM
  6926. #if version >= 4
  6927. SUPPORTED !!TS_SUPPORTED_WindowsXP
  6928. #endif
  6929. EXPLAIN !!TS_START_PROGRAM_EXPLAIN
  6930. PART !!TS_PROGRAM_NAME EDITTEXT REQUIRED
  6931. VALUENAME "InitialProgram"
  6932. END PART
  6933. PART !!TS_WORKDIR EDITTEXT
  6934. VALUENAME "WorkDirectory"
  6935. END PART
  6936. VALUENAME "fInheritInitialProgram"
  6937. END POLICY
  6938. CATEGORY !!TS_Sessions
  6939. #if version >= 4
  6940. EXPLAIN !!TS_Sessions_User_Help
  6941. #endif
  6942. POLICY !!TS_Sessions_Disconnected_Timeout
  6943. #if version >= 4
  6944. SUPPORTED !!TS_SUPPORTED_WindowsXP
  6945. #endif
  6946. EXPLAIN !!TS_SESSIONS_DISCONNECTED_TIMEOUT_EXPLAIN
  6947. ACTIONLISTOFF
  6948. VALUENAME "MaxDisconnectionTime" VALUE "0"
  6949. END ACTIONLISTOFF
  6950. PART !!TS_Sessions_EndDisconnected DROPDOWNLIST NOSORT
  6951. VALUENAME "MaxDisconnectionTime"
  6952. ITEMLIST
  6953. NAME !!TS_TIME_NEVER VALUE NUMERIC 0 DEFAULT
  6954. NAME !!TS_TIME_1MIN VALUE NUMERIC 60000
  6955. NAME !!TS_TIME_5MIN VALUE NUMERIC 300000
  6956. NAME !!TS_TIME_10MIN VALUE NUMERIC 600000
  6957. NAME !!TS_TIME_15MIN VALUE NUMERIC 900000
  6958. NAME !!TS_TIME_30MIN VALUE NUMERIC 1800000
  6959. NAME !!TS_TIME_1HR VALUE NUMERIC 3600000
  6960. NAME !!TS_TIME_2HR VALUE NUMERIC 7200000
  6961. NAME !!TS_TIME_3HR VALUE NUMERIC 10800000
  6962. NAME !!TS_TIME_1DAY VALUE NUMERIC 86400000
  6963. NAME !!TS_TIME_2DAY VALUE NUMERIC 172800000
  6964. END ITEMLIST
  6965. END PART
  6966. END POLICY
  6967. POLICY !!TS_Sessions_Limits
  6968. #if version >= 4
  6969. SUPPORTED !!TS_SUPPORTED_WindowsXP
  6970. #endif
  6971. EXPLAIN !!TS_SESSIONS_LIMITS_EXPLAIN
  6972. PART !!TS_Sessions_ActiveLimit DROPDOWNLIST NOSORT
  6973. VALUENAME "MaxConnectionTime"
  6974. ITEMLIST
  6975. NAME !!TS_TIME_NEVER VALUE NUMERIC 0 DEFAULT
  6976. NAME !!TS_TIME_1MIN VALUE NUMERIC 60000
  6977. NAME !!TS_TIME_5MIN VALUE NUMERIC 300000
  6978. NAME !!TS_TIME_10MIN VALUE NUMERIC 600000
  6979. NAME !!TS_TIME_15MIN VALUE NUMERIC 900000
  6980. NAME !!TS_TIME_30MIN VALUE NUMERIC 1800000
  6981. NAME !!TS_TIME_1HR VALUE NUMERIC 3600000
  6982. NAME !!TS_TIME_2HR VALUE NUMERIC 7200000
  6983. NAME !!TS_TIME_3HR VALUE NUMERIC 10800000
  6984. NAME !!TS_TIME_1DAY VALUE NUMERIC 86400000
  6985. NAME !!TS_TIME_2DAY VALUE NUMERIC 172800000
  6986. END ITEMLIST
  6987. END PART
  6988. END POLICY
  6989. POLICY !!TS_Sessions_Idle_Limit
  6990. #if version >= 4
  6991. SUPPORTED !!TS_SUPPORTED_WindowsXP
  6992. #endif
  6993. EXPLAIN !!TS_SESSIONS_IDLE_LIMIT_EXPLAIN
  6994. PART !!TS_Sessions_IdleLimitText DROPDOWNLIST NOSORT
  6995. VALUENAME "MaxIdleTime" REQUIRED
  6996. ITEMLIST
  6997. NAME !!TS_TIME_NEVER VALUE NUMERIC 0 DEFAULT
  6998. NAME !!TS_TIME_1MIN VALUE NUMERIC 60000
  6999. NAME !!TS_TIME_5MIN VALUE NUMERIC 300000
  7000. NAME !!TS_TIME_10MIN VALUE NUMERIC 600000
  7001. NAME !!TS_TIME_15MIN VALUE NUMERIC 900000
  7002. NAME !!TS_TIME_30MIN VALUE NUMERIC 1800000
  7003. NAME !!TS_TIME_1HR VALUE NUMERIC 3600000
  7004. NAME !!TS_TIME_2HR VALUE NUMERIC 7200000
  7005. NAME !!TS_TIME_3HR VALUE NUMERIC 10800000
  7006. NAME !!TS_TIME_1DAY VALUE NUMERIC 86400000
  7007. NAME !!TS_TIME_2DAY VALUE NUMERIC 172800000
  7008. END ITEMLIST
  7009. END PART
  7010. END POLICY
  7011. POLICY !!TS_Sessions_Reconnect_Same
  7012. #if version >= 4
  7013. SUPPORTED !!TS_SUPPORTED_WindowsXP
  7014. #endif
  7015. EXPLAIN !!TS_SESSIONS_RECONNECT_SAME_EXPLAIN
  7016. VALUENAME "fReconnectSame"
  7017. VALUEON NUMERIC 1
  7018. VALUEOFF NUMERIC 0
  7019. END POLICY
  7020. POLICY !!TS_Session_End_On_Limit
  7021. #if version >= 4
  7022. SUPPORTED !!TS_SUPPORTED_WindowsXP
  7023. #endif
  7024. EXPLAIN !!TS_SESSION_END_ON_LIMIT_EXPLAIN
  7025. VALUENAME "fResetBroken"
  7026. VALUEON NUMERIC 1
  7027. VALUEOFF NUMERIC 0
  7028. END POLICY
  7029. END CATEGORY
  7030. POLICY !!TS_RemoteControl
  7031. #if version >= 4
  7032. SUPPORTED !!TS_SUPPORTED_WindowsXP
  7033. #endif
  7034. EXPLAIN !!TS_RemoteControl_EXPLAIN
  7035. PART !!TS_RemoteControl_Levels DROPDOWNLIST NOSORT
  7036. VALUENAME "Shadow"
  7037. ITEMLIST
  7038. NAME !!TS_RemoteControl_0 VALUE NUMERIC 0 DEFAULT
  7039. NAME !!TS_RemoteControl_1 VALUE NUMERIC 1
  7040. NAME !!TS_RemoteControl_2 VALUE NUMERIC 2
  7041. NAME !!TS_RemoteControl_3 VALUE NUMERIC 3
  7042. NAME !!TS_RemoteControl_4 VALUE NUMERIC 4
  7043. END ITEMLIST
  7044. END PART
  7045. END POLICY
  7046. END CATEGORY ; TS_GP_NODE
  7047. CATEGORY !!MSI
  7048. #if version >= 4
  7049. EXPLAIN !!MSI_Help
  7050. #endif
  7051. KEYNAME "Software\Policies\Microsoft\Windows\Installer"
  7052. POLICY !!AlwaysInstallElevated
  7053. #if version >= 4
  7054. SUPPORTED !!SUPPORTED_Win2k
  7055. #endif
  7056. EXPLAIN !!AlwaysInstallElevated_Help
  7057. VALUENAME "AlwaysInstallElevated"
  7058. VALUEON NUMERIC 1
  7059. VALUEOFF NUMERIC 0
  7060. PART !!Blank TEXT
  7061. END PART
  7062. PART !!UserANDMachineT TEXT
  7063. END PART
  7064. END POLICY
  7065. POLICY !!SearchOrder
  7066. #if version >= 4
  7067. SUPPORTED !!SUPPORTED_Win2k
  7068. #endif
  7069. EXPLAIN !!SearchOrder_Help
  7070. PART !!SearchOrder EDITTEXT
  7071. VALUENAME "SearchOrder"
  7072. DEFAULT nmu
  7073. END PART
  7074. PART !!SearchOrderT1 TEXT
  7075. END PART
  7076. PART !!SearchOrderT2 TEXT
  7077. END PART
  7078. END POLICY
  7079. POLICY !!DisableRollback
  7080. #if version >= 4
  7081. SUPPORTED !!SUPPORTED_Win2k
  7082. #endif
  7083. EXPLAIN !!DisableRollback_Help
  7084. VALUENAME "DisableRollback"
  7085. VALUEON NUMERIC 1
  7086. VALUEOFF NUMERIC 0
  7087. PART !!Blank TEXT
  7088. END PART
  7089. PART !!UserORMachineT TEXT
  7090. END PART
  7091. END POLICY
  7092. POLICY !!DisableMedia
  7093. #if version >= 4
  7094. SUPPORTED !!SUPPORTED_Win2k
  7095. #endif
  7096. EXPLAIN !!DisableMedia_Help
  7097. VALUENAME "DisableMedia"
  7098. VALUEON NUMERIC 1
  7099. VALUEOFF NUMERIC 0
  7100. END POLICY
  7101. END CATEGORY ; MSI
  7102. CATEGORY !!WinMSG_WindowsMsg
  7103. #if version >= 4
  7104. EXPLAIN !!WinMSG_WindowsMsg_Help
  7105. #endif
  7106. KEYNAME "Software\Policies\Microsoft\Messenger\Client"
  7107. POLICY !!WinMSG_NoWindowsMsg_User
  7108. #if version >= 4
  7109. SUPPORTED !!SUPPORTED_WindowsXP
  7110. #endif
  7111. EXPLAIN !!WinMSG_NoWindowsMsg_Help
  7112. VALUENAME "PreventRun"
  7113. VALUEON NUMERIC 1
  7114. VALUEOFF NUMERIC 0
  7115. END POLICY
  7116. POLICY !!WinMSG_NoAutoStartWindowsMsg_User
  7117. #if version >= 4
  7118. SUPPORTED !!SUPPORTED_WindowsXP
  7119. #endif
  7120. EXPLAIN !!WinMSG_NoAutoStartWindowsMsg_Help
  7121. VALUENAME "PreventAutoRun"
  7122. VALUEON NUMERIC 1
  7123. VALUEOFF NUMERIC 0
  7124. END POLICY
  7125. END CATEGORY ; WindowsMsg
  7126. CATEGORY !!WindowsUpdateCat
  7127. #if version >= 4
  7128. EXPLAIN !!WindowsUpdateCat_Help
  7129. #endif
  7130. KEYNAME "Software\Microsoft\Windows\CurrentVersion\Policies\WindowsUpdate"
  7131. POLICY !!RemoveWindowsUpdate
  7132. #if version >= 4
  7133. SUPPORTED !!SUPPORTED_WindowsXP
  7134. #endif
  7135. EXPLAIN !!RemoveWindowsUpdate_Help
  7136. VALUENAME "DisableWindowsUpdateAccess"
  7137. END POLICY
  7138. END CATEGORY ;; WindowsUpdateCat
  7139. END CATEGORY ;; WindowsComponents
  7140. #endif
  7141. [strings]
  7142. ABCDOnly="Restrict A, B, C and D drives only"
  7143. ABConly="Restrict A, B and C drives only"
  7144. ABOnly="Restrict A and B drives only"
  7145. ActiveDesktop="Active Desktop"
  7146. ActiveDirectory="Active Directory"
  7147. AD_EnableFilter="Enable filter in Find dialog box"
  7148. AD_EnableFilter_Help="Displays the filter bar above the results of an Active Directory search. The filter bar consists of buttons for applying additional filters to search results.\n\nIf you enable this setting, the filter bar appears when the Active Directory Find dialog box opens, but users can hide it.\n\nIf you disable this setting or do not configure it, the filter bar does not appear, but users can display it by selecting "Filter" on the "View" menu.\n\nTo see the filter bar, open My Network Places, click Entire Network, and then click Directory. Right-click the name of a Windows domain, and click Find. Type the name of an object in the directory, such as "Administrator." If the filter bar does not appear above the resulting display, on the View menu, click Filter."
  7149. AD_HideDirectoryFolder="Hide Active Directory folder"
  7150. AD_HideDirectoryFolder_Help="Hides the Active Directory folder in My Network Places.\n\nThe Active Directory folder displays Active Directory objects in a browse window.\n\nIf you enable this setting, the Active Directory folder does not appear in the My Network Places folder.\n\nIf you disable this setting or do not configure it, the Active Directory folder appears in the My Network Places folder.\n\nThis setting is designed to let users search Active Directory but not tempt them to casually browse Active Directory."
  7151. AD_QueryLimit="Maximum size of Active Directory searches"
  7152. AD_QueryLimit_Box="Number of objects returned: "
  7153. AD_QueryLimit_Help="Specifies the maximum number of objects the system displays in response to a command to browse or search Active Directory. This setting affects all browse displays associated with Active Directory, such as those in Local Users and Groups, Active Directory Users and Computers, and dialog boxes used to set permissions for user or group objects in Active Directory.\n\nIf you enable this setting, you can use the "Number of objects returned" box to limit returns from an Active Directory search.\n\nIf you disable this setting or do not configure it, the system displays up to 10,000 objects. This consumes approximately 2 MB of memory or disk space.\n\nThis setting is designed to protect the network and the domain controller from the effect of expansive searches."
  7154. AddAdminGroupToRUP="Add the Administrators security group to roaming user profiles"
  7155. AddAdminGroupToRUP_Help="This setting adds the Administrator security group to the roaming user profile share.\n\nOnce an administrator has configured a users' roaming profile, the profile will be created at the user's next login. The profile is created at the location that is specified by the administrator.\n\nFor the Windows 2000 Professional and Windows XP Professional operating systems, the default file permissions for the newly generated profile are full control, or read and write access for the user, and no file access for the administrators group.\n\nBy configuring this setting, you can alter this behavior.\n\nIf you enable this setting, the administrator group is also given full control to the user's profile folder.\n\nIf you disable or do not configure it, only the user is given full control of their user profile, and the administrators group has no file system access to this folder.\n\nNote: If the setting is enabled after the profile is created, the setting has no effect.\n\nNote: The setting must be configured on the client computer, not the server, for it to have any effect, because the client computer sets the file share permissions for the roaming profile at creation time.\n\nNote: In the default case, administrators have no file access to the user's profile, but they may still take ownership of this folder to grant themselves file permissions.\n\nNote: The behavior when this setting is enabled is exactly the same behavior as in Windows NT 4.0."
  7156. AdminComponents_Help="Adds and deletes specified Web content items.\n\nYou can use the "Add" box in this setting to add particular Web-based items or shortcuts to users' desktops. Users can close or delete the items (if settings allow), but the items are added again each time the setting is refreshed.\n\nYou can also use this setting to delete particular Web-based items from users' desktops. Users can add the item again (if settings allow), but the item is deleted each time the setting is refreshed.\n\nNote: Removing an item from the "Add" list for this setting is not the same as deleting it. Items that are removed from the "Add" list are not removed from the desktop. They are simply not added again.\n\nNote: For this setting to take affect, you must log off and log on to the system."
  7157. AdministrativeServices="System"
  7158. ALLDrives="Restrict all drives"
  7159. AllowBrowse="Prohibit Browse"
  7160. AllowBrowseHelp="Limits newly scheduled to items on the user's Start menu, and prevents the user from changing the scheduled program for existing tasks.\n\nThis setting removes the Browse button from the Schedule Task Wizard and from the Task tab of the properties dialog box for a task. Also, users cannot edit the "Run" box or the "Start in" box that determine the program and path for a task.\n\nAs a result, when users create a task, they must select a program from the list in the Scheduled Task Wizard, which displays only the tasks that appear on the Start menu and its submenus. Once a task is created, users cannot change the program a task runs.\n\nImportant: This setting does not prevent users from creating a new task by pasting or dragging any program into the Scheduled Tasks folder. To prevent this action, use the "Prohibit Drag-and-Drop" setting.\n\nNote: This setting appears in the Computer Configuration and User Configuration folders. If both settings are configured, the setting in Computer Configuration takes precedence over the setting in User Configuration."
  7161. AllowLockdownBrowse_Help="Allows users to search for installation files during privileged installations.\n\nThis setting enables the Browse button in the "Use feature from" dialog box. As a result, users can search for installation files, even when the installation program is running with elevated system privileges. By default, only system administrators can browse during installations with elevated privileges, such as installations offered on the desktop or displayed in Add or Remove Programs.\n\nBecause the installation is running with elevated system privileges, users can browse through directories that their own permissions would not allow.\n\nThis setting does not affect installations that run in the user's security context. Also, see the "Remove browse dialog box for new source" setting."
  7162. AllowLockdownBrowse="Enable user to browse for source while elevated"
  7163. AllowLockdownMedia_Help="Allows users to install programs from removable media, such as floppy disks and CD-ROMs, during privileged installations.\n\nThis setting permits all users to install programs from removable media, even when the installation program is running with elevated system privileges. By default, users can install programs from removable media only when the installation runs in the user's security context. During privileged installations, such as those offered on the desktop or displayed in Add or Remove Programs, only system administrators can install from removable media.\n\nThis setting does not affect installations that run in the user's security context. By default, users can install from removable media when the installation runs in their own security context.\n\nAlso, see the "Prevent removable media source for any install" setting in User Configuration\Administrative Templates\Windows Components\Windows Installer."
  7164. AllowLockdownMedia="Enable user to use media source while elevated"
  7165. AllowLockdownPatch_Help="Allows users to upgrade programs during privileged installations.\n\nThis setting permits all users to install patches, even when the installation program is running with elevated system privileges. Patches are updates or upgrades that replace only those program files that have changed. Because patches can easily be vehicles for malicious programs, some installations prohibit their use.\n\nBy default, only system administrators can apply patches during installations with elevated privileges, such as installations offered on the desktop or displayed in Add or Remove Programs.\n\nThis setting does not affect installations that run in the user's security context. By default, users can install patches to programs that run in their own security context. Also, see the "Prohibit patching" setting."
  7166. AllowLockdownPatch="Enable user to patch elevated products"
  7167. AllowWebPrinting_Help="Determines whether Internet printing is activated on this server.\n\nInternet printing lets you display printers on Web pages so the printers can be viewed, managed, and used across the Internet or an intranet.\n\nInternet printing is and extension of the Internet Information Server. IIS must be installed and the printing support must be enabled in order to use Internet Printing as well as this policy.\n\nNote: This setting affects the server side of Internet printing only. It does not prevent the print client on the computer from printing across the Internet.\n\nAlso, see the "Custom support URL in the Printers folder's left pane" setting in this folder and the "Browse a common web site to find printers" setting in User Configuration\Administrative Templates\Control Panel\Printers."
  7168. AllowWebPrinting="Web-based printing"
  7169. AllowWebPrinting_SupportedOn="Windows 2000 or later, running IIS. Not supported on Windows Server 2003"
  7170. AllowX-ForestPolicy-and-RUP ="Allow Cross-Forest User Policy and Roaming User Profiles"
  7171. AllowX-ForestPolicy-and-RUP_Help="Allows User based policy processing, Roaming User Profiles and User Object logon scripts for cross forest interactive logons.\n\nThis setting affects all user accounts interactively logging on to a computer in a different forest when a Cross Forest or 2-Way Forest trust exists.\n\nWhen this setting is Not Configured:\n- No user based policy settings are applied from the user's forest\n- User will not receive their roaming profiles, they will receive a local profile on the computer from the local forest. A warning message will be shown to the user, and an Event Log message (1529) will be posted.\n- Loopback Group Policy processing will be applied, using the Group Policy Objects scoped to the machine.\n- An Event Log message (1109) will be posted stating that Loopback was invoked in replace mode.\n\nWhen this setting is Enabled, the behavior is exactly the same as with Windows 2000 Server Family, User policy is applied and a roaming user profile is allowed from the trusted forest.\n\nWhen this setting is Disabled, the behavior is the same as Not Configured."
  7172. AlwaysInstallElevated_Help="Directs Windows Installer to use system permissions when it installs any program on the system.\n\nThis setting extends elevated privileges to all programs. These privileges are usually reserved for programs that have been assigned to the user (offered on the desktop), assigned to the computer (installed automatically), or made available in Add or Remove Programs in Control Panel. This setting lets users install programs that require access to directories that the user might not have permission to view or change, including directories on highly restricted computers.\n\nIf you disable this setting or do not configure it, the system applies the current user's permissions when it installs programs that a system administrator does not distribute or offer.\n\nNote: This setting appears both in the Computer Configuration and User Configuration folders. To make this setting effective, you must enable the setting in both folders.\n\nCaution: Skilled users can take advantage of the permissions this setting grants to change their privileges and gain permanent access to restricted files and folders. Note that the User Configuration version of this setting is not guaranteed to be secure."
  7173. AlwaysInstallElevated="Always install with elevated privileges"
  7174. AppCompat="Application Compatibility"
  7175. AppCompat_Help=""
  7176. AppCompatTurnOffEngine="Turn Off Application Compatibility Engine"
  7177. AppCompat_TurnOffEngine_Help=" This policy controls the state of the application compatibility engine in the system.\n\nThe engine is part of the loader and looks through a compatibility database every time an application is started on the system. If a match for the application is found it provides either run-time solutions or compatibility fixes, or displays an Application Help message if the application has a know problem.\n\nTurning off the application compatibility engine will boost system performance. However, this will degrade the compatibility of many popular legacy applications, and will not block known incompatible applications from installing. (For Instance: This may result in a blue screen if an old anti-virus application is installed.)\n\nThis option is useful to server administrators who require faster performance and are aware of the compatibility of the applications they are using. It is particularly useful for a web server where applications may be launched several hundred times a second, and the performance of the loader is essential."
  7178. AppCompatTurnOffProgramCompatWizard="Turn Off Program Compatibility Wizard"
  7179. AppCompat_TurnOffProgramCompatWizard_Help="This policy controls the state of the Program Compatibility Wizard.\n\nWhen enabled, this policy disables the start page of the wizard in the Help and Support Center, and in the Start Menu.\n\nThese entry points will still exist but the first page of the Help and Support Center wizard will let the user know that this option has been disabled."
  7180. AppCompatRemoveProgramCompatPropPage="Remove Program Compatibility Property Page"
  7181. AppCompat_RemoveProgramCompatPropPage_Help="This policy controls the visibility of the Program Compatibility property page shell extension. This shell extension is visible on the property context-menu of any program shortcut or executable file.\n\nThe compatibility property page displays a list of options that can be selected and applied to the application to resolve the most common issues affecting legacy applications. Enabling this policy setting removes the property page from the context-menus, but does not affect previous compatibility settings applied to application using this interface."
  7182. AppCompatTurnOffAppLogEvents="Turn On Application Help Log Events"
  7183. AppCompat_TurnOffAppLogEvents_Help="The Application Help features blocks known incompatible applications and displays a dialog to the end-user regarding the problem. This dialog may include links to the web for downloading updates for the application, manual steps to work around an issue, or basic incompatibility information.\n\nEnabling this option turns on logging of Application Help events to the Application log."
  7184. AppCompatPrevent16Bit="Prevent access to 16-bit applications"
  7185. AppCompat_Prevent16Bit_Help="Specifies whether to prevent the MS-DOS subsystem (ntvdm.exe) from running for all users. This setting affects the launching of 16-bit applications in the operating system. By default, the MS-DOS subsystem runs for all users.\n\nYou can use this setting to turn off the MS-DOS subsystem, which will reduce resource usage and prevent users from running 16-bit applications. To run any 16-bit application or any application with 16-bit components, ntvdm.exe must be allowed to run. The MS-DOS subsystem starts when the first 16-bit application is launched. While the process is running, any subsequent 16-bit applications launch faster, but overall resource usage on the system is increased.\n\nIf the status is set to Enabled, ntvdm.exe is prevented from running, which then prevents any 16-bit applications from running. In addition, any 32-bit applications with 16-bit installers or other 16-bit components cannot run.\n\nIf the status is set to Disabled, the default setting applies and the MS-DOS subsystem runs for all users.\n\nIf the status is set to Not Configured, the default applies and ntvdm.exe runs for all users. However, if an administrator sets the registry DWORD value HKLM\System\CurrentControlSet\Control\WOW\DisallowedPolicyDefault to 1, the default changes to prevent all 16-bit applications from running.\n\nNote: This setting appears in both Computer Configuration and User Configuration. If both settings are configured, the Computer Configuration setting overrides."
  7186. AppCompatPrevent16BitMach="Prevent access to 16-bit applications"
  7187. AppCompat_Prevent16BitMach_Help="Specifies whether to prevent the MS-DOS subsystem (ntvdm.exe) from running on this computer. This setting affects the launching of 16-bit applications in the operating system. By default, the MS-DOS subsystem runs for all users on this computer.\n\nYou can use this setting to turn off the MS-DOS subsystem, which will reduce resource usage and prevent users from running 16-bit applications. To run any 16-bit application or any application with 16-bit components, ntvdm.exe must be allowed to run. The MS-DOS subsystem starts when the first 16-bit application is launched. While the MS-DOS subsystem is running, any subsequent 16-bit applications launch faster, but overall resource usage on the system is increased.\n\nIf the status is set to Enabled, ntvdm.exe is prevented from running, which then prevents any 16-bit applications from running. In addition, any 32-bit applications with 16-bit installers or other 16-bit components cannot run.\n\nIf the status is set to Disabled, the default setting applies and the MS-DOS subsystem runs for all users on this computer.\n\nIf the status is set to Not Configured, the default applies and ntvdm.exe runs for all users. However, if an administrator sets the registry DWORD value HKLM\System\CurrentControlSet\Control\WOW\DisallowedPolicyDefault to 1, the default changes to prevent all 16-bit applications from running.\n\nNote: This setting appears in both Computer Configuration and User Configuration. If both settings are configured, the Computer Configuration setting overrides."
  7188. AppMgmt_COM_SearchForCLSID="Download missing COM components"
  7189. AppMgmt_COM_SearchForCLSID_Help="Directs the system to search Active Directory for missing Component Object Model (COM) components that a program requires.\n\nMany Windows programs, such as the MMC snap-ins, use the interfaces provided by the COM. These programs cannot perform all of their functions unless Windows has internally registered the required components.\n\nIf you enable this setting and a component registration is missing, the system searches for it in Active Directory and if it is found, downloads it. The resulting searches might make some programs start or run slowly.\n\nIf you disable this setting or do not configure it, the program continues without the registration. As a result, the program might not perform all of its functions, or it might stop.\n\nThis setting appears in the Computer Configuration and User Configuration folders. If both settings are configured, the setting in Computer Configuration takes precedence over the setting in User Configuration."
  7190. ARP="Add or Remove Programs"
  7191. ATC_NoComponents_Help="Removes Active Desktop content and prevents users from adding Active Desktop content. \n\nThis setting removes all Active Desktop items from the desktop. It also removes the Web tab from Display in Control Panel. As a result, users cannot add Web pages or pictures from the Internet or an intranet to the desktop.\n\nNote: This setting does not disable Active Desktop. Users can still use image formats, such as JPEG and GIF, for their desktop wallpaper."
  7192. AutoPublishing_Help="Determines whether the Add Printer Wizard automatically publishes the computer's shared printers in Active Directory.\n\nIf you enable this setting or do not configure it, the Add Printer Wizard automatically publishes all shared printers.\n\nIf you disable this setting, the Add Printer Wizard does not automatically publish printers. However, you can publish shared printers manually.\n\nThe default behavior is to automatically publish shared printers in Active Directory. \n\nNote: This setting is ignored if the "Allow printers to be published" setting is disabled."
  7193. AutoPublishing="Automatically publish new printers in Active Directory"
  7194. Autorun_Box="Turn off Autoplay on:"
  7195. Autorun_NoCD="CD-ROM drives"
  7196. Autorun_None="All drives"
  7197. Autorun_Help="Turns off the Autoplay feature.\n\nAutoplay begins reading from a drive as soon as you insert media in the drive. As a result, the setup file of programs and the music on audio media start immediately.\n\nBy default, Autoplay is disabled on removable drives, such as the floppy disk drive (but not the CD-ROM drive), and on network drives.\n\nIf you enable this setting, you can also disable Autoplay on CD-ROM drives or disable Autoplay on all drives.\n\nThis setting disables Autoplay on additional types of drives. You cannot use this setting to enable Autoplay on drives on which it is disabled by default.\n\nNote: This setting appears in both the Computer Configuration and User Configuration folders. If the settings conflict, the setting in Computer Configuration takes precedence over the setting in User Configuration.\n\nNote: This setting does not prevent Autoplay for music CDs."
  7198. Autorun="Turn off Autoplay"
  7199. Blank=" "
  7200. BITS_Job_Timeout="Background Intelligent Transfer Service (BITS) inactive job timeout"
  7201. BITS_Job_Timeout_Time="Inactive Job Timeout in Days:"
  7202. BITS_Job_Timeout_Help="The number of days a pending BITS job can remain inactive before being considered abandoned by the requestor.\n\nOnce a job is determined to be abandoned, it is removed by the system and any downloaded files pertaining to the job are deleted from the disk. Any property changes for the job or any successful download action resets this timer.\n\nIf the computer remains offline for a long period of time, no activity for the job will be recorded.\n\nYou might want to increase this value if computers tend to stay offline for a longer period of time and still have pending jobs. You might want to decrease this value if you are concerned about orphaned jobs occupying disk space.\n\nIf you enable this setting, you can configure the inactive job time-out to specified number of days. If you disable or do not configure this setting, the default value of 90 will be used for the inactive job time-out."
  7203. CADOptions="Ctrl+Alt+Del Options"
  7204. Cat_OfflineFiles="Offline Files"
  7205. Catname="Administrative Alerts"
  7206. ClassicShell_Help="This setting allows you to remove the Active Desktop and Web view features. If you enable this setting, it will disable the Active Desktop and Web view. Also, users cannot configure their system to open items by single-clicking (such as in Mouse in Control Panel). As a result, the user interface looks and operates like the interface for Windows NT 4.0, and users cannot restore the new features.\n\nNote: This setting takes precedence over the "Enable Active Desktop" setting. If both policies are enabled, Active Desktop is disabled.\n\nAlso, see the "Disable Active Desktop" setting in User Configuration\Administrative Templates\Desktop\Active Desktop and the "Remove the Folder Options menu item from the Tools menu" setting in User Configuration\Administrative Templates\Windows Components\Windows Explorer."
  7207. ClassicShell="Turn on Classic Shell"
  7208. ClearRecentDocsOnExit_Help="Clear history of recently opened documents on exit.\n\nIf you enable this setting, the system deletes shortcuts to recently used document files when the user logs off. As a result, the Documents menu on the Start menu is always empty when the user logs on.\n\nIf you disable or do not configure this setting, the system retains document shortcuts, and when a user logs on the Documents menu appears just as it did when the user logged off.\n\nNote: The system saves document shortcuts in the user profile in the System-drive\Documents and Settings\User-name\Recent folder.\n\nAlso, see the "Remove Documents menu from Start Menu" and "Do not keep history of recently opened documents" policies in this folder. The system only uses this setting when neither of these related settings are selected.\n\nThis setting does not clear the list of recent files that Windows programs display at the bottom of the File menu. See the "Do not keep history of recently opened documents" setting.\n\nThis policy setting also does not hide document shortcuts displayed in the Open dialog box. See the "Hide the dropdown list of recent files" setting."
  7209. ClearRecentDocsOnExit="Clear history of recently opened documents on exit"
  7210. Comdlg="Common Open File Dialog"
  7211. ComdlgSub="Common Open File Dialog Restrictions"
  7212. CompatibleRUPSecurity="Do not check for user ownership of Roaming Profile Folders"
  7213. CompatibleRUPSecurity_Help="This setting disables the more secure default setting for the user s roaming user profile folder.\n\nOnce an administrator has configured a users' roaming profile, the profile will be created at the user's next login. The profile is created at the location that is specified by the administrator.\n\nFor Windows 2000 Professional pre-SP4 and Windows XP pre-SP1 operating systems, the default file permissions for the newly generated profile are full control access for the user and no file access for the administrators group. No checks are made for the correct permissions if the profile folder already exists. For Windows Server 2003 family, Windows 2000 Professional SP4 and Windows XP SP1, the default behavior is to check the folder for the correct permissions if the profile folder already exists, and not copy files to or from the roaming folder if the permissions are not correct.\n\nBy configuring this setting, you can alter this behavior.\n\nIf you enable this setting Windows will not check the permissions for the folder in the case where the folder exists.\n\nIf you disable or do not configure this setting AND the roaming profile folder exists AND the user or administrators group not the owner of the folder, Windows will NOT copy files to or from the roaming folder. The user will be shown an error message and an entry will be written to the event log. The user s cached profile will be used, or a temporary profile issued if no cached profile exists. \n\nNote: The setting must be configured on the client computer not the server for it to have any effect because the client computer sets the file share permissions for the roaming profile at creation time.\n\nNote: The behavior when this setting is enabled is exactly the same behavior as in Windows 2000 Professional pre-SP4 and Windows XP Professional"
  7214. ConfirmFileDelete="Display confirmation dialog when deleting files"
  7215. ConfirmFileDelete_Help="Allows you to have Windows Explorer display a confirmation dialog whenever a file is deleted or moved to the Recycle Bin.\n\nIf you enable this setting, a confirmation dialog is displayed when a file is deleted or moved to the Recycle Bin by the user.\n\nIf you disable or do not configure this setting, the default behavior of not displaying a confirmation dialog occurs."
  7216. COnly="Restrict C drive only"
  7217. Connect_HomeDir_ToRoot_Explain="Restores the definitions of the %HOMESHARE% and %HOMEPATH% environment variables to those used in Windows NT 4.0 and earlier.\n\nIf you enable this setting, the system uses the Windows NT 4.0 definitions. If you disable this setting or do not configure it, the system uses the new definitions designed for the Windows 2000 operating system.\n\nAlong with %HOMEDRIVE%, these variables define the home directory of a user profile. The home directory is a persistent mapping of a drive letter on the local computer to a local or remote directory.\n\nBy default, in Windows 2000 Server Family, %HOMESHARE% stores the fully qualified path to the home directory (such as \\server\share\dir1\dir2\homedir). Users can access the home directory and any of its subdirectories from the home drive letter, but they cannot see or access its parent directories. %HOMEPATH% stores a final backslash and is included for compatibility with earlier systems.\n\nOn Windows NT 4.0 and earlier, %HOMESHARE% stores only the network share (such as \\server\share). %HOMEPATH% stores the remainder of the fully qualified path to the home directory (such as \dir1\dir2\homedir). As a result, users can access any directory on the home share by using the home directory drive letter.\n\nTip: To specify a home directory in Windows 2000 Server Family, in Active Directory Users and Computers or Local Users and Groups, right-click the name of a user account, click Properties, click the Profile tab, and in the "Home folder" section, select the "Connect" option and select a drive letter and home directory.\n\nExample: Drive Z is mapped to \\server\share\dir1\dir2\homedir.\n\nIf this setting is disabled or not configured (Windows 2000 Server Family behavior):\n\n-- %HOMEDRIVE% = Z: (mapped to \\server\share\dir1\dir2\homedir)\n\n-- %HOMESHARE% = \\server\share\dir1\dir2\homedir\n\n-- %HOMEPATH% = \\n\nIf the setting is enabled (Windows NT 4.0 behavior):\n\n-- %HOMEDRIVE% = Z: (mapped to \\server\share)\n\n-- %HOMESHARE% = \\ser
  7218. Connect_HomeDir_ToRoot="Connect home directory to root of the share"
  7219. ControlPanel="Control Panel"
  7220. CPL_Display_Disable="Remove Display in Control Panel"
  7221. CPL_Display_HideAppearance="Hide Appearance and Themes tab"
  7222. CPL_Display_HideBkgnd="Hide Desktop tab"
  7223. CPL_Display_HideScrsav="Hide Screen Saver tab"
  7224. CPL_Display_HideSettings="Hide Settings tab"
  7225. CPL_Display_Restrict="Restrict display"
  7226. CPL_Display="Control Panel\Display Restrictions"
  7227. CPL="Control Panel"
  7228. CSE_AppMgmt="Software Installation policy processing"
  7229. CSE_AppMgmt_Help="Determines when software installation policies are updated.\n\nThis setting affects all policies that use the software installation component of Group Policy, such as policies in Software Settings\Software Installation. You can set software installation policy only for Group Policy objects stored in Active Directory, not for Group Policy objects on the local computer.\n\nThis policy overrides customized settings that the program implementing the software installation policy set when it was installed.\n\nIf you enable this setting, you can use the check boxes provided to change the options. If you disable this setting or do not configure it, it has no effect on the system.\n\nThe "Allow processing across a slow network connection" option updates the policies even when the update is being transmitted across a slow network connection, such as a telephone line. Updates across slow connections can cause significant delays.\n\nThe "Process even if the Group Policy objects have not changed" option updates and reapplies the policies even if the policies have not changed. Many policy implementations specify that they are updated only when changed. However, you might want to update unchanged policies, such as reapplying a desired setting in case a user has changed it."
  7230. CSE_DiskQuota="Disk Quota policy processing"
  7231. CSE_DiskQuota_Help="Determines when disk quota policies are updated.\n\nThis setting affects all policies that use the disk quota component of Group Policy, such as those in Computer Configuration\Administrative Templates\System\Disk Quotas.\n\nIt overrides customized settings that the program implementing the disk quota policy set when it was installed.\n\nIf you enable this setting, you can use the check boxes provided to change the options. If you disable this setting or do not configure it, it has no effect on the system.\n\nThe "Allow processing across a slow network connection" option updates the policies even when the update is being transmitted across a slow network connection, such as a telephone line. Updates across slow connections can cause significant delays.\n\nThe "Do not apply during periodic background processing" option prevents the system from updating affected policies in the background while the computer is in use. Background updates can disrupt the user, cause a program to stop or operate abnormally, and, in rare cases, damage data.\n\nThe "Process even if the Group Policy objects have not changed" option updates and reapplies the policies even if the policies have not changed. Many policy implementations specify that they are updated only when changed. However, you might want to update unchanged policies, such as reapplying a desired setting in case a user has changed it."
  7232. CSE_EFSRecovery="EFS recovery policy processing"
  7233. CSE_EFSRecovery_Help="Determines when encryption policies are updated.\n\nThis setting affects all policies that use the encryption component of Group Policy, such as policies related to encryption in Windows Settings\Security Settings.\n\nIt overrides customized settings that the program implementing the encryption policy set when it was installed.\n\nIf you enable this setting, you can use the check boxes provided to change the options. If you disable this setting or do not configure it, it has no effect on the system.\n\nThe "Allow processing across a slow network connection" option updates the policies even when the update is being transmitted across a slow network connection, such as a telephone line. Updates across slow connections can cause significant delays.\n\nThe "Do not apply during periodic background processing" option prevents the system from updating affected policies in the background while the computer is in use. Background updates can disrupt the user, cause a program to stop or operate abnormally, and, in rare cases, damage data.\n\nThe "Process even if the Group Policy objects have not changed" option updates and reapplies the policies even if the policies have not changed. Many policy implementations specify that they are updated only when changed. However, you might want to update unchanged policies, such as reapplying a desired setting in case a user has changed it."
  7234. CSE_FolderRedirection="Folder Redirection policy processing"
  7235. CSE_FolderRedirection_Help="Determines when folder redirection policies are updated.\n\nThis setting affects all policies that use the folder redirection component of Group Policy, such as those in WindowsSettings\Folder Redirection. You can only set folder redirection policy for Group Policy objects, stored in Active Directory, not for Group Policy objects on the local computer.\n\nThis setting overrides customized settings that the program implementing the folder redirection policy set when it was installed.\n\nIf you enable this setting, you can use the check boxes provided to change the options. If you disable this setting or do not configure it, it has no effect on the system.\n\nThe "Allow processing across a slow network connection" option updates the policies even when the update is being transmitted across a slow network connection, such as a telephone line. Updates across slow connections can cause significant delays.\n\nThe "Process even if the Group Policy objects have not changed" option updates and reapplies the policies even if the policies have not changed. Many policy implementations specify that they are updated only when changed. However, you might want to update unchanged policies, such as reapplying a desired setting in case a user has changed it."
  7236. CSE_IEM="Internet Explorer Maintenance policy processing"
  7237. CSE_IEM_Help="Determines when Internet Explorer Maintenance policies are updated.\n\nThis setting affects all policies that use the Internet Explorer Maintenance component of Group Policy, such as those in Windows Settings\Internet Explorer Maintenance.\n\nIt overrides customized settings that the program implementing the Internet Explorer Maintenance policy set when it was installed.\n\nIf you enable this setting, you can use the check boxes provided to change the options. If you disable this setting or do not configure it, it has no effect on the system.\n\nThe "Allow processing across a slow network connection" option updates the policies even when the update is being transmitted across a slow network connection, such as a telephone line. Updates across slow connections can cause significant delays.\n\nThe "Do not apply during periodic background processing" option prevents the system from updating affected policies in the background while the computer is in use. Background updates can disrupt the user, cause a program to stop or operate abnormally, and, in rare cases, damage data.\n\nThe "Process even if the Group Policy objects have not changed" option updates and reapplies the policies even if the policies have not changed. Many policy implementations specify that they are updated only when changed. However, you might want to update unchanged policies, such as reapplying a desired setting in case a user has changed it."
  7238. CSE_IPSecurity="IP Security policy processing"
  7239. CSE_IPSecurity_Help="Determines when IP security policies are updated.\n\nThis setting affects all policies that use the IP security component of Group Policy, such as policies in Computer Configuration\Windows Settings\Security Settings\IP Security Policies on Local Machine.\n\nIt overrides customized settings that the program implementing the IP security policy set when it was installed.\n\nIf you enable this setting, you can use the check boxes provided to change the options. If you disable this setting or do not configure it, it has no effect on the system.\n\nThe "Allow processing across a slow network connection" option updates the policies even when the update is being transmitted across a slow network connection, such as a telephone line. Updates across slow connections can cause significant delays.\n\nThe "Do not apply during periodic background processing" option prevents the system from updating affected policies in the background while the computer is in use. Background updates can disrupt the user, cause a program to stop or operate abnormally, and, in rare cases, damage data.\n\nThe "Process even if the Group Policy objects have not changed" option updates and reapplies the policies even if the policies have not changed. Many policy implementations specify that they are updated only when changed. However, you might want to update unchanged policies, such as reapplying a desired setting in case a user has changed it."
  7240. CSE_NOCHANGES="Process even if the Group Policy objects have not changed"
  7241. CSE_NOBACKGROUND="Do not apply during periodic background processing"
  7242. CSE_Registry="Registry policy processing"
  7243. CSE_Registry_Help="Determines when registry policies are updated.\n\nThis setting affects all policies in the Administrative Templates folder and any other policies that store values in the registry.\n\nIt overrides customized settings that the program implementing a registry policy set when it was installed.\n\nIf you enable this setting, you can use the check boxes provided to change the options. If you disable this setting or do not configure it, it has no effect on the system.\n\nThe "Do not apply during periodic background processing" option prevents the system from updating affected policies in the background while the computer is in use. Background updates can disrupt the user, cause a program to stop or operate abnormally, and, in rare cases, damage data.\n\nThe "Process even if the Group Policy objects have not changed" option updates and reapplies the policies even if the policies have not changed. Many policy implementations specify that they are updated only when changed. However, you might want to update unchanged policies, such as reapplying a desired setting in case a user has changed it."
  7244. CSE_Security="Security policy processing"
  7245. CSE_Security_Help="Determines when security policies are updated.\n\nThis setting affects all policies that use the security component of Group Policy, such as those in Windows Settings\Security Settings.\n\nIt overrides customized settings that the program implementing the security policy set when it was installed.\n\nIf you enable this setting, you can use the check boxes provided to change the options. If you disable this setting or do not configure it, it has no effect on the system.\n\nThe "Do not apply during periodic background processing" option prevents the system from updating affected policies in the background while the computer is in use. Background updates can disrupt the user, cause a program to stop or operate abnormally, and in rare cases, damage data.\n\nThe "Process even if the Group Policy objects have not changed" option updates and reapplies the policies even if the policies have not changed. Many policy implementations specify that they be updated only when changed. However, you might want to update unchanged policies, such as reapplying a desired setting in case a user has changed it."
  7246. CSE_Scripts="Scripts policy processing"
  7247. CSE_Scripts_Help="Determines when policies that assign shared scripts are updated.\n\nThis setting affects all policies that use the scripts component of Group Policy, such as those in WindowsSettings\Scripts.\n\nIt overrides customized settings that the program implementing the scripts policy set when it was installed.\n\nIf you enable this policy, you can use the check boxes provided to change the options. If you disable this setting or do not configure it, it has no effect on the system.\n\nThe "Allow processing across a slow network connection" option updates the policies even when the update is being transmitted across a slow network connection, such as a telephone line. Updates across slow connections can cause significant delays.\n\nThe "Do not apply during periodic background processing" option prevents the system from updating affected policies in the background while the computer is in use. Background updates can disrupt the user, cause a program to stop or operate abnormally, and, in rare cases, damage data.\n\nThe "Process even if the Group Policy objects have not changed" option updates and reapplies the policies even if the policies have not changed. Many policy implementations specify that they are updated only when changed. However, you might want to update unchanged policies, such as reapplying a desired setting in case a user has changed it."
  7248. CSE_SLOWLINK="Allow processing across a slow network connection"
  7249. CSE_Wireless="Wireless policy processing"
  7250. CSE_Wireless_Help="Determines when policies that assign wireless network settings are updated.\n\nThis setting affects all policies that use the wireless network component of Group Policy, such as those in WindowsSettings\Wireless Network Policies.\n\nIt overrides customized settings that the program implementing the wireless network set when it was installed.\n\nIf you enable this policy, you can use the check boxes provided to change the options. If you disable this setting or do not configure it, it has no effect on the system.\n\nThe "Allow processing across a slow network connection" option updates the policies even when the update is being transmitted across a slow network connection, such as a telephone line. Updates across slow connections can cause significant delays.\n\nThe "Do not apply during periodic background processing" option prevents the system from updating affected policies in the background while the computer is in use. Background updates can disrupt the user, cause a program to stop or operate abnormally, and, in rare cases, damage data.\n\nThe "Process even if the Group Policy objects have not changed" option updates and reapplies the policies even if the policies have not changed. Many policy implementations specify that they are updated only when changed. However, you might want to update unchanged policies, such as reapplying a desired setting in case a user has changed it."
  7251. CustomizedSupportUrl_Help="Adds a customized Web page link to the Printers folder.\n\nBy default, the Printers folder includes a link to the Microsoft Support Web page called "Get help with printing". It can also include a link to a Web page supplied by the vendor of the currently selected printer.\n\nYou can use this setting to replace the "Get help with printing" default link with a link to a Web page customized for your enterprise.\n\nIf you disable this setting or do not configure it, or if you do not enter an alternate Internet address, the default link will appear in the Printers folder.\n\nNote: Web pages links only appear in the Printers folder when Web view is enabled. If Web view is disabled, the setting has no effect. (To enable Web view, open the Printers folder, and, on the Tools menu, click Folder Options, click the General tab, and then click "Enable Web content in folders.")\n\nAlso, see the "Web-based printing" setting in this setting folder and the "Browse a common web site to find printers" setting in User Configuration\Administrative Templates\Control Panel\Printers.\n\nWeb view is affected by the "Turn on Classic Shell" and "Remove the Folder Options menu item from the Tools menu" settings in User Configuration\Administrative Templates\Windows Components\Windows Explorer, and by the "Enable Active Desktop" setting in User Configuration\Administrative Templates\Desktop\Active Desktop."
  7252. CustomizedSupportUrl_Link="URL"
  7253. CustomizedSupportUrl_Tip1="Specify the URL. For example, the url would: http://www.microsoft.com/support"
  7254. CustomizedSupportUrl="Custom support URL in the Printers folder's left pane"
  7255. DefaultDirectoryScope_Help="Determines which information source is the default starting point when users search for people.\n\nThis setting specifies the information source that appears in the "Look in" box in the Find People dialog box when the dialog box opens. (To open the Find People dialog box, click Start, click Search, and then click "For people.") Users can search in the default information source or use the drop-down list beside "Look in" to change the source. If users change the source, the last source used appears in the "Look in" box the next time it opens.\n\nIf you disable this setting or do not configure it, the source listed first in alphabetical order appears in the "Look in" box when it opens. By default, Address Book appears first.\n\nTo use this setting, type the DNS-friendly name or the NetBIOS name of the server that is hosting the source you want to list first.\n\nThis setting appears in the Computer Configuration and User Configuration folders. If these settings conflict, the setting in Computer Configuration takes precedence over the setting in User Configuration.\n\nNote: This setting establishes a default value that users can change. It does not limit user actions or change system features."
  7256. DefaultDirectoryScope="Default directory scope"
  7257. DefaultExcludeMessage="Local Settings;Temporary Internet Files;History;Temp"
  7258. DefaultSizeMessage="You have exceeded your profile storage space. Before you can log off, you need to move some items from your profile to network or local storage."
  7259. DefaultCategory_Help="Specifies the category of programs that appears when users open the "Add New Programs" page.\n\nIf you enable this setting, only the programs in the category you specify are displayed when the "Add New Programs" page opens. Users can use the Category box on the "Add New Programs" page to display programs in other categories.\n\nTo use this setting, type the name of a category in the Category box for this setting. You must enter a category that is already defined in Add or Remove Programs. To define a category, use Software Installation.\n\nIf you disable this setting or do not configure it, all programs (Category: All) are displayed when the "Add New Programs" page opens.\n\nYou can use this setting to direct users to the programs they are most likely to need.\n\nNote: This setting is ignored if either the "Remove Add or Remove Programs" setting or the "Hide Add New Programs page" setting is enabled."
  7260. DefaultCategory="Specify default category for Add New Programs"
  7261. DefaultCategoryBox="Category:"
  7262. DeleteRoamingCachedProfiles_Help="Determines whether the system saves a copy of a user s roaming profile on the local computer's hard drive when the user logs off.\n\nThis setting, and related settings in this folder, together describe a strategy for managing user profiles residing on remote servers. In particular, they tell the system how to respond when a remote profile is slow to load.\n\nRoaming profiles reside on a network server. By default, when users with roaming profiles log off, the system also saves a copy of their roaming profile on the hard drive of the computer they are using in case the server that stores the roaming profile is unavailable when the user logs on again. The local copy is also used when the remote copy of the roaming user profile is slow to load.\n\nIf you enable this setting, any local copies of the user s roaming profile are deleted when the user logs off. The roaming profile still remains on the network server that stores it.\n\nImportant: Do not enable this setting if you are using the slow link detection feature of Windows 2000 Professional and Windows XP Professional. To respond to a slow link, the system requires a local copy of the user s roaming profile."
  7263. DeleteRoamingCachedProfiles="Delete cached copies of roaming profiles"
  7264. DenyRsopToInteractiveUser_Help="This setting controls the ability of users to view their Resultant Set of Policy (RSoP) data.\n\nBy default, interactively logged on users can view their own Resultant Set of Policy (RSoP) data.\n\nIf this setting is enabled, interactive users cannot generate RSoP data.\n\nIf this setting is not configured or disabled, interactive Users can generate RSoP.\n\nNote: This setting does not affect administrators. If this setting is enabled or disabled, by default, administrators can view RSoP data.\n\nNote: To view RSoP data on a client computer, use the RSoP snap-in for the Microsoft Management Console. You can launch the RSoP snap-in from the command line by typing RSOP.msc\n\nNote: This setting exists as both a User Configuration and Computer Configuration setting.\n\nAlso, see the "Turn off Resultant set of Policy Logging" setting in Computer Configuration\Administrative Templates\System\GroupPolicy."
  7265. DenyRsopToInteractiveUser="Disallow Interactive Users from generating Resultant Set of Policy data"
  7266. Desktop="Desktop"
  7267. DesktopDisplay="Desktop and Display"
  7268. DesktopSub="General Desktop"
  7269. DFSDiscoverDC="Sets how often a DFS Client discovers DC's"
  7270. DFSDiscoverDC_Help="Allows you to configure how often a Distributed File System (DFS) client attempts to discover domain controllers on their network.\n\nBy default, a DFS client attempts to discover domain controllers every 15 minutes.\n\nIf you enable this setting, you can configure how often a DFS client attempts to discover domain controllers. This value is specified in minutes.\n\nIf you disable this setting or do not configure it, the default value of 15 minutes applies.\n\nNote: The minimum value you can select is 15 minutes. If you try to set this setting to a value less then 15 minutes, the default value of 15 minutes is applied."
  7271. DFSDiscoverDialog="Time in minutes:"
  7272. DisableAdvanced="Hide Advanced Properties Checkbox in Add Scheduled Task Wizard"
  7273. DisableAdvancedHelp="This setting removes the "Open advanced properties for this task when I click Finish" checkbox from the last page of the Scheduled Task Wizard. This policy is only designed to simplify task creation for beginning users.\n\nThe checkbox, when checked, instructs Task Scheduler to automatically open the newly created task's property sheet upon completion of the "Add Scheduled Task" wizard. The task's property sheet allows users to change task characteristics such as: the program the task runs, details of its schedule, idle time and power management settings, and its security context. Beginning users will often not be interested or confused by having the property sheet displayed automatically. Note that the checkbox is not checked by default even if this setting is Disabled or Not Configured.\n\nNote: This setting appears in the Computer Configuration and User Configuration folders. If both settings are configured, the setting in Computer Configuration takes precedence over the setting in User Configuration."
  7274. DisableAlways="Always"
  7275. DisableAutoADMUpdate="Turn off automatic update of ADM files"
  7276. DisableAutoADMUpdate_Help="Prevents the system from updating the Administrative Templates source files automatically when you open the Group Policy Object Editor. Administrators may want to use this if they are concerned about the amount of space used on the system volume of a DC.\n\nBy default, when you start the Group Policy Object Editor, a timestamp comparison is performed on the source files in the local %SYSTEMROOT%\inf directory and the source files stored in the GPO. If the local files are newer, they are copied into the GPO.\n\nChanging the status of this setting to Enabled will keep any source files from copying to the GPO.\n\nChanging the status of this setting to Disabled will enforce the default behavior. Files will always be copied to the GPO if they have a later timestamp.\n\nNOTE: If the Computer Configuration policy setting, "Always use local ADM files for the Group Policy Object Editor" is enabled, the state of this setting is ignored and always treated as Enabled."
  7277. DisableBackgroundPolicy_Help="Prevents Group Policy from being updated while the computer is in use. This setting applies to Group Policy for computers, users, and domain controllers.\n\nIf you enable this setting, the system waits until the current user logs off the system before updating the computer and user settings.\n\nIf you disable this setting, updates can be applied while users are working. The frequency of updates is determined by the "Group Policy refresh interval for computers" and "Group Policy refresh interval for users" settings.\n\nNote: If you make changes to this setting, you must restart your computer for it to take effect."
  7278. DisableBackgroundPolicy="Turn off background refresh of Group Policy"
  7279. DisableBrowse_Help="Prevents users from searching for installation files when they add features or components to an installed program.\n\nThis setting disables the Browse button beside the "Use feature from" list in the Windows Installer dialog box. As a result, users must select an installation file source from the "Use features from" list that the system administrator configures.\n\nThis setting applies even when the installation is running in the user's security context.\n\nIf you disable this setting or do not configure it, the Browse button is enabled when an installation is running in the user's security context. But only system administrators can browse when an installation is running with elevated system privileges, such as installations offered on the desktop or in Add or Remove Programs.\n\nThis setting affects Windows Installer only. It does not prevent users from selecting other browsers, such as Windows Explorer or My Network Places, to search for installation files.\n\nAlso, see the "Enable user to browse for source while elevated" setting."
  7280. DisableBrowse="Remove browse dialog box for new source"
  7281. DisableChangePassword_Help="Prevents users from changing their Windows password on demand.\n\nThis setting disables the "Change Password" button on the Windows Security dialog box (which appears when you press Ctrl+Alt+Del).\n\nHowever, users are still able to change their password when prompted by the system. The system prompts users for a new password when an administrator requires a new password or their password is expiring."
  7282. DisableChangePassword="Remove Change Password"
  7283. DisableCMD_Help="Prevents users from running the interactive command prompt, Cmd.exe. This setting also determines whether batch files (.cmd and .bat) can run on the computer.\n\nIf you enable this setting and the user tries to open a command window, the system displays a message explaining that a setting prevents the action.\n\nNote: Do not prevent the computer from running batch files if the computer uses logon, logoff, startup, or shutdown batch file scripts, or for users that use Terminal Services."
  7284. DisableCMD="Prevent access to the command prompt"
  7285. DisableCMDScripts="Disable the command prompt script processing also?"
  7286. DisableCMD_YES="Yes"
  7287. DisableCMD_NO="No"
  7288. DisableExplorerRunLegacy_Help="Ignores the customized run list.\n\nYou can create a customized list of additional programs and documents that the system starts automatically when it runs on Windows XP Professional, Windows 2000 Professional, Windows NT Workstation 4.0 and earlier. These programs are added to the standard run list of programs and services that the system starts.\n\nIf you enable this setting, the system ignores the run list for Windows NT Workstation 4.0, Windows 2000 Professional, and Windows XP Professional.\n\nIf you disable or do not configure this setting, Windows 2000 adds any customized run list configured for Windows NT 4.0 and earlier to its run list.\n\nThis setting appears in the Computer Configuration and User Configuration folders. If both policies are configured, the setting in Computer Configuration takes precedence over the setting in User Configuration.\n\nNote: To create a customized run list by using a policy, use the "Run these applications at startup" setting.\n\nThe customized run lists for Windows NT 4.0 and earlier are stored in the registry in HKEY_LOCAL_MACHINE\Software\Microsoft\Windows\CurrentVersion\Run and HKEY_CURRENT_USER\Software\Microsoft\Windows NT\CurrentVersion\Windows\Run. They can be configured by using the "Run" setting in System Policy Editor for Windows NT 4.0 and earlier.\n\nAlso, see the "Do not process the run once list" setting."
  7289. DisableExplorerRunLegacy="Do not process the legacy run list"
  7290. DisableExplorerRunOnceLegacy_Help="Ignores customized run-once lists.\n\nYou can create a customized list of additional programs and documents that are started automatically the next time the system starts (but not thereafter). These programs are added to the standard list of programs and services that the system starts.\n\nIf you enable this setting, the system ignores the run-once list.\n\nIf you disable this setting or do not configure it, the system runs the programs in the run-once list.\n\nThis setting appears in the Computer Configuration and User Configuration folders. If both settings are configured, the setting in Computer Configuration takes precedence over the setting in User Configuration.\n\nNote: Customized run-once lists are stored in the registry in HKEY_LOCAL_MACHINE\Software\Microsoft\Windows\CurrentVersion\RunOnce.\n\nAlso, see the "Do not process the legacy run list" setting."
  7291. DisableExplorerRunOnceLegacy="Do not process the run once list"
  7292. DisableFRAdminPin="Do not automatically make redirected folders available offline"
  7293. DisableFRAdminPin_Help="All redirected shell folders, such as My Documents, Desktop, Start Menu, and Application Data, are available offline by default. This setting allows you to change this behavior so that redirected shell folders are not automatically available for offline use. However, users can still choose to make files and folders available offline themselves.\n\nIf you enable this setting, the users must manually select the files they wish to be made available offline.\n\nIf you disable this setting or do not configure it, redirected shell folders are automatically made available offline. All subfolders within the redirected folders are also made available offline.\n\nNote: This setting does not prevent files from being automatically cached if the network share is configured for "Automatic Caching", nor does it affect the availability of the "Make Available Offline" menu option in the user interface.\n\nNote: Do not enable this setting unless you are certain that users will not need access to all of their redirected files in the event that the network or server holding the redirected files becomes unavailable."
  7294. DisableLockComputer_Help="Prevents users from locking the system.\n\nWhile locked, the desktop is hidden and the system cannot be used. Only the user who locked the system or the system administrator can unlock it.\n\nTip:To lock a computer without configuring a setting, press Ctrl+Alt+Delete, and then click "Lock Computer.""
  7295. DisableLockComputer="Remove Lock Computer"
  7296. DisableLogoff="Remove Logoff"
  7297. DisableMedia_Help="Prevents users from installing programs from removable media.\n\nIf a user tries to install a program from removable media, such as CD-ROMs, floppy disks, and DVDs, a message appears, stating that the feature cannot be found.\n\nThis setting applies even when the installation is running in the user's security context.\n\nIf you disable this setting or do not configure it, users can install from removable media when the installation is running in their own security context, but only system administrators can use removable media when an installation is running with elevated system privileges, such as installations offered on the desktop or in Add or Remove Programs.\n\nAlso, see the "Enable user to use media source while elevated setting" in Computer Configuration\Administrative Templates\Windows Components\Windows Installer.\n\nAlso, see the "Hide the 'Add a program from CD-ROM or floppy disk' option" setting in User Configuration\Administrative Templates\Control Panel\Add or Remove Programs."
  7298. DisableMedia="Prevent removable media source for any install"
  7299. DisableMSI_Help="Disables or restricts the use of Windows Installer.\n\nThis setting can prevent users from installing software on their systems or permit users to install only those programs offered by a system administrator.\n\nIf you enable this setting, you can use the options in the Disable Windows Installer box to establish an installation setting.\n\n-- The "Never" option indicates Windows Installer is fully enabled. Users can install and upgrade software. This is the default behavior for Windows Installer on Windows 2000 Professional and Windows XP Professional when the policy is not configured.\n\n-- The "For non-managed apps only" option permits users to install only those programs that a system administrator assigns (offers on the desktop) or publishes (adds them to Add or Remove Programs). This is the default behavior of Windows Installer on Windows Server 2003 family when the policy is not configured.\n\n-- The "Always" option indicates that Windows Installer is disabled.\n\nThis setting affects Windows Installer only. It does not prevent users from using other methods to install and upgrade programs."
  7300. DisableMSI="Disable Windows Installer"
  7301. DisableNever="Never"
  7302. DisableNonManaged="For non-managed apps only"
  7303. DisableOnline="Prevent Windows Media DRM Internet Access"
  7304. DisableOnlineExplain="Prevents Windows Media Digital Rights Management (DRM) from accessing the Internet (or intranet).\n\nWhen enabled, Windows Media DRM is prevented from accessing the Internet (or intranet) for license acquisition and security upgrades.\n\nWhen this policy is enabled, programs are not able to acquire licenses for secure content, upgrade Windows Media DRM security components, or restore backed up content licenses. Secure content that is already licensed to the local computer will continue to play. Users are also able to protect music that they copy from a CD and play this protected content on their computer, since the license is generated locally in this scenario.\n\nWhen this policy is either disabled or not configured, Windows Media DRM functions normally and will connect to the Internet (or intranet) to acquire licenses, download security upgrades, and perform license restoration."
  7305. DisablePatch_Help="Prevents users from using Windows Installer to install patches.\n\nPatches are updates or upgrades that replace only those program files that have changed. Because patches can be easy vehicles for malicious programs, some installations prohibit their use.\n\nNote: This setting applies only to installations that run in the user's security context. By default, users who are not system administrators cannot apply patches to installations that run with elevated system privileges, such as those offered on the desktop or in Add or Remove Programs.\n\nAlso, see the "Enable user to patch elevated products" setting."
  7306. DisablePatch="Prohibit patching"
  7307. DisablePersonalDirChange_Help="Prevents users from changing the path to the My Documents folder.\n\nBy default, a user can change the location of the My Documents folder by typing a new path in the Target box of the My Documents Properties dialog box.\n\nIf you enable this setting, users are unable to type a new location in the Target box."
  7308. DisablePersonalDirChange="Prohibit user from changing My Documents path"
  7309. DisableRegedit_Help="Disables the Windows registry editor Regedit.exe.\n\nIf this setting is enabled and the user tries to start a registry editor, a message appears explaining that a setting prevents the action.\n\nTo prevent users from using other administrative tools, use the "Run only allowed Windows applications" setting."
  7310. DisableRegedit="Prevent access to registry editing tools"
  7311. DisableRollback_Help="Prohibits Windows Installer from generating and saving the files it needs to reverse an interrupted or unsuccessful installation.\n\nThis setting prevents Windows Installer from recording the original state of the system and sequence of changes it makes during installation. It also prevents Windows Installer from retaining files it intends to delete later. As a result, Windows Installer cannot restore the computer to its original state if the installation does not complete.\n\nThis setting is designed to reduce the amount of temporary disk space required to install programs. Also, it prevents malicious users from interrupting an installation to gather data about the internal state of the computer or to search secure system files. However, because an incomplete installation can render the system or a program inoperable, do not use this setting unless it is essential.\n\nThis setting appears in the Computer Configuration and User Configuration folders. If the setting is enabled in either folder, it is considered be enabled, even if it is explicitly disabled in the other folder."
  7312. DisableRollback="Prohibit rollback"
  7313. DisableStatusMessages_Help="Suppresses system status messages.\n\nIf you enable this setting, the system does not display a message reminding users to wait while their system starts or shuts down, or while users log on or off."
  7314. DisableStatusMessages="Remove Boot / Shutdown / Logon / Logoff status messages"
  7315. DisableSystemPolicy_Help="Disables System Policy designed for Windows NT 4.0 and earlier.\n\nIn Windows 2000 Professional and Windows XP Professional, Group Policy replace the System Policy that System Policy Editor created on Windows NT 4.0 and earlier. However, Windows 2000 Professional and Windows XP Professional continues to support System Policy for installations that use them.\n\nIf you enable this setting, the system does not recognize or implement System Policy. However, it continues its full support for Group Policy. Note: If a computer is a member of an Active Directory, it will also not process System Policy."
  7316. DisableSystemPolicy="Disable System Policy (use Group Policy only)"
  7317. DisableTaskMgr_Help="Prevents users from starting Task Manager (Taskmgr.exe).\n\nIf this setting is enabled and users try to start Task Manager, a message appears explaining that a policy prevents the action.\n\nTask Manager lets users start and stop programs; monitor the performance of their computers; view and monitor all programs running on their computers, including system services; find the executable names of programs; and change the priority of the process in which programs run."
  7318. DisableTaskMgr="Remove Task Manager"
  7319. DisableUsersFromMachGP="Remove users ability to invoke machine policy refresh"
  7320. DisableUsersFromMachGP_Help="This setting allows you to control a user's ability to invoke a computer policy refresh.\n\nIf you enable this setting, users may not invoke a refresh of computer policy. Computer policy will still be applied at startup or when an official policy refresh occurs.\n\nIf you disable or do not configure this setting, the default behavior applies. By default, computer policy is applied when the computer starts up. It also applies at a specified refresh interval or when manually invoked by the user.\n\nNote: This setting only applies to non-administrators. Administrators can still invoke a refresh of computer policy at any time, no matter how this policy is configured.\n\nAlso, see the "Group Policy refresh interval for computers" setting to change the policy refresh interval.\n\nNote: If you make changes to this setting, you must restart your computer for it to take effect."
  7321. DisallowApps_Help="Prevents Windows from running the programs you specify in this setting.\n\nIf you enable this setting, users cannot run programs that you add to the list of disallowed applications.\n\nThis setting only prevents users from running programs that are started by the Windows Explorer process. It does not prevent users from running programs, such as Task Manager, that are started by the system process or by other processes. Also, if you permit users to gain access to the command prompt, Cmd.exe, this setting does not prevent them from starting programs in the command window that they are not permitted to start by using Windows Explorer. Note: To create a list of disallowed applications, click Show, click Add, and then enter the application executable name (e.g., Winword.exe, Poledit.exe, Powerpnt.exe)."
  7322. DisallowApps_Tip1=" "
  7323. DisallowApps_Tip2="To create a list of disallowed applications, click Show,"
  7324. DisallowApps_Tip3="then Add, and enter the application executable name"
  7325. DisallowApps_Tip4="(e.g., Winword.exe, Poledit.exe, Powerpnt.exe)."
  7326. DisallowApps="Don't run specified Windows applications"
  7327. DisallowAppsList="List of disallowed applications"
  7328. DisallowCpls_Help="Hides specified Control Panel items and folders.\n\nThis setting removes Control Panel items (such as Display) and folders (such as Fonts) from the Control Panel window and the Start menu. It can remove Control Panel items you have added to your system, as well as Control Panel items included in Windows 2000 Professional and Windows XP Professional.\n\nTo hide a Control Panel item, type the file name of the item, such as Ncpa.cpl (for Network). To hide a folder, type the folder name, such as Fonts.\n\nThis setting affects the Start menu and Control Panel window only. It does not prevent users from running Control Panel items.\n\nAlso, see the "Remove Display in Control Panel" setting in User Configuration\Administrative Templates\Control Panel\Display.\n\nIf both the "Hide specified Control Panel applets" setting and the "Show only specified Control Panel applets" setting are enabled, and the same item appears in both lists, the "Show only specified Control Panel applets" setting is ignored.\n\nNote: To find the file name of a Control Panel item, search for files with the .cpl file name extension in the %Systemroot%\System32 directory. Note: To create a list of disallowed Control Panel applets, click Show, click Add, and then enter the Control Panel file name (ends with .cpl) or the name displayed under that item in the Control Panel. (e.g., desk.cpl, powercfg.cpl, Printers and Faxes)\n\nNote: This setting does not affect the Categories that are displayed in the new Control Panel Category view in Windows XP. If you want to control which items are displayed in Control Panel, enable the "Force classic Control Panel Style" setting to remove the Category view, and then use this setting to control which .cpls are not displayed."
  7329. DisallowCpls="Hide specified Control Panel applets"
  7330. DisallowCplsList="List of disallowed Control Panel applets"
  7331. Display="Display"
  7332. DisplayErrors="Display error messages"
  7333. DLT_AllowDomainMode="Allow Distributed Link Tracking clients to use domain resources"
  7334. DLT_AllowDomainMode_Explain="Specifies that Distributed Link Tracking clients in this domain may use the Distributed LInk Tracking (DLT) server, which runs on domain controllers. The DLT client enables programs to track linked files that are moved within an NTFS volume, to another NTFS volume on the same computer, or to an NTFS volume on another computer. The DLT client can more reliably track links when allowed to use the DLT server. This policy should not be set unless the DLT server is running on all domain controllers in the domain."
  7335. DNS_Client="DNS Client"
  7336. DNS_Client_Interfaces="Interfaces"
  7337. DNS_RegistrationRefreshInterval="Registration Refresh Interval"
  7338. DNS_RegistrationRefreshInterval_Help="Specifies the Registration Refresh Interval of A and PTR resource records for computers to which this setting is applied. This setting may be applied to computers using dynamic update only.\n\nComputers running Windows 2000 Professional and Windows XP Professional, and configured to perform dynamic DNS registration of A and PTR resource records, periodically reregister their records with DNS servers, even if their records data has not changed. This reregistration is required to indicate to DNS servers configured to automatically remove (scavenge) stale records that these records are current and should be preserved in the database.\n\nWarning: If the DNS resource records are registered in zones with scavenging enabled, the value of this setting should never be longer than the Refresh Interval configured for these zones. Setting the Registration Refresh Interval to longer than the Refresh Interval of the DNS zones might result in the undesired deletion of A and PTR resource records.\n\nTo specify the Registration Refresh Interval, click Enable, and then enter a value larger than 1800. Remember, this value specifies the Registration Refresh Interval in seconds, for example, 1800 seconds is 30 minutes.\n\nIf this setting is not configured, it is not applied to any computers, and computers use their local configuration."
  7339. DNS_RegistrationRefreshIntervalLabel="Seconds:"
  7340. DNS_RegistrationEnabled="Dynamic Update"
  7341. DNS_RegistrationEnabled_Help="Determines if dynamic update is enabled.\n\nComputers configured for dynamic update automatically register and update their DNS resource records with a DNS server.\n\nIf you enable this setting, the computers to which this setting is applied may use dynamic DNS registration on each of their network connections, depending on the configuration of each individual network connection. For a dynamic DNS registration to be enabled on a specific network connection, it is necessary and sufficient that both computer-specific and connection-specific configurations allow dynamic DNS registration. This setting controls the computer-specific property controlling dynamic DNS registration. If you enable this setting, you allow dynamic update to be set individually for each of the network connections.\n\nIf you disable this setting, the computers to which this setting is applied may not use dynamic DNS registration for any of their network connections, regardless of the configuration for individual network connections.\n\nIf this setting is not configured, it is not applied to any computers, and computers use their local configuration."
  7342. DNS_RegistrationOverwritesInConflict="Replace Addresses In Conflicts"
  7343. DNS_RegistrationOverwritesInConflict_Help="Determines whether a DNS client that attempts to register its A resource record should overwrite an existing A resource record or records containing conflicting IP addresses.\n\nThis setting is designed for computers that register A resource records in DNS zones that do not support Secure Dynamic Update. Secure Dynamic Update preserves ownership of resource records and does not allow a DNS client to overwrite records that are registered by other computers.\n\nDuring dynamic update of a zone that does not use Secure Dynamic Update, a DNS client may discover that an existing A resource record associates the client s host DNS name with an IP address of a different computer. According to the default configuration, the DNS client attempts to replace the existing A resource record with an A resource record associating the DNS name with the client s IP address.\n\nIf you enable this setting, DNS clients attempt to replace conflicting A resource records during dynamic update.\n\nIf you disable this setting, the DNS client still performs the dynamic update of A resource records, but if the DNS client attempts to update A resource records containing conflicts, this attempt fails and an error is recorded in the Event Viewer log.\n\nIf this setting is not configured, it is not applied to any computers, and computers use their local configuration."
  7344. DNS_RegisterReverseLookup="Register PTR Records"
  7345. DNS_RegisterReverseLookup_Help="Determines whether the registration of PTR resource records is enabled for the computers to which this policy is applied.\n\nBy default, DNS clients configured to perform dynamic DNS registration attempt PTR resource record registration only if they successfully registered the corresponding A resource record. "A" resource records map a host DNS name to the host IP address, and "PTR" resource records map the host IP address to the host DNS name.\n\nTo enable this setting, click Enable, and then select one of the following values:\n\nDo not register - computers never attempt PTR resource records registration.\n\nRegister - computers attempt PTR resource records registration regardless of the success of the A records registration.\n\nRegister only if A record registration succeeds  computers attempt PTR resource records registration only if they successfully registered the corresponding A resource records.\n\nIf this setting is not configured, it is not applied to any computers, and computers use their local configuration."
  7346. DNS_RegisterReverseLookup_box="Register PTR records:"
  7347. DNS_RegisterReverseLookup_Register="Register"
  7348. DNS_RegisterReverseLookup_DoNotRegister="Do not register"
  7349. DNS_RegisterReverseLookup_RegisterOnlyIfASucceeds="Register only if A record registration succeeds "
  7350. DNS_Domain="Connection-Specific DNS Suffix"
  7351. DNS_Domain_Help="Specifies a connection-specific DNS suffix. This setting supersedes the connection-specific DNS suffixes set on the computers to which this setting is applied, those configured locally and those configured using DHCP.\n\nWarning: A connection-specific DNS suffix specified in this setting is applied to all the network connections used by multihomed computers to which this setting is applied.\n\nTo use this setting, click Enable, and then enter a string value representing the DNS suffix in the available field.\n\nIf this setting is not configured, it is not applied to any computers, and computers use their local or DHCP-configuration parameters."
  7352. DNS_DomainLabel="DNS Suffix:"
  7353. DNS_RegisterAdapterName="Register DNS records with connection-specific DNS suffix"
  7354. DNS_RegisterAdapterName_Help="Determines if a computer performing dynamic registration may register A and PTR resource records with a concatenation of its Computer Name and a connection-specific DNS suffix, in addition to registering these records with a concatenation of its Computer Name and the Primary DNS suffix.\n\nWarning: Enabling of this group setting is applied to all the network connections of multihomed computers to which this setting is applied.\n\nBy default, a DNS client performing dynamic DNS registration registers A and PTR resource records with a concatenation of its Computer Name and the primary DNS suffix. For example, a concatenation of a Computer Name, such as "mycomputer", and the primary DNS suffix, such as "microsoft.com", would result in "mycomputer.microsoft.com".\n\nIf this setting were enabled, a computer would register A and PTR resource records with its connection-specific DNS suffix in addition to registering A and PTR resource records with the primary DNS suffix. For example, a concatenation of a Computer Name "mycomputer" and the connection specific DNS suffix "VPNconnection" would be used when registering A and PTR resource records, resulting in "mycomputer.VPNconnection". Notice that if dynamic DNS registration is disabled on a computer to which this setting is applied, then, regardless of this setting s settings, a computer does not attempt dynamic DNS registration of A and PTR records containing a concatenation of its Computer Name and a connection-specific DNS suffix. If dynamic DNS registration is disabled on a specific network connection of a computer to which this setting is applied, then, regardless of this setting s settings, a computer does not attempt dynamic DNS registration of A and PTR records containing a concatenation of its Computer Name and a connection-specific DNS suffix on that network connection.\n\nIf this setting is disabled, a DNS client does not register A and PTR resource records with its connection-specific DNS suffix.\n\nIf this setting is not configu
  7355. DNS_NameServer="DNS Servers"
  7356. DNS_NameServer_Help="Defines the DNS servers to which a computer sends queries when it attempts to resolve names.\n\nWarning: The list of the DNS servers defined in this setting supersedes DNS servers configured locally and those configured using DHCP. The list of DNS servers is applied to all network connections of multihomed computers to which this setting is applied.\n\nTo use this setting, click Enable, and then enter a space-delimited list of IP addresses (in dotted decimal format) in the available field. If you enable this setting, you must enter at least one IP address.\n\nIf this setting is not configured, it is not applied to any computers, and computers use their local or DHCP-configured parameters."
  7357. DNS_NameServerLabel="IP Addresses:"
  7358. DNS_SearchList="DNS Suffix Search List"
  7359. DNS_SearchList_Help="Determines the DNS suffixes to attach to an unqualified single-label name before submission of a DNS query for that name.\n\nAn unqualified single-label name contains no dots, such as "example". This is different from a fully qualified domain name, such as "example.microsoft.com.".\n\nWith this setting enabled, when a user submits a query for a single-label name, such as "example", a local DNS client attaches a suffix, such as "microsoft.com", resulting in the query "example.microsoft.com", before sending the query to a DNS server.\n\nIf you enable this setting, you can specify the DNS suffixes to attach before submission of a query for an unqualified single-label name. The values of the DNS suffixes in this setting may be set using comma-separated strings, such as "microsoft.com,serverua.microsoft.com,office.microsoft.com". One DNS suffix is attached for each submission of a query. If a query is unsuccessful, a new DNS suffix is added in place of the failed suffix, and this new query is submitted. The values are used in the order they appear in the string, starting with the leftmost value and preceding to the right.\n\nIf you enable this setting, you must specify at least one suffix.\n\nIf you disable this setting, the primary DNS suffix and network connection-specific DNS suffixes are appended to the unqualified queries.\n\nIf this setting is not configured, it is not applied to any computers, and computers use their local configuration."
  7360. DNS_SearchListLabel="DNS Suffixes:"
  7361. DNS_UseDomainNameDevolution="Primary DNS Suffix Devolution"
  7362. DNS_UseDomainNameDevolution_Help="Determines whether the DNS client performs primary DNS suffix devolution in a name resolution process.\n\nWhen a user submits a query for a single-label name, such as "example", a local DNS client attaches a suffix, such as "microsoft.com", resulting in the query "example.microsoft.com", before sending the query to a DNS server.\n\nIf a DNS Suffix Search List is not specified, the DNS client attaches the Primary DNS Suffix to a single-label name, and, if this query fails, the Connection-Specific DNS suffix is attached for a new query. If none of these queries are resolved, the client devolves the Primary DNS Suffix of the computer (drops the leftmost label of the Primary DNS Suffix), attaches this devolved Primary DNS suffix to the single-label name, and submits this new query to a DNS server.\n\nFor example, if the primary DNS suffix ooo.aaa.microsoft.com is attached to the non-dot-terminated single-label name "example," and the DNS query for example.ooo.aaa.microsoft.com fails, the DNS client devolves the primary DNS suffix (drops the leftmost label), and submits a query for example.aaa.microsoft.com. If this query fails, the primary DNS suffix is devolved further and the query example.microsoft.com is submitted. If this query fails, devolution continues and the query example.microsoft.com is submitted. The primary DNS suffix would not be devolved further because the DNS suffix has two labels, "microsoft.com". The primary DNS suffix cannot be devolved to less than two labels.\n\nIf this setting is enabled, DNS clients on the computers to which this setting is applied attempt to resolve names that are concatenations of the single-label name to be resolved and the devolved Primary DNS Suffix.\n\nIf this setting is disabled, DNS clients on the computers to which this setting is applied donot attempt to resolve names that are concatenations of the single-label name to be resolved and the devolved Primary DNS Suffix.\n\nIf this setting is not configured, it is not applied to any co
  7363. DNS_PrimaryDnsSuffix_Help="Specifies the primary Domain Name System (DNS) suffix for all affected computers. The primary DNS suffix is used in DNS name registration and DNS name resolution.\n\nThis setting lets you specify a primary DNS suffix for a group of computers and prevents users, including administrators, from changing it.\n\nIf you disable this setting or do not configure it, each computer uses its local primary DNS suffix, which is usually the DNS name of Active Directory domain to which it is joined. However, administrators can use System in Control Panel to change the primary DNS suffix of a computer.\n\nTo use this setting, in the text box provided, type the entire primary DNS suffix you want to assign. For example, microsoft.com.\n\nThis setting does not disable the DNS Suffix and NetBIOS Computer Name dialog box that administrators use to change the primary DNS suffix of a computer. However, if administrators enter a suffix, that suffix is ignored while this setting is enabled.\n\nImportant: To make changes to this setting effective, you must restart Windows on all computers affected by the setting.\n\nNote: To change the primary DNS suffix of a computer without setting a setting, click System in Control Panel, click the Network Identification tab, click Properties, click More, and then enter a suffix in the "Primary DNS suffix of this computer" box.\n\nFor more information about DNS, see "Domain Name System (DNS)" in Help."
  7364. DNS_PrimaryDnsSuffix="Primary DNS Suffix"
  7365. DNS_PrimaryDnsSuffixBox="Enter a primary DNS suffix:"
  7366. DNS_RegistrationTtl="TTL Set in the A and PTR records"
  7367. DNS_RegistrationTtl_Help="Specifies the value for the Time-To-Live (TTL) field in A and PTR resource records registered by the computers to which this setting is applied.\n\nTo specify the TTL, click Enable, and then enter a value in seconds (for example, the value 900 is 15 minutes).\n\nIf this setting is not configured, it is not applied to any computer."
  7368. DNS_RegistrationTtlLabel="Seconds:"
  7369. DNS_UpdateSecurityLevel="Update Security Level"
  7370. DNS_UpdateSecurityLevel_Help="Specifies whether the computers to which this setting is applied use secure dynamic update or standard dynamic update for registration of DNS records.\n\nTo enable this setting, click Enable, and then choose one of the following values.\n\nUnsecure followed by secure - if this option is chosen, computers send secure dynamic updates only when nonsecure dynamic updates are refused.\n\nOnly Unsecure - if this option is chosen, computers send only nonsecure dynamic updates.\n\nOnly Secure - if this option is chosen, computers send only secure dynamic updates.\n\nIf this setting is not configured, it is not applied to any computers, and computers use their local configuration."
  7371. DNS_UpdateSecurityLevel_box="Update Security Level:"
  7372. DNS_UpdateSecurityLevel_OnlySecure="Only Secure"
  7373. DNS_UpdateSecurityLevel_OnlyUnsecure="Only Unsecure"
  7374. DNS_UpdateSecurityLevel_UnsecureFollowedBySecure="Unsecure followed by Secure"
  7375. DNS_AppendToMultiLabelName="Append DNS Suffixes to resolve multi-label names"
  7376. DNS_AppendToMultiLabelName_Help="Determines whether local a DNS client should attach DNS suffixes to a multi-label, non-dot-terminated name prior to submission of a DNS query for that name.\n\nA multi-label, non-dot-terminated name contains at least one dot, but not as its first or last character, for example, "www.microsoft.com".\n\nWith this setting enabled, when a user submits a query for a multi-label, non-dot-terminated name, such as "www.microsoft.com", a local DNS client attempts to resolve the name as is, that is, as "www.microsoft.com." or "www.hr". If such name resolution fails, then DNS client attaches a suffix, such as "microsoft.com" or "example.net", resulting in the query "www.microsoft.com.microsoft.com." or "www.hr.example.net", and sends the query to a DNS server.\n\nWith this setting disabled, when a user submits a query for a multi-label, non-dot-terminated name, such as "www.microsoft.com" or "www.hr", a local DNS client attempts to resolve the name only as is, that is, as "www.microsoft.com." or "www.hr". Regardless of the query result, the DNS client does not attempt to attach any DNS suffix to the specified name, and it resolves the query for the concatenated name.\n\nIf this setting is not configured, it is not applied to any computers, and computers use their local configuration.
  7377. DNS_UpdateTopLevelDomainZones="Update Top Level Domain Zones"
  7378. DNS_UpdateTopLevelDomainZones_Help="Specifies whether the computers to which this setting is applied may send dynamic updates to the zones named with a single label name, also known as top-level domain zones, for example, "com".\n\nBy default, a DNS client configured to perform dynamic DNS update sends dynamic updates to the DNS zone that is authoritative for its DNS resource records, unless the authoritative zone is a top-level domain and root zone.\n\nIf this setting is enabled, computers to which this policy is applied send dynamic updates to any zone that is authoritative for the resource records that the computer needs to update, except the root zone.\n\nIf this setting is disabled, computers to which this policy is applied do not send dynamic updates to the root and/or top-level domain zones that are authoritative for the resource records that the computer needs to update.\n\nIf this setting is not configured, it is not applied to any computers, and computers use their local configuration."
  7379. DOnly="Restrict D drive only"
  7380. DownlevelBrowse_Help="Allows users to use the Add Printer Wizard to search the network for shared printers.\n\nIf you enable this setting or do not configure it, when users choose to add a network printer by selecting the "A network printer, or a printer attached to another computer" radio button on Add Printer Wizard's page 2, and also check the "Connect to this printer (or to browse for a printer, select this option and click Next)" radio button on Add Printer Wizard's page 3, and do not specify a printer name in the adjacent "Name" edit box, then Add Printer Wizard displays the list of shared printers on the network and invites to choose a printer from the shown list.\n\nIf you disable this setting, the network printer browse page is removed from within the Add Printer Wizard, and users cannot search the network but must type a printer name.\n\nNote: This setting affects the Add Printer Wizard only. It does not prevent users from using other programs to search for shared printers or to connect to network printers."
  7381. DownlevelBrowse="Browse the network to find printers"
  7382. Do_not_display_Manage_Your_Server_page="Do not display Manage Your Server page at logon"
  7383. Do_not_display_Manage_Your_Server_page_Explain="Specifies whether to turn off the automatic display of the Manage Your Server page.\n\n If the status is set to Enabled, the Manage Your Server page does not appear each time an administrator logs on to the server.\n\n If the status is set to Disabled or Not Configured, the Manage Your Server page does appear each time an administrator logs on to the server. However, if the administrator has selected the  Don t display this page at logon check box at the bottom of the Manage Your Server page, the page will not appear.\n\n Regardless of this setting's status, the Manage Your Server page is still available from the Start menu."
  7384. DQ_Enable_Help="Enables and disables disk quota management on all NTFS volumes of the computer, and prevents users from changing the setting.\n\nIf you enable this setting, disk quota management is enabled, and users cannot disable it.\n\nIf you disable the setting, disk quota management is disabled, and users cannot enable it.\n\nIf this setting is not configured, disk quota management is disabled by default, but administrators can enable it.\n\nTo prevent users from changing the setting while a setting is in effect, the system disables the "Enable quota management" option on the Quota tab of NTFS volumes.\n\nNote: This setting enables disk quota management but does not establish or enforce a particular disk quota limit. To specify a disk quota limit, use the "Default quota limit and warning level" setting. Otherwise, the system uses the physical space on the volume as the quota limit.\n\nNote: To enable or disable disk quota management without specifying a setting, in My Computer, right-click the name of an NTFS volume, click Properties, click the Quota tab, and then click the "Enable quota management" option."
  7385. DQ_Enable="Enable disk quotas"
  7386. DQ_Enforce_Help="Determines whether disk quota limits are enforced and prevents users from changing the setting.\n\nIf you enable this setting, disk quota limits are enforced. If you disable this setting, disk quota limits are not enforced. When you enable or disable the setting, the system disables the "Deny disk space to users exceeding quota limit" option on the Quota tab so administrators cannot make changes while the setting is in effect.\n\nIf the setting is not configured, the disk quota limit is not enforced by default, but administrators change the setting.\n\nEnforcement is optional. When users reach an enforced disk quota limit, the system responds as though the physical space on the volume were exhausted. When users reach an unenforced limit, their status in the Quota Entries window changes, but they can continue to write to the volume as long as physical space is available.\n\nNote: This setting overrides user settings that enable or disable quota enforcement on their volumes.\n\nNote: To specify a disk quota limit, use the "Default quota limit and warning level" setting. Otherwise, the system uses the physical space on the volume as the quota limit."
  7387. DQ_Enforce="Enforce disk quota limit"
  7388. DQ_Limit_Help="Specifies the default disk quota limit and warning level for new users of the volume.\n\nThis setting determines how much disk space can be used by each user on each of the NTFS file system volumes on a computer. It also specifies the warning level, the point at which the user's status in the Quota Entries window changes to indicate that the user is approaching the disk quota limit.\n\nThis setting overrides new users settings for the disk quota limit and warning level on their volumes, and it disables the corresponding options in the "Select the default quota limit for new users of this volume" section on the Quota tab.\n\nThis setting applies to all new users as soon as they write to the volume. It does not affect disk quota limits for current users or affect customized limits and warning levels set for particular users (on the Quota tab in Volume Properties).\n\nIf you disable this setting or do not configure it, the disk space available to users is not limited. The disk quota management feature uses the physical space on each volume as its quota limit and warning level.\n\nWhen you select a limit, remember that the same limit applies to all users on all volumes, regardless of actual volume size. Be sure to set the limit and warning level so that it is reasonable for the range of volumes in the group.\n\nThis setting is effective only when disk quota management is enabled on the volume. Also, if disk quotas are not enforced, users can exceed the quota limit you set. When users reach the quota limit, their status in the Quota Entries window changes, but users can continue to write to the volume."
  7389. DQ_Limit="Default quota limit and warning level"
  7390. DQ_LimitLabel="Default quota limit:"
  7391. DQ_LimitTip1="Specify a quota limit and warning level applied to users when"
  7392. DQ_LimitTip2="they first write to a quota-enabled volume."
  7393. DQ_LimitUnits="Units"
  7394. DQ_LimitValue="Value"
  7395. DQ_LogEventOverLimit_Help="Determines whether the system records an event in the local Application log when users reach their disk quota limit on a volume, and prevents users from changing the logging setting.\n\nIf you enable this setting, the system records an event when the user reaches their limit. If you disable this setting, no event is recorded. Also, when you enable or disable this setting, the system disables the "Log event when a user exceeds their quota limit" option on the Quota tab, so administrators cannot change the setting while a setting is in effect.\n\nIf the setting is not configured, no events are recorded, but administrators can use the Quota tab option to change the setting.\n\nThis setting is independent of the enforcement settings for disk quotas. As a result, you can direct the system to log an event, regardless of whether or not you choose to enforce the disk quota limit.\n\nAlso, this setting does not affect the Quota Entries window on the Quota tab. Even without the logged event, users can detect that they have reached their limit, because their status in the Quota Entries window changes.\n\nNote: To find the logging option, in My Computer, right-click the name of an NTFS file system volume, click Properties, and then click the Quota tab."
  7396. DQ_LogEventOverLimit="Log event when quota limit exceeded"
  7397. DQ_LogEventOverThreshold_Help="Determines whether the system records an event in the Application log when users reach their disk quota warning level on a volume.\n\nIf you enable this setting, the system records an event. If you disable this setting, no event is recorded. When you enable or disable the setting, the system disables the corresponding "Log event when a user exceeds their warning level" option on the Quota tab, so that administrators cannot change logging while a setting is in effect.\n\nIf the setting is not configured, no event is recorded, but administrators can use the Quota tab option to change the logging setting.\n\nThis setting does not affect the Quota Entries window on the Quota tab. Even without the logged event, users can detect that they have reached their warning level because their status in the Quota Entries window changes.\n\nNote: To find the logging option, in My Computer, right-click the name of an NTFS file system volume, click Properties, and then click the Quota tab."
  7398. DQ_LogEventOverThreshold="Log event when quota warning level exceeded"
  7399. DQ_RemovableMedia_Help="Extends the disk quota policies in this folder to NTFS file system volumes on removable media.\n\nIf you disable this setting or do not configure it, the disk quota policies established in this folder apply to fixed-media NTFS volumes only. Note: When this setting is applied, the computer will apply the disk quota to both fixed and removable media."
  7400. DQ_RemovableMedia="Apply policy to removable media"
  7401. DQ_ThresholdLabel="Default warning level:"
  7402. DQ_ThresholdUnits="Units"
  7403. DQ_ThresholdValue="Value"
  7404. DQ_UnitsEB="EB"
  7405. DQ_UnitsGB="GB"
  7406. DQ_UnitsKB="KB"
  7407. DQ_UnitsMB="MB"
  7408. DQ_UnitsPB="PB"
  7409. DQ_UnitsTB="TB"
  7410. DragAndDrop="Prohibit Drag-and-Drop"
  7411. DragAndDropHelp="Prevents users from adding or removing tasks by moving or copying programs in the Scheduled Tasks folder.\n\nThis setting disables the Cut, Copy, Paste, and Paste shortcut items on the context menu and the Edit menu in Scheduled Tasks. It also disables the drag-and-drop features of the Scheduled Tasks folder.\n\nAs a result, users cannot add new scheduled tasks by dragging, moving, or copying a document or program into the Scheduled tasks folder.\n\nThis setting does not prevent users from using other methods to create new tasks, and it does not prevent users from deleting tasks.\n\nNote: This setting appears in the Computer Configuration and User Configuration folders. If both settings are configured, the setting in Computer Configuration takes precedence over the setting in User Configuration."
  7412. DriverSearchPlaces="Configure driver search locations"
  7413. DriverSearchPlaces_Help="This setting configures the location that Windows searches for drivers when a new piece of hardware is found.\n\nBy default, Windows searches the following places for drivers: local installation, floppy drives, CD-ROM drives, Windows Update.\n\nUsing this setting, you may remove any or all of these from the search algorithm.\n\nIf you enable this setting, you can remove any of the three locations by selecting the associated check box beside the location name.\n\nIf you disable or do not configure this setting, Windows searches the location installation, floppy drives, CD-ROM drives, and Windows Update for drivers."
  7414. DriverSearchPlaces_Floppies="Don't search floppy disk drives"
  7415. DriverSearchPlaces_CD="Don't search CD-ROM drives"
  7416. DriverSearchPlaces_WindowsUpdate="Don't search Windows Update"
  7417. DriverSign_Block="Block"
  7418. DriverSign_None="Ignore"
  7419. DriverSign_Warn="Warn"
  7420. DriverSigning_Help="Determines how the system responds when a user tries to install device driver files that are not digitally signed.\n\nThis setting establishes the least secure response permitted on the systems of users in the group. Users can use System in Control Panel to select a more secure setting, but when this setting is enabled, the system does not implement any setting less secure than the one the setting established.\n\nWhen you enable this setting, use the drop-down box to specify the desired response.\n\n-- "Ignore" directs the system to proceed with the installation even if it includes unsigned files.\n\n-- "Warn" notifies the user that files are not digitally signed and lets the user decide whether to stop or to proceed with the installation and whether to permit unsigned files to be installed. "Warn" is the default.\n\n-- "Block" directs the system to refuse to install unsigned files. As a result, the installation stops, and none of the files in the driver package are installed.\n\nTo change driver file security without specifying a setting, use System in Control Panel. Right-click My Computer, click Properties, click the Hardware tab, and then click the Driver Signing button."
  7421. DriverSigning="Code signing for device drivers"
  7422. DriverSigningOp="When Windows detects a driver file without a digital signature:"
  7423. EE_EnablePersistentTimeStamp="Enable Persistent Time Stamp"
  7424. EE_EnablePersistentTimeStamp_Help="The Persistent System Timestamp allows the system to detect the time of unexpected shutdowns by writing the current time to disk on a schedule controlled by the Timestamp Interval.\n\nIf you enable this setting, the Persistent System Timestamp will be refreshed according to the Timestamp Interval.\n\nIf you disable this setting, the Persistent System Timestamp will be turned off and the timing of unexpected shutdowns will not be detected.\n\nIf you do not configure this setting, the default behavior will occur.\n\nNote: By default, the Persistent System Timestamp is refreshed every 60 seconds on the Windows Server 2003 family. This feature may interfere with power configuration settings that turn off hard disks after a period of inactivity. These power settings may be accessed in the Power Options Control Panel."
  7425. EE_EnablePersistentTimeStamp_Desc1="The setting allows you to customize how often the
  7426. EE_EnablePersistentTimeStamp_Desc2="Persistent System Time Stamp is written to the disk."
  7427. EE_EnablePersistentTimeStamp_Desc3="The range is 1 to 86400 seconds (1 day).
  7428. EE_EnablePersistentTimeStamp_Desc4="Seconds: "
  7429. EnableAdminTSRemote_Help="Allows Terminal Services administrators to install and configure programs remotely.\n\nBy default, system administrators can install programs only when system administrators are logged on to the computer on which the program is being installed. This setting creates a special exception for computers running Terminal Services.\n\nThis setting affects system administrators only. Other users cannot install programs remotely."
  7430. EnableAdminTSRemote="Allow admin to install from Terminal Services session"
  7431. EnableSlowLinkDetect_Help="Disables the slow link detection feature.\n\nSlow link detection measures the speed of the connection between a user's computer and the remote server that stores the roaming user profile. When the system detects a slow link, the related settings in this folder tell the system how to respond.\n\nIf you enable this setting, the system does not detect slow connections or recognize any connections as being slow. As a result, the system does not respond to slow connections to user profiles, and it ignores the settings that tell the system how to respond to a slow connection.\n\nIf you disable this setting or do not configure it, slow link detection is enabled. The system measures the speed of the connection between the user's computer and profile server. If the connection is slow (as defined by the "Slow network connection timeout for user profiles" setting), the system applies the other settings set in this folder to determine how to proceed. By default, when the connection is slow, the system loads the local copy of the user profile."
  7432. EnableSlowLinkDetect="Do not detect slow network connections"
  7433. EnableSlowLinkUI="Prompt user when slow link is detected"
  7434. EnableSlowLinkUI_Help="Notifies users when their roaming profile is slow to load. The notice lets users decide whether to use a local copy or to wait for the roaming user profile.\n\nIf you disable this setting or do not configure it, when a roaming user profile is slow to load, the system does not consult the user. Instead, it loads the local copy of the profile. If you have enabled the "Wait for remote user profile" setting, the system loads the remote copy without consulting the user.\n\nThis setting and related settings in this folder together define the system's response when roaming user profiles are slow to load.\n\nTo adjust the time within which the user must respond to this notice, use the "Timeout for dialog boxes" setting.\n\nImportant: If the "Do not detect slow network connections" setting is enabled, this setting is ignored. Also, if the "Delete cached copies of roaming profiles" setting is enabled, there is no local copy of the roaming profile to load when the system detects a slow connection."
  7435. EnableUserControl_Help="Permits users to change installation options that typically are available only to system administrators.\n\nThis setting bypasses some of the security features of Windows Installer. It permits installations to complete that otherwise would be halted due to a security violation.\n\nThe security features of Windows Installer prevent users from changing installation options typically reserved for system administrators, such as specifying the directory to which files are installed. If Windows Installer detects that an installation package has permitted the user to change a protected option, it stops the installation and displays a message. These security features operate only when the installation program is running in a privileged security context in which it has access to directories denied to the user.\n\nThis setting is designed for less restrictive environments. It can be used to circumvent errors in an installation program that prevents software from being installed."
  7436. EnableUserControl="Enable user control over installs"
  7437. EnforcePoliciesOnly="Enforce Show Policies Only"
  7438. EnforcePoliciesOnly_Help="Prevents administrators from viewing or using Group Policy preferences.\n\nA Group Policy administration (.adm) file can contain both true settings and preferences. True settings, which are fully supported by Group Policy, must use registry entries in the Software\Policies or Software\Microsoft\Windows\CurrentVersion\Policies registry subkeys. Preferences, which are not fully supported, use registry entries in other subkeys.\n\nIf you enable this setting, the "Show Policies Only" command is turned on, and administrators cannot turn it off. As a result, Group Policy Object Editor displays only true settings; preferences do not appear.\n\nIf you disable this setting or do not configure it, the "Show Policies Only" command is turned on by default, but administrators can view preferences by turning off the "Show Policies Only" command.\n\nNote: To find the "Show Policies Only" command, in Group Policy Object Editor, click the Administrative Templates folder (either one), right-click the same folder, and then point to "View."\n\nIn Group Policy Object Editor, preferences have a red icon to distinguish them from true settings, which have a blue icon."
  7439. EnforceShellExtensionSecurity_Help="This setting is designed to ensure that shell extensions can operate on a per-user basis. If you enable this setting, Windows is directed to only run those shell extensions that have either been approved by an administrator or that will not impact other users of the machine.\n\nA shell extension only runs if there is an entry in at least one of the following locations in registry.\n\nFor shell extensions that have been approved by the administrator and are available to all users of the computer, there must be an entry at HKEY_LOCAL_MACHINE\Software\Microsoft\Windows\CurrentVersion\Shell Extensions\Approved.\n\nFor shell extensions to run on a per-user basis, there must be an entry at HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Shell Extensions\Approved."
  7440. EnforceShellExtensionSecurity="Allow only per user or approved shell extensions"
  7441. Exclude_Tip1="You can enter multiple directory names, semi-colon separated,"
  7442. Exclude_Tip2="all relative to the root of the user's profile"
  7443. ExcludeDirectories_Help="Lets you add to the list of folders excluded from the user's roaming profile.\n\nThis setting lets you exclude folders that are normally included in the user's profile. As a result, these folders do not need to be stored by the network server on which the profile resides and do not follow users to other computers.\n\nBy default, the History, Local Settings, Temp, and Temporary Internet Files folders are excluded from the user's roaming profile.\n\nIf you enable this setting, you can exclude additional folders.\n\nIf you disable this setting or do not configure it, only the default folders are excluded.\n\nNote: You cannot use this setting to include the default folders in a roaming user profile."
  7444. ExcludeDirectories="Exclude directories in roaming profile"
  7445. ExcludeMessage="Prevent the following directories from roaming with the profile:"
  7446. Execution="Prevent Task Run or End"
  7447. ExecutionHelp="Prevents users from starting and stopping tasks manually.\n\nThis setting removes the Run and End Task items from the context menu that appears when you right-click a task. As a result, users cannot start tasks manually or force tasks to end before they are finished.\n\nNote: This setting appears in the Computer Configuration and User Configuration folders. If both settings are configured, the setting in Computer Configuration takes precedence over the setting in User Configuration."
  7448. ExplorerWindow="Windows Explorer window"
  7449. ForceActiveDesktopOn_Help="Enables Active Desktop and prevents users from disabling it.\n\nThis setting prevents users from trying to enable or disable Active Desktop while a policy controls it.\n\nIf you disable this setting or do not configure it, Active Desktop is disabled by default, but users can enable it.\n\nNote: If both the "Enable Active Desktop" setting and the "Disable Active Desktop" setting are enabled, the "Disable Active Desktop" setting is ignored. If the "Turn on Classic Shell" setting ( in User Configuration\Administrative Templates\Windows Components\Windows Explorer) is enabled, Active Desktop is disabled, and both of these policies are ignored."
  7450. ForceActiveDesktopOn_Tip="Allows HTML and JPEG Wallpaper"
  7451. ForceActiveDesktopOn="Enable Active Desktop"
  7452. ForceClassicControlPanel="Force classic Control Panel Style"
  7453. ForceClassicControlPanel_Help="This setting affects the visual style and presentation of the Control Panel.\n\nIt allows you to disable the new style of Control Panel, which is task-based, and use the Windows 2000 style, referred to as the "classic" Control Panel. The new Control Panel, referred to as the "simple" Control Panel, simplifies how users interact with settings by providing easy-to-understand tasks that help users get their work done quickly. The Control Panel allows the users to configure their computer, add or remove programs, and change settings.\n\nIf you enable this setting, Control Panel sets the classic Control Panel. The user cannot switch to the new simple style.\n\nIf you disable this setting, Control Panel is set to the task-based style. The user cannot switch to the classic Control Panel style.\n\nIf you do not configure it, the default is the task-based style, which the user can change."
  7454. ForceStartMenuLogoff_Help="Adds the "Log Off <username>" item to the Start menu and prevents users from removing it.\n\nIf you enable this setting, the Log Off <username> item appears in the Start menu. This setting also removes the Display Logoff item from Start Menu Options. As a result, users cannot remove the Log Off <username> item from the Start Menu.\n\nIf you disable this setting or do not configure it, users can use the Display Logoff item to add and remove the Log Off item.\n\nThis setting affects the Start menu only. It does not affect the Log Off item on the Windows Security dialog box that appears when you press Ctrl+Alt+Del.\n\nNote: To add or remove the Log Off item on a computer, click Start, click Settings, click Taskbar and Start Menu, click the Start Menu Options tab, and then, in the Start Menu Settings box, click Display Logoff.\n\nAlso, see "Remove Logoff" in User Configuration\Administrative Templates\System\Logon/Logoff."
  7455. ForceStartMenuLogoff="Add Logoff to the Start Menu"
  7456. DiskQuota="Disk Quotas"
  7457. GPDCOptionAny="Use any available domain controller"
  7458. GPDCOptionInherit="Inherit from Active Directory Snap-ins"
  7459. GPDCOptionPDC="Use the Primary Domain Controller"
  7460. GPDCOptions="Group Policy domain controller selection"
  7461. GPDCOptions_Help="Determines which domain controller the Group Policy Object Editor snap-in uses.\n\n-- "Use the Primary Domain Controller" indicates that the Group Policy Object Editor snap-in reads and writes changes to the domain controller designated as the PDC Operations Master for the domain.\n\n-- "Inherit from Active Directory Snap-ins" indicates that the Group Policy Object Editor snap-in reads and writes changes to the domain controller that Active Directory Users and Computers or Active Directory Sites and Services snap-ins use.\n\n-- "Use any available domain controller" indicates that the Group Policy Object Editor snap-in can read and write changes to any available domain controller.\n\nIf you disable this setting or do not configure it, the Group Policy Object Editor snap-in uses the domain controller designated as the PDC Operations Master for the domain.\n\nNote: To change the PDC Operations Master for a domain, in Active Directory Users and Computers, right-click a domain, and then click "Operations Masters.""
  7462. GPDCOptionsDesc="When Group Policy Object Editor is selecting a domain controller to use, it should:"
  7463. GPOnly_Tip1="The System.adm file you have loaded requires Group Policy Object Editor"
  7464. GPOnly_Tip2="You cannot use the System Policy Editor"
  7465. GPOnly_Tip3="to display Group Policy settings."
  7466. GPOnly_Tip4=" "
  7467. GPOnly_Tip5="Refer to the Group Policy White Paper for more information."
  7468. GPOnly="Unsupported Administrative Templates"
  7469. GPOnlyPolicy="System.adm"
  7470. GPO_Script_Tip="Range is 0 to 32000, use 0 for infinite wait time"
  7471. GPRefreshRate_C_Desc1="This setting allows you to customize how often Group Policy is applied"
  7472. GPRefreshRate_C_Desc2="to computers. The range is 0 to 64800 minutes (45 days)."
  7473. GPRefreshRate_DC_Desc1="This setting allows you to customize how often Group Policy is applied"
  7474. GPRefreshRate_DC_Desc2="to domain controllers. The range is 0 to 64800 minutes (45 days)."
  7475. GPRefreshRate_U_Desc1="This setting allows you to customize how often Group Policy is applied"
  7476. GPRefreshRate_U_Desc2="to users. The range is 0 to 64800 minutes (45 days)."
  7477. GPRefreshRate="Minutes:"
  7478. GPRefreshRateOffset_Desc1="This is a random time added to the refresh interval to prevent"
  7479. GPRefreshRateOffset_Desc2="all clients from requesting Group Policy at the same time."
  7480. GPRefreshRateOffset_Desc3="The range is 0 to 1440 minutes (24 hours)"
  7481. GPRefreshRateOffset="Minutes:"
  7482. GPTransferRate_Help="Defines a slow connection for purposes of applying and updating Group Policy.\n\nIf the rate at which data is transferred from the domain controller providing a policy update to the computers in this group is slower than the rate specified by this setting, the system considers the connection to be slow.\n\nThe system's response to a slow policy connection varies among policies. The program implementing the policy can specify the response to a slow link. Also, the policy processing settings in this folder lets you override the programs' specified responses to slow links.\n\nTo use this setting, in the "Connection speed" box, type a decimal number between 0 and 4,294,967,200 (0xFFFFFFA0), indicating a transfer rate in kilobits per second. Any connection slower than this rate is considered to be slow. If you type 0, all connections are considered to be fast.\n\nIf you disable this setting or do not configure it, the system uses the default value of 500 kilobits per second.\n\nThis setting appears in the Computer Configuration and User Configuration folders. The setting in Computer Configuration defines a slow link for policies in the Computer Configuration folder. The setting in User Configuration defines a slow link for settings in the User Configuration folder.\n\nAlso, see the "Do not detect slow network connections" and related policies in Computer Configuration\Administrative Templates\System\User Profile. Note: If the profile server has IP connectivity, the connection speed setting is used. If the profile server does not have IP connectivity, the SMB timing is used."
  7483. GPTransferRate="Group Policy slow link detection"
  7484. GreyMSIAds="Gray unavailable Windows Installer programs Start Menu shortcuts"
  7485. GreyMSIAds_Help="Displays Start menu shortcuts to partially installed programs in gray text.\n\nThis setting makes it easier for users to distinguish between programs that are fully installed and those that are only partially installed.\n\nPartially installed programs include those that a system administrator assigns using Windows Installer and those that users have configured for full installation upon first use.\n\nIf you disable this setting or do not configure it, all Start menu shortcuts appear as black text.\n\nNote: Enabling this setting can make the Start menu slow to open."
  7486. GroupPolicyRefreshRate_Help="Specifies how often Group Policy for computers is updated while the computer is in use (in the background). This setting specifies a background update rate only for Group Policies in the Computer Configuration folder.\n\nIn addition to background updates, Group Policy for the computer is always updated when the system starts.\n\nBy default, computer Group Policy is updated in the background every 90 minutes, with a random offset of 0 to 30 minutes.\n\nYou can specify an update rate from 0 to 64,800 minutes (45 days). If you select 0 minutes, the computer tries to update Group Policy every 7 seconds. However, because updates might interfere with users' work and increase network traffic, very short update intervals are not appropriate for most installations.\n\nIf you disable this setting, Group Policy is updated every 90 minutes (the default). To specify that Group Policy should never be updated while the computer is in use, select the "Turn off background refresh of Group Policy" policy.\n\nThe Group Policy refresh interval for computers policy also lets you specify how much the actual update interval varies. To prevent clients with the same update interval from requesting updates simultaneously, the system varies the update interval for each client by a random number of minutes. The number you type in the random time box sets the upper limit for the range of variance. For example, if you type 30 minutes, the system selects a variance of 0 to 30 minutes. Typing a large number establishes a broad range and makes it less likely that client requests overlap. However, updates might be delayed significantly.\n\nThis setting establishes the update rate for computer Group Policy. To set an update rate for user policies, use the "Group Policy refresh interval for users" setting (located in User Configuration\Administrative Templates\System\Group Policy).\n\nThis setting is only used when the "Turn off background refresh of Group Policy" setting is not enabled.\n\nNote: Consider notifying use
  7487. GroupPolicyRefreshRate="Group Policy refresh interval for computers"
  7488. GroupPolicyRefreshRateDC_Help="Specifies how often Group Policy is updated on domain controllers while they are running (in the background). The updates specified by this setting occur in addition to updates performed when the system starts.\n\nBy default, Group Policy on the domain controllers is updated every five minutes.\n\nYou can specify an update rate from 0 to 64,800 minutes (45 days). If you select 0 minutes, the domain controller tries to update Group Policy every 7 seconds. However, because updates might interfere with users' work and increase network traffic, very short update intervals are not appropriate for most installations.\n\nIf you disable this setting, the domain controller updates Group Policy every 5 minutes (the default). To specify that Group Policies for users should never be updated while the computer is in use, select the "Turn off background refresh of Group Policy" setting.\n\nThis setting also lets you specify how much the actual update interval varies. To prevent domain controllers with the same update interval from requesting updates simultaneously, the system varies the update interval for each controller by a random number of minutes. The number you type in the random time box sets the upper limit for the range of variance. For example, if you type 30 minutes, the system selects a variance of 0 to 30 minutes. Typing a large number establishes a broad range and makes it less likely that update requests overlap. However, updates might be delayed significantly.\n\nNote: This setting is used only when you are establishing policy for a domain, site, organizational unit (OU), or customized group. If you are establishing policy for a local computer only, the system ignores this setting."
  7489. GroupPolicyRefreshRateDC="Group Policy refresh interval for domain controllers"
  7490. GroupPolicyRefreshRateUser_Help="Specifies how often Group Policy for users is updated while the computer is in use (in the background). This setting specifies a background update rate only for the Group Policies in the User Configuration folder.\n\nIn addition to background updates, Group Policy for users is always updated when users log on.\n\nBy default, user Group Policy is updated in the background every 90 minutes, with a random offset of 0 to 30 minutes.\n\nYou can specify an update rate from 0 to 64,800 minutes (45 days). If you select 0 minutes, the computer tries to update user Group Policy every 7 seconds. However, because updates might interfere with users' work and increase network traffic, very short update intervals are not appropriate for most installations.\n\nIf you disable this setting, user Group Policy is updated every 90 minutes (the default). To specify that Group Policy for users should never be updated while the computer is in use, select the "Turn off background refresh of Group Policy" setting.\n\nThis setting also lets you specify how much the actual update interval varies. To prevent clients with the same update interval from requesting updates simultaneously, the system varies the update interval for each client by a random number of minutes. The number you type in the random time box sets the upper limit for the range of variance. For example, if you type 30 minutes, the system selects a variance of 0 to 30 minutes. Typing a large number establishes a broad range and makes it less likely that client requests overlap. However, updates might be delayed significantly.\n\nImportant: If the "Turn off background refresh of Group Policy" setting is enabled, this setting is ignored.\n\nNote: This setting establishes the update rate for user Group Policies. To set an update rate for computer Group Policies, use the "Group Policy refresh interval for computers" setting (located in Computer Configuration\Administrative Templates\System\Group Policy).\n\nTip: Consider notifying users that thei
  7491. GroupPolicyRefreshRateUser="Group Policy refresh interval for users"
  7492. HelpQualifiedRootDir_Comp="Restrict potentially unsafe HTML Help functions to specified folders"
  7493. HelpQualifiedRootDir="Restrict potentially unsafe HTML Help functions to specified folders"
  7494. HelpQualifiedRootDir_Edit="Enter folder names separated by semi-colons:"
  7495. HelpQualifiedRootDir_Example="Example: %windir%\Help;%windir%\pchealth;%programfiles%"
  7496. HelpQualifiedRootDir_Help="With this policy, you can restrict certain HTML Help commands to function only in HTML Help (.chm) files within specified folders and their subfolders. Alternatively, you can disable these commands on the entire system. It is strongly recommended that only folders requiring administrative privileges be added to this policy.\n\nThe "Shortcut" command is used to add a link to a Help topic, and runs executables that are external to the Help file. The "WinHelp" command is used to add a link to a Help topic, and runs a WinHLP32.exe Help (.hlp) file.\n\nWhen this policy is disabled, or not configured, these commands are fully functional for all Help files. \n\nWhen this policy is enabled, the commands will function only for .chm files in the specified folders and their subfolders. \n\nTo restrict the commands to one or more folders, enable the policy and enter the desired folders in the text box on the settings tab of the Policy Properties dialog box. Use a semicolon to separate folders. For example, to restrict the commands to only .chm files in the %windir%\help folder and D:\somefolder, add the following string to the edit box: "%windir%\help;D:\somefolder".\n\nTo disallow the "Shortcut" and "WinHelp" commands on the entire local system, enable the policy and leave the text box on the settings tab of the Policy Properties dialog box blank.\n\nNote: An environment variable may be used, (for example, %windir%), so long as it is defined on the system. For example, %programfiles% is not defined on some early versions of Windows.\n\nNote: Only folders on the local computer can be specified in this policy. You cannot use this policy to enable the "Shortcut" and "WinHelp" commands for .chm files that are stored on mapped drives or accessed using UNC paths.\n\nFor additional options, see the "Restrict these programs from being launched from Help" policy."
  7497. HSS_HelpCenterPolicies="Help and Support Center"
  7498. HSS_HeadlinesPolicy="Do not allow "Did you know" content to appear"
  7499. HSS_HeadlinesPolicy_Explain="Specifies whether to display the dynamically updated "Did you know" content on the home page of Help and Support Center. \n\nThis policy lets you remove the "Did you know" section of content from the home page of Help and Support Center. This content is dynamically updated when users are connected to the Internet, and provides up-to-date information about Windows, the computer, or other helpful topics. \n\nIf you enable this policy, Help and Support Center will no longer display the "Did you know" content. \n\nIf you disable this policy or do not configure it, Help and Support Center displays the "Did you know" content according to the system s setting. \n\nYou might want to enable this policy for users who do not have Internet access, as the content in the "Did you know" section will remain static indefinitely without an Internet connection."
  7500. IIS="Internet Information Services"
  7501. ImmortalPrintQueue_Help="Determines whether the domain controller can prune (delete from Active Directory) the printers published by this computer.\n\nBy default, the pruning service on the domain controller prunes printer objects from Active Directory if the computer that published them does not respond to contact requests. When the computer that published the printers restarts, it republishes any deleted printer objects.\n\nIf you enable this setting or do not configure it, the domain controller prunes this computer's printers when the computer does not respond.\n\nIf you disable this setting, the domain controller does not prune this computer's printers. This setting is designed to prevent printers from being pruned when the computer is temporarily disconnected from the network.\n\nNote: You can use the "Directory Pruning Interval" and "Directory Pruning Retry" settings to adjust the contact interval and number of contact attempts."
  7502. ImmortalPrintQueue="Allow pruning of published printers"
  7503. IncludeRegInProQuota="Include registry in file list"
  7504. Intellimenus_Help="Disables personalized menus.\n\nWindows personalizes long menus by moving recently used items to the top of the menu and hiding items that have not been used recently. Users can display the hidden items by clicking an arrow to extend the menu.\n\nIf you enable this setting, the system does not personalize menus. All menu items appear and remain in standard order. Also, this setting removes the "Use Personalized Menus" option so users do not try to change the setting while a setting is in effect.\n\nNote: Personalized menus require user tracking. If you enable the "Turn off user tracking" setting, the system disables user tracking and personalized menus and ignores this setting.\n\nTip: To Turn off personalized menus without specifying a setting, click Start, click Settings, click Taskbar and Start Menu, and then, on the General tab, clear the "Use Personalized Menus" option."
  7505. Intellimenus="Turn off personalized menus"
  7506. IntranetPrintersUrl_Help="Adds a link to an Internet or intranet Web page to the Add Printer Wizard.\n\nYou can use this setting to direct users to a Web page from which they can install printers.\n\nIf you enable this setting and type an Internet or intranet address in the text box, the system adds a Browse button to the "Specify a Printer" page in the Add Printer Wizard. The Browse button appears beside the "Connect to a printer on the Interner or on a home or office network" option. When users click Browse, the system opens an Internet browser and navigates to the specified URL address to display the available printers.\n\nThis setting makes it easy for users to find the printers you want them to add.\n\nAlso, see the "Custom support URL in the Printers folder's left pane" and "Web-based printing" settings in Computer Configuration\Administrative Templates\Printers."
  7507. IntranetPrintersUrl_Link="Printers Page URL"
  7508. IntranetPrintersUrl_Tip1="Enable this option to add a browse button for Internet printers "
  7509. IntranetPrintersUrl_Tip2="in the Add Printer Wizard. Use this setting to allow users browsing "
  7510. IntranetPrintersUrl_Tip3="the company's Intranet for printers. For example, you can "
  7511. IntranetPrintersUrl_Tip4="specify a URL like: http://www.company.com/printers. "
  7512. IntranetPrintersUrl_Tip5="To enable this option, the edit box below should not be empty."
  7513. IntranetPrintersUrl="Browse a common web site to find printers"
  7514. KMPrintersAreBlocked_Help="Determines whether printers using kernel-mode drivers may be installed on the local computer. Kernel-mode drivers have access to system-wide memory, and therefore poorly-written kernel-mode drivers can cause stop errors.\n\nIf you disable this setting, or do not configure it, then printers using a kernel-mode drivers may be installed on the local computer running Windows XP Home Edition and Windows XP Professional.\n\nIf you do not configure this setting on Windows Server 2003 family products, the installation of kernel-mode printer drivers will be blocked.\n\nIf you enable this setting, installation of a printer using a kernel-mode driver will not be allowed. \n\nNote: By applying this policy, existing kernel-mode drivers will be disabled upon installation of service packs or reinstallation of the Windows XP operating system. This policy does not affect 64-bit Itanium computers, because kernel-mode drivers cannot be installed on Intel 64-bit Itanium computers."
  7515. KMPrintersAreBlocked="Disallow installation of printers using kernel-mode drivers"
  7516. Lbl_AlwaysPinSubFoldersHelp1="Ensures all subfolders are available offline when a folder is made"
  7517. Lbl_AlwaysPinSubFoldersHelp2="available for offline use."
  7518. Lbl_AssignedOfflineFilesHelp1="Specify network files and folders that are always available offline."
  7519. Lbl_AssignedOfflineFilesHelp2="In the name field, type a fully-qualified UNC path for each file or folder. "
  7520. Lbl_AssignedOfflineFilesHelp3="Do not enter a value for the item."
  7521. Lbl_AssignedOfflineFilesList="Files and Folders: "
  7522. Lbl_CustomGoOfflineActionsHelp1="Specify non-default actions for servers that become unavailable."
  7523. Lbl_CustomGoOfflineActionsHelp2="Enter a server name paired with an action value listed below."
  7524. Lbl_CustomGoOfflineActionsHelp3="Values:"
  7525. Lbl_CustomGoOfflineActionsHelp4="0 = Work offline. Server's files are available to local computer"
  7526. Lbl_CustomGoOfflineActionsHelp5="1 = Never go offline. Server's files are unavailable to local computer"
  7527. Lbl_CustomGoOfflineActionsList="Customize actions: "
  7528. Lbl_DefCacheSizeHelp1="Value entered is [ percent disk used * 10,000 ]."
  7529. Lbl_DefCacheSizeHelp2="For example, to indicate 12.53%, enter 1253."
  7530. Lbl_DefCacheSizeSpin="Default cache size: "
  7531. Lbl_Disabled="Disabled"
  7532. Lbl_Enabled="Enabled"
  7533. Lbl_EnabledHelp1="When enabled, files from auto-cache shared folders are cached on"
  7534. Lbl_EnabledHelp2="the local computer. Users can also select specific folders and"
  7535. Lbl_EnabledHelp3="files to always be available when working offline."
  7536. Lbl_EnabledOptionsCombo="Select one: "
  7537. Lbl_EventLoggingLevelHelp1="0 = Cache data corrupted"
  7538. Lbl_EventLoggingLevelHelp2="1 = Log 'server offline'"
  7539. Lbl_EventLoggingLevelHelp3="2 = Level 1 + log 'net stopped' and 'net started'"
  7540. Lbl_EventLoggingLevelHelp4="3 = Level 2 + log 'server available for reconnection'"
  7541. Lbl_EventLoggingLevelSpin="Enter [0-3]: "
  7542. Lbl_ExtExclusionListEdit="Extensions: "
  7543. Lbl_ExtExclusionListHelp1="Files may be excluded from caching on auto-cache shared folders based"
  7544. Lbl_ExtExclusionListHelp2="on their extension. Enter a list of extensions to be excluded. Extensions"
  7545. Lbl_ExtExclusionListHelp3="must be preceded by an asterisk and period. "e.g. *.dbf;*.ndx;*.lnk"
  7546. Lbl_Fail="Never go offline"
  7547. Lbl_FullSync="Full"
  7548. Lbl_GoOfflineActionCombo="Action: "
  7549. Lbl_GoOfflineActionHelp1="Specify how the system is to respond when a network server"
  7550. Lbl_GoOfflineActionHelp2="becomes unavailable."
  7551. Lbl_GoOfflineActionHelp3="Never go offline = Server's files are unavailable to local computer"
  7552. Lbl_GoOfflineActionHelp4="Work offline = Server's files are available to local computer"
  7553. Lbl_NoConfigCacheHelp1="Prevents users from changing any cache configuration settings."
  7554. Lbl_NoPinFilesHelp1="Click on Show and enter a UNC path for each file or folder"
  7555. Lbl_NoPinFilesList="Files and Folders: "
  7556. Lbl_PurgeOnlyAutoCachedFiles="Delete only the temporary offline files."
  7557. Lbl_PurgeAtLogoffHelp1="Causes the local copy of any offline file accessed by the user"
  7558. Lbl_PurgeAtLogoffHelp2="to be deleted when the user logs off of the computer."
  7559. Lbl_QuickSync="Quick"
  7560. Lbl_ReminderFreqHelp1="Number of minutes between reminder balloons"
  7561. Lbl_ReminderFreqSpin="Minutes: "
  7562. Lbl_ReminderInitTimeoutHelp1="Sets the lifetime of the initial notification balloon displayed"
  7563. Lbl_ReminderInitTimeoutHelp2="when an Offline Files event occurs."
  7564. Lbl_ReminderInitTimeoutSpin="Seconds: "
  7565. Lbl_ReminderTimeoutHelp1="Sets the lifetime of the balloon displayed periodically reminding"
  7566. Lbl_ReminderTimeoutHelp2="users of the current condition of Offline Files."
  7567. Lbl_ReminderTimeoutSpin="Seconds: "
  7568. Lbl_SlowLinkSpeed_Help1="Value entered is [ bps / 100 ] --> Example: 128,000bps, enter 1280"
  7569. Lbl_SlowLinkSpeedSpin="Value: "
  7570. Lbl_WorkOffline="Work offline"
  7571. LimitSize_Help="Sets the maximum size of each user profile and determines the system's response when a user profile reaches the maximum size.\n\nIf you disable this setting or do not configure it, the system does not limit the size of user profiles.\n\nIf you enable this setting, you can do the following:\n\n-- Set a maximum permitted user profile size;\n\n-- Determine whether the registry files are included in the calculation of the profile size;\n\n-- Determine whether users are notified when the profile exceeds the permitted maximum size;\n\n-- Specify a customized message notifying users of the oversized profile;\n\n-- Determine how often the customized message is displayed.\n\nNote: This setting affects both local and roaming profiles."
  7572. LimitSize="Limit profile size"
  7573. LinkResolveIgnoreLinkInfo_Help="Determines whether Windows traces shortcuts back to their sources when it cannot find the target on the user's system.\n\nShortcut files typically include an absolute path to the original target file as well as the relative path to the current target file. When the system cannot find the file in the current target path, then, by default, it searches for the target in the original path. If the shortcut has been copied to a different computer, the original path might lead to a network computer, including external resources, such as an Internet server.\n\nIf you enable this setting, Windows only searches the current target path. It does not search for the original path even when it cannot find the target file in the current target path."
  7574. LinkResolveIgnoreLinkInfo="Do not track Shell shortcuts during roaming"
  7575. LoadBalance="Load balancing"
  7576. LocalProfile="Only allow local user profiles"
  7577. LocalProfile_Help="This setting determines if roaming user profiles are available on a particular computer. By default, when roaming profile users log on to a computer, their roaming profile is copied down to the local computer. If they have already logged on to this computer in the past, the roaming profile is merged with the local profile. Similarly, when the user logs off this computer, the local copy of their profile, including any changes they have made, is merged with the server copy of their profile.\n\nUsing the setting, you can prevent users configured to use roaming profiles from receiving their profile on a specific computer.\n\nIf you enable this setting, the following occurs on the affected computer: At first logon, the user receives a new local profile, rather than the roaming profile. At logoff, changes are saved to the local profile. All subsequent logons use the local profile. \n\nIf you disable this setting or do not configure it, the default behavior occurs, as indicated above.\n\nIf you enable both the "Prevent Roaming Profile changes from propagating to the server" setting and the "Only allow local user profiles" setting, roaming profiles are disabled.\n\nNote: This setting only affects roaming profile users."
  7578. LockTaskbar="Lock the Taskbar"
  7579. LockTaskbar_Help="This setting effects the taskbar, which is used to switch between running applications.\n\nThe taskbar includes the Start button, list of currently running tasks, and the notification area. By default, the taskbar is located at the bottom of the screen, but it can be dragged to any side of the screen. When it is locked, it cannot be moved or resized.\n\nIf you enable this setting, it prevents the user from moving or resizing the taskbar. While the taskbar is locked, auto-hide and other taskbar options are still available in Taskbar properties.\n\nIf you disable this setting or do not configure it, the user can configure the taskbar position.\n\nNote: Enabling this setting also locks the quicklaunch bar and any other toolbars that the user has on their taskbar. The toolbar's position is locked, and the user cannot show and hide various toolbars using the taskbar context menu."
  7580. Logon="Logon"
  7581. LogonType="Always use classic logon"
  7582. LogonType_Help="This setting forces the user to log on to the computer using the classic logon screen. By default, a workgroup is set to use the simple logon screen. This setting only works when the computer is not on a domain."
  7583. Readonlyuserprofile="Prevent Roaming Profile changes from propagating to the server"
  7584. Readonlyuserprofile_Help="This setting determines if the changes a user makes to their roaming profile are merged with the server copy of their profile.\n\nBy default, when a roaming profile user logs on to a computer, their roaming profile is copied down to the local computer. If they have already logged on to this computer in the past, the roaming profile is merged with the local profile. Similiarly, when the user logs off this computer, the local copy of their profile, including any changes they have made, is merged with the server copy of their profile.\n\nUsing the setting, you can prevent changes made to a roaming profile on a particular computer from being persisted.\n\nIf you enable this setting, the following occurs on the affected computer: At login, the user receives their roaming profile. But, any changes a user makes to their profile will not be merged to their roaming profile when they log off.\n\nIf this setting is disabled or not configured, the default behavior occurs, as indicated above.\n\nNote: This setting only affects roaming profile users."
  7585. MaxGPOScriptWait="Seconds:"
  7586. MaxGPOScriptWaitPolicy_Help="Determines how long the system waits for scripts applied by Group Policy to run.\n\nThis setting limits the total time allowed for all logon, startup, and shutdown scripts applied by Group Policy to finish running. If the scripts have not finished running when the specified time expires, the system stops script processing and records an error event.\n\nBy default, the system lets the combined set of scripts run for up to 600 seconds (10 minutes), but you can use this setting to adjust this interval.\n\nTo use this setting, in the Seconds box, type a number from 1 to 32,000 for the number of seconds you want the system to wait for the set of scripts to finish. To direct the system to wait until the scripts have finished, no matter how long they take, type 0.\n\nThis interval is particularly important when other system tasks must wait while the scripts complete. By default, each startup script must complete before the next one runs. Also, you can use the "Run logon scripts synchronously" setting to direct the system to wait for the logon scripts to complete before loading the desktop.\n\nAn excessively long interval can delay the system and inconvenience users. However, if the interval is too short, prerequisite tasks might not be done, and the system can appear to be ready prematurely."
  7587. MaxGPOScriptWaitPolicy="Maximum wait time for Group Policy scripts"
  7588. MaxRecentDocs_Help="Determines how many shortcuts the system can display in the Documents menu on the Start menu.\n\nThe Documents menu contains shortcuts to the nonprogram files the user has most recently opened. By default, the system displays shortcuts to the 10 most recently opened documents."
  7589. MaxRecentDocs="Maximum number of recent documents"
  7590. MemCheckBoxInRunDlg_Help="Lets users run a 16-bit program in a dedicated (not shared) Virtual DOS Machine (VDM) process.\n\nAll DOS and 16-bit programs run on Windows 2000 Professional and Windows XP Professional in the Windows Virtual DOS Machine program. VDM simulates a 16-bit environment, complete with the DLLs required by 16-bit programs. By default, all 16-bit programs run as threads in a single, shared VDM process. As such, they share the memory space allocated to the VDM process and cannot run simultaneously.\n\nEnabling this setting adds a check box to the Run dialog box, giving users the option of running a 16-bit program in its own dedicated NTVDM process. The additional check box is enabled only when a user enters a 16-bit program in the Run dialog box."
  7591. MemCheckBoxInRunDlg="Add "Run in Separate Memory Space" check box to Run dialog box"
  7592. MMC_ActiveDirDomTrusts="Active Directory Domains and Trusts"
  7593. MMC_ActiveDirSitesServices="Active Directory Sites and Services"
  7594. MMC_ActiveDirUsersComp="Active Directory Users and Computers"
  7595. MMC_ADMComputers="Administrative Templates (Computers)"
  7596. MMC_ADMUsers="Administrative Templates (Users)"
  7597. MMC_AppleTalkRouting="AppleTalk Routing"
  7598. MMC_AuthMan="Authorization Manager"
  7599. MMC_CertAuth="Certification Authority"
  7600. MMC_CertAuthPolSet="Certification Authority Policy Settings"
  7601. MMC_Certs="Certificates"
  7602. MMC_WirelessMon="Wireless Monitor"
  7603. MMC_CertsTemplate="Certificate Templates"
  7604. MMC_ComponentServices="Component Services"
  7605. MMC_ComputerManagement="Computer Management"
  7606. MMC_ConnectionSharingNAT="Connection Sharing (NAT)"
  7607. MMC_DCOMCFG="DCOM Configuration Extension"
  7608. MMC_DeviceManager="Device Manager"
  7609. MMC_DFS="Distributed File System"
  7610. MMC_DHCPRelayMgmt="DHCP Relay Management"
  7611. MMC_DiskDefrag="Disk Defragmenter"
  7612. MMC_DiskMgmt="Disk Management"
  7613. MMC_EventViewer="Event Viewer"
  7614. MMC_ExtensionSnapins="Extension snap-ins"
  7615. MMC_FAXService="FAX Service"
  7616. MMC_FolderRedirection="Folder Redirection"
  7617. MMC_GroupPolicy="Group Policy"
  7618. MMC_GroupPolicyManagementSnapIn="Group Policy Management"
  7619. MMC_GroupPolicySnapIn="Group Policy Object Editor"
  7620. MMC_GroupPolicyTab="Group Policy tab for Active Directory Tools"
  7621. MMC_GroupPolicyTab_Explain="Permits or prohibits use of the Group Policy tab in property sheets for the Active Directory Users and Computers and Active Directory Sites and Services snap-ins.\n\nIf you enable this setting, the Group Policy tab is displayed in the property sheet for a site, domain, or organizational unit diplayed by the Active Directory Users and Computers and Active Directory Sites and Services snap-ins. If you disable the setting, the Group Policy tab is not displayed in those snap-ins.\n\nIf this setting is not configured, the setting of the "Restrict users to the explicitly permitted list of snap-ins" setting determines whether this tab is displayed.\n\n-- If "Restrict users to the explicitly permitted list of snap-ins" is enabled, users will not have access to the Group Policy tab.\n\n To explicitly permit use of the Group Policy tab, enable this setting. If this setting is not configured (or disabled), the Group Policy tab is inaccessible.\n\n-- If "Restrict users to the explicitly permitted list of snap-ins" is disabled or not configured, users will have access to the Group Policy tab.\n\n To explicitly prohibit use of the Group Policy tab, disable this setting. If this setting is not configured (or enabled), the Group Policy tab is accessible.\n\nWhen the Group Policy tab is inaccessible, it does not appear in the site, domain, or organizational unit property sheets."
  7622. MMC_GroupPolicy_RSoPSnapin="Resultant Set of Policy snap-in extensions"
  7623. MMC_GroupPolicy_GPSnapin="Group Policy snap-in extensions"
  7624. MMC_IAS="Internet Authentication Service (IAS)"
  7625. MMC_IASLogging="IAS Logging"
  7626. MMC_IEMaintenance="Internet Explorer Maintenance"
  7627. MMC_IGMPRouting="IGMP Routing"
  7628. MMC_IIS="Internet Information Services"
  7629. MMC_IndexingService="Indexing Service"
  7630. MMC_Net_Framework=".Net Framework Configuration"
  7631. MMC_IPRouting="IP Routing"
  7632. MMC_IPSecurity="IP Security"
  7633. MMC_IPXRIPRouting="IPX RIP Routing"
  7634. MMC_IPXRouting="IPX Routing"
  7635. MMC_IPXSAPRouting="IPX SAP Routing"
  7636. MMC_LocalUsersGroups="Local Users and Groups"
  7637. MMC_LogicalMappedDrives="Logical and Mapped Drives"
  7638. MMC_OSPFRouting="OSPF Routing"
  7639. MMC_PerfLogsAlerts="Performance Logs and Alerts"
  7640. MMC_PublicKey="Public Key Policies"
  7641. MMC_QoSAdmission="QoS Admission Control"
  7642. MMC_RRA="Routing and Remote Access"
  7643. MMC_RAS_DialinUser="RAS Dialin - User Node"
  7644. MMC_RemoteAccess="Remote Access"
  7645. MMC_RemStore="Removable Storage"
  7646. MMC_Restrict_Author="Restrict the user from entering author mode"
  7647. MMC_restrict_Author_Explain="Prevents users from entering author mode.\n\nThis setting prevents users from opening the Microsoft Management Console (MMC) in author mode, explicitly opening console files in author mode, and opening any console files that open in author mode by default.\n\nAs a result, users cannot create console files or add or remove snap-ins. Also, because they cannot open author-mode console files, they cannot use the tools that the files contain.\n\nThis setting permits users to open MMC user-mode console files, such as those on the Administrative Tools menu in Windows 2000 Server family or Windows Server 2003 family. However, users cannot open a blank MMC console window on the Start menu. (To open the MMC, click Start, click Run, and type mmc.) Users also cannot open a blank MMC console window from a command prompt.\n\nIf you disable this setting or do not configure it, users can enter author mode and open author-mode console files."
  7648. MMC_Restrict_Explain="Permits or prohibits use of this snap-in.\n\nIf you enable this setting, the snap-in is permitted. If you disable the setting, the snap-in is prohibited.\n\nIf this setting is not configured, the setting of the "Restrict users to the explicitly permitted list of snap-ins" setting determines whether this snap-in is permitted or prohibited.\n\n-- If "Restrict users to the explicitly permitted list of snap-ins" is enabled, users cannot use any snap-in except those explicitly permitted.\n\n To explicitly permit use of this snap-in, enable this setting. If this setting is not configured (or disabled), this snap-in is prohibited.\n\n-- If "Restrict users to the explicitly permitted list of snap-ins" is disabled or not configured, users can use any snap-in except those explicitly prohibited.\n\n To explicitly prohibit use of this snap-in, disable this setting. If this setting is not configured (or enabled), the snap-in is permitted.\n\nWhen a snap-in is prohibited, it does not appear in the Add/Remove Snap-in window in MMC. Also, when a user opens a console file that includes a prohibited snap-in, the console file opens, but the prohibited snap-in does not appear."
  7649. MMC_Restrict_To_Permitted_Snapins="Restrict users to the explicitly permitted list of snap-ins"
  7650. MMC_restrict_To_Permitted_Snapins_Explain="Lets you selectively permit or prohibit the use of Microsoft Management Console (MMC) snap-ins.\n\n-- If you enable this setting, all snap-ins are prohibited, except those that you explicitly permit. Use this setting if you plan to prohibit use of most snap-ins.\n\n To explicitly permit a snap-in, open the Restricted/Permitted snap-ins setting folder and enable the settings representing the snap-in you want to permit. If a snap-in setting in the folder is disabled or not configured, the snap-in is prohibited.\n\n-- If you disable this setting or do not configure it, all snap-ins are permitted, except those that you explicitly prohibit. Use this setting if you plan to permit use of most snap-ins.\n\n To explicitly prohibit a snap-in, open the Restricted/Permitted snap-ins setting folder and then disable the settings representing the snap-ins you want to prohibit. If a snap-in setting in the folder is enabled or not configured, the snap-in is permitted.\n\nWhen a snap-in is prohibited, it does not appear in the Add/Remove Snap-in window in MMC. Also, when a user opens a console file that includes a prohibited snap-in, the console file opens, but the prohibited snap-in does not appear.\n\nNote: If you enable this setting, and you do not enable any settings in the Restricted/Permitted snap-ins folder, users cannot use any MMC snap-ins."
  7651. MMC_RESTRICT="Restricted/Permitted snap-ins"
  7652. MMC_ResultantSetOfPolicySnapIn="Resultant Set of Policy snap-in"
  7653. MMC_RIPRouting="RIP Routing"
  7654. MMC_RIS="Remote Installation Services"
  7655. MMC_Routing="Routing"
  7656. MMC_RSM="Removable Storage Management"
  7657. MMC_SCA="Security Configuration and Analysis"
  7658. MMC_ScriptsMachine="Scripts (Startup/Shutdown)"
  7659. MMC_ScriptsUser="Scripts (Logon/Logoff)"
  7660. MMC_Scripts="Scripts (Startup/Shutdown/Logon/Logoff)"
  7661. MMC_SecuritySettings="Security Settings"
  7662. MMC_SecurityTemplates="Security Templates"
  7663. MMC_SendConsoleMessage="Send Console Message"
  7664. MMC_ServiceDependencies="Service Dependencies"
  7665. MMC_Services="Services"
  7666. MMC_SharedFolders="Shared Folders"
  7667. MMC_SharedFolders_Ext="Shared Folders Ext"
  7668. MMC_SMTPProtocol="SMTP Protocol"
  7669. MMC_SNMP="SNMP"
  7670. MMC_SoftwareInstallationUsers="Software Installation (Users)"
  7671. MMC_SoftwareInstalationComputers="Software Installation (Computers)"
  7672. MMC_SysInfo="System Information"
  7673. MMC_SysProp="System Properties"
  7674. MMC_Telephony="Telephony"
  7675. MMC_TerminalServices="Terminal Services Configuration"
  7676. MMC_WirelessNetworkPolicy="Wireless Network (IEEE 802.11) Policies"
  7677. MMC_WMI="WMI Control"
  7678. MMC="Microsoft Management Console"
  7679. MMC_RemoteDesktop="Remote Desktops"
  7680. MMC_ExtendView="Extended View (Web View)"
  7681. MMC_LinkToWeb="Link to Web Address"
  7682. MMC_IpSecManage="IP Security Policy Management"
  7683. MMC_IpSecMonitor="IP Security Monitor"
  7684. MMC_FrontPageExt="FrontPage Server Extensions"
  7685. MMC_ActiveXControl="ActiveX Control"
  7686. MMC_ADSI="ADSI Edit"
  7687. MSI="Windows Installer"
  7688. MSILogging_Help="Specifies the types of events that Windows Installer records in its transaction log for each installation. The log, Msi.log, appears in the Temp directory of the system volume.\n\nWhen you enable this setting, you can specify the types of events you want Windows Installer to record. To indicate that an event type is recorded, type the letter representing the event type. You can type the letters in any order and list as many or as few event types as you want.\n\nTo disable logging, delete all of the letters from the box.\n\nIf you disable this setting or do not configure it, Windows Installer logs the default event types, represented by the letters "iweap.""
  7689. MSILogging="Logging"
  7690. MSILoggingT1="To activate logging, enter one or more of the modes below."
  7691. MSILoggingT10="m - Out-of-memory"
  7692. MSILoggingT11="p - Terminal properties"
  7693. MSILoggingT12="v - Verbose output"
  7694. MSILoggingT13="o - Out of disk space messages"
  7695. MSILoggingT2=""iwearucmpvo" will log everything but adds time to the install."
  7696. MSILoggingT3="i - Status messages"
  7697. MSILoggingT4="w - Non-fatal warnings"
  7698. MSILoggingT5="e - All error messages"
  7699. MSILoggingT6="a - Start up of actions"
  7700. MSILoggingT7="r - Action-specific records"
  7701. MSILoggingT8="u - User requests"
  7702. MSILoggingT9="c - Initial UI parameters"
  7703. MSI_AllowUser="Allow User Installs"
  7704. MSI_DisableUserInstalls="Prohibit User Installs"
  7705. MSI_DisableUserInstalls_Help="This setting allows you to configure user installs. To configure this setting, set it to enabled and use the drop-down list to select the behavior you want.\n\nIf this setting is not configured, or if the setting is enabled and "Allow User Installs" is selected, the installer allows and makes use of products that are installed per user, and products that are installed per computer. If the installer finds a per-user install of an application, this hides a per-computer installation of that same product.\n\nIf this setting is enabled and "Hide User Installs" is selected, the installer ignores per-user applications. This causes a per-computer installed application to be visible to users, even if those users have a per-user install of the product registered in their user profile.\n\nIf this setting is enabled and "Prohibit User Installs" is selected, the installer prevents applications from being installed per user, and it ignores previously installed per-user applications. An attempt to perform a per-user installation causes the installer to display an error message and stop the installation. This setting is useful in environments where the administrator only wants per-computer applications installed, such as on a kiosk or a Windows Terminal Server."
  7706. MSI_DisAllowUser="Prohibit User Installs"
  7707. MSI_DisableSRCheckPoints="Turn off creation of System Restore Checkpoints"
  7708. MSI_DisableSRCheckPoints_Help="System Restore enables users, in the event of a problem, to restore their computers to a previous state without losing personal data files. By default, the Windows Installer automatically creates a System Restore checkpoint each time an application is installed, so that users can restore their computer to the state it was in before installing the application.\n\nIf you enable this setting, the windows Installer does not generate System Restore checkpoints when installing applications.\n\nIf you disable this setting or do not configure it, the Windows Installer automatically creates a System Restore checkpoint each time an application is installed.\n\nNote: This setting only applies to Windows XP Professional."
  7709. MSI_DisableUserInstallsBox="User Install Behavior:"
  7710. MSI_HideUser="Hide User Installs"
  7711. NC_RenameConnection_Help="Determines whether users can rename LAN or all user remote access connections.\n\nIf you enable this setting, the Rename option is enabled for all users. Users can rename connections by clicking the icon representing a connection or by using the File menu.\n\nIf you disable this setting (and enable the "Enable Network Connections settings for Administrators" setting), the Rename option for LAN and all user remote access connections is disabled for all users (including Administrators and Network Configuration Operators).\n\nImportant: If the "Enable Network Connections settings for Administrators" is disabled or not configured, this setting will not apply to administrators on post-Windows 2000 computers.\n\nIf this setting is not configured, only Administrators and Network Configuration Operators have the right to rename LAN or all user remote access connections.\n\nNote: When configured, this setting always takes precedence over the "Ability to rename LAN connections" and "Ability to rename all user remote access connections" settings.\n\nNote: This setting does not prevent users from using other programs, such as Internet Explorer, to rename remote access connections."
  7712. NC_RenameConnection="Ability to rename LAN connections or remote access connections available to all users"
  7713. NC_LanChangeProperties_Help="Determines whether Administrators and Network Configuration Operators can change the properties of components used by a LAN connection.\n\nThis setting determines whether the Properties button for components of a LAN connection is enabled.\n\nIf you enable this setting (and enable the "Enable Network Connections settings for Administrators" setting), the Properties button is disabled for Administrators. Network Configuration Operators are prohibited from accessing connection components, regardless of the "Enable Network Connections settings for Administrators" setting.\n\nImportant: If the "Enable Network Connections settings for Administrators" is disabled or not configured, this setting does not apply to administrators on post-Windows 2000 computers.\n\nIf you disable this setting or do not configure it, the Properties button is enabled for administrators and Network Configuration Operators.\n\nThe Local Area Connection Properties dialog box includes a list of the network components that the connection uses. To view or change the properties of a component, click the name of the component, and then click the Properties button beneath the component list.\n\nNote: Not all network components have configurable properties. For components that are not configurable, the Properties button is always disabled.\n\nNote: When the "Prohibit access to properties of a LAN connection" setting is enabled, users are blocked from accessing the Properties button for LAN connection components.\n\nNote: Network Configuration Operators only have permission to change TCP/IP properties. Properties for all other components are unavailable to these users.\n\nNote: Nonadministrators are already prohibited from accessing properties of components for a LAN connection, regardless of this setting."
  7714. NC_LanChangeProperties="Prohibit access to properties of components of a LAN connection"
  7715. NC_RasChangeProperties_Help="Determines whether users can view and change the properties of components used by a private or all-user remote access connection.\n\nThis setting determines whether the Properties button for components used by a private or all-user remote access connection is enabled.\n\nIf you enable this setting (and enable the "Enable Network Connections settings for Administrators" setting), the Properties button is disabled for all users (including administrators).\n\nImportant: If the "Enable Network Connections settings for Administrators" is disabled or not configured, this setting does not apply to administrators on post-Windows 2000 computers.\n\nIf you disable this setting or do not configure it, the Properties button is enabled for all users.\n\nThe Networking tab of the Remote Access Connection Properties dialog box includes a list of the network components that the connection uses. To view or change the properties of a component, click the name of the component, and then click the Properties button beneath the component list.\n\nNote: Not all network components have configurable properties. For components that are not configurable, the Properties button is always disabled.\n\nNote: When the "Ability to change properties of an all user remote access connection" or "Prohibit changing properties of a private remote access connection" settings are set to deny access to the Remote Access Connection Properties dialog box, the Properties button for remote access connection components is blocked.\n\nNote: This setting does not prevent users from using other programs, such as Internet Explorer, to bypass this setting."
  7716. NC_RasChangeProperties="Prohibit access to properties of components of a remote access connection"
  7717. NC_ShowSharedAccessUI_Help="Determines whether administrators can enable and configure the Internet Connection Sharing (ICS) feature of an Internet connection and if the ICS service can run on the computer.\n\nImportant: This setting is location aware. It only applies when a computer is connected to the same DNS domain network it was connected to when the setting was refreshed on that computer. If a computer is connected to a DNS domain network other than the one it was connected to when the setting was refreshed, this setting does not apply.\n\nICS lets administrators configure their system as an Internet gateway for a small network and provides network services, such as name resolution and addressing through DHCP, to the local private network.\n\nIf you enable this setting, ICS cannot be enabled or configured by administrators, and the ICS service cannot run on the computer. The Advanced tab in the Properties dialog box for a LAN or remote access connection is removed. The Internet Connection Sharing page is removed from the New Connection Wizard. The Network Setup Wizard is disabled.\n\nIf you disable this setting or do not configure it and have two or more connections, administrators can enable ICS. The Advanced tab in the properties dialog box for a LAN or remote access connection is available. In addition, the user is presented with the option to enable Internet Connection Sharing in the Network Setup Wizard and Make New Connection Wizard. (The Network Setup Wizard is available only in Windows XP Professional.)\n\nBy default, ICS is disabled when you create a remote access connection, but administrators can use the Advanced tab to enable it. When running the New Connection Wizard or Network Setup Wizard, administrators can choose to enable ICS.\n\nNote: Internet Connection Sharing is only available when two or more network connections are present.\n\nNote: When the "Prohibit access to properties of a LAN connection," "Ability to change properties of an all user remote access connection," or "Prohibit chang
  7718. NC_ShowSharedAccessUI="Prohibit use of Internet Connection Sharing on your DNS domain network"
  7719. NC_PersonalFirewallConfig_Help="Prohibits use of Internet Connection Firewall on your DNS domain network.\n\nDetermines whether users can enable the Internet Connection Firewall feature on a connection, and if the Internet Connection Firewall service can run on a computer.\n\nImportant: This setting is location aware. It only applies when a computer is connected to the same DNS domain network it was connected to when the setting was refreshed on that computer. If a computer is connected to a DNS domain network other than the one it was connected to when the setting was refreshed, this setting does not apply.\n\nThe Internet Connection Firewall is a stateful packet filter for home and small office users to protect them from Internet network security threats.\n\nIf you enable this setting, Internet Connection Firewall cannot be enabled or configured by users (including administrators), and the Internet Connection Firewall service cannot run on the computer. The option to enable the Internet Connection Firewall through the Advanced tab is removed. In addition, the Internet Connection Firewall is not enabled for remote access connections created through the Make New Connection Wizard. The Network Setup Wizard is disabled.\n\nIf you disable this setting or do not configure it, the Internet Connection Firewall is disabled when a LAN Connection or VPN connection is created, but users can use the Advanced tab in the connection properties to enable it. The Internet Connection Firewall is enabled by default on the connection for which Internet Connection Sharing is enabled. In addition, remote access connections created through the Make New Connection Wizard have the Internet Connection Firewall enabled."
  7720. NC_PersonalFirewallConfig="Prohibit use of Internet Connection Firewall on your DNS domain network"
  7721. NC_AllowNetBridge_NLA="Prohibit installation and configuration of Network Bridge on your DNS domain network"
  7722. NC_AllowNetBridge_NLA_Help="Determines whether a user can install and configure the Network Bridge.\n\nImportant: This settings is location aware. It only applies when a computer is connected to the same DNS domain network it was connected to when the setting was refreshed on that computer. If a computer is connected to a DNS domain network other than the one it was connected to when the setting was refreshed, this setting does not apply.\n\nThe Network Bridge allows users to create a layer 2 MAC bridge, enabling them to connect two or more network segements together. This connection appears in the Network Connections folder.\n\nIf you disable this setting or do not configure it, the user will be able to create and modify the configuration of a Network Bridge. Enabling this setting does not remove an existing Network Bridge from the user's computer."
  7723. NC_AllowAdvancedTCPIPConfig_Help="Determines whether users can configure advanced TCP/IP settings.\n\nIf you enable this setting (and enable the "Enable Network Connections settings for Administrators" setting), the Advanced button on the Internet Protocol (TCP/IP) Properties dialog box is disabled for all users (including administrators). As a result, users cannot open the Advanced TCP/IP Settings Properties page and modify IP settings, such as DNS and WINS server information.\n\nImportant: If the "Enable Network Connections settings for Administrators" is disabled or not configured, this setting will not apply to administrators on post-Windows 2000 computers.\n\nIf you disable this setting, the Advanced button is enabled, and all users can open the Advanced TCP/IP Setting dialog box.\n\nNote: This setting is superseded by settings that prohibit access to properties of connections or connection components. When these policies are set to deny access to the connection properties dialog box or Properties button for connection components, users cannot gain access to the Advanced button for TCP/IP configuration.\n\nNote: Nonadministrators (excluding Network Configuration Operators) do not have permission to access TCP/IP advanced configuration for a LAN connection, regardless of this setting.\n\nTip: To open the Advanced TCP/IP Setting dialog box, in the Network Connections folder, right-click a connection icon, and click Properties. For remote access connections, click the Networking tab. In the "Components checked are used by this connection" box, click Internet Protocol (TCP/IP), click the Properties button, and then click the Advanced button.\n\nNote: Changing this setting from Enabled to Not Configured does not enable the Advanced button until the user logs off."
  7724. NC_AllowAdvancedTCPIPConfig="Prohibit TCP/IP advanced configuration"
  7725. NC_AdvancedSettings_Help="Determines whether the Advanced Settings item on the Advanced menu in Network Connections is enabled for administrators.\n\nThe Advanced Settings item lets users view and change bindings and view and change the order in which the computer accesses connections, network providers, and print providers.\n\nIf you enable this setting (and enable the "Enable Network Connections settings for Administrators" setting), the Advanced Settings item is disabled for administrators.\n\nImportant: If the "Enable Network Connections settings for Administrators" is disabled or not configured, this setting will not apply to administrators on post-Windows 2000 computers.\n\nIf you disable this setting or do not configure it, the Advanced Settings item is enabled for administrators.\n\nNote: Nonadministrators are already prohibited from accessing the Advanced Settings dialog box, regardless of this setting."
  7726. NC_AdvancedSettings="Prohibit access to the Advanced Settings item on the Advanced menu"
  7727. NC_AddRemoveComponents_Help="Determines whether administrators can add and remove network components for a LAN or remote access connection. This setting has no effect on nonadministrators.\n\nIf you enable this setting (and enable the "Enable Network Connections settings for Administrators" setting), the Install and Uninstall buttons for components of connections are disabled, and administrators are not permitted to access network components in the Windows Components Wizard.\n\nImportant: If the "Enable Network Connections settings for Administrators" is disabled or not configured, this setting will not apply to administrators on post-Windows 2000 computers.\n\nIf you disable this setting or do not configure it, the Install and Uninstall buttons for components of connections in the Network Connections folder are enabled. Also, administrators can gain access to network components in the Windows Components Wizard.\n\nThe Install button opens the dialog boxes used to add network components. Clicking the Uninstall button removes the selected component in the components list (above the button).\n\nThe Install and Uninstall buttons appear in the properties dialog box for connections. These buttons are on the General tab for LAN connections and on the Networking tab for remote access connections.\n\nNote: When the "Prohibit access to properties of a LAN connection", "Ability to change properties of an all user remote access connection", or "Prohibit changing properties of a private remote access connection" settings are set to deny access to the connection properties dialog box, the Install and Uninstall buttons for connections are blocked.\n\nNote: Nonadministrators are already prohibited from adding and removing connection components, regardless of this setting."
  7728. NC_AddRemoveComponents="Prohibit adding and removing components for a LAN or remote access connection"
  7729. NC_LanProperties_Help="Determines whether users can change the properties of a LAN connection.\n\nThis setting determines whether the Properties menu item is enabled, and thus, whether the Local Area Connection Properties dialog box is available to users.\n\nIf you enable this setting (and enable the "Enable Network Connections settings for Administrators" setting), the Properties menu items are disabled for all users, and users cannot open the Local Area Connection Properties dialog box.\n\nImportant: If the "Enable Network Connections settings for Administrators" is disabled or not configured, this setting will not apply to administrators on post-Windows 2000 computers.\n\nIf you disable this setting or do not configure it, a Properties menu item appears when users right-click the icon representing a LAN connection. Also, when users select the connection, Properties is enabled on the File menu.\n\nNote: This setting takes precedence over settings that manipulate the availability of features inside the Local Area Connection Properties dialog box. If this setting is enabled, nothing within the properties dialog box for a LAN connection is available to users.\n\nNote: Nonadministrators have the right to view the properties dialog box for a connection but not to make changes, regardless of this setting."
  7730. NC_LanProperties="Prohibit access to properties of a LAN connection"
  7731. NC_ChangeBindState_Help="Determines whether administrators can enable and disable the components used by LAN connections.\n\nIf you enable this setting (and enable the "Enable Network Connections settings for Administrators" setting), the check boxes for enabling and disabling components are disabled. As a result, administrators cannot enable or disable the components that a connection uses.\n\nImportant: If the "Enable Network Connections settings for Administrators" is disabled or not configured, this setting will not apply to administrators on post-Windows 2000 computers.\n\nIf you disable this setting or do not configure it, the Properties dialog box for a connection includes a check box beside the name of each component that the connection uses. Selecting the check box enables the component, and clearing the check box disables the component.\n\nNote: When the "Prohibit access to properties of a LAN connection" setting is enabled, users are blocked from accessing the check boxes for enabling and disabling the components of a LAN connection.\n\nNote: Nonadministrators are already prohibited from enabling or disabling components for a LAN connection, regardless of this setting."
  7732. NC_ChangeBindState="Prohibit Enabling/Disabling components of a LAN connection"
  7733. NC_RasAllUserProperties_Help="Determines whether a user can view and change the properties of remote access connections that are available to all users of the computer.\n\nTo create an all-user remote access connection, on the Connection Availability page in the New Connection Wizard, click the "For all users" option.\n\nThis setting determines whether the Properties menu item is enabled, and thus, whether the Remote Access Connection Properties dialog box is available to users.\n\nIf you enable this setting, a Properties menu item appears when any user right-clicks the icon for a remote access connection. Also, when any user selects the connection, Properties appears on the File menu.\n\nIf you disable this setting (and enable the "Enable Network Connections settings for Administrators" setting), the Properties menu items are disabled, and users (including administrators) cannot open the remote access connection properties dialog box.\n\nImportant: If the "Enable Network Connections settings for Administrators" is disabled or not configured, this setting will not apply to administrators on post-Windows 2000 computers.\n\nIf you do not configure this setting, only Administrators and Network Configuration Operators can change properties of all-user remote access connections.\n\nNote: This setting takes precedence over settings that manipulate the availability of features inside the Remote Access Connection Properties dialog box. If this setting is disabled, nothing within the properties dialog box for a remote access connection will be available to users.\n\nNote: This setting does not prevent users from using other programs, such as Internet Explorer, to bypass this setting."
  7734. NC_RasAllUserProperties="Ability to change properties of an all user remote access connection"
  7735. NC_RasMyProperties_Help="Determines whether users can view and change the properties of their private remote access connections.\n\nPrivate connections are those that are available only to one user. To create a private connection, on the Connection Availability page in the New Connection Wizard, click the "Only for myself" option.\n\nThis setting determines whether the Properties menu item is enabled, and thus, whether the Remote Access Connection Properties dialog box for a private connection is available to users.\n\nIf you enable this setting (and enable the "Enable Network Connections settings for Administrators" setting), the Properties menu items are disabled, and no users (including administrators) can open the Remote Access Connection Properties dialog box for a private connection.\n\nImportant: If the "Enable Network Connections settings for Administrators" is disabled or not configured, this setting will not apply to administrators on post-Windows 2000 computers.\n\nIf you disable this setting or do not configure it, a Properties menu item appears when any user right-clicks the icon representing a private remote access connection. Also, when any user selects the connection, Properties appears on the File menu.\n\nNote: This setting takes precedence over settings that manipulate the availability of features in the Remote Access Connection Properties dialog box. If this setting is enabled, nothing within the properties dialog box for a remote access connection will be available to users.\n\nNote: This setting does not prevent users from using other programs, such as Internet Explorer, to bypass this setting."
  7736. NC_RasMyProperties="Prohibit changing properties of a private remote access connection"
  7737. NC_DeleteConnection_Help="Determines whether users can delete remote access connections.\n\nIf you enable this setting (and enable the "Enable Network Connections settings for Administrators" setting), users (including administrators) cannot delete any remote access connections. This setting also disables the Delete option on the context menu for a remote access connection and on the File menu in the Network Connections folder.\n\nImportant: If the "Enable Network Connections settings for Administrators" is disabled or not configured, this setting will not apply to administrators on post-Windows 2000 computers.\n\nIf you disable this setting or do not configure it, all users can delete their private remote access connections. Private connections are those that are available only to one user. (By default, only Administrators and Network Configuration Operators can delete connections available to all users, but you can change the default by using the "Ability to delete all user remote access connections" setting.)\n\nImportant: When enabled, this setting takes precedence over the "Ability to delete all user remote access connections" setting. Users cannot delete any remote access connections, and the "Ability to delete all user remote access connections" setting is ignored.\n\nNote: LAN connections are created and deleted automatically when a LAN adapter is installed or removed. You cannot use the Network Connections folder to create or delete a LAN connection.\n\nNote: This setting does not prevent users from using other programs, such as Internet Explorer, to bypass this setting."
  7738. NC_DeleteConnection="Prohibit deletion of remote access connections"
  7739. NC_DeleteAllUserConnection_Help="Determines whether users can delete all user remote access connections.\n\nTo create an all-user remote access connection, on the Connection Availability page in the New Connection Wizard, click the "For all users" option.\n\nIf you enable this setting, all users can delete shared remote access connections. In addition, if your file system is NTFS, users need to have Write access to Documents and Settings\All Users\Application Data\Microsoft\Network\Connections\Pbk to delete a shared remote access connection.\n\nIf you disable this setting (and enable the "Enable Network Connections settings for Administrators" setting), users (including administrators) cannot delete all-user remote access connections. (By default, users can still delete their private connections, but you can change the default by using the "Prohibit deletion of remote access connections" setting.)\n\nImportant: If the "Enable Network Connections settings for Administrators" is disabled or not configured, this setting will not apply to administrators on post-Windows 2000 computers.\n\nIf you do not configure this setting, only Administrators and Network Configuration Operators can delete all user remote access connections.\n\nImportant: When enabled, the "Prohibit deletion of remote access connections" setting takes precedence over this setting. Users (including administrators) cannot delete any remote access connections, and this setting is ignored.\n\nNote: LAN connections are created and deleted automatically by the system when a LAN adapter is installed or removed. You cannot use the Network Connections folder to create or delete a LAN connection.\n\nNote: This setting does not prevent users from using other programs, such as Internet Explorer, to bypass this setting."
  7740. NC_DeleteAllUserConnection="Ability to delete all user remote access connections"
  7741. NC_RasConnect_Help="Determines whether users can connect and disconnect remote access connections.\n\nIf you enable this setting (and enable the "Enable Network Connections settings for Administrators" setting), double-clicking the icon has no effect, and the Connect and Disconnect menu items are disabled for all users (including administrators).\n\nImportant: If the "Enable Network Connections settings for Administrators" is disabled or not configured, this setting will not apply to administrators on post-Windows 2000 computers.\n\nIf you disable this setting or do not configure it, the Connect and Disconnect options for remote access connections are available to all users. Users can connect or disconnect a remote access connection by double-clicking the icon representing the connection, by right-clicking it, or by using the File menu."
  7742. NC_RasConnect="Prohibit connecting and disconnecting a remote access connection"
  7743. NC_LanConnect_Help="Determines whether users can enable/disable LAN connections.\n\nIf you enable this setting, the Enable and Disable options for LAN connections are available to users (including nonadministrators). Users can enable/disable a LAN connection by double-clicking the icon representing the connection, by right-clicking it, or by using the File menu.\n\nIf you disable this setting (and enable the "Enable Network Connections settings for Administrators" setting), double-clicking the icon has no effect, and the Enable and Disable menu items are disabled for all users (including administrators).\n\nImportant: If the "Enable Network Connections settings for Administrators" is disabled or not configured, this setting will not apply to administrators on post-Windows 2000 computers.\n\nIf you do not configure this setting, only Administrators and Network Configuration Operators can enable/disable LAN connections.\n\nNote: Administrators can still enable/disable LAN connections from Device Manager when this setting is disabled."
  7744. NC_LanConnect="Ability to Enable/Disable a LAN connection"
  7745. NC_NewConnectionWizard_Help="Determines whether users can use the New Connection Wizard, which creates new network connections.\n\nIf you enable this setting (and enable the "Enable Network Connections settings for Administrators" setting), the Make New Connection icon does not appear in the Start Menu on in the Network Connections folder. As a result, users (including administrators) cannot start the New Connection Wizard.\n\nImportant: If the "Enable Network Connections settings for Administrators" is disabled or not configured, this setting will not apply to administrators on post-Windows 2000 computers.\n\nIf you disable this setting or do not configure it, the Make New Connection icon appears in the Start menu and in the Network Connections folder for all users. Clicking the Make New Connection icon starts the New Connection Wizard.\n\nNote: Changing this setting from Enabled to Not Configured does not restore the Make New Connection icon until the user logs off or on. When other changes to this setting are applied, the icon does not appear or disappear in the Network Connections folder until the folder is refreshed.\n\nNote: This setting does not prevent users from using other programs, such as Internet Explorer, to bypass this setting."
  7746. NC_NewConnectionWizard="Prohibit access to the New Connection Wizard"
  7747. NC_RenameLanConnection_Help="Determines whether nonadministrators can rename a LAN connection.\n\nIf you enable this setting, the Rename option is enabled for LAN connections. Nonadministrators can rename LAN connections by clicking an icon representing the connection or by using the File menu.\n\nIf you disable this setting, the Rename option is disabled for nonadministrators only.\n\nIf you do not configure this setting, only Administrators and Network Configuration Operators can rename LAN connections\n\nNote: This setting does not apply to Administrators.\n\nNote: When the "Ability to rename LAN connections or remote access connections available to all users" setting is configured (set to either enabled or disabled), this setting does not apply."
  7748. NC_RenameLanConnection="Ability to rename LAN connections"
  7749. NC_RenameAllUserRasConnection_Help="Determines whether nonadministrators can rename all-user remote access connections.\n\nTo create an all-user connection, on the Connection Availability page in the New Connection Wizard, click the "For all users" option.\n\nIf you enable this setting, the Rename option is enabled for all-user remote access connections. Any user can rename all-user connections by clicking an icon representing the connection or by using the File menu.\n\nIf you disable this setting, the Rename option is disabled for nonadministrators only.\n\nIf you do not configure the setting, only Administrators and Network Configuration Operators can rename all-user remote access connections.\n\nNote: This setting does not apply to Administrators\n\nNote: When the "Ability to rename LAN connections or remote access connections available to all users" setting is configured (set to either Enabled or Disabled), this setting does not apply.\n\nNote: This setting does not prevent users from using other programs, such as Internet Explorer, to bypass this setting."
  7750. NC_RenameAllUserRasConnection="Ability to rename all user remote access connections"
  7751. NC_RenameMyRasConnection_Help="Determines whether users can rename their private remote access connections.\n\nPrivate connections are those that are available only to one user. To create a private connection, on the Connection Availability page in the New Connection Wizard, click the "Only for myself" option.\n\nIf you enable this setting (and enable the "Enable Network Connections settings for Administrators" setting), the Rename option is disabled for all users (including administrators).\n\nImportant: If the "Enable Network Connections settings for Administrators" is disabled or not configured, this setting will not apply to administrators on post-Windows 2000 computers.\n\nIf you disable this setting or do not configure it, the Rename option is enabled for all users' private remote access connections. Users can rename their private connection by clicking an icon representing the connection or by using the File menu.\n\nNote: This setting does not prevent users from using other programs, such as Internet Explorer, to bypass this setting."
  7752. NC_RenameMyRasConnection="Prohibit renaming private remote access connections"
  7753. NC_DialupPrefs_Help="Determines whether the Remote Acccess Preferences item on the Advanced menu in Network Connections folder is enabled.\n\nThe Remote Access Preferences item lets users create and change connections before logon and configure automatic dialing and callback features.\n\nIf you enable this setting (and enable the "Enable Network Connections settings for Administrators" setting), the Remote Access Preferences item is disabled for all users (including administrators).\n\nImportant: If the "Enable Network Connections settings for Administrators" is disabled or not configured, this setting will not apply to administrators on post-Windows 2000 computers.\n\nIf you disable this setting or do not configure it, the Remote Access Preferences item is enabled for all users."
  7754. NC_DialupPrefs="Prohibit access to the Remote Access Preferences item on the Advanced menu"
  7755. NC_Statistics_Help="Determines whether users can view the status for an active connection.\n\nConnection status is available from the connection status taskbar icon or from the Status dialog box. The Status dialog box displays information about the connection and its activity. It also provides buttons to disconnect and to configure the properties of the connection.\n\nIf you enable this setting, the connection status taskbar icon and Status dialog box are not available to users (including administrators). The Status option is disabled in the context menu for the connection and on the File menu in the Network Connections folder. Users cannot choose to show the connection icon in the taskbar from the Connection Properties dialog box.\n\nImportant: If the "Enable Network Connections settings for Administrators" is disabled or not configured, this setting will not apply to administrators on post-Windows 2000 computers.\n\nIf you disable this setting or do not configure it, the connection status taskbar icon and Status dialog box are available to all users."
  7756. NC_Statistics="Prohibit viewing of status for an active connection"
  7757. NC_EnableAdminProhibits_Help="Determines whether settings that existed in Windows 2000 Server family will apply to Administrators.\n\nThe set of Network Connections group settings that existed in Windows 2000 Professional also exists in Windows XP Professional. In Windows 2000 Professional, all of these settings had the ability to prohibit the use of certain features from Administrators.\n\nBy default, Network Connections group settings in Windows XP Professional do not have the ability to prohibit the use of features from Administrators.\n\nIf you enable this setting, the Windows XP settings that existed in Windows 2000 Professional will have the ability to prohibit Administrators from using certain features. These settings are "Ability to rename LAN connections or remote access connections available to all users", "Prohibit access to properties of components of a LAN connection", "Prohibit access to properties of components of a remote access connection", "Ability to access TCP/IP advanced configuration", "Prohibit access to the Advanced Settings Item on the Advanced Menu", "Prohibit adding and removing components for a LAN or remote access connection", "Prohibit access to properties of a LAN connection", "Prohibit Enabling/Disabling components of a LAN connection", "Ability to change properties of an all user remote access connection", "Prohibit changing properties of a private remote access connection", "Prohibit deletion of remote access connections", "Ability to delete all user remote access connections", "Prohibit connecting and disconnecting a remote access connection", "Ability to Enable/Disable a LAN connection", "Prohibit access to the New Connection Wizard", "Prohibit renaming private remote access connections", "Prohibit access to the Remote Access Preferences item on the Advanced menu", "Prohibit viewing of status for an active connection". When this setting is enabled, settings that exist in both Windows 2000 Professional and Windows XP Professional behave the same for administrators.\n\nIf you di
  7758. NC_EnableAdminProhibits="Enable Windows 2000 Network Connections settings for Administrators"
  7759. NC_8021XCAName="IEEE 802.1x Certificate Authority for Machine Authentication"
  7760. NC_8021XCAName_Help="If you want to use IEEE 802.1x machine authentication, configure this setting.\n\nIf you enable this setting, it configures the Certificate Authority to be used on the client for authentication.\n\nTo allow successful authentication, enable this setting and indicate the thumbprint or hash for your Certificate Authority.\n\nIf you disable or do not configure this setting, the Certificate Authority for IEEE 802.1x machine authentication will not be configured on your client. This might cause machine authentication to fail.\n\nNote: The Certificate Authority that is configured by this setting only applies to machine authentication, and not to user authentication."
  7761. NC_8021xCertAuth="Certificate Authority Hash: "
  7762. Netlogon="Net Logon"
  7763. Netlogon_DC_Locator_DNS_Records="DC Locator DNS Records"
  7764. Netlogon_DebugFlag="Log File Debug Output Level"
  7765. Netlogon_DebugFlag_Help="Specifies the level of debug output for the Net Logon service.\n\nThe Net Logon service outputs debug information to the log file netlogon.log in the directory %windir%\debug. By default, no debug information is logged.\n\nIf you enable this setting and specify a non-zero value, debug information will be logged to the file. Higher values result in more verbose logging; the value of 536936447 is commonly used as an optimal setting.\n\nIf you specify zero for this setting, the default behavior occurs as described above.\n\nIf you disable this setting or do not configure it, the default behavior occurs as described above."
  7766. Netlogon_DebugFlagLabel="Level:"
  7767. Netlogon_UseDynamicDns="Dynamic Registration of the DC Locator DNS Records"
  7768. Netlogon_UseDynamicDns_Help="Determines if Dynamic Registration of the domain controller (DC) locator DNS resource records is enabled. These DNS records are dynamically registered by the Net Logon service and are used by the Locator algorithm to locate the DC.\n\nIf you enable this setting, DCs to which this setting is applied dynamically register DC Locator DNS resource records through dynamic DNS update-enabled network connections.\n\nIf you disable this setting, DCs will not register DC Locator DNS resource records.\n\nIf this setting is not configured, it is not applied to any DCs, and DCs use their local configuration."
  7769. Netlogon_DnsAvoidRegisterRecords="DC Locator DNS records not registered by the DCs"
  7770. Netlogon_DnsAvoidRegisterRecords_Help="Determines which Domain Controller (DC) Locator DNS records are not registered by the Netlogon service.\n\nTo enable this setting, select Enable and specify a list of space-delimited mnemonics (instructions) for the DC Locator DNS records that will not be registered by the DCs to which this setting is applied.\n\nSelect the mnemonics from the following list:\n\nMnemonic Type DNS Record\n\nLdapIpAddress A <DnsDomainName>\nLdap SRV _ldap._tcp.<DnsDomainName>\nLdapAtSite SRV _ldap._tcp.<SiteName>._sites.<DnsDomainName>\nPdc SRV _ldap._tcp.pdc._msdcs.<DnsDomainName>\nGc SRV _ldap._tcp.gc._msdcs.<DnsForestName>\nGcAtSite SRV _ldap._tcp.<SiteName>._sites.gc._msdcs.<DnsForestName>\nDcByGuid SRV _ldap._tcp.<DomainGuid>.domains._msdcs.<DnsForestName>\nGcIpAddress A _gc._msdcs.<DnsForestName>\nDsaCname CNAME <DsaGuid>._msdcs.<DnsForestName>\nKdc SRV _kerberos._tcp.dc._msdcs.<DnsDomainName>\nKdcAtSite SRV _kerberos._tcp.dc._msdcs.<SiteName>._sites.<DnsDomainName>\nDc SRV _ldap._tcp.dc._msdcs.<DnsDomainName>\nDcAtSite SRV _ldap._tcp.<SiteName>._sites.dc._msdcs.<DnsDomainName>\nRfc1510Kdc SRV _kerberos._tcp.<DnsDomainName>\nRfc1510KdcAtSite SRV _kerberos._tcp.<SiteName>._sites.<DnsDomainName>\nGenericGc SRV _gc._tcp.<DnsForestName>\nGenericGcAtSite SRV _gc._tcp.<SiteName>._sites.<DnsForestName>\nRfc1510UdpKdc SRV _kerberos._udp.<DnsDomainName>\nRfc1510Kpwd SRV _kpasswd._tcp.<DnsDomainName>\nRfc1510UdpKpwd SRV _kpasswd._udp.<DnsDomainName>\n\nIf this setting is disabled, DCs configured to perform dynamic registration of DC Locator DNS records register all DC locator DNS resource records.\n\nIf this setting is not applied to DCs, DCs use their local configuration."
  7771. Netlogon_DnsAvoidRegisterRecordsLabel="Mnemonics:"
  7772. Netlogon_DnsRefreshInterval="Refresh Interval of the DC Locator DNS Records"
  7773. Netlogon_DnsRefreshInterval_Help="Specifies the Refresh Interval of the domain controller (DC) Locator DNS resource records for DCs to which this setting is applied. These DNS records are dynamically registered by the Net Logon service and are used by the Locator algorithm to locate the DC. This setting may be applied only to DCs using dynamic update.\n\nDCs configured to perform dynamic registration of the DC Locator DNS resource records periodically reregister their records with DNS servers, even if their records data has not changed. If authoritative DNS servers are configured to perform scavenging of the stale records, this reregistration is required to instruct the DNS servers configured to automatically remove (scavenge) stale records that these records are current and should be preserved in the database.\n\nWarning: If the DNS resource records are registered in zones with scavenging enabled, the value of this setting should never be longer than the Refresh Interval configured for these zones. Setting the Refresh Interval of the DC Locator DNS records to longer than the Refresh Interval of the DNS zones may result in the undesired deletion of DNS resource records.\n\nTo specify the Refresh Interval of the DC records, click Enabled, and then enter a value larger than 1800. This value specifies the Refresh Interval of the DC records in seconds (for example, the value 3600 is 60 minutes).\n\nIf this setting is not configured, it is not applied to any DCs, and DCs use their local configuration."
  7774. Netlogon_DnsRefreshIntervalLabel="Seconds:"
  7775. Netlogon_LdapSrvWeight="Weight Set in the DC Locator DNS SRV Records"
  7776. Netlogon_LdapSrvWeight_Help="Specifies the Weight field in the SRV resource records registered by the domain controllers (DC) to which this setting is applied. These DNS records are dynamically registered by the Net Logon service, and they are used to locate the DC.\n\nThe Weight field in the SRV record can be used in addition to the Priority value to provide a load-balancing mechanism where multiple servers are specified in the SRV records Target field and are all set to the same priority. The probability with which the DNS client randomly selects the target host to be contacted is proportional to the Weight field value in the SRV record.\n\nTo specify the Weight in the DC Locator DNS SRV records, click Enabled, and then enter a value. The range of values is 0 to 65535.\n\nIf this setting is not configured, it is not applied to any DCs, and DCs use their local configuration."
  7777. Netlogon_LdapSrvWeightLabel="Weight:"
  7778. Netlogon_LdapSrvPriority="Priority Set in the DC Locator DNS SRV Records"
  7779. Netlogon_LdapSrvPriority_Help="Specifies the Priority field in the SRV resource records registered by domain controllers (DC) to which this setting is applied. These DNS records are dynamically registered by the Net Logon service and are used to locate the DC.\n\nThe Priority field in the SRV record sets the preference for target hosts (specified in the SRV record s Target field). DNS clients that query for SRV resource records attempt to contact the first reachable host with the lowest priority number listed.\n\nTo specify the Priority in the DC Locator DNS SRV resource records, click Enabled, and then enter a value. The range of values is 0 to 65535.\n\nIf this setting is not configured, it is not applied to any DCs, and DCs use their local configuration."
  7780. Netlogon_LdapSrvPriorityLabel="Priority:"
  7781. Netlogon_MaximumLogFileSize="Maximum Log File Size"
  7782. Netlogon_MaximumLogFileSize_Help="Specifies the maximum size in bytes of the log file netlogon.log in the directory %windir%\debug when logging is enabled.\n\nBy default, the maximum size of the log file is 20MB. If this policy is enabled, the maximum size of the log file is set to the specified size. Once this size is reached the log file is saved to netlogon.bak and netlogon.log is truncated. A reasonable value based on available storage should be specified.\n\nIf this policy is disabled or not configured, the default behavior occurs as indicated above."
  7783. Netlogon_MaximumLogFileSizeLabel="Bytes:"
  7784. Netlogon_DnsTtl="TTL Set in the DC Locator DNS Records"
  7785. Netlogon_DnsTtl_Help="Specifies the value for the Time-To-Live (TTL) field in Net Logon registered SRV resource records. These DNS records are dynamically registered by the Net Logon service, and they are used to locate the domain controller (DC).\n\nTo specify the TTL for DC Locator DNS records, click Enabled, and then enter a value in seconds (for example, the value "900" is 15 minutes).\n\nIf this setting is not configured, it is not applied to any DCs, and DCs use their local configuration."
  7786. Netlogon_DnsTtlLabel="Seconds:"
  7787. Netlogon_AutoSiteCoverage="Automated Site Coverage by the DC Locator DNS SRV Records"
  7788. Netlogon_AutoSiteCoverage_Help="Determines whether domain controllers (DC) will dynamically register DC Locator site-specific SRV records for the closest sites where no DC for the same domain exists (or no Global Catalog for the same forest exists). These DNS records are dynamically registered by the Net Logon service, and they are used to locate the DC.\n\nIf this setting is enabled, the DCs to which this setting is applied dynamically register DC Locator site-specific DNS SRV records for the closest sites where no DC for the same domain, or no Global Catalog for the same forest, exists.\n\nIf you disable this setting, the DCs will not register site-specific DC Locator DNS SRV records for any other sites but their own.\n\nIf this setting is not configured, it is not applied to any DCs, and DCs use their local configuration."
  7789. Netlogon_SiteCoverage="Sites Covered by the DC Locator DNS SRV Records"
  7790. Netlogon_SiteCoverage_Help="Specifies the sites for which the domain controllers (DC) register the site-specific DC Locator DNS SRV resource records. These records are registered in addition to the site-specific SRV records registered for the site where the DC resides, and records registered by a DC configured to register DC Locator DNS SRV records for those sites without a DC that are closest to it. \n\nThe DC Locator DNS records are dynamically registered by the Net Logon service, and they are used to locate the DC. An Active Directory site is one or more well-connected TCP/IP subnets that allow administrators to configure Active Directory access and replication.\n\nTo specify the sites covered by the DC Locator DNS SRV records, click Enabled, and then enter the sites names in a space-delimited format.\n\nIf this setting is not configured, it is not applied to any DCs, and DCs use their local configuration."
  7791. Netlogon_SiteCoverageLabel="Sites:"
  7792. Netlogon_GcSiteCoverage="Sites Covered by the GC Locator DNS SRV Records"
  7793. Netlogon_GcSiteCoverage_Help="Specifies the sites for which the global catalogs (GC) should register site-specific GC locator DNS SRV resource records. These records are registered in addition to the site-specific SRV records registered for the site where the GC resides, and records registered by a GC configured to register GC Locator DNS SRV records for those sites without a GC that are closest to it. \n\nThe GC Locator DNS records and the site-specific SRV records are dynamically registered by the Net Logon service, and they are used to locate the GC. An Active Directory site is one or more well-connected TCP/IP subnets that allow administrators to configure Active Directory access and replication. A GC is a domain controller that contains a partial replica of every domain in Active Directory.\n\nTo specify the sites covered by the GC Locator DNS SRV records, click Enabled, and enter the sites' names in a space-delimited format.\n\nIf this setting is not configured, it is not applied to any GCs, and GCs use their local configuration."
  7794. Netlogon_GcSiteCoverageLabel="Sites:"
  7795. Netlogon_NdncSiteCoverage="Sites Covered by the Application Directory Partition Locator DNS SRV Records"
  7796. Netlogon_NdncSiteCoverage_Help="Specifies the sites for which the domain controllers (DC) housing application directory partition should register the site-specific, application directory partition-specific DC Locator DNS SRV resource records. These records are registered in addition to the site-specific SRV records registered for the site where the DC resides, and records registered by a DC configured to register DC Locator DNS SRV records for those sites without a DC that are closest to it. \n\nThe application directory partition locator DNS records and the site-specific SRV records are dynamically registered by the Net Logon service, and they are used to locate the application directory partition-specific DC. An Active Directory site is one or more well-connected TCP/IP subnets that allow administrators to configure Active Directory access and replication.\n\nTo specify the sites covered by the DC Locator application directory partition-specific DNS SRV records, click Enabled, and then enter the site names in a space-delimited format.\n\nIf this setting is not configured, it is not applied to any DCs, and DCs use their local configuration."
  7797. Netlogon_NdncSiteCoverageLabel="Sites:"
  7798. Netlogon_ExpectedDialupDelay="Expected dial-up delay on logon"
  7799. Netlogon_ExpectedDialupDelay_Help="Specifies the additional time for the computer to wait for the domain controller s (DC) response when logging on to the network.\n\nTo specify the Expected dial-up delay at logon, click Enable, and then enter the desired value in seconds (for example, the value "60" is 1 minute).\n\nIf this setting is not configured, it is not applied to any computers, and computers use their local configuration."
  7800. Netlogon_ExpectedDialupDelayLabel="Seconds:"
  7801. Netlogon_SiteName="Site Name"
  7802. Netlogon_SiteName_Help="Specifies the Active Directory site to which computers belong.\n\nAn Active Directory site is one or more well-connected TCP/IP subnets that allow administrators to configure Active Directory access and replication.\n\nTo specify the site name for this setting, click Enabled, and then enter the site name. When the site to which a computer belongs is not specified, the computer automatically discovers its site from Active Directory.\n\nIf this setting is not configured, it is not applied to any computers, and computers use their local configuration."
  7803. Netlogon_SiteNameLabel="Site:"
  7804. Netlogon_NegativeCachePeriod="Negative DC Discovery Cache Setting"
  7805. Netlogon_NegativeCachePeriod_Help="Specifies the amount of time (in seconds) the DC locator remembers that a domain controller (DC) could not be found in a domain. When a subsequent attempt to locate the DC occurs within the time set in this setting, DC Discovery immediately fails, without attempting to find the DC.\n\nThe default value for this setting is 45 seconds. The maximum value for this setting is 7 days (7*24*60*60). The minimum value for this setting is 0.\n\nWarning: If the value for this setting is too large, a client will not attempt to find any DCs that were initially unavailable. If the value for this setting is too small, clients will attempt to find DCs even when none are available."
  7806. Netlogon_NegativeCachePeriodLabel="Seconds:"
  7807. Netlogon_BackgroundRetryInitialPeriod="Initial DC Discovery Retry Setting for Background Callers"
  7808. Netlogon_BackgroundRetryInitialPeriod_Help="When applications performing periodic searches for domain controllers (DC) are unable to find a DC, the value set in this setting determines the amount of time (in seconds) before the first retry.\n\nThe default value for this setting is 10 minutes (10*60). The maximum value for this setting is 49 days (0x4294967). The minimum value for this setting is 0.\n\nThis setting is relevant only to those callers of DsGetDcName that have specified the DS_BACKGROUND_ONLY flag.\n\nIf the value of this setting is less than the value specified in the NegativeCachePeriod subkey, the value in the NegativeCachePeriod subkey is used.\n\nWarning: If the value for this setting is too large, a client will not attempt to find any DCs that were initially unavailable. If the value set in this setting is very small and the DC is not available, the traffic caused by periodic DC discoveries may be excessive."
  7809. Netlogon_BackgroundRetryInitialPeriodLabel="Seconds:"
  7810. Netlogon_BackgroundRetryMaximumPeriod="Maximum DC Discovery Retry Interval Setting for Background Callers"
  7811. Netlogon_BackgroundRetryMaximumPeriod_Help="When applications performing periodic searches for Domain Controllers (DCs) are unable to find a DC, the value set in this setting determines the maximum retry interval allowed.\n\nFor example, the retry intervals may be set at 10 minutes, then 20 minutes and then 40 minutes, but when the interval reaches the value set in this setting, that value becomes the retry interval for all subsequent retries until the value set in Final DC Discovery Retry Setting is reached.\n\nThe default value for this setting is 60 minutes (60*60). The maximum value for this setting is 49 days (0x4294967). The minimum value for this setting is 0.\n\nIf the value for this setting is smaller than the value specified for the Initial DC Discovery Retry Setting, the Initial DC Discovery Retry Setting is used.\n\nWarning: If the value for this setting is too large, a client may take very long periods to try to find a DC.\n\nIf the value for this setting is too small and the DC is not available, the frequent retries may produce excessive network traffic."
  7812. Netlogon_BackgroundRetryMaximumPeriodLabel="Seconds:"
  7813. Netlogon_BackgroundRetryQuitTime="Final DC Discovery Retry Setting for Background Callers"
  7814. Netlogon_BackgroundRetryQuitTime_Help="When applications performing periodic searches for domain controllers (DC) are unable to find a DC, the value set in this setting determines when retries are no longer allowed. For example, retires may be set to occur according to the Maximum DC Discovery Retry Interval Setting, but when the value set in this setting is reached, no more retries occur. If a value for this setting is smaller than the value in Maximum DC Discovery Retry Interval Setting, the value for Maximum DC Discovery Retry Interval Setting is used.\n\nThe default value for this setting is to not quit retrying (0). The maximum value for this setting is 49 days (0x4294967). The minimum value for this setting is 0.\n\nWarning: If the value for this setting is too small, a client will stop trying to find a DC too soon."
  7815. Netlogon_BackgroundRetryQuitTimeLabel="Seconds:"
  7816. Netlogon_BackgroundSuccessfulRefreshPeriod="Positive Periodic DC Cache Refresh for Background Callers"
  7817. Netlogon_BackgroundSuccessfulRefreshPeriod_Help="Determines when a successful DC cache entry is refreshed. This setting is applied to caller programs that periodically attempt to locate DCs, and it is applied before the returning the DC information to the caller program. The default value for this setting is infinite (4294967200). The maximum value for this setting is (4294967200), while the maximum that is not treated as infinity is 49 days (4294967). Any larger value is treated as infinity. The minimum value for this setting is to always refresh (0)."
  7818. Netlogon_BackgroundSuccessfulRefreshPeriodLabel="Seconds:"
  7819. Netlogon_NetlogonShareCompatibilityMode="Netlogon share compatibility"
  7820. Netlogon_NetlogonShareCompatibilityMode_Help="This setting controls whether or not the Netlogon share created by the Net Logon service on a domain controller (DC) should support compatibility in file sharing semantics with earlier applications.\n\nWhen this setting is enabled, the Netlogon share will honor file sharing semantics that grant requests for exclusive read access to files on the share even when the caller has only read permission.\n\nWhen this setting is disabled or not configured, the Netlogon share will grant shared read access to files on the share when exclusive access is requested and the caller has only read permission.\n\nBy default, the Netlogon share will grant shared read access to files on the share when exclusive access is requested.\n\nNote: The Netlogon share is a share created by the Net Logon service for use by client machines in the domain. The default behavior of the Netlogon share ensures that no application with only read permission to files on the Netlogon share can lock the files by requesting exclusive read access, which might prevent Group Policy settings from being updated on clients in the domain. When this setting is enabled, an application that relies on the ability to lock files on the Netlogon share with only read permission will be able to deny Group Policy clients from reading the files, and in general the availability of the Netlogon share on the domain will be decreased.\n\nIf this setting is enabled, domain administrators should ensure that the only applications using the exclusive read capability in the domain are those approved by the administrator."
  7821. Netlogon_NonBackgroundSuccessfulRefreshPeriod="Positive Periodic DC Cache Refresh for Non-Background Callers"
  7822. Netlogon_NonBackgroundSuccessfulRefreshPeriod_Help="Determines when a successful DC cache entry is refreshed. This setting is applied to caller programs that do not periodically attempt to locate DCs, and it is applied before the returning the DC information to the caller program. This setting is relevant to only those callers of DsGetDcName that have not specified the DS_BACKGROUND_ONLY flag.\n\nThe default value for this setting is 30 minutes (1800). The maximum value for this setting is (4294967200), while the maximum that is not treated as infinity is 49 days (4294967). Any larger value will be treated as infinity. The minimum value for this setting is to always refresh (0)."
  7823. Netlogon_NonBackgroundSuccessfulRefreshPeriodLabel="Seconds:"
  7824. Netlogon_ScavengeInterval="Scavenge Interval"
  7825. Netlogon_ScavengeInterval_Help="Determines the interval at which Netlogon performs the following scavenging operations:\n\n- Checks if a password on a secure channel needs to be modified, and modifies it if necessary.\n\n- On the domain controllers (DC), discovers a DC that has not been discovered.\n\n- On the PDC, attempts to add the <DomainName>[1B] NetBIOS name if it hasn t already been successfully added.\n\nNone of these operations are critical. 15 minutes is optimal in all but extreme cases. For instance, if a DC is separated from a trusted domain by an expensive (e.g., ISDN) line, this parameter might be adjusted upward to avoid frequent automatic discovery of DCs in a trusted domain.\n\nTo enable the setting, click Enabled, and then specify the interval in seconds."
  7826. Netlogon_ScavengeIntervalLabel="Seconds:"
  7827. Netlogon_SysvolShareCompatibilityMode="Sysvol share compatibility"
  7828. Netlogon_SysvolShareCompatibilityMode_Help="This setting controls whether or not the Sysvol share created by the Net Logon service on a domain controller (DC) should support compatibility in file sharing semantics with earlier applications.\n\nWhen this setting is enabled, the Sysvol share will honor file sharing semantics that grant requests for exclusive read access to files on the share even when the caller has only read permission.\n\nWhen this setting is disabled or not configured, the Sysvol share will grant shared read access to files on the share when exclusive access is requested and the caller has only read permission.\n\nBy default, the Sysvol share will grant shared read access to files on the share when exclusive access is requested.\n\nNote: The Sysvol share is a share created by the Net Logon service for use by Group Policy clients in the domain. The default behavior of the Sysvol share ensures that no application with only read permission to files on the sysvol share can lock the files by requesting exclusive read access, which might prevent Group Policy settings from being updated on clients in the domain. When this setting is enabled, an application that relies on the ability to lock files on the Sysvol share with only read permission will be able to deny Group Policy clients from reading the files, and in general the availability of the Sysvol share on the domain will be decreased.\n\nIf this setting is enabled, domain administrators should ensure that the only applications using the exclusive read capability in the domain are those approved by the administrator."
  7829. Netlogon_AvoidPdcOnWan="Contact PDC on logon failure"
  7830. Netlogon_AvoidPdcOnWan_Help="Defines whether a domain controller (DC) should attempt to verify with the PDC the password provided by a client if the DC failed to validate the password.\n\nContacting the PDC is useful in case the client s password was recently changed and did not propagate to the DC yet. Users may want to disable this feature if the PDC is located over a slow WAN connection.\n\nTo enable this feature, click Enabled.\n\nTo disable this feature, click Disabled."
  7831. Netlogon_AllowSingleLabelDnsDomain="Location of the DCs hosting a domain with single label DNS name"
  7832. Netlogon_AllowSingleLabelDnsDomain_Help="Specifies whether the computers to which this setting is applied attempt DNS name resolution of a single-label domain names.\n\nBy default, when a computer (or the DC Locator running on a computer, to be more specific) needs to locate a domain controller hosting an Active Directory domain specified with a single-label name, the computer exclusively uses NetBIOS name resolution, but not the DNS name resolution, unless the computer is joined to an Active Directory forest in which at least one domain has a single-label DNS name. \n\nIf this setting is enabled, computers to which this policy is applied will attempt to locate a domain controller hosting an Active Directory domain specified with a single-label name using DNS name resolution.\n\nIf this setting is disabled, computers to which this setting is applied will attempt to locate a domain controller hosting an Active Directory domain specified with a single-label name only using NetBIOS name resolution, but not the DNS name resolution, unless the computer is searching for a domain with a single label DNS name that exists in the Active Directory forest to which this computer is joined.\n\nIf this setting is not configured, it is not applied to any computers, and computers use their local configuration."
  7833. NoStartPage="Force classic Start Menu"
  7834. NoStartPage_Help="This setting effects the presentation of the Start menu.\n\nThe classic Start menu in Windows 2000 Professional allows users to begin common tasks, while the new Start menu consolidates common items onto one menu. When the classic Start menu is used, the following icons are placed on the desktop: My Documents, My Pictures, My Music, My Computer, and My Network Places. The new Start menu starts them directly.\n\nIf you enable this setting, the Start menu displays the classic Start menu in the Windows 2000 style and displays the standard desktop icons.\n\nIf you disable this setting, the Start menu only displays in the new style, meaning the desktop icons are now on the Start page.\n\nIf you do not configure this setting, the default is the new style, and the user can change the view."
  7835. SharedFolders="Shared Folders"
  7836. PublishSharedFolders="Allow shared folders to be published"
  7837. PublishSharedFolders_Help="Determines whether the user can publish shared folders in Active Directory.\n\nIf you enable this setting or do not configure it, users can use the "Publish in Active Directory" option in the Shared Folders snap-in to publish shared folders in Active Directory.\n\nIf you disable this setting, the user cannot publish shared folders in Active Directory, and the "Publish in Active Directory" option is disabled. Note: The default is to allow shared folders to be published when this setting is not configured"
  7838. PublishDfsRoots="Allow DFS roots to be published"
  7839. PublishDfsRoots_Help="Determines whether the user can publish DFS roots in Active Directory.\n\nIf you enable this setting or do not configure it, users can use the "Publish in Active Directory" option to publish DFS roots as shared folders in Active Directory.\n\nIf you disable this setting, the user cannot publish DFS roots in Active Directory, and the "Publish in Active Directory" option is disabled. Note: The default is to allow shared folders to be published when this setting is not configured."
  7840. Network="Network"
  7841. NetworkConnections="Network Connections"
  7842. NewGPODisplayName="Default name for new Group Policy objects"
  7843. NewGPODisplayName_Help="Sets the default display name for new Group Policy objects.\n\nThis setting allows you to specify the default name for new Group Policy objects created from policy compliant Group Policy Management tools including the Group Policy tab in Active Directory tools and the GPO browser.\n\nThe display name may contain environment variables and can be a maximum of 255 characters long.\n\nIf this setting is Disabled or Not Configured, the default display name of New Group Policy object is used."
  7844. NewGPODisplayNameHeading="GPO Name:"
  7845. NewGPOLinksDisabled="Create new Group Policy object links disabled by default"
  7846. NewGPOLinksDisabled_Help="Creates new Group Policy object links in the disabled state.\n\nThis setting creates all new Group Policy object links in the disabled state by default. After you configure and test the new object links by using a policy compliant Group Policy management tool such as Active Directory Users and Computers or Active Directory Sites and Services, you can enable the object links for use on the system.\n\nIf you disable this setting or do not configure it, new Group Policy object links are created in the enabled state. If you do not want them to be effective until they are configured and tested, you must disable the object link."
  7847. NoActiveDesktop_Help="Disables Active Desktop and prevents users from enabling it.\n\nThis setting prevents users from trying to enable or disable Active Desktop while a policy controls it.\n\nIf you disable this setting or do not configure it, Active Desktop is disabled by default, but users can enable it.\n\nNote: If both the "Enable Active Desktop" setting and the "Disable Active Desktop" setting are enabled, the "Disable Active Desktop" setting is ignored. If the "Turn on Classic Shell" setting (in User Configuration\Administrative Templates\Windows Components\Windows Explorer) is enabled, Active Desktop is disabled, and both these policies are ignored."
  7848. NoActiveDesktop_Tip="Disallows HTML and Jpg Wallpaper"
  7849. NoActiveDesktop="Disable Active Desktop"
  7850. NoActiveDesktopChanges_Help="Prevents the user from enabling or disabling Active Desktop or changing the Active Desktop configuration.\n\nThis is a comprehensive setting that locks down the configuration you establish by using other policies in this folder. This setting removes the Web tab from Display in Control Panel. As a result, users cannot enable or disable Active Desktop. If Active Desktop is already enabled, users cannot add, remove, or edit Web content or disable, lock, or synchronize Active Desktop components."
  7851. NoActiveDesktopChanges="Prohibit changes"
  7852. NoAddFromCDorFloppy_Help="Removes the "Add a program from CD-ROM or floppy disk" section from the Add New Programs page. This prevents users from using Add or Remove Programs to install programs from removable media.\n\nIf you disable this setting or do not configure it, the "Add a program from CD-ROM or floppy disk" option is available to all users.\n\nThis setting does not prevent users from using other tools and methods to add or remove program components.\n\nNote: If the "Hide Add New Programs page" setting is enabled, this setting is ignored. Also, if the "Prevent removable media source for any install" setting (located in User Configuration\Administrative Templates\Windows Components\Windows Installer) is enabled, users cannot add programs from removable media, regardless of this setting."
  7853. NoAddFromCDorFloppy="Hide the "Add a program from CD-ROM or floppy disk" option"
  7854. NoAddFromInternet_Help="Removes the "Add programs from Microsoft" section from the Add New Programs page. This setting prevents users from using Add or Remove Programs to connect to Windows Update.\n\nIf you disable this setting or do not configure it, "Add programs from Microsoft" is available to all users.\n\nThis setting does not prevent users from using other tools and methods to connect to Windows Update.\n\nNote: If the "Hide Add New Programs page" setting is enabled, this setting is ignored."
  7855. NoAddFromInternet="Hide the "Add programs from Microsoft" option"
  7856. NoAddFromNetwork_Help="Prevents users from viewing or installing published programs.\n\nThis setting removes the "Add programs from your network" section from the Add New Programs page. The "Add programs from your network" section lists published programs and provides an easy way to install them.\n\nPublished programs are those programs that the system administrator has explicitly made available to the user with a tool such as Windows Installer. Typically, system administrators publish programs to notify users that the programs are available, to recommend their use, or to enable users to install them without having to search for installation files.\n\nIf you enable this setting, users cannot tell which programs have been published by the system administrator, and they cannot use Add or Remove Programs to install published programs. However, they can still install programs by using other methods, and they can view and install assigned (partially installed) programs that are offered on the desktop or on the Start menu.\n\nIf you disable this setting or do not configure it, "Add programs from your network" is available to all users.\n\nNote: If the "Hide Add New Programs page" setting is enabled, this setting is ignored."
  7857. NoAddFromNetwork="Hide the "Add programs from your network" option"
  7858. NoAddingComponents_Help="Prevents users from adding Web content to their Active Desktop.\n\nThis setting removes the "New" button from Web tab in Display in Control Panel. As a result, users cannot add Web pages or pictures from the Internet or an intranet to the desktop. This setting does not remove existing Web content from their Active Desktop, or prevent users from removing existing Web content.\n\nAlso, see the "Disable all items" setting."
  7859. NoAddPage_Help="Removes the Add New Programs button from the Add or Remove Programs bar. As a result, users cannot view or change the attached page.\n\nThe Add New Programs button lets users install programs published or assigned by a system administrator.\n\nIf you disable this setting or do not configure it, the Add New Programs button is available to all users.\n\nThis setting does not prevent users from using other tools and methods to install programs."
  7860. NoAddPage="Hide Add New Programs page"
  7861. NoAddPrinter_Help="Prevents users from using familiar methods to add local and network printers.\n\nThis setting removes the Add Printer option from the Start menu. (To find the Add Printer option, click Start, click Printers, and then click Add Printer.) This setting also removes Add Printer from the Printers folder in Control Panel.\n\nAlso, users cannot add printers by dragging a printer icon into the Printers folder. If they try, a message appears explaining that the setting prevents the action.\n\nHowever, this setting does not prevent users from using the Add Hardware Wizard to add a printer. Nor does it prevent users from running other programs to add printers.\n\nThis setting does not delete printers that users have already added. However, if users have not added a printer when this setting is applied, they cannot print.\n\nNote: You can use printer permissions to restrict the use of printers without specifying a setting. In the Printers folder, right-click a printer, click Properties, and then click the Security tab."
  7862. NoAddPrinter="Prevent addition of printers"
  7863. NoAddRemovePrograms_Help="Prevents users from using Add or Remove Programs.\n\nThis setting removes Add or Remove Programs from Control Panel and removes the Add or Remove Programs item from menus.\n\nAdd or Remove Programs lets users install, uninstall, repair, add, and remove features and components of Windows 2000 Professional and a wide variety of Windows programs. Programs published or assigned to the user appear in Add or Remove Programs.\n\nIf you disable this setting or do not configure it, Add or Remove Programs is available to all users.\n\nWhen enabled, this setting takes precedence over the other settings in this folder.\n\nThis setting does not prevent users from using other tools and methods to install or uninstall programs."
  7864. NoAddRemovePrograms="Remove Add or Remove Programs"
  7865. NoAutoUpdate="Windows Automatic Updates"
  7866. NoAutoUpdate_Help="This setting controls automatic updates to a user's computer.\n\nWhenever a user connects to the Internet, Windows searches for updates available for the software and hardware on their computer and automatically downloads them. This happens in the background, and the user is prompted when downloaded components are ready to be installed, or prior to downloading, depending on their configuration.\n\nIf you enable this setting, it prohibits Windows from searching for updates.\n\nIf you disable or do not configure it, Windows searches for updates and automatically downloads them.\n\nNote: Windows Update is an online catalog customized for your computer that consists of items such as drivers, critical updates, Help files, and Internet products that you can download to keep your computer up to date.\n\nAlso, see the "Remove links and access to Windows Update" setting. If the "Remove links and access to Windows Update" setting is enabled, the links to Windows Update on the Start menu are also removed.\n\nNote: If you have installed Windows XP Service Pack 1 or the update to Automatic Updates that was released after Windows XP was originally shipped, then you should use the new Automatic Updates settings located at: 'Computer Configuration / Administrative Templates / Windows Update'"
  7867. NoAutoTrayNotify="Turn off notification area cleanup"
  7868. NoAutoTrayNotify_Help="This setting effects the notification area, also called the "system tray."\n\nThe notification area is located in the task bar, generally at the bottom of the screen, and itincludes the clock and current notifications. This setting determines whether the items are always expanded or always collapsed. By default, notifications are collapsed. The notification cleanup << icon can be referred to as the "notification chevron."\n\nIf you enable this setting, the system notification area expands to show all of the notifications that use this area.\n\nIf you disable this setting, the system notification area will always collapse notifications.\n\nIf you do not configure it, the user can choose if they want notifications collapsed."
  7869. NoBackButton_Help="Removes the Back button from the Open dialog box.\n\nThis setting, and others in this folder, lets you remove new features added in Windows 2000 Professional, so that the Open dialog box looks like it did in Windows NT 4.0 and earlier. These policies only affect programs that use the standard Open dialog box provided to developers of Windows programs.\n\nTo see an example of the standard Open dialog box, run Notepad and, on the File menu, click Open.\n\nNote: It is a requirement for third-party applications with Windows 2000 or later certification to adhere to this setting."
  7870. NoBackButton="Hide the common dialog back button"
  7871. NoBalloonTip_Help="Hides pop-up text on the Start menu and in the notification area.\n\nWhen you hold the cursor over an item on the Start menu or in the notification area, the system displays pop-up text providing additional information about the object.\n\nIf you enable this setting, some of this pop-up text is not displayed. The pop-up text affected by this setting includes "Click here to begin" on the Start button, "Where have all my programs gone" on the Start menu, and "Where have my icons gone" in the notification area.\n\nIf you disable this setting or do not configure it, all pop-up text is displayed on the Start menu and in the notification area."
  7872. NoBalloonTip="Remove Balloon Tips on Start Menu items"
  7873. NoCacheThumbNailPictures="Turn off caching of thumbnail pictures"
  7874. NoCacheThumbNailPictures_Help="This settings controls whether the thumbnail views are cached.\n\nIf you enable this setting, thumbnail views are not cached.\n\nIf you disable or do not configure this setting, thumbnail views are cached.\n\nNote: For shared corporate workstations or computers where security is a top concern, you should enable this setting to turn off the thumbnail view cache, because the thumbnail cache can be read by everyone."
  7875. NoCDBurning="Remove CD Burning features"
  7876. NoCDBurning_Help="Windows Explorer allows you to create and modify re-writable CDs if you have a CD writer connected to your PC.\n\nIf you enable this setting, all features in the Windows Explorer that allow you to use your CD writer are removed.\n\nIf you disable or do not configure this setting, users are able to use the Windows Explorer CD burning features.\n\nNote: This setting does not prevent users from using third-party applications to create or modify CDs using a CD writer."
  7877. NoChangeAnimation_Help="Prevents users from selecting the option to animate the movement of windows, menus, and lists.\n\nIf you enable this setting, the "Use transition effects for menus and tooltips" option in Display in Control Panel is disabled.\n\nEffects, such as animation, are designed to enhance the user's experience but might be confusing or distracting to some users."
  7878. NoChangeAnimation="Remove UI to change menu animation setting"
  7879. NoChangeKeyboardNavigationIndicators_Help="Disables the "Hide keyboard navigation indicators until I use the ALT key" option in Display in Control Panel.\n\nWhen this Display Properties option is selected, the underlining that indicates a keyboard shortcut character (hot key) does not appear on menus until you press ALT.\n\nEffects, such as transitory underlines, are designed to enhance the user's experience but might be confusing or distracting to some users."
  7880. NoChangeKeyboardNavigationIndicators="Remove UI to change keyboard navigation indicator setting"
  7881. NoChangeStartMenu_Help="Prevents users from using the drag-and-drop method to reorder or remove items on the Start menu. Also, it removes context menus from the Start menu.\n\nIf you disable this setting or do not configure it, users can remove or reorder Start menu items by dragging and dropping the item. They can display context menus by right-clicking a Start menu item.\n\nThis setting does not prevent users from using other methods of customizing the Start menu or performing the tasks available from the context menus.\n\nAlso, see the "Prevent changes to Taskbar and Start Menu Settings" and the "Remove access to the context menus for taskbar" settings."
  7882. NoChangeStartMenu="Remove Drag-and-drop context menus on the Start Menu"
  7883. NoChangingWallPaper_Help="Prevents users from adding or changing the background design of the desktop.\n\nBy default, users can use the Desktop tab of Display in Control Panel to add a background design (wallpaper) to their desktop.\n\nIf you enable this setting, the Desktop tab still appears, but all options on the tab are disabled.\n\nTo remove the Desktop tab, use the "Hide Desktop tab" setting.\n\nTo specify wallpaper for a group, use the "Active Desktop Wallpaper" setting.\n\nAlso, see the "Allow only bitmapped wallpaper" setting."
  7884. NoChooseProgramsPage_Help="Removes the Set Program Access and Defaults button from the Add or Remove Programs bar. As a result, users cannot view or change the associated page.\n\nThe Set Program Access and Defaults button lets administrators specify default programs for certain activities, such as Web browsing or sending e-mail, as well as which programs are accessible from the Start menu, desktop, and other locations.\n\nIf you disable this setting or do not configure it, the Set Program Access and Defaults button is available to all users.\n\nThis setting does not prevent users from using other tools and methods to change program access or defaults.\n\nThis setting does not prevent the Set Program Access and Defaults icon from appearing on the Start menu. See the "Remove Set Program Access and Defaults from Start menu" setting."
  7885. NoChooseProgramsPage="Hide the Set Program Access and Defaults page"
  7886. NoClose_Help="Prevents users from shutting down or restarting Windows.\n\nThis setting removes the Shut Down option from the Start menu and disables the Shut Down button on the Windows Security dialog box, which appears when you press CTRL+ALT+DEL.\n\nThis setting prevents users from using the Windows user interface to shut down the system, although it does not prevent them from running programs that shut down Windows. \n\nIf you disable this setting or do not configure it, the Shut Down menu option appears, and the Shut Down button is enabled.\n\nNote: It is a requirement for third-party applications with Windows 2000 or later certification to adhere to this setting."
  7887. NoClose="Remove and prevent access to the Shut Down command"
  7888. NoCloseDragDropBands_Help="Prevents users from manipulating desktop toolbars.\n\nIf you enable this setting, users cannot add or remove toolbars from the desktop. Also, users cannot drag toolbars on to or off of docked toolbars.\n\nNote: If users have added or removed toolbars, this setting prevents them from restoring the default configuration.\n\nTip: To view the toolbars that can be added to the desktop, right-click a docked toolbar (such as the taskbar beside the Start button), and point to "Toolbars."\n\nAlso, see the "Prohibit adjusting desktop toolbars" setting."
  7889. NoClosingComponents_Help="Prevents users from removing Web content from their Active Desktop.\n\nIn Active Desktop, you can add items to the desktop but close them so they are not displayed.\n\nIf you enable this setting, items added to the desktop cannot be closed; they always appear on the desktop. This setting removes the check boxes from items on the Web tab in Display in Control Panel.\n\nNote: This setting does not prevent users from deleting items from their Active Desktop."
  7890. NoCommonGroups_Help="Removes items in the All Users profile from the Programs menu on the Start menu.\n\nBy default, the Programs menu contains items from the All Users profile and items from the user's profile. If you enable this setting, only items in the user's profile appear in the Programs menu.\n\nTip: To see the Program menu items in the All Users profile, on the system drive, go to Documents and Settings\All Users\Start Menu\Programs."
  7891. NoCommonGroups="Remove common program groups from Start Menu"
  7892. NoControlPanel_Help="Disables all Control Panel programs.\n\nThis setting prevents Control.exe, the program file for Control Panel, from starting. As a result, users cannot start Control Panel or run any Control Panel items.\n\nThis setting also removes Control Panel from the Start menu. (To open Control Panel, click Start, point to Settings, and then click Control Panel.) This setting also removes the Control Panel folder from Windows Explorer.\n\nIf users try to select a Control Panel item from the Properties item on a context menu, a message appears explaining that a setting prevents the action.\n\nAlso, see the "Remove Display in Control Panel" and "Remove programs on Settings menu" settings."
  7893. NoControlPanel="Prohibit access to the Control Panel"
  7894. NoDeletePrinter_Help="Prevents users from deleting local and network printers.\n\nIf a user tries to delete a printer, such as by using the Delete option in Printers in Control Panel, a message appears explaining that a setting prevents the action.\n\nThis setting does not prevent users from running other programs to delete a printer."
  7895. NoDeletePrinter="Prevent deletion of printers"
  7896. NoDeletingComponents_Help="Prevents users from deleting Web content from their Active Desktop.\n\nThis setting removes the Delete button from the Web tab in Display in Control Panel. As a result, users can temporarily remove, but not delete, Web content from their Active Desktop.\n\nThis setting does not prevent users from adding Web content to their Active Desktop.\n\nAlso, see the "Prohibit closing items" and "Disable all items" settings."
  7897. NoDesktop_Help="Removes icons, shortcuts, and other default and user-defined items from the desktop, including Briefcase, Recycle Bin, My Computer, and My Network Places.\n\nRemoving icons and shortcuts does not prevent the user from using another method to start the programs or opening the items they represent.\n\nAlso, see "Items displayed in Places Bar" in User Configuration\Administrative Templates\Windows Components\Common Open File Dialog to remove the Desktop icon from the Places Bar. This will help prevent users from saving data to the Desktop."
  7898. NoDesktop="Hide and disable all items on the desktop"
  7899. NoDesktopCleanupWizard="Remove the Desktop Cleanup Wizard"
  7900. NoDesktopCleanupWizard_Help="Prevents users from using the Desktop Cleanup Wizard.\n\nIf you enable this setting, the Desktop Cleanup wizard does not automatically run on a users workstation every 60 days. The user will also not be able to access the Desktop Cleanup Wizard.\n\nIf you disable this setting or do not configure it, the default behavior of the Desktop Clean Wizard running every 60 days occurs.\n\nNote: When this setting is not enabled, users can run the Desktop Cleanup Wizard, or have it run automatically every 60 days from Display, by clicking the Desktop tab and then clicking the Customize Desktop button."
  7901. NoDFSTab_Help="Removes the DFS tab from Windows Explorer.\n\nThis setting removes the DFS tab from Windows Explorer and from other programs that use the Windows Explorer browser, such as My Computer. As a result, users cannot use this tab to view or change the properties of the Distributed File System (DFS) shares available from their computer.\n\nThis setting does not prevent users from using other methods to configure DFS."
  7902. NoDFSTab="Remove DFS tab"
  7903. NoDispAppearancePage_Help="Removes the Appearance and Themes tabs from Display in Control Panel.\n\nWhen this setting is enabled, it removes the desktop color selection option from the Desktop tab.\n\nThis setting prevents users from using Control Panel to change the colors or color scheme of the desktop and windows.\n\nIf this setting is disabled or not configured, the Appearance and Themes tabs are available in Display in Control Panel."
  7904. NoDispBackgroundPage_Help="Removes the Desktop tab from Display in Control Panel.\n\nThis setting prevents users from using Control Panel to change the pattern and wallpaper on the desktop.\n\nEnabling this setting also prevents the user from customizing the desktop by changing icons or adding new Web content through Control Panel."
  7905. NoDispCpl_Help="Disables Display in Control Panel.\n\nIf you enable this setting, Display in Control Panel does not run. When users try to start Display, a message appears explaining that a setting prevents the action.\n\nAlso, see the "Prohibit access to the Control Panel" (User Configuration\Administrative Templates\Control Panel) and "Remove programs on Settings menu" (User Configuration\Administrative Templates\Start Menu & Taskbar) settings."
  7906. NoDispScrSavPage_Help="Removes the Screen Saver tab from Display in Control Panel.\n\nThis setting prevents users from using Control Panel to add, configure, or change the screen saver on the computer."
  7907. NoDispSettingsPage_Help="Removes the Settings tab from Display in Control Panel.\n\nThis setting prevents users from using Control Panel to add, configure, or change the display settings on the computer."
  7908. NoDrives_Help="Removes the icons representing selected hard drives from My Computer and Windows Explorer. Also, the drive letters representing the selected drives do not appear in the standard Open dialog box.\n\nTo use this setting, select a drive or combination of drives in the drop-down list. To display all drives, disable this setting or select the "Do not restrict drives" option in the drop-down list.\n\nNote: This setting removes the drive icons. Users can still gain access to drive contents by using other methods, such as by typing the path to a directory on the drive in the Map Network Drive dialog box, in the Run dialog box, or in a command window.\n\nAlso, this setting does not prevent users from using programs to access these drives or their contents. And, it does not prevent users from using the Disk Management snap-in to view and change drive characteristics.\n\nAlso, see the "Prevent access to drives from My Computer" setting.\n\nNote: It is a requirement for third-party applications with Windows 2000 or later certification to adhere to this setting."
  7909. NoDrives="Hide these specified drives in My Computer"
  7910. NoDrivesDropdown="Pick one of the following combinations"
  7911. NoEditingComponents_Help="Prevents users from changing the properties of Web content items on their Active Desktop.\n\nThis setting disables the Properties button on the Web tab in Display in Control Panel. Also, it removes the Properties item from the menu for each item on the Active Desktop. As a result, users cannot change the properties of an item, such as its synchronization schedule, password, or display characteristics."
  7912. NoEncryptOnMove="Do not automatically encrypt files moved to encrypted folders"
  7913. NoEncryptOnMove_Help="Prevents Windows Explorer from encrypting files that are moved to an encrypted folder.\n\nIf you disable this setting or do not configure it, Windows Explorer automatically encrypts files that are moved to an encrypted folder.\n\nThis setting applies only to files moved within a volume. When files are moved to other volumes, or if you create a new file in an encrypted folder, Windows Explorer encrypts those files automatically."
  7914. NoEntireNetwork_Help="Removes all computers outside of the user's workgroup or local domain from lists of network resources in Windows Explorer and My Network Places.\n\nIf you enable this setting, the system removes the Entire Network option and the icons representing networked computers from My Network Places and from the browser associated with the Map Network Drive option.\n\nThis setting does not prevent users from viewing or connecting to computers in their workgroup or domain. It also does not prevent users from connecting to remote computers by other commonly used methods, such as by typing the share name in the Run dialog box or the Map Network Drive dialog box.\n\nTo remove computers in the user's workgroup or domain from lists of network resources, use the "No "Computers Near Me" in My Network Places" setting.\n\nNote: It is a requirement for third-party applications with Windows 2000 or later certification to adhere to this setting."
  7915. NoEntireNetwork="No "Entire Network" in My Network Places"
  7916. NoFavoritesMenu_Help="Prevents users from adding the Favorites menu to the Start menu or classic Start menu.\n\nIf you enable this setting, the Display Favorites item does not appear in the Advanced Start menu options box.\n\nIf you disable or do not configure this setting, the Display Favorite item is available.\n\nNote:The Favorities menu does not appear on the Start menu by default. To display the Favorites menu, right-click Start, click Properties, and then click Customize. If you are using Start menu, click the Advanced tab, and then, under Start menu items, click the Favorites menu. If you are using the classic Start menu, click Display Favorites under Advanced Start menu options.\n\nNote:The items that appear in the Favorites menu when you install Windows are preconfigured by the system to appeal to most users. However, users can add and remove items from this menu, and system administrators can create a customized Favorites menu for a user group.\n\nNote:This setting only affects the Start menu. The Favorites item still appears in Windows Explorer and in Internet Explorer."
  7917. NoFavoritesMenu="Remove Favorites menu from Start Menu"
  7918. NoFileMenu_Help="Removes the File menu from My Computer and Windows Explorer.\n\nThis setting does not prevent users from using other methods to perform tasks available on the File menu."
  7919. NoFileMenu="Remove File menu from Windows Explorer"
  7920. NoFileMRU_Help="Removes the list of most recently used files from the Open dialog box.\n\nIf you disable this setting or do not configure it, the "File name" field includes a drop-down list of recently used files. If you enable this setting, the "File name" field is a simple text box. Users must browse directories to find a file or type a file name in the text box.\n\nThis setting, and others in this folder, lets you remove new features added in Windows 2000 Professional, so that the Open dialog box looks like it did in Windows NT 4.0 and earlier. These policies only affect programs that use the standard Open dialog box provided to developers of Windows programs.\n\nTo see an example of the standard Open dialog box, start Notepad and, on the File menu, click Open.\n\nNote: It is a requirement for third-party applications with Windows 2000 or later certification to adhere to this setting."
  7921. NoFileMRU="Hide the dropdown list of recent files"
  7922. NoFind_Help="Removes the Search item from the Start menu, and disables some Windows Explorer search elements.\n\nThis setting removes the Search item from the Start menu and from the context menu that appears when you right-click the Start menu. Also, the system does not respond when users press the Application key (the key with the Windows logo)+ F.\n\nIn Windows Explorer, the Search item still appears on the Standard buttons toolbar, but the system does not respond when the user presses Ctrl+F. Also, Search does not appear in the context menu when you right-click an icon representing a drive or a folder.\n\nThis setting affects the specified user interface elements only. It does not affect Internet Explorer and does not prevent the user from using other methods to search.\n\nAlso, see the "Remove Search button from Windows Explorer" setting in User Configuration\Administrative Templates\Windows Components\Windows Explorer.\n\nNote:\n\nThis setting also prevents the user from using the F3 key."
  7923. NoFind="Remove Search menu from Start Menu"
  7924. NoFolderOptions_Help="Removes the Folder Options item from all Windows Explorer menus and removes the Folder Options item from Control Panel. As a result, users cannot use the Folder Options dialog box.\n\nThe Folder Options dialog box lets users set many properties of Windows Explorer, such as Active Desktop, Web view, Offline Files, hidden system files, and file types.\n\nAlso, see the "Enable Active Desktop" setting in User Configuration\AdministrativeTemplates\Desktop\Active Desktop and the "Prohibit user configuration of Offline Files" setting in User Configuration\Administrative Templates\Network\Offline Files."
  7925. NoFolderOptions="Removes the Folder Options menu item from the Tools menu"
  7926. NoHardwareTab_Help="Removes the Hardware tab.\n\nThis setting removes the Hardware tab from Mouse, Keyboard, and Sounds and Audio Devices in Control Panel. It also removes the Hardware tab from the Properties dialog box for all local drives, including hard drives, floppy disk drives, and CD-ROM drives. As a result, users cannot use the Hardware tab to view or change the device list or device properties, or use the Troubleshoot button to resolve problems with the device."
  7927. NoHardwareTab="Remove Hardware tab"
  7928. NoHelp_Help="Removes the Help command from the Start menu.\n\nThis setting only affects the Start menu. It does not remove the Help menu from Windows Explorer and does not prevent users from running Help."
  7929. NoHelp="Remove Help menu from Start Menu"
  7930. NoHTMLWallPaper_Help="Permits only bitmap images for wallpaper. This setting limits the desktop background ("wallpaper") to bitmap (.bmp) files. If users select files with other image formats, such as JPEG, GIF, PNG, or HTML, through the Browse button on the Desktop tab, the wallpaper does not load. Files that are autoconverted to a .bmp format, such as JPEG, GIF, and PNG, can be set as Wallpaper by right-clicking the image and selecting "Set as Wallpaper".\n\nAlso, see the "Active Desktop Wallpaper" and the "Prevent changing wallpaper" (in User Configuration\Administrative Templates\Control Panel\Display) settings."
  7931. NoInstrumentation_Help="Disables user tracking.\n\nThis setting prevents the system from tracking the programs users run, the paths they navigate, and the documents they open. The system uses this information to customize Windows features, such as personalized menus.\n\nIf you enable this setting, the system does not track these user actions. The system disables customized features that require user tracking information, including personalized menus.\n\nAlso, see the "Turn off personalized menus" setting."
  7932. NoInstrumentation="Turn off user tracking"
  7933. NoInternetIcon_Help="Removes the Internet Explorer icon from the desktop and from the Quick Launch bar on the taskbar.\n\nThis setting does not prevent the user from starting Internet Explorer by using other methods."
  7934. NoInternetIcon="Hide Internet Explorer icon on desktop"
  7935. NoLogOff_Help="Prevents the user from logging off.\n\nThis setting does not let the user log off the system by using any method, including programs run from the command line, such as scripts. It also disables or removes all menu items and buttons that log the user off the system.\n\nAlso, see the "Remove Logoff on the Start Menu" setting."
  7936. NoLogoff="Remove Logoff"
  7937. NoManageMyComputerVerb="Hides the Manage item on the Windows Explorer context menu"
  7938. NoManageMyComputerVerb_Help="Removes the Manage item from the Windows Explorer context menu. This context menu appears when you right-click Windows Explorer or My Computer.\n\nThe Manage item opens Computer Management (Compmgmt.msc), a console tool that includes many of the primary Windows 2000 administrative tools, such as Event Viewer, Device Manager, and Disk Management. You must be an administrator to use many of the features of these tools.\n\nThis setting does not remove the Computer Management item from the Start menu (Start, Programs, Administrative Tools, Computer Management), nor does it prevent users from using other methods to start Computer Management.\n\nTip: To hide all context menus, use the "Remove Windows Explorer's default context menu" setting."
  7939. NoMovingBands_Help="Prevents users from adjusting the length of desktop toolbars. Also, users cannot reposition items or toolbars on docked toolbars.\n\nThis setting does not prevent users from adding or removing toolbars on the desktop.\n\nNote: If users have adjusted their toolbars, this setting prevents them from restoring the default configuration.\n\nAlso, see the "Prevent adding, dragging, dropping and closing the Taskbar's toolbars" setting."
  7940. NoPropertiesMyComputer="Remove Properties from the My Computer context menu"
  7941. NoPropertiesMyComputer_Help="This setting hides Properties on the context menu for My Computer.\n\nIf you enable this setting, the Properties option will not be present when the user right-clicks My Computer or clicks My Computer and then goes to the File menu. Likewise, Alt-Enter does nothing when My Computer is selected.\n\nIf you disable or do not configure this setting, the Properties option is displayed as usual."
  7942. NoMyComputerSharedDocuments="Remove Shared Documents from My Computer"
  7943. NoMyComputerSharedDocuments_Help="Removes the Shared Documents folder from My Computer.\n\nWhen a Windows client in is a workgroup, a Shared Documents icon appears in the Windows Explorer Web view under "Other Places" and also under "Files Stored on This Computer" in My Computer. Using this policy setting, you can choose not to have these items displayed.\n\nIf you enable this setting, the Shared Documents folder is not displayed in the Web view or in My Computer.\n\nIf you disable or do not configure this setting, the Shared Documents folder is displayed in Web view and also in My Computer when the client is part of a workgroup.\n\nNote: The ability to remove the Shared Documents folder via Group Policy is only available on Windows XP Professional."
  7944. NoMyComputerIcon="Remove My Computer icon on the desktop"
  7945. NoMyComputerIcon_Help="This setting hides My Computer from the desktop and from the new Start menu. It also hides links to My Computer in the Web view of all Explorer windows, and it hides My Computer in the Explorer folder tree pane. If the user navigates into My Computer via the "Up" button while this setting is enabled, they view an empty My Computer folder. This setting allows administrators to restrict their users from seeing My Computer in the shell namespace, allowing them to present their users with a simpler desktop environment.\n\nIf you enable this setting, My Computer is hidden on the desktop, the new Start menu, the Explorer folder tree pane, and the Explorer Web views. If the user manages to navigate to My Computer, the folder will be empty.\n\nIf you disable this setting, My Computer is displayed as usual, appearing as normal on the desktop, Start menu, folder tree pane, and Web views, unless restricted by another setting.\n\nIf you do not configure this setting, the default is to display My Computer as usual.\n\nNote: Hiding My Computer and its contents does not hide the contents of the child folders of My Computer. For example, if the users navigate into one of their hard drives, they see all of their folders and files there, even if this setting is enabled."
  7946. NoMyDocumentsIcon_Help="Removes most occurrences of the My Documents icon.\n\nThis setting removes the My Documents icon from the desktop, from Windows Explorer, from programs that use the Windows Explorer windows, and from the standard Open dialog box.\n\nThis setting does not prevent the user from using other methods to gain access to the contents of the My Documents folder.\n\nThis setting does not remove the My Documents icon from the Start menu. To do so, use the "Remove My Documents icon from Start Menu" setting.\n\nNote: To make changes to this setting effective, you must log off from and log back on to Windows 2000 Professional."
  7947. NoMyDocumentsIcon="Remove My Documents icon on the desktop"
  7948. NoPinnedPrograms="Remove pinned programs list from the Start Menu"
  7949. NoPinnedPrograms_Help="If you enable this setting, the "Pinned Programs" list is removed from the Start menu, and the Internet and Email checkboxes are removed from the simple Start menu customization CPL.\n\nIf you disable this setting or do not configure it, the "Pinned Programs" list remains on the simple Start menu."
  7950. NoFrequentUsedPrograms="Remove frequent programs list from the Start Menu"
  7951. NoFrequentUsedPrograms_Help="If you enable this setting, the frequently used programs list is removed from the Start menu.\n\nIf you disable this setting or do not configure it, the frequently used programs list remains on the simple Start menu."
  7952. NoMoreProgramsList="Remove All Programs list from the Start menu"
  7953. NoMoreProgramsList_Help="If you enable this setting, the "All Programs" item is removed from the simple Start menu.\n\nIf you disable this setting or do not configure it, the "All Programs" item remains on the simple Start menu."
  7954. NoUserNameOnStartMenu="Remove user name from Start Menu"
  7955. NoUserNameOnStartMenu_Help="If you enable this setting, the user name is removed from the simple Start menu.\n\nIf you disable this setting or do not configure it, the user name remains on the simple Start menu."
  7956. NoRecycleBinIcon="Remove Recycle Bin icon from desktop"
  7957. NoRecycleBinIcon_Help="Removes most occurrences of the Recycle Bin icon.\n\nThis setting removes the Recycle Bin icon from the desktop, from Windows Explorer, from programs that use the Windows Explorer windows, and from the standard Open dialog box.\n\nThis setting does not prevent the user from using other methods to gain access to the contents of the Recycle Bin folder.\n\nNote: To make changes to this setting effective, you must log off and then log back on."
  7958. NoRecycleBinProperties="Remove Properties from the Recycle Bin context menu"
  7959. NoRecycleBinProperties_Help="Removes the Properties option from the Recycle Bin context menu.\n\nIf you enable this setting, the Properties option will not be present when the user right-clicks on Recycle Bin or opens Recycle Bin and then clicks File. Likewise, Alt-Enter does nothing when Recycle Bin is selected.\n\nIf you disable or do not configure this setting, the Properties option is displayed as usual."
  7960. NoRecycleFiles="Do not move deleted files to the Recycle Bin"
  7961. NoRecycleFiles_Help="When a file or folder is deleted in Windows Explorer, a copy of the file or folder is placed in the Recycle Bin. Using this setting, you can change this behavior.\n\nIf you enable this setting, files and folders that are deleted using Windows Explorer will not be placed in the Recycle Bin and will therefore be permanently deleted.\n\nIf you disable or do not configure this setting, files and folders deleted using Windows Explorer will be placed in the Recyele Bin."
  7962. RecycleBinSize="Maximum allowed Recycle Bin size"
  7963. RecycleBinSize_Help="Limits the percentage of a volume's disk space that can be used to store deleted files.\n\nIf you enable this setting, the user has a maximum amount of disk space that may be used for the Recycle Bin on their workstation.\n\nIf you disable or do not configure this setting, users can change the total amount of disk space used by the Recycle Bin.\n\nNote: This setting is applied to all volumes."
  7964. RecycleBinSizeHelp1="Value represents percentage of hard disk that can be used (0 - 100)."
  7965. RecycleBinSizeSpin="Maximum Recycle Bin size: "
  7966. NoSecurityTab="Remove Security tab"
  7967. NoSecurityTab_Help="Removes the Security tab from Windows Explorer.\n\nIf you enable this setting, users opening the Properties dialog box for all file system objects, including folders, files, shortcuts, and drives, will not be able to access the Security tab. As a result, users will be able to neither change the security settings nor view a list of all users that have access to the resource in question.\n\nIf you disable or do not configure this setting, users will be able to access the security tab."
  7968. NoSMMyPictures_Help="Removes the My Pictures icon from the Start Menu.
  7969. NoSMMyPictures="Remove My Pictures icon from Start Menu"
  7970. NoSMMyNetworkPlaces_Help="Removes the My Network Places icon from the Start Menu.
  7971. NoSMMyNetworkPlaces="Remove My Network Places icon from Start Menu"
  7972. NoSMMyMusic_Help="Removes the My Music icon from the Start Menu.
  7973. NoSMMyMusic="Remove My Music icon from Start Menu"
  7974. NoNetAndDialupConnect_Help="Prevents users from running Network Connections.\n\nThis setting prevents the Network Connections folder from opening. This setting also removes Network Connections from Settings on the Start menu.\n\nNetwork Connections still appears in Control Panel and in Windows Explorer, but if users try to start it, a message appears explaining that a setting prevents the action.\n\nAlso, see the "Disable programs on Settings menu" and "Disable Control Panel" settings and the settings in the Network Connections folder (Computer Configuration and User Configuration\Administrative Templates\Network\Network Connections)."
  7975. NoNetAndDialupConnect="Remove Network Connections from Start Menu"
  7976. NoNetConnectDisconnect_Help="Prevents users from using Windows Explorer or My Network Places to map or disconnect network drives.\n\nIf you enable this setting, the system removes the Map Network Drive and Disconnect Network Drive commands from the toolbar and Tools menus in Windows Explorer and My Network Places and from menus that appear when you right-click the Windows Explorer or My Network Places icons. It also removes the Add Network Place option from My Network Places.\n\nThis setting does not prevent users from connecting to another computer by typing the name of a shared folder in the Run dialog box.\n\nNote:\n\nThis setting was documented incorrectly on the Explain tab in Group Policy for Windows 2000. The Explain tab states incorrectly that this setting prevents users from connecting and disconnecting drives.\n\nNote: It is a requirement for third-party applications with Windows 2000 or later certification to adhere to this setting."
  7977. NoNetConnectDisconnect="Remove "Map Network Drive" and "Disconnect Network Drive""
  7978. NoNetHood_Help="Removes the My Network Places icon from the desktop.\n\nThis setting only affects the desktop icon. It does not prevent users from connecting to the network or browsing for shared computers on the network."
  7979. NoNetHood="Hide My Network Places icon on desktop"
  7980. NoOptions_Help="Removes the Folder Options item from all Windows Explorer menus and removes the Internet Options item from Internet Explorer. This setting also removes the Folder Options icon from Control Panel.\n\nFolder Options appears on the Tools menu in both Control Panel and Windows Explorer. (To open Folder Options, click My Computer, click My Documents, and then click My Network Places). Folder Options also appears as an item in Control Panel.\n\nThe Folder Options dialog box lets users set many properties of Windows Explorer, such as enabling Active Desktop, setting a single-click option for icons, displaying hidden system files, adding and deleting file types, and saving local copies of network files.\n\nInternet Options appears on the Tools menu in Internet Explorer. The Internet Options dialog box is the primary configuration tool for Internet Explorer. It lets users customize their displays, establish security and content standards, configure LAN and dial-up connections, set advanced browser options, and gain access to Certificate Manager and Microsoft Wallet.\n\nThis setting is more restrictive than the "Remove the Folder Options menu item from the Settings menu" setting, which removes Folder Options but displays Internet Options."
  7981. NoPropertiesMyDocuments="Remove Properties from the My Documents context menu"
  7982. NoPropertiesMyDocuments_Help="This setting hides Properties for the context menu on My Documents.\n\nIf you enable this setting, the Properties option will not be present when the user right-clicks My Documents or clicks My Documents and then goes to the File menu. Likewise, Alt-Enter does nothing when My Documents is selected.\n\nIf you disable or do not configure this setting, the Properties option is displayed as usual."
  7983. NoPlacesBar_Help="Removes the shortcut bar from the Open dialog box.\n\nThis setting, and others in this folder, lets you remove new features added in Windows 2000 Professional, so that the Open dialog box looks like it did in Windows NT 4.0 and earlier. These policies only affect programs that use the standard Open dialog box provided to developers of Windows programs.\n\nTo see an example of the standard Open dialog box, start Notepad and, on the File menu, click Open.\n\nNote: It is a requirement for third-party applications with Windows 2000 or later certification to adhere to this setting."
  7984. NoPlacesBar="Hide the common dialog places bar"
  7985. NoRecentDocsHistory_Help="Prevents the operating system and installed programs from creating and displaying shortcuts to recently opened documents.\n\nIf you enable this setting, the system and Windows programs do not create shortcuts to documents opened while the setting is in effect. Also, they retain but do not display existing document shortcuts. The system empties the Documents menu on the Start menu, and Windows programs do not display shortcuts at the bottom of the File menu.\n\nIf you disable this setting, the system defaults are enforced. Disabling this setting has no effect on the system.\n\nNote: The system saves document shortcuts in the user profile in the System-drive\Documents and Settings\User-name\Recent folder.\n\nAlso, see the "Remove Documents menu from Start Menu" and "Clear history of recently opened documents on exit" policies in this folder.\n\nIf you enable this setting but do not enable the "Remove Documents menu from Start Menu" setting, the Documents menu appears on the Start menu, but it is empty.\n\nIf you enable this setting, but then later disable it or set it to Not Configured, the document shortcuts saved before the setting was enabled reappear in the Documents menu and program File menus.\n\nThis setting does not hide document shortcuts displayed in the Open dialog box. See the "Hide the dropdown list of recent files" setting.\n\nNote: It is a requirement for third-party applications with Windows 2000 or later certification to adhere to this setting."
  7986. NoRecentDocsHistory="Do not keep history of recently opened documents"
  7987. NoRecentDocsMenu_Help="Removes the Documents menu from the Start menu.\n\nThe Documents menu contains links to the nonprogram files that users have most recently opened. It appears so that users can easily reopen their documents.\n\nIf you enable this setting, the system saves document shortcuts but does not display them in the Documents menu. If you later disable it or set it to Not Configured, the document shortcuts saved before the setting was enabled and while it was in effect appear in the Documents menu.\n\nNote: This setting does not prevent Windows programs from displaying shortcuts to recently opened documents. See the "Do not keep history of recently opened documents" setting.\n\nAlso, see the "Do not keep history of recently opened documents" and "Clear history of recenTly opened documents on exit" policies in this folder.\n\nThis setting also does not hide document shortcuts displayed in the Open dialog box. See the "Hide the dropdown list of recent files" setting."
  7988. NoRecentDocsMenu="Remove Documents menu from Start Menu"
  7989. NoRecentDocsNetHood="Do not add shares of recently opened documents to My Network Places"
  7990. NoRecentDocsNetHood_Help="Remote shared folders are not added to My Network Places whenever you open a document in the shared folder.\n\nIf you disable this setting or do not configure it, when you open a document in a remote shared folder, the system adds a connection to the shared folder to My Network Places.\n\nIf you enable this setting, shared folders are not added to My Network Places automatically when you open a document in the shared folder."
  7991. NoRemovePage_Help="Removes the Change or Remove Programs button from the Add or Remove Programs bar. As a result, users cannot view or change the attached page.\n\nThe Change or Remove Programs button lets users uninstall, repair, add, or remove features of installed programs.\n\nIf you disable this setting or do not configure it, the Change or Remove Programs page is available to all users.\n\nThis setting does not prevent users from using other tools and methods to delete or uninstall programs."
  7992. NoRemovePage="Hide Change or Remove Programs page"
  7993. NoResolveSearch_Help="Prevents the system from conducting a comprehensive search of the target drive to resolve a shortcut.\n\nBy default, when the system cannot find the target file for a shortcut (.lnk), it searches all paths associated with the shortcut. If the target file is located on an NTFS partition, the system then uses the target's file ID to find a path. If the resulting path is not correct, it conducts a comprehensive search of the target drive in an attempt to find the file.\n\nIf you enable this setting, the system does not conduct the final drive search. It just displays a message explaining that the file is not found.\n\nNote: This setting only applies to target files on NTFS partitions. FAT partitions do not have this ID tracking and search capability.\n\nAlso, see the "Do not track Shell shortcuts during roaming" and the "Do not use the tracking-based method when resolving shell shortcuts" settings."
  7994. NoResolveSearch="Do not use the search-based method when resolving shell shortcuts"
  7995. NoResolveTrack_Help="Prevents the system from using NTFS tracking features to resolve a shortcut.\n\nBy default, when the system cannot find the target file for a shortcut (.lnk), it searches all paths associated with the shortcut. If the target file is located on an NTFS partition, the system then uses the target's file ID to find a path. If the resulting path is not correct, it conducts a comprehensive search of the target drive in an attempt to find the file.\n\nIf you enable this setting, the system does not try to locate the file by using its file ID. It skips this step and begins a comprehensive search of the drive specified in the target path.\n\nNote: This setting only applies to target files on NTFS partitions. FAT partitions do not have this ID tracking and search capability.\n\nAlso, see the "Do not track Shell shortcuts during roaming" and the "Do not use the search-based method when resolving shell shortcuts" settings."
  7996. NoResolveTrack="Do not use the tracking-based method when resolving shell shortcuts"
  7997. NoRun_Help="Allows you to remove the Run command from the Start menu, Internet Explorer, and Task Manager.\n\nIf you enable this setting, the following changes occur:\n\n(1) The Run command is removed from the Start menu.\n\n(2) The New Task (Run) command is removed from Task Manager.\n\n(3) The user will be blocked from entering the following into the Internet Explorer Address Bar:\n\n--- A UNC path: \\<server>\<share> \n\n---Accessing local drives: e.g., C:\n\n--- Accessing local folders: e.g., \temp>\n\nAlso, users with extended keyboards will no longer be able to display the Run dialog box by pressing the Application key (the key with the Windows logo) + R.\n\nIf you disable or do not configure this setting, users will be able to access the Run command in the Start menu and in Task Manager and use the Internet Explorer Address Bar.\n\n\n\nNote:This setting affects the specified interface only. It does not prevent users from using other methods to run programs.\n\nNote: It is a requirement for third-party applications with Windows 2000 or later certification to adhere to this setting."
  7998. NoRun="Remove Run menu from Start Menu"
  7999. NoRunAsInstallPrompt_Help="Prevents users from submitting alternate logon credentials to install a program.\n\nThis setting suppresses the "Install Program As Other User" dialog box for local and network installations. This dialog box, which prompts the current user for the user name and password of an administrator, appears when users who are not administrators try to install programs locally on their computers. This setting allows administrators who have logged on as regular users to install programs without logging off and logging on again using their administrator credentials.\n\nMany programs can be installed only by an administrator. If you enable this setting and a user does not have sufficient permissions to install a program, the installation continues with the current user's logon credentials. As a result, the installation might fail, or it might complete but not include all features. Or, it might appear to complete successfully, but the installed program might not operate correctly.\n\nIf you disable this setting or do not configure it, the "Install Program As Other User" dialog box appears whenever users install programs locally on the computer.\n\nBy default, users are not prompted for alternate logon credentials when installing programs from a network share. If enabled, this setting overrides the "Request credentials for network installations" setting."
  8000. NoRunasInstallPrompt="Do not request alternate credentials"
  8001. NoSaveSettings_Help="Prevents users from saving certain changes to the desktop.\n\nIf you enable this setting, users can change the desktop, but some changes, such as the position of open windows or the size and position of the taskbar, are not saved when users log off. However, shortcuts placed on the desktop are always saved."
  8002. NoSaveSettings="Don't save settings at exit"
  8003. NoServices_Help="Prevents users from using Add or Remove Programs to configure installed services.\n\nThis setting removes the "Set up services" section of the Add/Remove Windows Components page. The "Set up services" section lists system services that have not been configured and offers users easy access to the configuration tools.\n\nIf you disable this setting or do not configure it, "Set up services" appears only when there are unconfigured system services. If you enable this setting, "Set up services" never appears.\n\nThis setting does not prevent users from using other methods to configure services.\n\nNote: When "Set up services" does not appear, clicking the Add/Remove Windows Components button starts the Windows Component Wizard immediately. Because the only remaining option on the Add/Remove Windows Components page starts the wizard, that option is selected automatically, and the page is bypassed.\n\nTo remove "Set up services" and prevent the Windows Component Wizard from starting, enable the "Hide Add/Remove Windows Components page" setting. If the "Hide Add/Remove Windows Components page" setting is enabled, this setting is ignored."
  8004. NoServices="Go directly to Components Wizard"
  8005. NoSetFolders_Help="Prevents Control Panel, Printers, and Network Connections from running.\n\nThis setting removes the Control Panel, Printers, and Network and Connection folders from Settings on the Start menu, and from My Computer and Windows Explorer. It also prevents the programs represented by these folders (such as Control.exe) from running.\n\nHowever, users can still start Control Panel items by using other methods, such as right-clicking the desktop to start Display or right-clicking My Computer to start System.\n\nAlso, see the "Disable Control Panel," "Disable Display in Control Panel," and "Remove Network Connections from Start Menu" settings."
  8006. NoSetFolders="Remove programs on Settings menu"
  8007. NoSetTaskbar_Help="Removes the Taskbar and Start Menu item from Settings on the Start menu. This setting also prevents the user from opening the Taskbar Properties dialog box.\n\nIf the user right-clicks the taskbar and then clicks Properties, a message appears explaining that a setting prevents the action."
  8008. NoSetTaskbar="Prevent changes to Taskbar and Start Menu Settings"
  8009. NoShellSearchButton="Remove Search button from Windows Explorer"
  8010. NoShellSearchButton_Help="Removes the Search button from the Windows Explorer toolbar.\n\nThis setting removes the Search button from the Standard Buttons toolbar that appears in Windows Explorer and other programs that use the Windows Explorer window, such as My Computer and My Network Places.\n\nIt does not remove the Search button or affect any search features of Internet browser windows, such as the Internet Explorer window.\n\nThis setting does not affect the Search items on the Windows Explorer context menu or on the Start menu. To remove Search from the Start menu, use the "Remove Search menu from Start menu" setting (in User Configuration\Administrative Templates\Start Menu and Taskbar). To hide all context menus, use the "Remove Windows Explorer's default context menu" setting."
  8011. NoSMConfigurePrograms_Help="Removes the Set Program Access and Defaults icon from the Start menu.\n\nClicking the Set Program Access and Defaults icon from the Start menu opens Add or Remove Programs and provides adminstrators the ability to specify default programs for certain activities, such as Web browsing or sending e-mail, as well as which programs are accessible from the Start menu, desktop, and other locations.\n\nNote: This setting does not prevent the Set Program Access and Defaults button from appearing in Add or Remove Programs. See the "Hide the Set Program Access and Defaults page" setting."
  8012. NoSMConfigurePrograms="Remove Set Program Access and Defaults from Start menu"
  8013. NoSMMyDocuments_Help="Removes the My Documents icon from the Start menu and its submenus.\n\nThis setting only removes the icon. It does not prevent the user from using other methods to gain access to the contents of the My Documents folder.\n\nNote: To make changes to this setting effective, you must log off and then log on.\n\nAlso, see the "Remove My Documents icon on the desktop" setting."
  8014. NoSMMyDocuments="Remove My Documents icon from Start Menu"
  8015. NoStartMenuSubFolders_Help="Hides all folders on the user-specific (top) section of the Start menu. Other items appear, but folders are hidden.\n\nThis setting is designed for use with redirected folders. Redirected folders appear on the main (bottom) section of the Start menu. However, the original, user-specific version of the folder still appears on the top section of the Start menu. Because the appearance of two folders with the same name might confuse users, you can use this setting to hide user-specific folders.\n\nNote that this setting hides all user-specific folders, not just those associated with redirected folders.\n\nIf you enable this setting, no folders appear on the top section of the Start menu. If users add folders to the Start Menu directory in their user profiles, the folders appear in the directory but not on the Start menu.\n\nIf you disable this setting or do not configured it, Windows 2000 Professional and Windows XP Professional display folders on both sections of the Start menu."
  8016. NoStartMenuSubFolders="Remove user's folders from the Start Menu"
  8017. NoSupportInfo_Help="Removes links to the Support Info dialog box from programs on the Change or Remove Programs page.\n\nPrograms listed on the Change or Remove Programs page can include a "Click here for support information" hyperlink. When clicked, the hyperlink opens a dialog box that displays troubleshooting information, including a link to the installation files and data that users need to obtain product support, such as the Product ID and version number of the program. The dialog box also includes a hyperlink to support information on the Internet, such as the Microsoft Product Support Services Web page.\n\nIf you disable this setting or do not configure it, the Support Info hyperlink appears.\n\nNote: Not all programs provide a support information hyperlink."
  8018. NoSupportInfo="Remove Support Information"
  8019. NoToolbarsOnTaskbar="Do not display any custom toolbars in the taskbar"
  8020. NoToolbarsOnTaskbar_Help="This setting affects the taskbar.\n\nThe taskbar includes the Start button, buttons for currently running tasks, custom toolbars, the notification area, and the system clock. Toolbars include Quick Launch, Address, Links, Desktop, and other custom toolbars created by the user or by an application.\n\nIf this setting is enabled, the taskbar does not display any custom toolbars, and the user cannot add any custom toolbars to the taskbar. Moreover, the "Toolbars" menu command and submenu are removed from the context menu. The taskbar displays only the Start button, taskbar buttons, the notification area, and the system clock.\n\nIf this setting is disabled or is not configured, the taskbar displays all toolbars. Users can add or remove custom toolbars, and the "Toolbars" command appears in the context menu."
  8021. NoTrayItemsDisplay="Hide the notification area"
  8022. NoTrayItemsDisplay_Help="This setting affects the notification area (previously called the "system tray") on the taskbar.\n\nDescription: The notification area is located at the far right end of the task bar and includes the icons for current notifications and the system clock.\n\nIf this setting is enabled, the user s entire notification area, including the notification icons, is hidden. The taskbar displays only the Start button, taskbar buttons, custom toolbars (if any), and the system clock.\n\nIf this setting is disabled or is not configured, the notification area is shown in the user's taskbar.\n\nNote: Enabling this setting overrides the "Turn off notification area cleanup" setting, because if the notification area is hidden, there is no need to clean up the icons."
  8023. NoTaskBarClock="Remove Clock from the system notification area"
  8024. NoTaskBarClock_Help="Prevents the clock in the system notification area from being displayed.\n\nIf you enable this setting, the clock will not be displayed in the system notification area.\n\nIf you disable or do not configure this setting, the default behavior of the clock appearing in the notification area will occur."
  8025. NoTaskGrouping="Prevent grouping of taskbar items"
  8026. NoTaskGrouping_Help="This setting effects the taskbar buttons used to switch between running programs.\n\nTaskbar grouping consolidates similar applications when there is no room on the taskbar. It kicks in when the user's taskbar is full.\n\nIf you enable this setting, it prevents the taskbar from grouping items that share the same program name. By default, this setting is always enabled.\n\nIf you disable or do not configure it, items on the taskbar that share the same program are grouped together. The users have the option to disable grouping if they choose."
  8027. NoTrayContextMenu_Help="Hides the menus that appear when you right-click the taskbar and items on the taskbar, such as the Start button, the clock, and the taskbar buttons.\n\nThis setting does not prevent users from using other methods to issue the commands that appear on these menus."
  8028. NoTrayContextMenu="Remove access to the context menus for the taskbar"
  8029. NoViewContextMenu_Help="Removes shortcut menus from the desktop and Windows Explorer. Shortcut menus appear when you right-click an item.\n\nIf you enable this setting, menus do not appear when you right-click the desktop or when you right-click the items in Windows Explorer. This setting does not prevent users from using other methods to issue commands available on the shortcut menus."
  8030. NoViewContextMenu="Remove Windows Explorer's default context menu"
  8031. NoViewOnDrive_Help="Prevents users from using My Computer to gain access to the content of selected drives.\n\nIf you enable this setting, users can browse the directory structure of the selected drives in My Computer or Windows Explorer, but they cannot open folders and access the contents. Also, they cannot use the Run dialog box or the Map Network Drive dialog box to view the directories on these drives.\n\nTo use this setting, select a drive or combination of drives from the drop-down list. To allow access to all drive directories, disable this setting or select the "Do not restrict drives" option from the drop-down list.\n\nNote: The icons representing the specified drives still appear in My Computer, but if users double-click the icons, a message appears explaining that a setting prevents the action.\n\n Also, this setting does not prevent users from using programs to access local and network drives. And, it does not prevent them from using the Disk Management snap-in to view and change drive characteristics.\n\nAlso, see the "Hide these specified drives in My Computer" setting."
  8032. NoViewOnDrive="Prevent access to drives from My Computer"
  8033. NoWelcomeTips_Help="Supresses the welcome screen.\n\nThis setting hides the welcome screen that is displayed on Windows 2000 Professional and Windows XP Professional each time the user logs on.\n\nUsers can still display the welcome screen by selecting it on the Start menu or by typing "Welcome" in the Run dialog box.\n\nThis setting applies only to Windows 2000 Professional and Windows XP Professional. It does not affect the "Configure Your Server on a Windows 2000 Server" screen on Windows 2000 Server.\n\nNote: This setting appears in the Computer Configuration and User Configuration folders. If both settings are configured, the setting in Computer Configuration takes precedence over the setting in User Configuration.\n\nTip: To display the welcome screen, click Start, point to Programs, point to Accessories, point to System Tools, and then click "Getting Started." To suppress the welcome screen without specifying a setting, clear the "Show this screen at startup" check box on the welcome screen."
  8034. NoWelcomeTips="Don't display the Getting Started welcome screen at logon"
  8035. NoWindowsHotKeys="Turn off Windows+X hotkeys"
  8036. NoWindowsHotKeys_Help="Turn off Windows+X hotkeys.\n\nKeyboards with a Windows key provide users with shortcuts to common shell features. For example, pressing the keyboard sequence Windows+R opens the Run dialog box; pressing Windows+E starts Windows Explorer. By using this setting, you can disable these Windows+X shortcut keys.\n\nIf you enable this setting, the Windows+X shortcut keys are unavailable.\n\nIf you disable or do not configure this setting, the Windows+X shortcut keys are available."
  8037. NoWindowsSetupPage_Help="Removes the Add/Remove Windows Components button from the Add or Remove Programs bar. As a result, users cannot view or change the associated page.\n\nThe Add/Remove Windows Components button lets users configure installed services and use the Windows Component Wizard to add, remove, and configure components of Windows from the installation files.\n\nIf you disable this setting or do not configure it, the Add/Remove Windows Components button is available to all users.\n\nThis setting does not prevent users from using other tools and methods to configure services or add or remove program components. However, this setting blocks user access to the Windows Component Wizard."
  8038. NoWindowsSetupPage="Hide Add/Remove Windows Components page"
  8039. NoWindowsUpdate_Help="Prevents users from connecting to the Windows Update Web site.\n\nThis setting blocks user access to the Windows Update Web site at http://windowsupdate.microsoft.com. Also, the setting removes the Windows Update hyperlink from the Start menu and from the Tools menu in Internet Explorer.\n\nWindows Update, the online extension of Windows, offers software updates to keep a user s system up-to-date. The Windows Update Product Catalog determines any system files, security fixes, and Microsoft updates that users need and shows the newest versions available for download.\n\nAlso, see the "Hide the "Add programs from Microsoft" option" setting."
  8040. NoWindowsUpdate="Remove links and access to Windows Update"
  8041. NoWorkGroupContents_Help="Removes computers in the user's workgroup and domain from lists of network resources in Windows Explorer and My Network Places.\n\nIf you enable this setting, the system removes the "Computers Near Me" option and the icons representing nearby computers from My Network Places. This setting also removes these icons from the Map Network Drive browser.\n\nThis setting does not prevent users from connecting to computers in their workgroup or domain by other commonly used methods, such as typing the share name in the Run dialog box or the Map Network Drive dialog box.\n\nTo remove network computers from lists of network resources, use the "No Entire Network in My Network Places" setting."
  8042. NoWorkgroupContents="No "Computers Near Me" in My Network Places"
  8043. OnlyUseLocalAdminFiles="Always use local ADM files for Group Policy Object Editor"
  8044. OnlyUseLocalAdminFiles_Help="Always use local ADM files for the Group Policy snap-in.\n\nBy default, when you edit a Group Policy object (GPO) using the Group Policy Object Editor snap-in, the ADM files are loaded from that GPO into the Group Policy Object Editor snap-in. This enables you to use the same version of the ADM files that were used to create the GPO while editing this GPO.\n\nThis leads to the following behavior:\n\n- If you originally created the GPO with, for example, an English system, the GPO contains English ADM files.\n\n- If you later edit the GPO from a different-language system, you get the English ADM files as they were in the GPO.\n\nYou can change this behavior by using this setting.\n\nIf you enable this setting, the Group Policy Object Editor snap-in always uses local ADM files in your %windir%\inf directory when editing GPOs.\n\nThis leads to the following behavior:\n\n- If you had originally created the GPO with an English system, and then you edit the GPO with a Japanese system, the Group Policy Object Editor snap-in uses the local Japanese ADM files, and you see the text in Japanese under Administrative Templates.\n\nIf you disable or do not configure this setting, the Group Policy Object Editor snap-in always loads all ADM files from the actual GPO.\n\nNote: If the ADMs that you require are not all available locally in your %windir%\inf directory, you might not be able to see all the settings that have been configured in the GPO that you are editing."
  8045. PCHealth="Error Reporting"
  8046. PCH_AdvancedReporting="Advanced Error Reporting settings"
  8047. PCH_ShowUI="Display Error Notification"
  8048. PCH_ShowUI_Help="Use this setting to control whether or not a user is given the choice to report an error.\n\nWhen Display Error Notification is enabled, the user will be notified that an error has occurred and will be given access to details about the error. If the Report Errors setting is also enabled, the user will also be given the choice of whether to report the error.\n\nWhen Display Error Notification is not enabled, the user will not be given the choice of whether to report the error. If the Report Errors setting is enabled, the error will be automatically reported, but the user will not be notified that an error has occurred.\n\nDisabling this setting is useful for server machines that do not have interactive users.\n\nIf you do not configure this setting, the user will be able to adjust the setting via the control panel, which is set to 'enable notification' by default on Windows XP Personal and Windows XP Professional machines and 'disable notification' on servers.\n\nAlso, see the "Report Errors" policy."
  8049. PCH_ShowUI_Chk="Enable error notification."
  8050. PCH_DoReport="Report Errors"
  8051. PCH_DoReport_Help="Use this setting to control whether or not errors are reported.\n\nIf Report Errors is enabled, the errors may be reported to Microsoft via the Internet or to a corporate file share.\n\nIf the 'Do not display links to any Microsoft "more information" web sites' checkbox is checked, links to Microsoft web sites that have more information about the error message will not be displayed.\n\nIf the 'Do not collect additional files' checkbox is checked, additional files will not be collected and included in the error reports.\n\nIf the 'Do not collect additional machine data' checkbox is checked, additional information about the machine will not be collected and included in the error reports.\n\nIf the 'Force queue mode for application errors' checkbox is checked, then the user will not be offered the chance to report when an error occurs. Instead, the error will be placed in a queue directory, and the next admin to log onto the machine will be given the chance to report the error.\n\nUse the 'Corporate file path' setting to set a UNC path that errors reports will be uploaded to. By entering a path, all error reports will go to the UNC path and Corporate Error Reporting will be enabled.\n\nIf an entry is made in the 'Replace instances of the word "Microsoft" with' setting, instances of the word "Microsoft" will be replaced with the contents of the entry in the error notification dialog boxes. This can be used to customize the error reporting dialogs with your company's name.\n\nIf Report Errors is disabled, users will not be given the option to report errors. If Display Error Notification is enabled, then users will still get a message indicating that a problem occurred, but will not have the option to report.\n\nIf you do not configure this setting, the user will be able to adjust the setting via the control panel, which is set to 'enable reporting' by default on Windows XP Personal and Windows XP Professional and 'disable reporting' on servers.\n\nIf this setting is enabled, it will override any s
  8052. PCH_NoExternalURL_Chk="Do not display links to any Microsoft provided 'more information' web sites."
  8053. PCH_NoFileCollect_Chk="Do not collect additional files"
  8054. PCH_NoLevelTwo_Chk="Do not collect additional machine data"
  8055. PCH_ForceQ_Chk="Force queue mode for application errors"
  8056. PCH_DumpPath_Edit="Corporate upload file path:"
  8057. PCH_CompanyText_Edit="Replace instances of the word 'Microsoft' with:"
  8058. PCH_AllOrNoneDef="Default application reporting settings"
  8059. PCH_AllOrNoneDef_Help="This setting controls whether or not errors in general applications are included when error reporting is enabled.\n\nWhen this setting is enabled, The 'Default' dropdown list allows you to choose whether or not to report all application errors or no application errors by default.\n\nWhen the 'Report all errors in Microsoft applications' checkbox is checked, all errors in Microsoft applications will be reported, regardless of the setting in the 'Default' dropdown list.\n\nWhen the 'Report all errors in Windows components' checkbox is checked, all errors in Windows applications will be reported, regardless of the setting in the 'Default' dropdown list.\n\nIf this setting is disabled, or not configured, the user will be able to adjust this setting via the control panel, which is set to 'upload all applications' by default.\n\nThis setting is ignored if the 'Report Errors' setting is disabled or not configured.\n\nAlso see the 'Report Errors' and 'Report Operating System Errors' policies."
  8060. PCH_AllOrNoneDef_List="Default:"
  8061. PCH_AllOrNoneDef_Include="Report all application errors"
  8062. PCH_AllOrNoneDef_Exclude="Do not report any application errors"
  8063. PCH_AllOrNoneWinComp_Chk="Report all errors in Windows components."
  8064. PCH_AllOrNoneIncMS_Chk="Report all errors in Microsoft applications."
  8065. PCH_AllOrNoneInc="List of applications to always report errors for"
  8066. PCH_AllOrNoneInc_Help="This setting specifies the applications that are always included in error reporting.\n\nWhen this setting is enabled, You can create a list of applications that are always included in error reporting: click the 'Show' button, and edit the list of application file names. The file names must include the .exe file name extension (for example, 'notepad.exe'). Errors generated by applications on this list will be reported, even if the Default dropdown in the Default Application Reporting setting is set to report no application errors.\n\nIf the 'Report all errors in Microsoft applications' or 'Report all errors in Windows components' checkbox in the Default Application Reporting setting is checked, error reporting will report errors as though all applications in these categories were added to this list. (Note: The 'Microsoft applications' category includes the 'Windows components' category.\n\nWhen this setting is disabled or not configured, no list of explicitly included files will be used, though the two checkboxes mentioned above will still be honored.\n\nAlso see the "Default Application Reporting" and "Application Exclusion List" policies.\n\nThis setting will be ignored if the 'Report Errors' setting is disabled or not configured."
  8067. PCH_AllOrNoneInc_List="Report errors for applications on this list:"
  8068. PCH_AllOrNoneEx="List of applications to never report errors for"
  8069. PCH_AllOrNoneEx_Help="This setting controls error reporting for errors in general applications when error reporting is enabled.\n\nThe "Default" dropdown list allows you to choose whether or not to report all application errors or no application errors by default.\n\nTo create a list of applications that error reporting will report for, click the "Show" button next to "Report errors for applications on this list" and edit the list of application filenames (example: notepad.exe). Errors generated by applications in this list will be reported, even if "Default" is set to report no application errors. You may use the "Report all errors in Microsoft applications" and "Report all errors in Windows components" checkboxes to implicitly add applications in these categories to the include list. Note that the "Microsoft applications" category includes the "Windows components" category.\n\nTo create a list of applications that error reporting will exclude from reporting, click the "Show" button next to "Exclude errors for applications on this list". Errors generated by applications in this list will never be reported, even if the default is set to report all application errors.\n\nThe exclude list has priority, so if an application is listed in the include list and exclude list the application will be excluded. You may also use the exclude list to exclude specific Microsoft applications or Windows components if you implicitly included these categories in the include list via the two checkboxes.\n\nIf you disable this setting or do not configure it, the user will be able to adjust this setting via the control panel, which is set to 'upload all applications' by default."
  8070. PCH_AllOrNoneEx_List="Exclude errors for applications on this list:"
  8071. PCH_ReportOperatingSystemFaults="Report operating system errors"
  8072. PCH_ReportOperatingSystemFaults_Help="This setting controls whether or not errors in the operating system are included when error reporting is enabled.\n\nWhen this setting is enabled, error reporting will include operating system errors.\n\nWhen this setting is disabled, operating system errors will not be included in error reporting.\n\nIf you do not configure this setting, the user will be able to adjust this setting via the control panel, which is set to 'upload operating system errors' by default\n\nAlso see the 'Report Errors' setting."
  8073. PCH_ReportOperatingSystemFaults_Chk="Enable error reporting for operating system errors"
  8074. PCH_ReportShutdownEvents="Report unplanned shutdown events"
  8075. PCH_ReportShutdownEvents_Help="This setting controls whether or not unplanned shutdown events can be reported when error reporting is enabled.\n\nWhen this setting is enabled, error reporting will include unplanned shutdown events.\n\nWhen this setting is disabled, unplanned shutdown events will not be included in error reporting.\n\nIf you do not configure this setting, the user will be able to adjust this setting via the control panel, which is set to 'upload unplanned shutdown events' by default.\n\nAlso see the 'Report Errors' setting."
  8076. PD_DOWNLOAD="Download profile"
  8077. PD_USELOCAL="Use local profile"
  8078. PhysicalLocation_Help="Specifies the default location criteria used when searching for printers.\n\nThis setting is a component of the Location Tracking feature of Windows printers. To use this setting, enable Location Tracking by enabling the "Pre-populate printer search location text" setting.\n\nWhen Location Tracking is enabled, the system uses the specified location as a criterion when users search for printers. The value you type here overrides the actual location of the computer conducting the search.\n\nType the location of the user's computer. When users search for printers, the system uses the specified location (and other search criteria) to find a printer nearby. You can also use this setting to direct users to a particular printer or group of printers that you want them to use.\n\nIf you disable this setting or do not configure it, and the user does not type a location as a search criterion, the system searches for a nearby printer based on the IP address and subnet mask of the user's computer."
  8079. PhysicalLocation_Name="Location"
  8080. PhysicalLocation_Tip1="Enter the location of this computer"
  8081. PhysicalLocation_Tip2="For example: CityName/Building 2/Floor 1/Office 1800"
  8082. PhysicalLocation="Computer location"
  8083. PhysicalLocationSupport_Help="Enables the physical Location Tracking support feature of Windows printers.\n\nLocation tracking lets you design a location scheme for your enterprise and assign computers and printers to locations in your scheme. Location tracking overrides the standard method of locating and associating users and printers, which uses the IP address and subnet mask of a computer to estimate its physical location and proximity to other computers.\n\nIf you enable Location Tracking, a Browse button appears beside the Location field in the Find Printers dialog box. (To go to the Browse button, click Start, click Search, and click For printers.) The Browse button also appears on the General tab of the Properties dialog box for a printer. It lets users browse for printers by location without their having to know the precise location (or location naming scheme). Also, if you enable the "Computer location" setting, the default location you type appears in the Location field.\n\nIf you disable this setting or do not configure it, Location Tracking is disabled. Printer proximity is estimated based on IP address and subnet mask."
  8084. PhysicalLocationSupport="Pre-populate printer search location text"
  8085. PickOneDrive="Restrict these drives"
  8086. PlacesBar="Items displayed in Places Bar"
  8087. PlacesBar_Help="Configures the list of items displayed in the Places Bar in the Windows File/Open dialog. If enable this setting you can specify from 1 to 5 items to be displayed in the Places Bar.\n\nThe valid items you may display in the Places Bar are:\n\n1) Shortcuts to a local folders -- (ex. C:\Windows)\n\n2) Shortcuts to remote folders -- (\\server\share)\n\n3) Common Shell folders.\n\nThe list of Common Shell Folders that may be specified:\n\nCommonDocuments, CommonMusic, CommonPictures, Desktop, MyComputer, MyDocuments, MyFavorites, MyMusic, MyNetworkPlaces, MyPictures, Printers, ProgramFiles, Recent.\n\nIf you disable or do not configure this setting the default list of items will be displayed in the Places Bar."
  8088. Places="Places to display:
  8089. Places0="Item 1"
  8090. Places1="Item 2"
  8091. Places2="Item 3"
  8092. Places3="Item 4"
  8093. Places4="Item 5"
  8094. PointAndPrint_Restrictions="Point and Print Restrictions"
  8095. PointAndPrint_Restrictions_Help="This policy setting restricts the servers that a client can connect to for point and print. The policy setting applies only to non Print Administrators clients, and only to machines that are members of a domain.\n\nWhen the policy setting is enabled, the client can be restricted to only point and print to a server within its own forest, and/or to a list of explicitly trusted servers.\n\nWhen the policy setting is not-configured, it defaults to allowing point and print only within the client s forest.\n\nWhen the policy setting is disabled, client machines can point and print to any server."
  8096. PointAndPrint_TrustedForest_Chk="Users can only point and print to machines in their forest."
  8097. PointAndPrint_TrustedServers_Chk="Users can only point and print to these servers:"
  8098. PointAndPrint_TrustedServers_Edit="Enter fully qualified server names separated by semicolons"
  8099. Pol_AlwaysPinSubFolders="Subfolders always available offline"
  8100. Pol_AlwaysPinSubFolders_Help ="Makes subfolders available offline whenever their parent folder is made available offline.\n\nThis setting automatically extends the "make available offline" setting to all new and existing subfolders of a folder. Users do not have the option of excluding subfolders.\n\nIf you enable this setting, when you make a folder available offline, all folders within that folder are also made available offline. Also, new folders that you create within a folder that is available offline are made available offline when the parent folder is synchronized.\n\nIf you disable this setting or do not configure it, the system asks users whether they want subfolders to be made available offline when they make a parent folder available offline."
  8101. Pol_AssignedOfflineFiles_Help="Lists network files and folders that are always available for offline use. This setting makes the specified files and folders available offline to users of the computer.\n\nTo assign a folder, click Show, and then click Add. In the "Type the name of the item to be added" box, type the fully qualified UNC path to the file or folder. Leave the "Enter the value of the item to be added" field blank.\n\nNote: This setting appears in the Computer Configuration and User Configuration folders. If both settings are configured, the settings will be combined and all specified files will be available for offline use."
  8102. Pol_AssignedOfflineFiles="Administratively assigned offline files"
  8103. Pol_CustomGoOfflineActions_Help="Determines how computers respond when they are disconnected from particular offline file servers. This setting overrides the default response, a user-specified response, and the response specified in the "Action on server disconnect" setting.\n\nTo use this setting, click Show, and then click Add. In the "Type the name of the item to be added" box, type the server's computer name. Then, in the "Type the value of the item to be added" box, type "0" if users can work offline when they are disconnected from this server, or type "1" if they cannot.\n\nThis setting appears in the Computer Configuration and User Configuration folders. If both settings are configured for a particular server, the setting in Computer Configuration takes precedence over the setting in User Configuration. Both Computer and User configuration take precedence over a user's setting. This setting does not prevent users from setting custom actions through the Offline Files tab. However, users are unable to change any custom actions established via this setting.\n\nTip: To configure this setting without establishing a setting, in Windows Explorer, on the Tools menu, click Folder Options, click the Offline Files tab, and then click Advanced. This setting corresponds to the settings in the "Exception list" section."
  8104. Pol_CustomGoOfflineActions="Non-default server disconnect actions"
  8105. Pol_DefCacheSize_Help="Limits the percentage of the computer's disk space that can be used to store automatically cached offline files.\n\nThis setting also disables the "Amount of disk space to use for temporary offline files" option on the Offline Files tab. This prevents users from trying to change the option while a setting controls it.\n\nAutomatic caching can be set on any network share. When a user opens a file on the share, the system automatically stores a copy of the file on the user's computer.\n\nThis setting does not limit the disk space available for files that user's make available offline manually.\n\nIf you enable this setting, you can specify an automatic-cache disk space limit.\n\nIf you disable this setting, the system limits the space that automatically cached files occupy to 10 percent of the space on the system drive.\n\nIf you do not configure this setting, disk space for automatically cached files is limited to 10 percent of the system drive by default, but users can change it.\n\nTip: To change the amount of disk space used for automatic caching without specifying a setting, in Windows Explorer, on the Tools menu, click Folder Options, click the Offline Files tab, and then use the slider bar associated with the "Amount of disk space to use for temporary offline files" option."
  8106. Pol_DefCacheSize="Default cache size"
  8107. Pol_Enabled_Help="Determines whether the Offline Files feature is enabled.\n\nThis setting also disables the "Enable Offline Files" option on the Offline Files tab. This prevents users from trying to change the option while a setting controls it.\n\nOffline Files saves a copy of network files on the user's computer for use when the computer is not connected to the network.\n\nIf you enable this setting, Offline Files is enabled and users cannot disable it.\n\nIf you disable this setting, Offline Files is disabled and users cannot enable it.\n\nBy default, Offline Files is enabled on Windows 2000 Professional and Windows XP Professional and is disabled on Windows 2000 Server and also Windows Server 2003 family.\n\nTip: To enable Offline Files without specifying a setting, in Windows Explorer, on the Tools menu, click Folder Options, click the Offline Files tab, and then click "Enable Offline Files."\n\nNote: To make changes to this setting effective, you must restart Windows."
  8108. Pol_Enabled="Allow or Disallow use of the Offline Files feature"
  8109. Pol_EncryptOfflineFiles="Encrypt the Offline Files cache"
  8110. Pol_EncryptOfflineFiles_Help="This setting determines whether offline files are encrypted.\n\nOffline files reside on a user's hard drive, not the network, and they are stored in a local cache on the computer. Encrypting this cache enhances security on a local computer. If the cache on the local computer is not encrypted, any encrypted files cached from the network will not be encrypted on the local computer. This may pose a security risk in some environments.\n\nIf you enable this setting, all files in the Offline Files cache are encrypted. This includes existing files as well as files added later. The cached copy on the local computer is affected, but the associated network copy is not. The user cannot unencrypt Offline Files through the user interface.\n\nIf you disable this setting, all files in the Offline Files cache are unencrypted. This includes existing files as well as files added later. The cached copy on the local computer is affected, but the associated network copy is not. The user cannot encrypt Offline Files through the user interface.\n\nIf you do not configure this setting, encryption of the Offline Files cache is controlled by the user through the user interface. The current cache state is retained, and if the cache is only partially encrypted, the operation completes so that it is fully encrypted. The cache does not return to the unencrypted state. The user must be an administrator on the local computer to encrypt or decrypt the Offline Files cache.\n\nNote: By default, this cache is protected on NTFS partitions by ACLs."
  8111. Pol_EventLoggingLevel_Help="Determines which events the Offline Files feature records in the event log.\n\nOffline Files records events in the Application log in Event Viewer when it detects errors. By default, Offline Files records an event only when the offline files storage cache is corrupted. However, you can use this setting to specify additional events you want Offline Files to record.\n\nTo use this setting, in the "Enter" box, select the number corresponding to the events you want the system to log. The levels are cumulative; that is, each level includes the events in all preceding levels.\n\n"0" records an error when the offline storage cache is corrupted.\n\n"1" also records an event when the server hosting the offline file is disconnected from the network.\n\n"2" also records events when the local computer is connected and disconnected from the network.\n\n"3" also records an event when the server hosting the offline file is reconnected to the network.\n\nNote: This setting appears in the Computer Configuration and User Configuration folders. If both settings are configured, the setting in Computer Configuration takes precedence over the setting in User Configuration."
  8112. Pol_EventLoggingLevel="Event logging level"
  8113. Pol_ExtExclusionList_Help="Lists types of files that cannot be used offline.\n\nThis setting lets you exclude certain types of files from automatic and manual caching for offline use. The system does not cache files of the type specified in this setting even when they reside on a network share configured for automatic caching. Also, if users try to make a file of this type available offline, the operation will fail and the following message will be displayed in the Synchronization Manager progress dialog box: "Files of this type cannot be made available offline."\n\nThis setting is designed to protect files that cannot be separated, such as database components.\n\nTo use this setting, type the file name extension in the "Extensions" box. To type more than one extension, separate the extensions with a semicolon (;).\n\nNote: To make changes to this setting effective, you must log off and log on again."
  8114. Pol_ExtExclusionList="Files not cached"
  8115. Pol_GoOfflineAction_Help="Determines whether network files remain available if the computer is suddenly disconnected from the server hosting the files.\n\nThis setting also disables the "When a network connection is lost" option on the Offline Files tab. This prevents users from trying to change the option while a setting controls it.\n\nIf you enable this setting, you can use the "Action" box to specify how computers in the group respond.\n\n-- "Work offline" indicates that the computer can use local copies of network files while the server is inaccessible.\n\n-- "Never go offline" indicates that network files are not available while the server is inaccessible.\n\nIf you disable this setting or select the "Work offline" option, users can work offline if disconnected.\n\nIf you do not configure this setting, users can work offline by default, but they can change this option.\n\nThis setting appears in the Computer Configuration and User Configuration folders. If both settings are configured, the setting in Computer Configuration takes precedence over the setting in User Configuration.\n\nTip: To configure this setting without establishing a setting, in Windows Explorer, on the Tools menu, click Folder Options, click the Offline Files tab, click Advanced, and then select an option in the "When a network connection is lost" section.\n\nAlso, see the "Non-default server disconnect actions" setting."
  8116. Pol_GoOfflineAction="Action on server disconnect"
  8117. Pol_NoCacheViewer_Help="Disables the Offline Files folder.\n\nThis setting disables the "View Files" button on the Offline Files tab. As a result, users cannot use the Offline Files folder to view or open copies of network files stored on their computer. Also, they cannot use the folder to view characteristics of offline files, such as their server status, type, or location.\n\nThis setting does not prevent users from working offline or from saving local copies of files available offline. Also, it does not prevent them from using other programs, such as Windows Explorer, to view their offline files.\n\nThis setting appears in the Computer Configuration and User Configuration folders. If both settings are configured, the setting in Computer Configuration takes precedence over the setting in User Configuration.\n\nTip: To view the Offline Files Folder, in Windows Explorer, on the Tools menu, click Folder Options, click the Offline Files tab, and then click "View Files.""
  8118. Pol_NoCacheViewer="Prevent use of Offline Files folder"
  8119. Pol_NoConfigCache_Help="Prevents users from enabling, disabling, or changing the configuration of Offline Files.\n\nThis setting removes the Offline Files tab from the Folder Options dialog box. It also removes the Settings item from the Offline Files context menu and disables the Settings button on the Offline Files Status dialog box. As a result, users cannot view or change the options on the Offline Files tab or Offline Files dialog box.\n\nThis is a comprehensive setting that locks down the configuration you establish by using other settings in this folder.\n\nThis setting appears in the Computer Configuration and User Configuration folders. If both settings are configured, the setting in Computer Configuration takes precedence over the setting in User Configuration.\n\nTip: This setting provides a quick method for locking down the default settings for Offline Files. To accept the defaults, just enable this setting. You do not have to disable any other settings in this folder."
  8120. Pol_NoConfigCache="Prohibit user configuration of Offline Files"
  8121. Pol_NoMakeAvailableOffline_Help="Prevents users from making network files and folders available offline.\n\nThis setting removes the "Make Available Offline" option from the File menu and from all context menus in Windows Explorer. As a result, users cannot designate files to be saved on their computer for offline use.\n\nHowever, this setting does not prevent the system from saving local copies of files that reside on network shares designated for automatic caching.\n\nThis setting appears in the Computer Configuration and User Configuration folders. If both settings are configured, the setting in Computer Configuration takes precedence over the setting in User Configuration."
  8122. Pol_NoMakeAvailableOffline="Remove 'Make Available Offline'"
  8123. Pol_NoPinFiles="Prohibit 'Make Available Offline' for these file and folders"
  8124. Pol_NoPinFiles_Help="Prohibits specific network files and folders from being made available for offline use.\n\nTo prohibit the "Make Available Offline" option for specific files or folders, enable this setting, click Show, and then click Add. In the "Type the name of the item to be added" box, type the fully qualified UNC path to the file or folder. Leave the "Enter the value of the item to be added" field blank.\n\nNote: This setting appears in the Computer Configuration and User Configuration folders. If both settings are configured, the settings are combined, and all specified files will not be available for offline use.\n\nNote: This setting does not prevent files from being automatically cached if the network share is configured for "Automatic Caching". It only affects the availability of the "Make Available Offline" menu option in the user interface.\n\nNote: If the "Disable Make Available Offline" setting is enabled, this setting has no effect."
  8125. Pol_PurgeAtLogoff="At logoff, delete local copy of user s offline files"
  8126. Pol_PurgeAtLogoff_Help="Deletes local copies of the user's offline files when the user logs off.\n\nThis setting specifies that automatically and manually cached offline files are retained only while the user is logged on to the computer. When the user logs off, the system deletes all local copies of offline files.\n\nIf you disable this setting or do not configure it, automatically and manually cached copies are retained on the user's computer for later offline use.\n\nCaution: Files are not synchronized before they are deleted. Any changes to local files since the last synchronization are lost."
  8127. Pol_NoReminders_Help="Hides or displays reminder balloons, and prevents users from changing the setting.\n\nReminder balloons appear above the Offline Files icon in the notification area to notify users when they have lost the connection to a networked file and are working on a local copy of the file. Users can then decide how to proceed.\n\nIf you enable this setting, the system hides the reminder balloons, and prevents users from displaying them.\n\nIf you disable the setting, the system displays the reminder balloons and prevents users from hiding them.\n\nIf this setting is not configured, reminder balloons are displayed by default when you enable offline files, but users can change the setting.\n\nTo prevent users from changing the setting while a setting is in effect, the system disables the "Enable reminders" option on the Offline Files tab\n\nThis setting appears in the Computer Configuration and User Configuration folders. If both settings are configured, the setting in Computer Configuration takes precedence over the setting in User Configuration.\n\nTip: To display or hide reminder balloons without establishing a setting, in Windows Explorer, on the Tools menu, click Folder Options, and then click the Offline Files tab. This setting corresponds to the "Enable reminders" check box."
  8128. Pol_NoReminders="Turn off reminder balloons"
  8129. Pol_ReminderFreq_Help="Determines how often reminder balloon updates appear.\n\nIf you enable this setting, you can select how often reminder balloons updates apppear and also prevent users from changing this setting.\n\nReminder balloons appear when the user's connection to a network file is lost or reconnected, and they are updated periodically. By default, the first reminder for an event is displayed for 30 seconds. Then, updates appear every 60 minutes and are displayed for 15 seconds. You can use this setting to change the update interval.\n\nThis setting appears in the Computer Configuration and User Configuration folders. If both settings are configured, the setting in Computer Configuration takes precedence over the setting in User Configuration.\n\nTip: To set reminder balloon frequency without establishing a setting, in Windows Explorer, on the Tools menu, click Folder Options, and then click the Offline Files tab. This setting corresponds to the "Display reminder balloons every ... minutes" option."
  8130. Pol_ReminderFreq="Reminder balloon frequency"
  8131. Pol_ReminderInitTimeout_Help="Determines how long the first reminder balloon for a network status change is displayed.\n\nReminder balloons appear when the user's connection to a network file is lost or reconnected, and they are updated periodically. By default, the first reminder for an event is displayed for 30 seconds. Then, updates appear every 60 minutes and are displayed for 15 seconds. You can use this setting to change the duration of the first reminder.\n\nThis setting appears in the Computer Configuration and User Configuration folders. If both settings are configured, the setting in Computer Configuration takes precedence over the setting in User Configuration."
  8132. Pol_ReminderInitTimeout="Initial reminder balloon lifetime"
  8133. Pol_ReminderTimeout_Help="Determines how long updated reminder balloons are displayed.\n\nReminder balloons appear when the user's connection to a network file is lost or reconnected, and they are updated periodically. By default, the first reminder for an event is displayed for 30 seconds. Then, updates appear every 60 minutes and are displayed for 15 seconds. You can use this setting to change the duration of the update reminder.\n\nThis setting appears in the Computer Configuration and User Configuration folders. If both settings are configured, the setting in Computer Configuration takes precedence over the setting in User Configuration."
  8134. Pol_ReminderTimeout="Reminder balloon lifetime"
  8135. Pol_SyncAtLogon_Help="Determines whether offline files are fully synchronized when users log on.\n\nThis setting also disables the "Synchronize all offline files before logging on" option on the Offline Files tab. This prevents users from trying to change the option while a setting controls it.\n\nIf you enable this setting, offline files are fully synchronized at logon. Full synchronization ensures that offline files are complete and current. Enabling this setting automatically enables logon synchronization in Synchronization Manager.\n\nIf this setting is disabled and Synchronization Manager is configured for logon synchronization, the system performs only a quick synchronization. Quick synchronization ensures that files are complete but does not ensure that they are current.\n\nIf you do not configure this setting and Synchronization Manager is configured for logon synchronization, the system performs a quick synchronization by default, but users can change this option.\n\nThis setting appears in the Computer Configuration and User Configuration folders. If both settings are configured, the setting in Computer Configuration takes precedence over the setting in User Configuration.\n\nTip: To change the synchronization method without setting a setting, in Windows Explorer, on the Tools menu, click Folder Options, click the Offline Files tab, and then select the "Synchronize all offline files before logging on" option."
  8136. Pol_SyncAtLogon="Synchronize all offline files when logging on"
  8137. Pol_SyncAtLogoff_Help="Determines whether offline files are fully synchronized when users log off.\n\nThis setting also disables the "Synchronize all offline files before logging off" option on the Offline Files tab. This prevents users from trying to change the option while a setting controls it.\n\nIf you enable this setting, offline files are fully synchronized. Full synchronization ensures that offline files are complete and current.\n\nIf you disable this setting, the system only performs a quick synchronization. Quick synchronization ensures that files are complete, but does not ensure that they are current.\n\nIf you do not configure this setting, the system performs a quick synchronization by default, but users can change this option.\n\nThis setting appears in the Computer Configuration and User Configuration folders. If both settings are configured, the setting in Computer Configuration takes precedence over the setting in User Configuration.\n\nTip: To change the synchronization method without changing a setting, in Windows Explorer, on the Tools menu, click Folder Options, click the Offline Files tab, and then select the "Synchronize all offline files before logging off" option."
  8138. Pol_SyncAtLogoff="Synchronize all offline files before logging off"
  8139. Pol_SyncAtSuspend="Synchronize offline files before suspend"
  8140. Lbl_SyncAtSuspendCombo="Action:"
  8141. Lbl_SyncAtSuspendHelp1="Type of synchronization to perform when suspending:"
  8142. Pol_SyncAtSuspend_Help="Determines whether offline files are synchonized before a computer is suspended.\n\nIf you enable this setting, offline files will be synchronized whenever the computer is suspended. Setting the synchronization action to "Quick" ensures only that all files in the cache are complete. Setting the synchronization action to "Full" ensures that all cached files and folders are up to date with the most current version.\n\nIf you disable or do not configuring this setting, a synchronization will not occur when the computer is suspended.\n\nNote: If the computer is suspended by closing the display on a portable computer, a synchronization is not performed. If multiple users are logged on to the computer at the time the computer is suspended, a synchronization is not performed."
  8143. Pol_SlowLinkSpeed="Configure Slow link speed"
  8144. Pol_SlowLinkSpeed_Help="Configures the threshold value at which Offline Files considers a network connection to be "slow". Any network speed below this value is considered to be slow.\n\nWhen a connection is considered slow, Offline Files automatically adjust its behavior to avoid excessive synchronization traffic and will not automatically reconnect to a server when the presence of a server is detected.\n\nIf you enable this setting, you can configure the threshold value that will be used to determine a slow network connection.\n\nIf this setting is disabled or not configured, the default threshold value of 64,000 bps is used to determine if a network connection is considered to be slow.\n\nNote: Use the following formula when entering the slow link value: [ bps / 100]. For example, if you want to set a threshold value of 128,000 bps, enter a value of 1280."
  8145. PolicyPolicies="Group Policy"
  8146. PreventIISInstall="Prevent IIS installation"
  8147. PreventIISInstall_Help="When you enable this setting, it will prevent Internet Information Services (IIS) from being installed, and you will not be able to install Windows components or applications that require IIS. Users installing Windows components or applications that require IIS may not receive a warning that IIS cannot be installed because of this Group Policy. Enabling this setting will not have any effect on IIS if IIS is already installed on the computer."
  8148. PrinterDirectorySearchScope_Help="Specifies the Active Directory location where searches for printers begin.\n\nThe Add Printer Wizard gives users the option of searching Active Directory for a shared printer. If you enable this setting, these searches begin at the location you specify in the "Default Active Directory path" box. Otherwise, searches begin at the root of Active Directory.\n\nThis setting only provides a starting point for Active Directory searches for printers. It does not restrict user searches through Active Directory."
  8149. PrinterDirectorySearchScope_Name="Default Active Directory path"
  8150. PrinterDirectorySearchScope_Tip1="example --> LDAP://DC=Domain1,DC=MyCompany,DC=com."
  8151. PrinterDirectorySearchScope="Default Active Directory path when searching for printers"
  8152. Printers="Printers"
  8153. PrinterServerThread_Help="Announces the presence of shared printers to print browse master servers for the domain.\n\nOn domains with Active Directory, shared printer resources are available in Active Directory and are not announced.\n\nIf you enable this setting, the print spooler announces shared printers to the print browse master servers. As a result, shared printers appear in the domain list in the Browse for Printer dialog box in the Add Printer Wizard.\n\nIf you disable this setting, shared printers are not announced to print browse master servers, even if Active Directory is not available.\n\nIf you do not configure this setting, shared printers are announced to browse master servers only when Active Directory is not available.\n\nNote: A client license is used each time a client computer announces a printer to a print browse master on the domain."
  8154. PrinterServerThread="Printer browsing"
  8155. PriorityLevel="Priority level:"
  8156. ProfileDlgTimeOut_Help="Determines how long the system waits for a user response before it uses a default value.\n\nThe default value is applied when the user does not respond to messages explaining that any of the following events has occurred:\n\n-- The system detects a slow connection between the user's computer and the server that stores users' roaming user profiles.\n\n-- The system cannot access users' server-based profiles when users log on or off.\n\n-- Users' local profiles are newer than their server-based profiles.\n\nYou can use this setting to override the system's default value of 30 seconds. To use this setting, type a decimal number between 0 and 600 for the length of the interval."
  8157. ProfileDlgTimeOut="Timeout for dialog boxes"
  8158. ProfileDlgWaitInterval="Time (seconds)"
  8159. ProfileErrorAction="Log users off when roaming profile fails"
  8160. ProfileErrorAction_Help="Logs a user off automatically when the system cannot load the user's roaming user profile.\n\nThis setting is used when the system cannot find the roaming user profile or the profile contains errors which prevent it from loading correctly.\n\nIf you disable this setting or do not configure it, when the roaming profile fails, the system loads a local copy of the roaming user profile, if one is available. Otherwise, the system loads the default user profile (stored in %Systemroot%\Documents and Settings\Default User).\n\nAlso, see the "Delete cached copies of roaming profiles" setting."
  8161. ProfileErrorActionDesc="If an error occurs when loading the user's profile:"
  8162. ProfileSize="Max Profile size (KB)"
  8163. ProfileUnloadTimeout="Maximum retries to unload and update user profile"
  8164. ProfileUnloadTimeout_Help="Determines how many times the system tries to unload and update the registry portion of a user profile. When the number of trials specified by this setting is exhausted, the system stops trying. As a result, the user profile might not be current, and local and roaming user profiles might not match.\n\nWhen a user logs off of the computer, the system unloads the user-specific section of the registry (HKEY_CURRENT_USER) into a file (NTUSER.DAT) and updates it. However, if another program or service is reading or editing the registry, the system cannot unload it. The system tries repeatedly (at a rate of once per second) to unload and update the registry settings. By default, the system repeats its periodic attempts 60 times (over the course of one minute).\n\nIf you enable this setting, you can adjust the number of times the system tries to unload and update the user's registry settings. (You cannot adjust the retry rate.)\n\nIf you disable this setting or do not configure it, the system repeats its attempt 60 times.\n\nIf you set the number of retries to 0, the system tries just once to unload and update the user's registry settings. It does not try again.\n\nNote: This setting is particularly important to servers running Terminal Services. Because Terminal Services edits the users' registry settings when they log off, the system's first few attempts to unload the user settings are more likely to fail.\n\nThis setting does not affect the system's attempts to update the files in the user profile.\n\nTip: Consider increasing the number of retries specified in this setting if there are many user profiles stored in the computer's memory. This indicates that the system has not been able to unload the profile.\n\nAlso, check the Application Log in Event Viewer for events generated by Userenv. The system records an event whenever it tries to unload the registry portion of the user profile. The system also records an event when it fails to update the files in a user profile."
  8165. ProfileUnloadTimeoutPrompt="Max retries: "
  8166. PromptRunAsInstallNetPath_Help="Prompts users for alternate logon credentials during network-based installations.\n\nThis setting displays the "Install Program As Other User" dialog box even when a program is being installed from files on a network computer across a local area network connection.\n\nIf you disable this setting or do not configure it, this dialog box appears only when users are installing programs from local media.\n\nThe "Install Program as Other User" dialog box prompts the current user for the user name and password of an administrator. This setting allows administrators who have logged on as regular users to install programs without logging off and logging on again using their administrator credentials.\n\nIf the dialog box does not appear, the installation proceeds with the current user's permissions. If these permissions are not sufficient, the installation might fail, or it might complete but not include all features. Or, it might appear to complete successfully, but the installed program might not operate correctly.\n\nNote: If it is enabled, the "Do not request alternate credentials" setting takes precedence over this setting. When that setting is enabled, users are not prompted for alternate logon credentials on any installation."
  8167. PromptRunasInstallNetPath="Request credentials for network installations"
  8168. PropertyPages="Hide Property Pages"
  8169. PropertyPagesHelp="Prevents users from viewing and changing the properties of an existing task.\n\nThis setting removes the Properties item from the File menu in Scheduled Tasks and from the context menu that appears when you right-click a task. As a result, users cannot change any properties of a task. They can only see the properties that appear in Detail view and in the task preview.\n\nThis setting prevents users from viewing and changing characteristics such as the program the task runs, its schedule details, idle time and power management settings, and its security context.\n\nNote: This setting appears in the Computer Configuration and User Configuration folders. If both settings are configured, the setting in Computer Configuration takes precedence over the setting in User Configuration.\n\nTip: This setting affects existing tasks only. To prevent users from changing the properties of newly created tasks, use the "Remove Advanced Menu" setting."
  8170. PruneDownlevel_Found="Only if Print Server is found"
  8171. PruneDownlevel_Help="Determines whether the system prunes (deletes from Active Directory) printers that are not automatically republished. This setting applies to printers running operating systems other than Windows 2000 and to Windows 2000 printers published outside their forest.\n\nThe Windows pruning service prunes printer objects from Active Directory when the computer that published them does not respond to contact requests. Computers running Windows 2000 Professional detect and republish deleted printer objects when they rejoin the network. However, because non-Windows 2000 computers and computers in other domains cannot republish printers in Active Directory automatically, by default the system never prunes their printer objects.\n\nYou can enable this setting to change the default behavior. To use this setting, select one of the following options from the "Prune non-republishing printers" box:\n\n-- "Never" specifies that printer objects that are not automatically republished are never pruned. "Never" is the default.\n\n-- "Only if Print Server is found" prunes printer objects that are not automatically republished only when the print server responds, but the printer is unavailable.\n\n-- "Whenever printer is not found" prunes printer objects that are not automatically republished whenever the host computer does not respond, just as it does with Windows 2000 printers.\n\nNote: This setting applies to printers published by using Active Directory Users and Computers or Pubprn.vbs. It does not apply to printers published by using Printers in Control Panel.\n\nTip: If you disable automatic pruning, remember to delete printer objects manually whenever you remove a printer or print server."
  8172. PruneDownlevel_Never="Never"
  8173. PruneDownlevel_NotFound="Whenever printer is not found"
  8174. PruneDownlevel_Tip1="Select the method by which non-republishing printers should be pruned."
  8175. PruneDownlevel="Prune printers that are not automatically republished"
  8176. PruneDownlevelTitle="Prune non-republishing printers:"
  8177. Pruning10Minutes="10 Minutes"
  8178. Pruning12Hours="12 Hours"
  8179. Pruning1Day="1 Day"
  8180. Pruning1Hour="1 Hour"
  8181. Pruning1Week="1 Week"
  8182. Pruning2Days="2 Days"
  8183. Pruning2Weeks="2 Weeks"
  8184. Pruning30Minutes="30 Minutes"
  8185. Pruning3Days="3 Days"
  8186. Pruning3Weeks="3 Weeks"
  8187. Pruning4Days="4 Days"
  8188. Pruning4Hours="4 Hours"
  8189. Pruning4Weeks="4 Weeks"
  8190. Pruning5Days="5 Days"
  8191. Pruning5Weeks="5 Weeks"
  8192. Pruning6Days="6 Days"
  8193. Pruning6Weeks="6 Weeks"
  8194. Pruning7Weeks="7 Weeks"
  8195. Pruning8Hours="8 Hours"
  8196. PruningImmediately="Continuous"
  8197. PruningInterval_Help="Specifies how often the pruning service on a domain controller contacts computers to verify that their printers are operational.\n\nThe pruning service periodically contacts computers that have published printers. If a computer does not respond to the contact message (optionally, after repeated attempts), the pruning service "prunes" (deletes from Active Directory) printer objects the computer has published.\n\nBy default, the pruning service contacts computers every eight hours and allows two repeated contact attempts before deleting printers from Active Directory.\n\nIf you enable this setting, you can change the interval between contact attempts.\n\nIf you do not configure or disable this setting the default values will be used.\n\nNote: This setting is used only on domain controllers."
  8198. PruningInterval_Tip1="The Pruning Interval determines the period of time the pruner "
  8199. PruningInterval_Tip2="sleeps between checks for abandoned PrintQueues."
  8200. PruningInterval="Directory pruning interval"
  8201. PruningIntervalTitle="Interval:"
  8202. PruningNever="Infinite"
  8203. PruningPriority_Help="Sets the priority of the pruning thread.\n\nThe pruning thread, which runs only on domain controllers, deletes printer objects from Active Directory if the printer that published the object does not respond to contact attempts. This process keeps printer information in Active Directory current.\n\nThe thread priority influences the order in which the thread receives processor time and determines how likely it is to be preempted by higher priority threads.\n\nBy default, the pruning thread runs at normal priority. However, you can adjust the priority to improve the performance of this service.\n\nNote: This setting is used only on domain controllers."
  8204. PruningPriority_Tip1="Use this setting to change the pruning thread's priority."
  8205. PruningPriority="Directory pruning priority"
  8206. PruningRetries_Help="Specifies how many times the pruning service on a domain controller repeats its attempt to contact a computer before pruning the computer's printers.\n\nThe pruning service periodically contacts computers that have published printers to verify that the printers are still available for use. If a computer does not respond to the contact message, the message is repeated for the specified number of times. If the computer still fails to respond, then the pruning service "prunes" (deletes from Active Directory) printer objects the computer has published.\n\nBy default, the pruning service contacts computers every eight hours and allows two retries before deleting printers from Active Directory. You can use this setting to change the number of retries.\n\nIf you enable this setting, you can change the interval between attempts.\n\nIf you do not configure or disable this setting, the default values are used.\n\nNote: This setting is used only on domain controllers."
  8207. PruningRetries="Directory pruning retry"
  8208. PruningRetries0="No Retry"
  8209. PruningRetries1="1 Retry"
  8210. PruningRetries2="2 Retries"
  8211. PruningRetries3="3 Retries"
  8212. PruningRetries4="4 Retries"
  8213. PruningRetries5="5 Retries"
  8214. PruningRetries6="6 Retries"
  8215. PruningRetryLog_Help="Specifies whether or not to log events when the pruning service on a domain controller attempts to contact a computer before pruning the computer's printers.\n\nThe pruning service periodically contacts computers that have published printers to verify that the printers are still available for use. If a computer does not respond to the contact attempt, the attempt is retried a specified number of times, at a specified interval. The "Directory pruning retry" setting determines the number of times the attempt is retried; the default value is two retries. The "Directory Pruning Interval" setting determines the time interval between retries; the default value is every eight hours. If the computer has not responded by the last contact attempt, its printers are pruned from the directory.\n\nIf the "Log directory pruning retry events" setting is enabled, the contact events are recorded in the event log. If this setting is not configured or is disabled, the contact events are not recorded in the event log.\n\nNote: This setting does not affect the logging of pruning events; the actual pruning of a printer is always logged.\n\nNote: This setting is used only on domain controllers."
  8216. PruningRetryLog="Log directory pruning retry events"
  8217. PruningRetriesTitle="Retries:"
  8218. PublishPrinters_Help="Determines whether the computer's shared printers can be published in Active Directory.\n\nIf you enable this setting or do not configure it, users can use the "List in directory" option in the Printer's Properties' Sharing tab to publish shared printers in Active Directory.\n\nIf you disable this setting, this computer's shared printers cannot be published in Active Directory, and the "List in directory" option is not available.\n\nNote: This settings takes priority over the setting "Automatically publish new printers in the Active Directory"."
  8219. PublishPrinters="Allow printers to be published"
  8220. PW_Power="Power Management"
  8221. PW_PromptPasswordOnResume="Prompt for password on resume from hibernate / suspend"
  8222. PW_PromptPasswordOnResume_Help="This settings allows you to configure client computers to always lock when resuming from a hibernate or suspend.\n\nIf you enable this setting, the client computer is locked when it is resumed from a suspend or hibernate state.\n\nIf you disable or do not configure this setting, users can decide if their computer is automatically locked or not after performing a resume operation."
  8223. QosDBMC_BestEffort_Help="Specifies an alternate Layer-3 Differentiated Services Code Point (DSCP) value for packets with the Best Effort service type (ServiceTypeBestEffort). The Packet Scheduler inserts the corresponding DSCP value in the IP header of the packets.\n\nThis setting applies only to packets that conform to the flow specification.\n\nIf you enable this setting, you can change the default DSCP value associated with the Best Effort service type.\n\nIf you disable this setting, the system uses the default DSCP value of 0.\n\nImportant: If the DSCP value for this service type is specified in the registry for a particular network adapter, this setting is ignored when configuring that network adapter."
  8224. QosDBMC_ControlledLoad_Help="Specifies an alternate Layer-3 Differentiated Services Code Point (DSCP) value for packets with the Controlled Load service type (ServiceTypeControlledLoad). The Packet Scheduler inserts the corresponding DSCP value in the IP header of the packets.\n\nThis setting applies only to packets that conform to the flow specification.\n\nIf you enable this setting, you can change the default DSCP value associated with the Controlled Load service type.\n\nIf you disable this setting, the system uses the default DSCP value of 24 (0x18).\n\nImportant: If the DSCP value for this service type is specified in the registry for a particular network adapter, this setting is ignored when configuring that network adapter."
  8225. QosDBMC_Guaranteed_Help="Specifies an alternate Layer-3 Differentiated Services Code Point (DSCP) value for packets with the Guaranteed service type (ServiceTypeGuaranteed). The Packet Scheduler inserts the corresponding DSCP value in the IP header of the packets.\n\nThis setting applies only to packets that conform to the flow specification.\n\nIf you enable this setting, you can change the default DSCP value associated with the Guaranteed service type.\n\nIf you disable this setting, the system uses the default DSCP value of 40 (0x28).\n\nImportant: If the DSCP value for this service type is specified in the registry for a particular network adapter, this setting is ignored when configuring that network adapter."
  8226. QosDBMC_NetworkControl_Help="Specifies an alternate Layer-3 Differentiated Services Code Point (DSCP) value for packets with the Network Control service type (ServiceTypeNetworkControl). The Packet Scheduler inserts the corresponding DSCP value in the IP header of the packets.\n\nThis setting applies only to packets that conform to the flow specification.\n\nIf you enable this setting, you can change the default DSCP value associated with the Network Control service type.\n\nIf you disable this setting, the system uses the default DSCP value of 48 (0x30).\n\nImportant: If the DSCP value for this service type is specified in the registry for a particular network adapter, this setting is ignored when configuring that network adapter."
  8227. QosDBMC_Qualitative_Help="Specifies an alternate Layer-3 Differentiated Services Code Point (DSCP) value for packets with the Qualitative service type (ServiceTypeQualitative). The Packet Scheduler inserts the corresponding DSCP value in the IP header of the packets.\n\nThis setting applies only to packets that conform to the flow specification.\n\nIf you enable this setting, you can change the default DSCP value associated with the Qualitative service type.\n\nIf you disable this setting, the system uses the default DSCP value of 0.\n\nImportant: If the DSCP value for this service type is specified in the registry for a particular network adapter, this setting is ignored when configuring that network adapter."
  8228. QosDBMC_Tip="Enter a DSCP value for conforming packets with the "
  8229. QosDBMNC_BestEffort_Help="Specifies an alternate Layer-3 Differentiated Services Code Point (DSCP) value for packets with the Best Effort service type (ServiceTypeBestEffort). The Packet Scheduler inserts the corresponding DSCP value in the IP header of the packets.\n\nThis setting applies only to packets that do not conform to the flow specification.\n\nIf you enable this setting, you can change the default DSCP value associated with the Best Effort service type.\n\nIf you disable this setting, the system uses the default DSCP value of 0.\n\nImportant: If the DSCP value for this service type is specified in the registry for a particular network adapter, this setting is ignored when configuring that network adapter."
  8230. QosDBMNC_ControlledLoad_Help="Specifies an alternate Layer-3 Differentiated Services Code Point (DSCP) value for packets with the Controlled Load service type (ServiceTypeControlledLoad). The Packet Scheduler inserts the corresponding DSCP value in the IP header of the packets.\n\nThis setting applies only to packets that do not conform to the flow specification.\n\nIf you enable this setting, you can change the default DSCP value associated with the Controlled Load service type.\n\nIf you disable this setting, the system uses the default DSCP value of 0.\n\nImportant: If the DSCP value for this service type is specified in the registry for a particular network adapter, this setting is ignored when configuring that network adapter."
  8231. QosDBMNC_Guaranteed_Help="Specifies an alternate Layer-3 Differentiated Services Code Point (DSCP) value for packets with the Guaranteed service type (ServiceTypeGuaranteed). The Packet Scheduler inserts the corresponding DSCP value in the IP header of the packets.\n\nThis setting applies only to packets that do not conform to the flow specification.\n\nIf you enable this setting, you can change the default DSCP value associated with the Guaranteed service type.\n\nIf you disable this setting, the system uses the default DSCP value of 0.\n\nImportant: If the DSCP value for this service type is specified in the registry for a particular network adapter, this setting is ignored when configuring that network adapter."
  8232. QosDBMNC_NetworkControl_Help="Specifies an alternate Layer-3 Differentiated Services Code Point (DSCP) value for packets with the Network Control service type (ServiceTypeNetworkControl). The Packet Scheduler inserts the corresponding DSCP value in the IP header of the packets.\n\nThis setting applies only to packets that do not conform to the flow specification.\n\nIf you enable this setting, you can change the default DSCP value associated with the Network Control service type.\n\nIf you disable this setting, the system uses the default DSCP value of 0.\n\nImportant: If the DSCP value for this service type is specified in the registry for a particular network adapter, this setting is ignored when configuring that network adapter."
  8233. QosDBMNC_Qualitative_Help="Specifies an alternate Layer-3 Differentiated Services Code Point (DSCP) value for packets with the Qualitative service type (ServiceTypeQualitative). The Packet Scheduler inserts the corresponding DSCP value in the IP header of the packets.\n\nThis setting applies only to packets that do not conform to the flow specification.\n\nIf you enable this setting, you can change the default DSCP value associated with the Qualitative service type.\n\nIf you disable this setting, the system uses the default DSCP value of 0.\n\nImportant: If the DSCP value for this service type is specified in the registry for a particular network adapter, this setting is ignored when configuring that network adapter."
  8234. QosDBMNC_Tip="Enter a DSCP value for non-conforming packets with the "
  8235. QosDiffservByteMappingConforming="DSCP value of conforming packets"
  8236. QosDiffservByteMappingNonConforming="DSCP value of non-conforming packets"
  8237. QosDSCPValue="DSCP value: "
  8238. QosMaxOutstandingSends="Limit outstanding packets"
  8239. QosMaxOutstandingSends_Box="Number of packets: "
  8240. QosMaxOutstandingSends_Help="Specifies the maximum number of outstanding packets permitted on the system. When the number of outstanding packets reaches this limit, the Packet Scheduler postpones all submissions to network adapters until the number falls below this limit.\n\n"Outstanding packets" are packets that the Packet Scheduler has submitted to a network adapter for transmission, but which have not yet been sent.\n\nIf you enable this setting, you can limit the number of outstanding packets.\n\nIf you disable this setting or do not configure it, then the setting has no effect on the system.\n\nImportant: If the maximum number of outstanding packets is specified in the registry for a particular network adapter, this setting is ignored when configuring that network adapter."
  8241. QosNonBestEffortLimit="Limit reservable bandwidth"
  8242. QosNonBestEffortLimit_Box="Bandwidth limit (%): "
  8243. QosNonBestEffortLimit_Help="Determines the percentage of connection bandwidth that the system can reserve. This value limits the combined bandwidth reservations of all programs running on the system.\n\nBy default, the Packet Scheduler limits the system to 20 percent of the bandwidth of a connection, but you can use this setting to override the default.\n\nIf you enable this setting, you can use the "Bandwidth limit" box to adjust the amount of bandwidth the system can reserve.\n\nIf you disable this setting or do not configure it, the system uses the default value of 20 percent of the connection.\n\nImportant: If a bandwidth limit is set for a particular network adapter in the registry, this setting is ignored when configuring that network adapter."
  8244. QosPriorityValue="Priority value "
  8245. QosPsched="QoS Packet Scheduler"
  8246. QosServiceTypeNonConforming="Non-conforming packets"
  8247. QosServiceTypeBestEffort="Best effort service type"
  8248. QosServiceTypeControlledLoad="Controlled load service type"
  8249. QosServiceTypeGuaranteed="Guaranteed service type"
  8250. QosServiceTypeNetworkControl="Network control service type"
  8251. QosServiceTypeQualitative="Qualitative service type"
  8252. QosServiceTypeBestEffort_C="Best effort service type"
  8253. QosServiceTypeControlledLoad_C="Controlled load service type"
  8254. QosServiceTypeGuaranteed_C="Guaranteed service type"
  8255. QosServiceTypeNetworkControl_C="Network control service type"
  8256. QosServiceTypeQualitative_C="Qualitative service type"
  8257. QosServiceTypeBestEffort_NC="Best effort service type"
  8258. QosServiceTypeControlledLoad_NC="Controlled load service type"
  8259. QosServiceTypeGuaranteed_NC="Guaranteed service type"
  8260. QosServiceTypeNetworkControl_NC="Network control service type"
  8261. QosServiceTypeQualitative_NC="Qualitative service type"
  8262. QosServiceTypeBestEffort_PV="Best effort service type"
  8263. QosServiceTypeControlledLoad_PV="Controlled load service type"
  8264. QosServiceTypeGuaranteed_PV="Guaranteed service type"
  8265. QosServiceTypeNetworkControl_PV="Network control service type"
  8266. QosServiceTypeQualitative_PV="Qualitative service type"
  8267. QosTcpTraffic="Specify default marking for TCP traffic"
  8268. QosTimerResolution="Set timer resolution"
  8269. QosTimerResolution_Box="Timer units (in microseconds): "
  8270. QosTimerResolution_Help="Determines the smallest unit of time that the Packet Scheduler uses when scheduling packets for transmission. The Packet Scheduler cannot schedule packets for transmission more frequently than permitted by the value of this entry.\n\nIf you enable this setting, you can override the default timer resolution established for the system, usually units of 10 microseconds.\n\nIf you disable this setting or do not configure it, the setting has no effect on the system.\n\nImportant: If a timer resolution is specified in the registry for a particular network adapter, then this setting is ignored when configuring that network adapter."
  8271. QosUPM_BestEffort_Help="Specifies an alternate link layer (Layer-2) priority value for packets with the Best Effort service type (ServiceTypeBestEffort). The Packet Scheduler inserts the corresponding priority value in the Layer-2 header of the packets.\n\nIf you enable this setting, you can change the default priority value associated with the Best Effort service type.\n\nIf you disable this setting, the system uses the default priority value of 0.\n\nImportant: If the Layer-2 priority value for this service type is specified in the registry for a particular network adapter, this setting is ignored when configuring that network adapter."
  8272. QosUPM_ControlledLoad_Help="Specifies an alternate link layer (Layer-2) priority value for packets with the Controlled Load service type (ServiceTypeControlledLoad). The Packet Scheduler inserts the corresponding priority value in the Layer-2 header of the packets.\n\nIf you enable this setting, you can change the default priority value associated with the Controlled Load service type.\n\nIf you disable this setting, the system uses the default priority value of 4.\n\nImportant: If the Layer-2 priority value for this service type is specified in the registry for a particular network adapter, this setting is ignored when configuring that network adapter."
  8273. QosUPM_Guaranteed_Help="Specifies an alternate link layer (Layer-2) priority value for packets with the Guaranteed service type (ServiceTypeGuaranteed). The Packet Scheduler inserts the corresponding priority value in the Layer-2 header of the packets.\n\nIf you enable this setting, you can change the default priority value associated with the Guaranteed service type.\n\nIf you disable this setting, the system uses the default priority value of 5.\n\nImportant: If the Layer-2 priority value for this service type is specified in the registry for a particular network adapter, this setting is ignored when configuring that network adapter."
  8274. QosUPM_NetworkControl_Help="Specifies an alternate link layer (Layer-2) priority value for packets with the Network Control service type (ServiceTypeNetworkControl). The Packet Scheduler inserts the corresponding priority value in the Layer-2 header of the packets.\n\nIf you enable this setting, you can change the default priority value associated with the Network Control service type.\n\nIf you disable this setting, the system uses the default priority value of 7.\n\nImportant: If the Layer-2 priority value for this service type is specified in the registry for a particular network adapter, this setting is ignored when configuring that network adapter."
  8275. QosUPM_NonConforming_Help="Specifies an alternate link layer (Layer-2) priority value for packets that do not conform to the flow specification. The Packet Scheduler inserts the corresponding priority value in the Layer-2 header of the packets.\n\nIf you enable this setting, you can change the default priority value associated with nonconforming packets.\n\nIf you disable this setting, the system uses the default priority value of 1.\n\nImportant: If the Layer-2 priority value for nonconforming packets is specified in the registry for a particular network adapter, this setting is ignored when configuring that network adapter."
  8276. QosUPM_Qualitative_Help="Specifies an alternate link layer (Layer-2) priority value for packets with the Qualitative service type (ServiceTypeQualitative). The Packet Scheduler inserts the corresponding priority value in the Layer-2 header of the packets.\n\nIf you enable this setting, you can change the default priority value associated with the Qualitative service type.\n\nIf you disable this setting, the system uses the default priority value of 0.\n\nImportant: If the Layer-2 priority value for this service type is specified in the registry for a particular network adapter, this setting is ignored when configuring that network adapter."
  8277. QosUPM_Tip="Enter a priority value for packets with the "
  8278. QosUPM_TipNC="Enter a priority value for non-conforming packets."
  8279. QosUserPriorityMapping="Layer-2 priority value"
  8280. RegisterSpoolerRemoteRpcEndPoint="Allow Print Spooler to accept client connections"
  8281. RegisterSpoolerRemoteRpcEndPoint_Help="This policy controls whether the print spooler will accept client connections. \n\nWhen the policy is unconfigured, the spooler will not accept client connections until a user shares out a local printer or opens the print queue on a printer connection, at which point spooler will begin accepting client connections automatically. \n\nWhen the policy is enabled, the spooler will always accept client connections.\n\nWhen the policy is disabled, the spooler will not accept client connections nor allow users to share printers. All printers currently shared will continue to be shared.\n\nThe spooler must be restarted for changes to this policy to take effect."
  8282. RestrictRunFromHelp_Comp="Restrict these programs from being launched from Help"
  8283. RestrictRunFromHelp="Restrict these programs from being launched from Help"
  8284. RestrictRunFromHelp_Edit="Enter executables separated by commas:"
  8285. RestrictRunFromHelp_Example="Example: calc.exe,paint.exe"
  8286. RestrictRunFromHelp_Help="Allows you to restrict programs from being run from online Help.\n\nIf you enable this setting, you can prevent programs that you specify from being allowed to be run from Help. When you enable this setting, enter the list of the programs you want to restrict. Enter the file name of the executable for each application, separated by commas.\n\nIf you disable or do not configure this setting, users will be able to run applications from online Help.\n\nNote: You can also restrict users from running applications by using the Software Restriction settings available in Computer Configuration\Security Settings.\n\nNote: This setting is available under Computer Configuration and User Comfiguration. If both are set, the list of programs specified in each of these will be restricted."
  8287. RemoteAssist="Remote Assistance"
  8288. RA_Solicit="Solicited Remote Assistance"
  8289. RA_Solicit_Help="Specifies whether users can solicit another user s assistance via Remote Assistance.\n\nIf the status is set to Enabled, a user can create a Remote Assistance invitation that a person ( expert ) can use at another computer to connect to the user s computer. If given permission, the expert can view the user s screen, mouse, and keyboard activity in real time.\n\nThe "Permit remote control of this computer" setting specifies whether a user on a different computer can control this computer. If a user invites an expert to connect to the computer, and gives permission, the expert can take control of this computer. The expert can only make requests to take control during a Remote Assistance session. The user can stop remote control at any time.\n\nThe "Maximum ticket time" setting sets a limit on the amount of time that a Remote Assistance invitation can remain open.\n\nThe "Select the method for sending e-mail invitations" setting specifies which e-mail standard to use to send Remote Assistance invitations. Depending on your e-mail program, you can use either the Mailto (the invitation recipient connects through an Internet link) or SMAPI (Simple MAPI) standard (the invitation is attached to your e-mail message).\n\nNote: The e-mail program must support the selected e-mail standard.\n\nIf the status is set to Disabled, users cannot request Remote Assistance and this computer cannot be controlled from another computer.\n\nNote: An expert can connect to this computer only with the explicit permission of the user. If Remote Assistance is disabled in this setting or set to  Not Configured and disabled in Control Panel, the  Offer Remote Assistance setting will also be disabled.\n\nIf the status is set to Not Configured, users can enable or disable and configure Remote Assistance themselves in System properties in Control Panel. If the status is set to Not Configured, the default maximum time a Remote Assistance invitation can stay open is determined by the Control Panel setting."
  8290. RA_Solicit_Control_List="Permit remote control of this computer:"
  8291. RA_Solicit_Control_Ctrl="Allow helpers to remotely control the computer"
  8292. RA_Solicit_Control_View="Allow helpers to only view the computer"
  8293. RA_Solicit_ExpireUnits_List="Maximum ticket time (units):"
  8294. RA_Solicit_Control_Minutes="Minutes"
  8295. RA_Solicit_Control_Hours="Hours"
  8296. RA_Solicit_Control_Days="Days"
  8297. RA_Solicit_ExpireValue_Edt="Maximum ticket time (value):"
  8298. RA_Solicit_Mailto_List="Select the method for sending e-mail invitations:"
  8299. RA_Solicit_SimpleMapi="Simple MAPI"
  8300. RA_Solicit_Mailto="Mailto"
  8301. RA_Unsolicit="Offer Remote Assistance"
  8302. RA_Unsolicit_Help="Use this setting to determine whether or not a support person or IT admin (who is termed the "expert") can offer remote assistance to this computer without a user explicitly requesting it first via a channel, e-mail, or instant messenger.\n\nUsing this setting, an expert can offer remote assistance to this computer.\n\nNote: The expert cannot connect to the computer unannounced or control it without permission from the user. When the expert tries to connect, the user is still given a chance to accept or deny the connection (giving the expert view-only privileges to the user's desktop), and thereafter the user has to explicitly click a button to give the expert the ability to remotely control the desktop, if remote control is enabled.\n\nIf you enable this setting, you can offer remote assistance. When you configure this setting, you can make two choices: you can select either "Allow helpers to only view the computer" or "Allow helpers to remotely control the computer." In addition to making this selection, when you configure this setting you also specify the list of users or user groups that will be allowed to offer remote assistance. These are known as "helpers."\n\nTo configure the list of helpers, click "Show." This opens a new window where you can enter the names of the helpers. Add each user or group one by one. When you enter the name of the helper user or user groups, use the following format:\n\n<Domain Name>\<User Name> or\n\n<Domain Name>\<Group Name>\n\nIf you disable or do not configure this policy setting, users or groups cannot offer unsolicited remote assistance to this computer."
  8303. RA_Unsolicit_DACL_Edit="Helpers:"
  8304. RA_Unsolicit_Control_List="Permit remote control of this computer:"
  8305. RA_Unsolicit_Control_Ctrl="Allow helpers to remotely control the computer"
  8306. RA_Unsolicit_Control_View="Allow helpers to only view the computer"
  8307. RemoveWindowsUpdate="Remove access to use all Windows Update features"
  8308. RemoveWindowsUpdate_Help="This setting allows you to remove access to Windows Update.\n\nIf you enable this setting, all Windows Update features are removed. This includes blocking access to the Windows Update Web site at http://windowsupdate.microsoft.com, from the Windows Update hyperlink on the Start menu, and also on the Tools menu in Internet Explorer. Windows automatic updating is also disabled; you will neither be notified about nor will you receive critical updates from Windows Update. This setting also prevents Device Manager from automatically installing driver updates from the Windows Update Web site."
  8309. RemoveUnDockPCButton="Remove the "Undock PC" button from the Start Menu"
  8310. RemoveUnDockPCButton_Help="If you enable this setting, the "Undock PC" button is removed from the simple Start Menu, and your PC cannot be undocked.\n\nIf you disable this setting or do not configure it, the "Undock PC" button remains on the simple Start menu, and your PC can be undocked."
  8311. RegionalOptions="Regional and Language Options"
  8312. RestNoDrives="Do not restrict drives"
  8313. RestrictApps_Help="Limits the Windows programs that users have permission to run on the computer.\n\nIf you enable this setting, users can only run programs that you add to the List of Allowed Applications.\n\nThis setting only prevents users from running programs that are started by the Windows Explorer process. It does not prevent users from running programs such as Task Manager, which are started by the system process or by other processes. Also, if users have access to the command prompt, Cmd.exe, this setting does not prevent them from starting programs in the command window that they are not permitted to start by using Windows Explorer.\n\nNote: It is a requirement for third-party applications with Windows 2000 or later certification to adhere to this setting. Note: To create a list of allowed applications, click Show, click Add, and then enter the application executable name (e.g., Winword.exe, Poledit.exe, Powerpnt.exe)."
  8314. RestrictApps="Run only allowed Windows applications"
  8315. RestrictAppsList="List of allowed applications"
  8316. RestrictCpls_Help="Hides all Control Panel items and folders except those specified in this setting.\n\nThis setting removes all Control Panel items (such as Network) and folders (such as Fonts) from the Control Panel window and the Start menu. It removes Control Panel items you have added to your system, as well the Control Panel items included in Windows 2000 and Windows XP Professional. The only items displayed in Control Panel are those you specify in this setting.\n\nTo display a Control Panel item, type the file name of the item, such as Ncpa.cpl (for Network). To display a folder, type the folder name, such as Fonts.\n\nThis setting affects the Start menu and Control Panel window only. It does not prevent users from running any Control Panel items.\n\nAlso, see the "Remove Display in Control Panel" setting in User Configuration\Administrative Templates\Control Panel\Display.\n\nIf both the "Hide specified Control Panel applets" setting and the "Show only specified Control Panel applets" setting are enabled, the "Show only specified Control Panel applets" setting is ignored.\n\nTip: To find the file name of a Control Panel item, search for files with the .cpl file name extension in the %Systemroot%\System32 directory."
  8317. RestrictCpls_Tip1="To create a list of allowed Control Panel applets, click Show,"
  8318. RestrictCpls_Tip2="then Add, and enter the Control Panel file name (ends with .cpl)"
  8319. RestrictCpls_Tip3="or the name displayed under that item in the Control Panel."
  8320. RestrictCpls_Tip4="(e.g., desk.cpl, powercfg.cpl, Printers)"
  8321. RestrictCpls="Show only specified Control Panel applets"
  8322. RestrictCplsList="List of allowed Control Panel applets"
  8323. Restrictions="Restrictions"
  8324. RestrictUILangSelect="Restrict selection of Windows menus and dialogs language"
  8325. RestrictUILangSelect_Help="This setting restricts users to the specified language by disabling the menus and dialog box controls in the Regional and Language Options Control Panel. If the specified language is not installed on the target computer, the language selection defaults to English."
  8326. Rpc="Remote Procedure Call"
  8327. RpcStateInformation="RPC Troubleshooting State Information"
  8328. RpcStateInformation_Help="\n\nDetermines whether the RPC Runtime maintains RPC state information for the system, and how much information it maintains. Basic state information, which consists only of the most commonly needed state data, is required for troubleshooting RPC problems.\n\nIf you enable this setting, you can use the drop-down box to determine which systems maintain RPC state information. If the setting is disabled or not configured, RPC uses the Auto2 setting.\n\n-- "None" indicates that the system does not maintain any RPC state information. Note: Because the basic state information required for troubleshooting has a negligible effect on performance and uses only about 4K of memory, this setting is not recommended for most installations.\n\n-- "Auto1" directs RPC to maintain basic state information only if the computer has at least 64 MB of memory.\n\n-- "Auto2" directs RPC to maintain basic state information only if the computer has at least 128 MB of memory and is running Windows 2000 Server, Windows 2000 Advanced Server, or Windows 2000 Datacenter Server. \n\n-- "Server" directs RPC to maintain basic state information on the computer, regardless of its capacity.\n\n-- "Full" directs RPC to maintain complete RPC state information on the system, regardless of its capacity. Because this setting can degrade performance, it is recommended for use only while you are investigating an RPC problem.\n\nNote: To retrieve the RPC state information from a system that maintains it, you must use a debugging tool."
  8329. RpcStateInformationList="RPC Runtime state information to maintain:"
  8330. RpcStateInfoNone="None"
  8331. RpcStateInfoAuto1="Auto1"
  8332. RpcStateInfoAuto2="Auto2"
  8333. RpcStateInfoServer="Server"
  8334. RpcStateInfoBoth="Full"
  8335. RpcExtendedErrorInformation="Propagation of extended error information"
  8336. RpcExtendedErrorInformation_Help="Directs the RPC Runtime to generate extended error information when an error occurs.\n\nExtended error information includes the local time that the error occurred, the RPC version, and the name of the computer on which the error occurred or was propagated. Programs can retrieve the extended error information by using standard Windows application programming interfaces (APIs).\n\nIf you disable this setting or do not configure it, the RPC Runtime only generates a status code to indicate an error condition.\n\nTo use this setting, enable the setting, and then select an error response type in the drop-down box.\n\n-- "Off" disables all extended error information for all processes. RPC only generates an error code.\n\n-- "On with Exceptions" enables extended error information but lets you disable it for selected processes. To disable extended error information for a process while this setting is in effect, the command that starts the process must begin with one of the strings in the Extended Error Information Exception field.\n\n-- "Off with Exceptions" disables extended error information but lets you enable it for selected processes. To enable extended error information for a process while this setting is in effect, the command that starts the process must begin with one of the strings in the Extended Error Information Exception field.\n\n-- "On" enables extended error information for all processes."\n\nNote: For information about the Extended Error Information Exception field, see the Windows 2000 Platform Software Development Kit (SDK).\n\nNote: Extended error information is formatted to be compatible with other operating systems and older Microsoft operating systems, but only newer Microsoft operating systems can read and respond to the information.\n\nNote: The default setting, "Off," is designed for systems where extended error information is considered to be sensitive, and it should not be made available remotely."
  8337. RpcExtendedErrorInformationList="Propagation of extended error information:"
  8338. RpcEEInfoOff="Off"
  8339. RpcEEInfoOnWithExc="On with Exceptions"
  8340. RpcEEInfoOffWithExc="Off with Exceptions"
  8341. RpcEEInfoOn="On"
  8342. RpcExtErrorExceptions="Extended Error Information Exceptions:"
  8343. RpcIgnoreDelegationFailureList="Ignoring Delegation Failure:"
  8344. RpcIDFOff="Off"
  8345. RpcIDFOn="On"
  8346. RpcIgnoreDelegationFailure="Ignore Delegation Failure"
  8347. RpcIgnoreDelegationFailure_Help="Directs the RPC Runtime to ignore delegation failures if delegation was asked for.\n\nWindows Server 2003 family includes a new delegation model - constrained delegation. In this model the security system does not report that delegation was enabled on a security context when a client connects to a server. Callers of RPC and COM are encouraged to use the RPC_C_QOS_CAPABILITIES_IGNORE_DELEGATE_FAILURE flag, but some applications written for the traditional delegation model may not use this flag and will encounter RPC_S_SEC_PKG_ERROR when connecting to a server that uses constrained delegation.\n\nIf you disable this setting, do not configure it or set it to "Off", the RPC Runtime will generate RPC_S_SEC_PKG_ERROR errors to applications that ask for delegation and connect to servers using constrained delegation. If you configure this setting to "On", the RPC Runtime will accept security contexts that do not support delegation as well as security contexts that do support delegation.\n\n-- "Off" directs the RPC Runtime to generate RPC_S_SEC_PKG_ERROR if the client asks for delegation, but the created security context does not support delegation.\n\n-- "On" directs the RPC Runtime to accept security contexts that do not support delegation even if delegation was asked for."
  8348. RpcMinimumHttpConnectionTimeout="Minimum Idle Connection Timeout for RPC/HTTP connections"
  8349. RpcMinimumHttpConnectionTimeoutValue="Minimum Idle Connection Timeout (in seconds):"
  8350. RpcMinimumHttpConnectionTimeout_Help="Directs the RPC Runtime to assume the specified timeout as the idle connection timeout even if the IIS server running the RPC HTTP proxy is configured with a higher timeout. If the IIS server running the RPC HTTP proxy is configured with a lower idle connection timeout, the timeout on the IIS server is used. The timeout is given in seconds.\n\nThis setting is useful in cases where a network agent like an HTTP proxy or a router uses a lower idle connection timeout than the IIS server running the RPC HTTP proxy. In such cases RPC over HTTP clients may encounter errors because connections will be timed out faster than expected. Using this setting you can force the RPC Runtime and the RPC Proxy to use a lower connection timeout.\n\nThis setting is only applicable when the RPC Client, the RPC Server and the RPC HTTP Proxy are all running Windows Server 2003 family/Windows XP SP1 or higher versions. If either the RPC Client or the RPC Server or the RPC HTTP Proxy run on an older version of Windows, this setting will be ignored.\n\nThe minimum allowed value for this setting is 90 seconds. The maximum is 7200 (2 hours).\n\nIf you disable this setting or do not configure it, the idle connection timeout on the IIS server running the RPC HTTP proxy will be used."
  8351. RSoPLogging="Turn off Resultant Set of Policy logging"
  8352. RSoPLogging_Help="This setting allows you to enable or disable Resultant Set of Policy (RSoP) logging on a client computer.\n\nRSoP logs information on Group Policy settings that have been applied to the client. This information includes details such as which Group Policy objects (GPO) were applied, where they came from, and the client-side extension settings that were included.\n\nIf you enable this setting, RSoP logging is turned off.\n\nIf you disable or do not configure this setting, RSoP logging is turned on. By default, RSoP logging is always on.\n\nNote: To view the RSoP information logged on a client computer, you can use the RSoP snap-in in the Microsoft Management Console (MMC)."
  8353. Run_Legacy_Logon_Script_Hidden_Explain="Hides the instructions in logon scripts written for Windows NT 4.0 and earlier.\n\nLogon scripts are batch files of instructions that run when the user logs on. By default, Windows 2000 displays the instructions in logon scripts written for Windows NT 4.0 and earlier in a command window as they run, although it does not display logon scripts written for Windows 2000.\n\nIf you enable this setting, Windows 2000 does not display logon scripts written for Windows NT 4.0 and earlier.\n\nAlso, see the "Run Logon Scripts Visible" setting."
  8354. Run_Legacy_Logon_Script_Hidden="Run legacy logon scripts hidden"
  8355. Run_Logoff_Script_Visible_Explain="Displays the instructions in logoff scripts as they run.\n\nLogoff scripts are batch files of instructions that run when the user logs off. By default, the system does not display the instructions in the logoff script.\n\nIf you enable this setting, the system displays each instruction in the logoff script as it runs. The instructions appear in a command window. This setting is designed for advanced users.\n\nIf you disable this setting or do not configure it, the instructions are suppressed."
  8356. Run_Logoff_Script_Visible="Run logoff scripts visible"
  8357. Run_Logon_Script_Sync_Help="Directs the system to wait for the logon scripts to finish running before it starts the Windows Explorer interface program and creates the desktop.\n\nIf you enable this setting, Windows Explorer does not start until the logon scripts have finished running. This setting ensures that logon script processing is complete before the user starts working, but it can delay the appearance of the desktop.\n\nIf you disable this setting or do not configure it, the logon scripts and Windows Explorer are not synchronized and can run simultaneously.\n\nThis setting appears in the Computer Configuration and User Configuration folders. The setting set in Computer Configuration takes precedence over the setting set in User Configuration."
  8358. Run_Logon_Script_Sync="Run logon scripts synchronously"
  8359. Run_Logon_Script_Visible_Explain="Displays the instructions in logon scripts as they run.\n\nLogon scripts are batch files of instructions that run when the user logs on. By default, the system does not display the instructions in the logon script.\n\nIf you enable this setting, the system displays each instruction in the logon script as it runs. The instructions appear in a command window. This setting is designed for advanced users.\n\nIf you disable this setting or do not configure it, the instructions are suppressed."
  8360. Run_Logon_Script_Visible="Run logon scripts visible"
  8361. Run_Help="Specifies additional programs or documents that Windows starts automatically when a user logs on to the system.\n\nTo use this setting, click Show, click Add, and then, in the text box, type the name of the executable program (.exe) file or document file. Unless the file is located in the %Systemroot% directory, you must specify the fully qualified path to the file.\n\nNote: This setting appears in the Computer Configuration and User Configuration folders. If both settings are configured, the system starts the programs specified in the Computer Configuration setting just before it starts the programs specified in the User Configuration setting.\n\nAlso, see the "Do not process the legacy run list" and the "Do not process the run once list" settings."
  8362. Run="Run these programs at user logon"
  8363. RunListBox="Items to run at logon"
  8364. Run_Shutdown_Script_Visible_Explain="Displays the instructions in shutdown scripts as they run.\n\nShutdown scripts are batch files of instructions that run when the user restarts the system or shuts it down. By default, the system does not display the instructions in the shutdown script.\n\nIf you enable this setting, the system displays each instruction in the shutdown script as it runs. The instructions appear in a command window.\n\nIf you disable this setting or do not configure it, the instructions are suppressed."
  8365. Run_Shutdown_Script_Visible="Run shutdown scripts visible"
  8366. Run_Startup_Script_Sync_Help="Lets the system run startup scripts simultaneously.\n\nStartup scripts are batch files that run before the user is invited to log on. By default, the system waits for each startup script to complete before it runs the next startup script.\n\nIf you enable this setting, the system does not coordinate the running of startup scripts. As a result, startup scripts can run simultaneously.\n\nIf you disable this setting or do not configure it, a startup cannot run until the previous script is complete."
  8367. Run_Startup_Script_Sync="Run startup scripts asynchronously"
  8368. Run_Startup_Script_Visible_Explain="Displays the instructions in startup scripts as they run.\n\nStartup scripts are batch files of instructions that run before the user is invited to log on. By default, the system does not display the instructions in the startup script.\n\nIf you enable this setting, the system displays each instruction in the startup script as it runs. The instructions appear in a command window. This setting is designed for advanced users.\n\nIf you disable this setting or do not configure it, the instructions are suppressed."
  8369. Run_Startup_Script_Visible="Run startup scripts visible"
  8370. SafeForScripting="Disable IE security prompt for Windows Installer scripts"
  8371. SafeForScripting_Help="Allows Web-based programs to install software on the computer without notifying the user.\n\nBy default, when a script hosted by an Internet browser tries to install a program on the system, the system warns users and allows them to select or refuse the installation. This setting suppresses the warning and allows the installation to proceed.\n\nThis setting is designed for enterprises that use Web-based tools to distribute programs to their employees. However, because this setting can pose a security risk, it should be applied cautiously."
  8372. ScreenSaverActive_Help="Enables desktop screen savers.\n\nIf you disable this setting, screen savers do not run. Also, this setting disables the Screen Saver section of the Screen Saver tab in Display in Control Panel. As a result, users cannot change the screen saver options.\n\nIf you do not configure it, this setting has no effect on the system.\n\nIf you enable it, a screen saver runs, provided the following two conditions hold: First, a valid screensaver on the client is specified through the "Screensaver executable name" setting or through Control Panel on the client computer. Second, the screensaver timeout is set to a nonzero value through the setting or Control Panel.\n\nAlso, see the "Hide Screen Saver tab" setting."
  8373. ScreenSaverActive="Screen Saver"
  8374. ScreenSaverFilename_Help="Specifies the screen saver for the user's desktop.\n\nIf you enable this setting, the system displays the specified screen saver on the user's desktop. Also, this setting disables the drop-down list of screen savers on the Screen Saver tab in Display in Control Panel, which prevents users from changing the screen saver.\n\nIf you disable this setting or do not configure it, users can select any screen saver.\n\nIf you enable this setting, type the name of the file that contains the screen saver, including the .scr file name extension. If the screen saver file is not in the %Systemroot%\System32 directory, type the fully qualified path to the file.\n\nIf the specified screen saver is not installed on a computer to which this setting applies, the setting is ignored.\n\nNote: This setting can be superseded by the "Screen Saver" setting. If the "Screen Saver" setting is disabled, this setting is ignored, and screen savers do not run."
  8375. ScreenSaverFilename="Screen Saver executable name"
  8376. ScreenSaverIsSecure_Help="Determines whether screen savers used on the computer are password protected.\n\nIf you enable this setting, all screen savers are password protected. If you disable this setting, password protection cannot be set on any screen saver.\n\nThis setting also disables the "Password protected" check box on the Screen Saver tab in Display in Control Panel, preventing users from changing the password protection setting.\n\nIf you do not configure this setting, users can choose whether or not to set password protection on each screen saver.\n\nTo ensure that a computer will be password protected, also enable the "Screen Saver" setting and specify a timeout via the "Screen Saver timeout" setting.\n\nNote: To remove the Screen Saver tab, use the "Hide Screen Saver tab" setting."
  8377. ScreenSaverIsSecure="Password protect the screen saver"
  8378. ScreenSaverTimeOut="Screen Saver timeout"
  8379. ScreenSaverTimeOut_Tip1="Number of seconds to wait to enable the Screen Saver"
  8380. ScreenSaverTimeOutFreqSpin="Seconds:"
  8381. ScreenSaverTimeOut_Help="Specifies how much user idle time must elapse before the screen saver is launched.\n\nWhen configured, this idle time can be set from a minimum of 1 second to a maximum of 86,400 seconds, or 24 hours. If set to zero, the screen saver will not be started.\n\nThis setting has no effect under any of the following circumstances:\n\n - The setting is disabled or not configured.\n\n - The wait time is set to zero.\n\n - The "No screen saver" setting is enabled.\n\n - Neither the "Screen saver executable name" setting nor the Screen Saver tab of the client computer's Display Properties dialog box specifies a valid existing screensaver program on the client.\n\nWhen not configured, whatever wait time is set on the client through the Screen Saver tab of the Display Properties dialog box is used. The default is 15 minutes."
  8382. Scripts="Scripts"
  8383. SearchOrder_Help="Specifies the order in which Windows Installer searches for installation files.\n\nBy default, the Windows Installer searches the network first, then removable media (floppy drive, CD-ROM, or DVD), and finally, the Internet (URL).\n\nTo change the search order, enable the setting, and then type the letters representing each file source in the order that you want Windows Installer to search.:\n\n-- "n" represents the network;\n\n-- "m" represents media;\n\n-- "u" represents URL, or the Internet.\n\nTo exclude a file source, omit or delete the letter representing that source type."
  8384. SearchOrder="Search order"
  8385. SearchOrderT1="n = network, m = media (CD), u = URL"
  8386. SearchOrderT2="A few valid examples: nmu, n, nu, mn"
  8387. ServerAppsServices="Server Applications and Services"
  8388. ServerName="Server name:"
  8389. ServicePackSourcePath="Specify Windows Service Pack installation file location"
  8390. ServicePackSourcePath_Help="Specifies an alternate location for Windows Service Pack installation files.\n\nTo enable this setting, enter the fully qualified path to the new location in the "Windows Service Pack Setup file path" box.\n\nIf you disable this setting or do not configure it, the Windows Service Pack Setup source path will be the location used during the last time Windows Service Pack Setup was run on the system.\n\n"
  8391. ServicePackSourcePathBox="Windows Service Pack Setup file path:"
  8392. SetupSourcePath="Specify Windows installation file location"
  8393. SetupSourcePath_Help="Specifies an alternate location for Windows installation files.\n\nTo enable this setting, and enter the fully qualified path to the new location in the "Windows Setup file path" box.\n\nIf you disable this setting or do not configure it, the Windows Setup source path will be the location used during the last time Windows Setup was run on the system.\n\n"
  8394. SetupSourcePathBox="Windows Setup file path:"
  8395. ShellName="Custom user interface"
  8396. ShellName_Help="Specifies an alternate user interface for Windows 2000.\n\nThe Explorer program (%systemdrive%\program files\internet explorer\iExplorer.exe) creates the familiar Windows interface, but you can use this setting to specify an alternate interface. If you enable this setting, the system starts the interface you specify instead of Explorer.exe.\n\nTo use this setting, copy your interface program to a network share or to your system drive. Then, enable this setting, and type the name of the interface program, including the file name extension, in the Shell name text box. If the interface program file is not located in a folder specified in the Path environment variable for your system, enter the fully qualified path to the file.\n\nIf you disable this setting or do not configure it, the setting is ignored and the system displays the Explorer interface.\n\nTip: To find the folders indicated by the Path environment variable, click System Properties in Control Panel, click the Advanced tab, click the Environment Variables button, and then, in the System variables box, click Path."
  8397. ShellNameInst="Interface file name (for example, Explorer.exe)"
  8398. ShellPreventWPWDownload="Prevent Internet download for Web Publishing and Online Ordering wizards"
  8399. ShellPreventWPWDownload_HELP="These wizards allow the user to select from a list of companies that provide services such as online storage and photographic printing.\n\nBy default, Windows will display providers downloaded from a Windows Web site in addition to providers specified in the registry.\n\nEnabling this policy setting prevents these wizards from downloading providers, and instead displays service providers cached in the local registry.\n\nSee the wizard documentation for details on specifying service providers in the registry."
  8400. ShellRemoveOrderPrints="Remove Order Prints from Picture Tasks"
  8401. ShellRemoveOrderPrints_HELP="When enablied, This policy removes "Order Prints Online from Picture Tasks in shell folders."
  8402. ShellRemovePublishToWeb="Remove Publish to Web from File and Folder Tasks"
  8403. ShellRemovePublishToWeb_HELP="This policy setting removes Publish this file to the Web, Publish this folder to the Web, and Publish the selected items to the Web from File and Folder Tasks in shell folders."
  8404. ShutdownEventTrackerStateFile="Activate Shutdown Event Tracker System State Data feature"
  8405. ShutdownEventTrackerStateFile_Help="Defines when the Shutdown Event Tracker System State Data feature is activated.\n\nThe system state data file contains information about the basic system state as well as the state of all running processes.\n\nIf you enable this setting, the System State Data feature is activated when the user indicates that the shutdown or restart is unplanned.\n\nIf you disable this setting, the System State Data feature is never activated.\n\nIf you do not configure this setting, the default behavior for the System State Data feature occurs.\n\nNote: By default, the System State Data feature is always enabled on the Windows Server 2003 family."
  8406. ShutdownReason="Display Shutdown Event Tracker"
  8407. ShutdownReason_Help="The Shutdown Event Tracker can be displayed when you shut down a workstation or server. This is an extra set of questions that is displayed when you invoke a shutdown to collect information related to why you are shutting down the computer.\n\nIf you enable this setting and choose "Always" from the drop-down menu, the Shutdown Event Tracker is displayed when you shut down.\n\nIf you enable this setting and choose "Server Only" from the drop-down menu, the Shutdown Event Tracker is displayed when you shut down a Windows Server 2003 family computer.\n\nIf you enable this setting and choose "Workstation Only" from the drop-down menu, the Shutdown Event Tracker is displayed when you shut down a Windows XP Professional workstation.\n\nIf you disable this setting, the Shutdown Event Tracker is not displayed when you shut down.\n\nIf you do not configure this setting, the default behavior for the Shutdown Event Tracker occurs.\n\nNote: By default, the Shutdown Event Tracker is not displayed on Windows XP Professional and is displayed by default on the Windows Server 2003 family."
  8408. ShutdownReason_Box="Shutdown Event Tracker should be displayed:"
  8409. ShutdownReason_Never="Never"
  8410. ShutdownReason_Always="Always"
  8411. ShutdownReason_WkstnOnly="Workstation Only"
  8412. ShutdownReason_SrvOnly="Server Only"
  8413. SizeMessage="Custom Message"
  8414. SlowLinkDefault_Help="Directs the system to wait for the remote copy of the roaming user profile to load, even when loading is slow. Also, the system waits for the remote copy when the user is notified about a slow connection, but does not respond in the time allowed.\n\nThis setting and related settings in this folder together define the system's response when roaming user profiles are slow to load.\n\nIf you disable this setting or do not configure it, then when a remote profile is slow to load, the system loads the local copy of the roaming user profile. The local copy is also used when the user is consulted (as set in the "Prompt user when slow link is detected" setting), but does not respond in the time allowed (as set in the "Timeout for dialog boxes" setting).\n\nWaiting for the remote profile is appropriate when users move between computers frequently and the local copy of their profile is not always current. Using the local copy is desirable when quick logging on is a priority.\n\nImportant: If the "Do not detect slow network connections" setting is enabled, this setting is ignored. Also, if the "Delete cached copies of roaming profiles" setting is enabled, there is no local copy of the roaming profile to load when the system detects a slow connection."
  8415. SlowLinkDefault="Wait for remote user profile"
  8416. SlowLinkTimeOut_Help="Defines a slow connection for roaming user profiles.\n\nIf the server on which the user's roaming user profile resides takes longer to respond than the thresholds set by this setting allow, then the system considers the connection to the profile to be slow.\n\nThis setting and related settings in this folder together define the system's response when roaming user profiles are slow to load.\n\nThis setting establishes thresholds for two tests. For computers connected to IP networks, the system measures the rate at which the remote server returns data in response to an IP ping message. To set a threshold for this test, in the Connection speed box, type a decimal number between 0 and 4,294,967,200, representing the minimum acceptable transfer rate in kilobits per second. By default, if the server returns fewer than 500 kilobits of data per second, it is considered to be slow.\n\nFor non-IP computers, the system measures the responsiveness of the remote server's file system. To set a threshold for this test, in the Time box, type a decimal number between 0 and 20,000, representing the maximum acceptable delay, in milliseconds. By default, if the server's file system does not respond within 120 milliseconds, it is considered to be slow.\n\nConsider increasing this value for clients using DHCP Service-assigned addresses or for computers accessing profiles across dial-up connections.\n\nImportant: If the "Do not detect slow network connections" setting is enabled, this setting is ignored. Also, if the "Delete cached copies of roaming profiles" setting is enabled, there is no local copy of the roaming profile to load when the system detects a slow connection."
  8417. SlowLinkTimeOut="Slow network connection timeout for user profiles"
  8418. SlowLinkWaitInterval="Time (milliseconds)"
  8419. StartMenu="Start Menu and Taskbar"
  8420. StartMenuLogoff_Help="Removes the "Log Off <username>" item from the Start menu and prevents users from restoring it.\n\nIf you enable this setting, the Log Off <username> item does not appear in the Start menu. This setting also removes the Display Logoff item from Start Menu Options. As a result, users cannot restore the Log Off <username> item to the Start Menu.\n\nIf you disable this setting or do not configure it, users can use the Display Logoff item to add and remove the Log Off item.\n\nThis setting affects the Start menu only. It does not affect the Log Off item on the Windows Security dialog box that appears when you press Ctrl+Alt+Del, and it does not prevent users from using other methods to log off.\n\nTip: To add or remove the Log Off item on a computer, click Start, click Settings, click Taskbar and Start Menu, click the Start Menu Options tab and, in the Start Menu Settings box, click Display Logoff.\n\nSee also: "Remove Logoff" in User Configuration\Administrative Templates\System\Logon/Logoff."
  8421. StartMenuLogoff="Remove Logoff on the Start Menu"
  8422. StdCheckT="Check to force setting on; uncheck to force setting off."
  8423. SUPPORTED_IE6SP1="At least Internet Explorer 6 Service Pack 1"
  8424. SUPPORTED_Win2k="At least Microsoft Windows 2000"
  8425. SUPPORTED_WindowsXP_SP1_W2K_SP4_NETSERVER="At least Microsoft Windows 2000 Service Pack 4, Microsoft Windows XP Professional Service Pack 1 or Microsoft Windows Server 2003 family"
  8426. SUPPORTED_Win2kOnly="Only works on Microsoft Windows 2000"
  8427. SUPPORTED_Win2kSP1="At least Microsoft Windows 2000 Service Pack 1"
  8428. SUPPORTED_Win2kSP3_Or_XPSP1="At least Microsoft Windows 2000 Service Pack 3 or Microsoft Windows XP Professional Service Pack 1"
  8429. SUPPORTED_Win2kSP3="At least Microsoft Windows 2000 Service Pack 3"
  8430. SUPPORTED_WindowsXP="At least Microsoft Windows XP Professional or Windows Server 2003 family"
  8431. SUPPORTED_WindowsXPSP1="At least Microsoft Windows XP Professional with SP1 or Windows Server 2003 family"
  8432. SUPPORTED_WindowsXPOnly="Only works on Microsoft Windows XP Professional"
  8433. SUPPORTED_WindowsNET="At least Microsoft Windows Server 2003"
  8434. SUPPORTED_WindowsNET_Enterprise="Microsoft Windows Server 2003, Enterprise Edition"
  8435. SUPPORTED_MSI15="Microsoft Windows XP or Windows 2000 with Windows Installer v2.0"
  8436. SNMP_SNMP="SNMP"
  8437. SNMP_Communities="Communities"
  8438. SNMP_ValidCommunities_Help="Configures a list of the communities defined to the Simple Network Management Protocol (SNMP) service.\n\nSNMP is a protocol designed to give a user the capability to remotely manage a computer network, by polling and setting terminal values and monitoring network events.\n\nA valid community is a community recognized by the SNMP service, while a community is a group of hosts (servers, workstations, hubs, and routers) that are administered together by SNMP. The SNMP service is a managed network node that receives SNMP packets from the network.\n\nIf you enable this setting, the SNMP agent only accepts requests from management systems within the communities it recognizes, and only SNMP Read operation is allowed for the community.\n\nIf you disable or do not configure this setting, the SNMP service takes the Valid Communities configured on the local computer instead.\n\nBest Practice: For security purposes, it is recommended to restrict the HKLM\SOFTWARE\Policies\SNMP\Parameters\ValidCommunities key to allow only the local admin group full control.\n\nNote: It is good practice to use a cryptic community name.\n\nNote: This setting has no effect if the SNMP agent is not installed on the client computer.\n\nAlso, see the other two SNMP settings: "Permitted Managers" and "Trap Configuration"."
  8439. SNMP_CommunitiesListbox="Communities"
  8440. SNMP_PermittedManagers="Permitted Managers"
  8441. SNMP_PermittedManagers_Help="This setting determines the permitted list of hosts that can submit a query to the Simple Network Management (SNMP) agent running on the client computer.\n\nSimple Network Management Protocol is a protocol designed to give a user the capability to remotely manage a computer network by polling and setting terminal values and monitoring network events.\n\nThe manager is located on the host computer on the network. The manager's role is to poll the agents for certain requested information.\n\nIf you enable this setting, the SNMP agent only accepts requests from the list of Permitted Managers that you configure using this setting.\n\nIf you disable or do not configure this setting, SNMP service takes the Permitted Managers configured on the local computer instead.\n\nBest Practice: For security purposes, it is recommended to restrict the HKLM\SOFTWARE\Policies\SNMP\Parameters\PermittedManagers key to allow only the local admin group full control.\n\nNote: This setting has no effect if the SNMP agent is not installed on the client computer.\n\nAlso, see the other two SNMP settings: "Trap Configuration" and "Community Name"."
  8442. SNMP_PermittedManagersListbox="Permitted Managers"
  8443. SNMP_Traps_Public="Traps for public community"
  8444. SNMP_TrapDestinations_Help="This setting allows Trap configuration for the Simple Network Management Protocol (SNMP) agent.\n\nSimple Network Management Protocol is a protocol designed to give a user the capability to remotely manage a computer network by polling and setting terminal values and monitoring network events.\n\nThis setting allows you to configure the name of the hosts that receive trap messages for the community sent by the SNMP service. A trap message is an alert or significant event that allows the SNMP agent to notify management systems asynchronously.\n\nIf you enable this setting, the SNMP service sends trap messages to the hosts within the "public" community.\n\nIf you disable or do not configure this setting, the SNMP service takes the Trap Configuration configured on the local computer instead.\n\nNote: This setting has no effect if the SNMP agent is not installed on the client computer.\n\nAlso, see the other two SNMP settings: "Permitted Managers" and "Community Name"."
  8445. SNMP_Traps_PublicListbox=Trap configuration"
  8446. SR="System Restore"
  8447. SR_DisableConfig="Turn off Configuration"
  8448. SR_DisableConfig_Help="Allows you to turn off the Configuration Interface for System Restore.\n\nSystem Restore enables users, in the event of a problem, to restore their computers to a previous state without losing personal data files. The behavior of this setting depends on the "Turn off System Restore" setting. \n\nIf you enable this setting, the option to configure System Restore on the Configuration Interface disappears. If the "Turn off Configuration setting" is disabled, the Configuration Interface is still visible, but all System Restore configuration defaults are enforced. \n\nIf you do not configure it, the Configuration Interface for System Restore remains, and the user has the ability to configure System Restore. \n\nNote: This setting is only available in the Home Edition and Professional versions of Windows. \n\nAlso, see the "Turn off System Restore" setting. If the "Turn off System Restore" setting is enabled, the "Turn off Configuration" setting is not active. If the "Turn off System Restore" setting is disabled, and "Turn off Configuration" is not configured, System Restore cannot be turned off locally, but it can be configured. If the "Turn off System Restore" setting is not configured, and "Turn off Configuration" is disabled, System Restore can be turned off locally but not configured."
  8449. SR_DisableSR="Turn off System Restore"
  8450. SR_DisableSR_Help="Determines whether System Restore is turned on or off.\n\nSystem Restore enables users, in the event of a problem, to restore their computers to a previous state without losing personal data files. By default, System Restore is on. \n\nIf you enable this setting, System Restore is turned off, and the System Restore Wizard and Configuration Interface cannot be accessed. \n\nIf you disable this setting, System Restore is turned on and enforced. It cannot be turned off in the Configuration Interface, but, depending on the "Turn off Configuration" settings, it may still be configured. The feature is nonfunctional until the system is rebooted. To turn off the Configuration Interface, see the "Turn off Configuration" setting. \n\nIf you do not configure it, the system reverts to the default local setting. \n\nImportant: This setting only refreshes at boot time. \n\nNote: This setting is only available in Windows XP Professional.\n\nAlso, see the "Turn off Configuration" setting. If the "Turn off System Restore" setting is disabled or not configured, the "Turn off Configuration" setting is used to determine whether the Configuration Interface appears."
  8451. SyncForegroundPolicy="Always wait for the network at computer startup and logon"
  8452. SyncForegroundPolicy_Help="Determines whether Windows XP waits for the network during computer startup and user logon. By default, Windows XP does not wait for the network to be fully initialized at startup and logon. Existing users are logged on using cached credentials, which results in shorter logon times. Group Policy is applied in the background once the network becomes available.\n\nNote that because this is a background refresh, extensions such as Software Installation and Folder Redirection take two logons to apply changes. To be able to operate safely, these extensions require that no users be logged on. Therefore, they must be processed in the foreground before users are actively using the computer. In addition, changes that are made to the user object, such as adding a roaming profile path, home directory, or user object logon script, may take up to two logons to be detected.\n\nIf a user with a roaming profile, home directory, or user object logon script logs on to a computer, Windows XP always waits for the network to be initialized before logging the user on.\n\nIf a user has never logged on to this computer before, Windows XP always waits for the network to be initialized.\n\nIf you enable this setting, logons are performed in the same way as for Windows 2000 clients, in that Windows XP waits for the network to be fully initialized before users are logged on. Group Policy is applied in the foreground, synchronously.\n\nIf you disable or do not configure this setting, Windows does not wait for the network to be fully initialized and users are logged on with cached credentials. Group Policy is applied asynchronously in the background.\n\nNote: If you want to guarantee the application of Folder Redirection, Software Installation, or roaming user profile settings in just one logon, enable this setting to ensure that Windows waits for the network to be available before applying policy.\n\nNote: For servers, the startup and logon processing always behaves as if this policy setting is enabled."
  8453. sz_ActiveDesktop_Title="Active Desktop"
  8454. sz_AdminComponents_Title="Add/Delete items"
  8455. sz_ATC_AdminAddItem="Enter URL(s) of desktop item(s) to Add (space separated): "
  8456. sz_ATC_AdminDeleteItem="Enter URL(s) of desktop item(s) to Delete (space separated): "
  8457. sz_ATC_DisableAdd="Prohibit adding items"
  8458. sz_ATC_DisableClose="Prohibit closing items"
  8459. sz_ATC_DisableDel="Prohibit deleting items"
  8460. sz_ATC_DisableEdit="Prohibit editing items"
  8461. sz_ATC_NoComponents="Disable all items"
  8462. sz_DB_DragDropClose="Prevent adding, dragging, dropping and closing the Taskbar's toolbars"
  8463. sz_DB_Moving="Prohibit adjusting desktop toolbars"
  8464. sz_DeskBands_Title="Desktop Toolbars Settings"
  8465. sz_Desktop_Title="Desktop Settings"
  8466. sz_DWP_DisableChanges="Prevent changing wallpaper"
  8467. sz_DWP_NoHTMLPaper="Allow only bitmapped wallpaper"
  8468. sz_WallPaper_Title="Desktop WallPaper Settings"
  8469. TaskCreation="Prohibit New Task Creation"
  8470. TaskCreationHelp="Prevents users from creating new tasks.\n\nThis setting removes the Add Scheduled Task item that starts the New Task Wizard. Also, the system does not respond when users try to move, paste, or drag programs or documents into the Scheduled Tasks folder.\n\nNote: This setting appears in the Computer Configuration and User Configuration folders. If both settings are configured, the setting in Computer Configuration takes precedence over the setting in User Configuration.\n\nImportant: This setting does not prevent administrators of a computer from using At.exe to create new tasks or prevent administrators from submitting tasks from remote computers."
  8471. TaskDeletion="Prohibit Task Deletion"
  8472. TaskDeletionHelp="Prevents users from deleting tasks from the Scheduled Tasks folder.\n\nThis setting removes the Delete command from the Edit menu in the Scheduled Tasks folder and from the menu that appears when you right-click a task. Also, the system does not respond when users try to cut or drag a task from the Scheduled Tasks folder.\n\nNote: This setting appears in the Computer Configuration and User Configuration folders. If both settings are configured, the setting in Computer Configuration takes precedence over the setting in User Configuration.\n\nImportant: This setting does not prevent administrators of a computer from using At.exe to delete tasks."
  8473. TaskScheduler="Task Scheduler"
  8474. TerminalServer="Terminal Server"
  8475. Themes="Desktop Themes"
  8476. Themes_Disable_Options="Remove Theme option"
  8477. Themes_Disable_Options_Help="This setting effects the Themes tab that controls the overall appearance of windows.\n\nIt is accessed through the Display icon in Control Panel.\n\nUsing the options under the Themes tab, users can configure the theme for their desktop.\n\nIf you enable this setting, it removes the Themes tab.\n\nIf you disable or do not configure this setting, there is no effect.\n\nNote: If you enable this setting but do not set a theme, the theme defaults to whatever the user previously set."
  8478. Themes_Disable_VisualStyle="Prevent selection of windows and buttons styles"
  8479. Themes_Disable_VisualStyle_Help="Prevents users from changing the visual style of the windows and buttons displayed on their screens. When enabled, this setting disables the "Windows and buttons" drop-down list on the Appearance tab in Display Properties."
  8480. Themes_Lock_Themesize="Prohibit selection of font size"
  8481. Themes_Lock_Themesize_Help="Prevents users from changing the size of the font in the windows and buttons displayed on their screens.\n\nIf this setting is enabled, the "Font size" drop-down list on the Appearance tab in Display Properties is disabled. \n\nIf you disable or do not configure this setting, a user may change the font size using the "Font size" drop-down list on the Appearance tab."
  8482. Themes_Disable_Color_Select="Prohibit Theme color selection"
  8483. Themes_Disable_Color_Select_Help="This setting forces the theme color to be the default color scheme.\n\nIf you enable this setting, a user cannot change the color scheme of the current desktop theme.\n\nIf you disable or do not configure this setting, a user may change the color scheme of the current desktop theme."
  8484. Themes_Name="Path to Visual Style:"
  8485. Themes_Load_Theme="Load a specific visual style file or force Windows Classic"
  8486. Themes_Load_Tip1="To select Luna type:"
  8487. Themes_Load_Tip2="%windir%\resources\Themes\Luna\Luna.msstyles"
  8488. Themes_Load_Tip3=" "
  8489. Themes_Load_Tip4="To select a different visual style, type:"
  8490. Themes_Load_Tip5="ie: \\<server>\share\Corp.msstyles"
  8491. Themes_Load_Tip6=" "
  8492. Themes_Load_Tip7="To select Windows Classic, leave the box"
  8493. Themes_Load_Tip8="above blank and enable this setting"
  8494. Themes_Load_Theme_Help="This setting allows you to load a specific visual style file by entering the path (location) of the visual style file.\n\nThis can be a local computer visual style (Luna.msstyles), or a file located on a remote server using a UNC path (\\Server\Share\luna.msstyles).\n\nIf you enable this setting, the visual style file that you specify will be used. Also, a user may not choose to use a different visual style.\n\nIf you disable or do not configure this setting, the users can select the visual style that they want to use for their desktop.\n\nNote: If this setting is enabled and the file is not available at user logon, the default visual style is loaded.\n\nNote: When running Windows XP, you can select the Luna visual style by typing %windir%\resources\Themes\Luna\Luna.msstyles\n\nNote: To select the Windows Classic visual style, leave the box blank beside "Path to Visual Style:" and enable this setting."
  8495. Thread_Priority_Above_Normal="Scheduler priority above normal"
  8496. Thread_Priority_Below_Normal="Scheduler priority below normal"
  8497. Thread_Priority_Normal="Scheduler priority normal"
  8498. ThreadAboveNormal="Above Normal"
  8499. ThreadBelowNormal="Below Normal"
  8500. ThreadHighest="Highest"
  8501. ThreadLowest="Lowest"
  8502. ThreadNormal="Normal"
  8503. TransferRateOp="Connection speed (Kbps):"
  8504. TransferRateTip1="Enter 0 to disable slow link detection."
  8505. TransformsSecure="Cache transforms in secure location on workstation"
  8506. TransformsSecure_Help="Saves copies of transform files in a secure location on the local computer.\n\nTransform files consist of instructions to modify or customize a program during installation.\n\nIf you enable this setting, the transform file is saved in a secure location on the user's computer. Because Windows Installer requires the transform file in order to repeat an installation in which the transform file was used, the user must be using the same computer or be connected to the original or identical media to reinstall, remove, or repair the installation. This is the default behavior on Windows Server 2003 family when the policy is not configured.\n\nThis setting is designed for enterprises to prevent unauthorized or malicious editing of transform files.\n\nIf you disable this setting, Windows Installer stores transform files in the Application Data directory in the user's profile. When a user reinstalls, removes, or repairs an installation, the transform file is available, even if the user is on a different computer or is not connected to the network. This is the default behavior on Windows 2000 Professional and Windows XP Professional when the policy is not configured."
  8507. TS_AUDIOMAP_EXPLAIN="Specifies whether users can choose where to play the remote computer's audio output during a Terminal Services session (audio redirection). \n\nUsers can use the "Remote computer sound" option on the Local Resources tab of Remote Desktop Connection to choose whether to play the remote audio on the remote computer or on the local computer. Users can also choose to disable the audio. \n\nBy default, users cannot apply audio redirection when connecting via Terminal Services to a server running Windows Server 2003. Users connecting to a computer running Windows XP Professional can apply audio redirection by default. \n\nIf the status is set to Enabled, users can apply audio redirection. \n\nIf the status is set to Disabled, users cannot apply audio redirection. \n\nIf the status is set to Not Configured, audio redirection is not specified at the Group Policy level. However, an administrator can still enable or disable audio redirection by using the Terminal Services Configuration tool."
  8508. TS_AUTO_RECONNECT="Automatic reconnection"
  8509. TS_AUTO_RECONNECT_EXPLAIN="Specifies whether to allow Remote Desktop Connection clients to automatically reconnect to Terminal Services sessions if their network link is temporarily lost. By default, a maximum of twenty reconnection attempts are made at five second intervals. \n\nIf the status is set to Enabled, automatic reconnection is attempted for all clients running Remote Desktop Connection whenever their network connection is lost. \n\nIf the status is set to Disabled, automatic reconnection of clients is prohibited. \n\nIf the status is set to Not Configured, automatic reconnection is not specified at the Group Policy level. However, users can configure automatic reconnection using the "Reconnect if connection is dropped" checkbox on the Experience tab in Remote Desktop Connection.\n"
  8510. TS_CLIENT_AUDIO="Allow audio redirection"
  8511. TS_CLIENT_CLIPBOARD="Do not allow clipboard redirection"
  8512. TS_CLIENT_COM="Do not allow COM port redirection"
  8513. TS_CLIENT_DEFAULT="Set default client printer to be default printer in a session"
  8514. TS_CLIENT_DEFAULT_M="Do not set default client printer to be default printer in a session"
  8515. TS_CLIENT_DEFAULT_EXPLAIN="Directs Terminal Services to automatically specify the client printer as the default printer in a Terminal Services session.\n\nIf you enable this setting, the terminal server automatically maps the client default printer and sets it to be the default printer upon connection. \n\nIf you disable this setting, the default printer is the one that is specified at the server. \n\nIf you do not configure this setting, the default printer is not enforced at the Group Policy level."
  8516. TS_CLIENT_DEFAULT_EXPLAIN_M="Specifies whether the client default printer is automatically set as the default printer in a Terminal Services session. \n\nBy default, Terminal Services automatically designates the client default printer as the default printer in a Terminal Services session. You can use this setting to override this behavior. \n\nIf the status is set to Enabled, the default printer is the printer specified on the remote computer. \n\nIf the status is set to Disabled, the terminal server automatically maps the client default printer and sets it as the default printer upon connection. \n\nIf the status is set to Not Configured, the default printer is not specified at the Group Policy level. However, an administrator can configure the default printer for client sessions by using the Terminal Services Configuration tool."
  8517. TS_CLIENT_DEVICES_MAPPING="Do not allow redirection of client devices"
  8518. TS_CLIENT_PER_DEVICE="Management of specific devices"
  8519. TS_CLIENT_DRIVE="Do not allow drive redirection"
  8520. TS_CLIENT_DRIVE_M="Do not allow drive redirection"
  8521. TS_CLIENT_DRIVE_EXPLAIN=" Disables the mapping of client drives in Terminal Services sessions ("drive redirection"). \n\nBy default, Terminal Services maps client drives automatically upon connection. Mapped drives appear in the session folder tree in Windows Explorer or My Computer in the format \\TSClient\<driveletter>. \n\nIf you enable this setting, client drive redirection is not allowed in Terminal Services sessions. \n\nIf you disable this setting, client drive redirection is always allowed.\n\n If you do not configure this setting, client drive redirection is not specified at the Group Policy level. However, an administrator can still disable client drive redirection by using the Terminal Services Configuration tool."
  8522. TS_CLIENT_DRIVE_EXPLAIN_M="Specifies whether to prevent the mapping of client drives in a Terminal Services session (drive redirection). \n\nBy default, Terminal Services maps client drives automatically upon connection. Mapped drives appear in the session folder tree in Windows Explorer or My Computer in the format <driveletter> on <computername>. You can use this setting to override this behavior. \n\nIf the status is set to Enabled, client drive redirection is not allowed in Terminal Services sessions. \n\nIf the status is set to Disabled, client drive redirection is always allowed. \n\nIf the status is set to Not Configured, client drive redirection is not specified at the Group Policy level. However, an administrator can still disable client drive redirection by using the Terminal Services Configuration tool."
  8523. TS_CLIENT_INDIVIDUAL="Client/Server data redirection"
  8524. TS_CLIENT_LPT="Do not allow LPT port redirection"
  8525. TS_CLIENT_PRINTER="Do not allow client printer redirection"
  8526. TS_CLIENT_PRINTER_EXPLAIN="Directs Terminal Services to map client printers and display them in the user's printer list during Terminal Services sessions.\n\nIf you enable this setting, client printers are mapped automatically upon connection to a terminal server or Remote Desktop. \n\nIf you disable this setting, automatic client printer mapping is never allowed.\n\n If you do not configure this setting, automatic client printer mapping is not specified at the Group Policy level. \n\nNote: This setting is overridden if you enable the Terminal Services setting "Do not allow client printer redirection"."
  8527. TS_CLIENT_PRINTER_MAPPING="Map client printers"
  8528. TS_CLIPBOARDMAP_EXPLAIN="Specifies whether to prevent the sharing of clipboard contents (clipboard redirection) between a remote computer and a client computer during a Terminal Services session. \n\nYou can use this setting to prevent users from redirecting clipboard data to and from the remote computer and the local computer. By default, Terminal Services allows this clipboard redirection. \n\nIf the status is set to Enabled, users cannot redirect clipboard data. \n\nIf the status is set to Disabled, Terminal Services always allows clipboard redirection. \n\nIf the status is set to Not Configured, clipboard redirection is not specified at the Group Policy level. However, an administrator can still disable clipboard redirection using the Terminal Services Configuration tool."
  8529. TS_COLOR="See Explain text for default values"
  8530. TS_COLOR_EXPLAIN="Specifies the maximum color resolution (color depth) for Terminal Services connections.\n\nYou can use this setting to set a limit on the color depth of any connection to a terminal server or Remote Desktop. Limiting the color depth can improve connection performance, particularly over slow links, and reduce server load.\n\nTo use this setting, select the setting from the Color Depth list. To specify that all connections should be at the highest color depth supported by the client, select Client Compatible. The current maximum color depth for Terminal Server and Remote Desktop connections is 24 bit. The default maximum color depth is set to 16 bit for Terminal Server and Remote Desktop on Windows XP Professional.\n\nIf the status is set to Enabled, the specified color depth is the maximum depth for a user's Terminal Services connection. The actual color depth for the connection is determined by the color support available on the client computer.\n\nIf the status is set to Disabled or Not Configured, the color depth for connections is the default value for the Terminal Services mode/Windows version running on the computer, unless a lower level is specified by the user at the time of connection."
  8531. TS_COLORDEPTH="Limit maximum color depth"
  8532. TS_COMPORTMAP_EXPLAIN="Specifies whether to prevent the redirection of data to client COM ports from the remote computer in a Terminal Services session. \n\nYou can use this setting to prevent users from redirecting data to COM port peripherals or mapping local COM ports while they are logged on to a Terminal Services session. By default, Terminal Services allows this COM port redirection. \n\nIf the status is set to Enabled, users cannot redirect server data to the local COM port. \n\nIf the status is set to Disabled, Terminal Services always allows COM port redirection. \n\nIf the status is set to Not Configured, COM port redirection is not specified at the Group Policy level. However, an administrator can still disable COM port redirection using the Terminal Services Configuration tool."
  8533. TS_DISABLE_CONNECTIONS="Allow users to connect remotely using Terminal Services"
  8534. TS_DISABLE_CONNECTIONS_EXPLAIN="Specifies whether to allow users to connect remotely using Terminal Services. \n\nYou can use this setting to configure Terminal Services remote access for the target computers. \n\nIf the status is set to Enabled, users can connect to the target computers remotely using Terminal Services. You can limit the number of users who can connect simultaneously by configuring the "Limit number of connections" setting or the "Maximum Connections" option on the Network Adapter tab in the Terminal Services Configuration tool. \n\nIf the status is set to Disabled, the target computers maintain current connections, but will not accept any new incoming connections. \n\nIf the status is set to Not Configured, Terminal Services uses the "Allow users to connect remotely to your computer" option on the target computer to determine whether remote connection is allowed. This option is found on the Remote tab in System Properties."
  8535. TS_FORCIBLE_LOGOFF="Deny log off of an administrator logged in to the console session"
  8536. TS_FORCIBLE_LOGOFF_EXPLAIN="Specifies whether to allow an administrator attempting to connect to the console of a server to log off an administrator currently logged on to the console. The console session is also known as Session 0. Console access can be obtained by using the /console switch from Remote Desktop Connection in the computer field name or from the command line. \n\nIf the status is set to Enabled, logging off the connected administrator is not allowed.\nIf the status is set to Disabled, logging off the connected administrator is allowed.\nIf the status is set to Not Configured, logging off the connected administrator is allowed but can be changed at the local computer policy level.\n\nThis policy is useful when the currently connected administrator does not want to be logged off by another administrator. If the connected administrator is logged off, any data not previously saved is lost.\n"
  8537. TS_DISABLE_REMOTE_DESKTOP_WALLPAPER="Enforce Removal of Remote Desktop Wallpaper"
  8538. TS_DISABLE_REMOTE_DESKTOP_WALLPAPER_EXPLAIN="Specifies whether desktop wallpaper is displayed to remote clients connecting via Terminal Services. \n\nYou can use this setting to enforce the removal of wallpaper during a remote session. By default, Windows XP Professional displays wallpaper to remote clients connecting through Remote Desktop, depending on the client configuration (see the Experience tab in the Remote Desktop Connection options for more information). Servers running Windows Server 2003 do not display wallpaper by default to remote sessions. \n\nIf the status is set to Enabled, wallpaper never appears to a Terminal Services client. \n\nIf the status is set to Disabled, wallpaper might appear to a Terminal Services client, depending on the client configuration. \n\nIf the status is set to Not Configured, the default behavior applies."
  8539. TS_DRIVE_NOTE="If home path is on the network, specify drive letter for the mapped drive."
  8540. TS_DRIVE_G="G:"
  8541. TS_DRIVE_H="H:"
  8542. TS_DRIVE_I="I:"
  8543. TS_DRIVE_J="J:"
  8544. TS_DRIVE_K="K:"
  8545. TS_DRIVE_L="L:"
  8546. TS_DRIVE_M="M:"
  8547. TS_DRIVE_N="N:"
  8548. TS_DRIVE_O="O:"
  8549. TS_DRIVE_P="P:"
  8550. TS_DRIVE_Q="Q:"
  8551. TS_DRIVE_R="R:"
  8552. TS_DRIVE_S="S:"
  8553. TS_DRIVE_T="T:"
  8554. TS_DRIVE_U="U:"
  8555. TS_DRIVE_V="V:"
  8556. TS_DRIVE_W="W:"
  8557. TS_DRIVE_X="X:"
  8558. TS_DRIVE_Y="Y:"
  8559. TS_DRIVE_Z="Z:"
  8560. TS_EP="Encryption and Security"
  8561. TS_ENCRYPTION="Choose the encryption level from the drop-down list."
  8562. TS_ENCRYPTION_EXPLAIN="Specifies whether to enforce an encryption level for all data sent between the client and the remote computer during a Terminal Services session. \n\nImportant: If FIPS compliance has already been enabled by the "System cryptography: Use FIPS compliant algorithms for encryption, hashing, and signing" Group Policy, you cannot change the encryption level by using this Group Policy or by using Terminal Services Configuration. \n\nIf the status is set to Enabled, encryption for all connections to the server is set to the level you specify. By default, encryption is set to High. The following encryption levels are available: \n\nFIPS Compliant: encrypts data sent from client to server and from server to client to meet the Federal Information Processing Standard 140-1 (FIPS 140-1), a security implementation designed for certifying cryptographic software. Use this level when Terminal Services connections require the highest degree of encryption. FIPS 140-1 validated software is required by the U.S. Government and requested by other prominent institutions. \n\nHigh: encrypts data sent from client to server and from server to client by using strong 128-bit encryption. Use this level when the remote computer is running in an environment containing 128-bit clients only (such as Remote Desktop Connection clients). Clients that do not support this level of encryption cannot connect. \n\nClient Compatible: encrypts data sent from client to server and from server to client at the maximum key strength supported by the client. Use this level when the remote computer is running in an environment containing mixed or legacy clients. \n\nLow: encrypts data sent from the client to the server using 56-bit encryption. Note that data sent from the server to the client is not encrypted when Low is specified. \n\nIf the status is set to Disabled or Not Configured, the encryption level is not enforced through Group Policy. However, administrators can set the encryption level on the server using the Terminal Services
  8563. TS_ENCRYPTION_POLICY="Set client connection encryption level"
  8564. TS_GP_NODE="Terminal Services"
  8565. TS_GP_NODE_FLAT="Terminal Services"
  8566. TS_HELP_HOME_DIR="Directs Terminal Services to use the specified network share as the root of the user's home directory. \n\nIf you enable this setting, Terminal Services maps the specified drive letter to a network share that is used as the user's home directory. The home directory path is based on the specified Home Dir root and the user's alias. (Important: the administrator must create a specific folder for each user.)\n\nHome Dir root must be in the form \\Computername\Sharename. Do not specify a placeholder for user alias, because Terminal Services will automatically append this at logon.\n\nIf you disable this setting or do not configure it, the user's home directory will be as specified at the server."
  8567. TS_HELP_LOCAL_PATH="Directs Terminal Services to use the specified local directory path as the root of the user's home directory. \n\nIf you enable this setting, Terminal Services uses the specified local path as the root directory for all users' home directories. The home directory path is based on the specified Home Dir root and the user's alias. (Important: the administrator must create a specific folder for each user.) \n\nHome Dir root must be an absolute path in the form "Drive:\Path" (without quotes), without environment variables or ellipses. Do not specify a placeholder for user alias, because Terminal Services automatically appends this at logon. \n\nIf you disable this setting or do not configure it, the user's home directory is what was specified at the server."
  8568. TS_HOME_DIR="Home Dir Root Path:"
  8569. TS_JOIN_SESSION_DIRECTORY="Join Session Directory"
  8570. TS_JOIN_SESSION_DIRECTORY_EXPLAIN="Specifies whether Terminal Services uses a Session Directory for tracking user sessions, allowing a group of terminal servers to locate and connect a user back to an existing session. \n\nIf the status is set to Enabled, Terminal Services stores user session information in a Session Directory on the server specified in the "Session Directory Server" setting. \n\nIf the status is set to Disabled, session tracking is not performed, and cannot be enabled using either the Terminal Services Configuration tool or the Terminal Services WMI provider. \n\nIf the status is set to Not Configured, session tracking is not specified at the Group Policy level. However, an administrator can configure servers to participate in a Session Directory with the Terminal Services Configuration tool or via the Terminal Services WMI provider. \n\nNote: If you enable this setting, you must enable the "Session Directory Server" and "Session Directory Cluster Name" settings. The Session Directory service can only be used when the Terminal Server component is installed on the server."
  8571. TS_KEEP_ALIVE="Keep-Alive Connections"
  8572. TS_KEEP_ALIVE_EXPLAIN="Specifies whether persistent connections are allowed. \n\nAfter a terminal server client loses the connection to a terminal server, the session on the terminal server might remain active instead of changing to a disconnected state, even if the client is physically disconnected from the terminal server. If the client logs on to the same terminal server again, a new session might be established (if Terminal Services is configured to allow multiple sessions), and the original session might still be active. \n\nYou can use this setting to enable keep-alive connections and ensure that the session state is consistent with the client state. By default, keep-alive connections are disabled. \n\nTo configure keep-alive connections, enable the setting and set the Keep-alive interval. The keep-alive interval determines how often, in minutes, the server checks the session state. \n\nIf the status is set to Enabled, keep-alive connections are enabled. \n\nIf the status is set to Disabled, the default behavior is enforced. \n\nIf the status is set to Not Configured, keep-alive connections remain disabled by default."
  8573. TS_KEEP_ALIVE_INTERVAL="Keep-Alive interval:"
  8574. TS_License="Licensing"
  8575. TS_LICENSE_SECGROUP="License Server Security Group"
  8576. TS_LICENSE_SECGROUP_HELP="Specifies the terminal servers and license servers to which a Terminal Server License Server offers licenses.\n\nYou can use this setting to control which servers are issued licenses. By default, a Terminal Server License Server issues a license to any computer that requests one.\n\nIf the status is set to Enabled, a local group called Terminal Services Computers is created. The Terminal Server License Server grants licenses only to computers whose computer accounts are placed in this group. When the target computer is a domain controller, this group is a domain local group.\n\nIf the status is set to Disabled, the Terminal Server License Server issues a license to any computer that requests one. The Terminal Services Computers group is not deleted or changed in any way. This is the default behavior.\n\nIf the status is set to Not Configured, the Terminal Server License Server issues a license to any computer that requests one. The Terminal Services Computers group is not deleted or changed in any way. This is the default behavior.\n\nNotes:\n1. The Terminal Services Computers group is empty by default. The Terminal Server License Server does not grant licenses to any computers unless you explicitly populate this group.\n2. The most efficient way to manage Terminal Server computer accounts is to create a global group containing the accounts of all terminal servers and license servers that must receive licenses. Then, place this global group into the local (or domain local) Terminal Services Computers group. This method allows a domain administrator to manage a single list of computer accounts.\n3. To add a computer account to a group, open the Computer Management snap-in, navigate to the Properties page of the group, and click Add. On the Select Users, Computers, or Groups dialog box, click Object Types and then check Computers."
  8577. TS_LPTPORTMAP_EXPLAIN="Specifies whether to prevent the redirection of data to client LPT ports during a Terminal Services session. \n\nYou can use this setting to prevent users from mapping local LPT ports and redirecting data from the remote computer to local LPT port peripherals. By default, Terminal Services allows this LPT port redirection. \n\nIf the status is set to Enabled, users in a Terminal Services session cannot redirect server data to the local LPT port. \n\nIf the status is set to Disabled, LPT port redirection is always allowed. \n\nIf the status is set to Not Configured, LPT port redirection is not specified at the Group Policy level. However, an administrator can still disable local LPT port redirection using the Terminal Services Configuration tool."
  8578. TS_LOCAL_NOTE=" Specify an absolute path in the form Drive:\Path"
  8579. TS_Max_CON="Type 999999 for unlimited connections."
  8580. TS_MAX_CON_EXPLAIN="Specifies whether Terminal Services limits the number of simultaneous connections to the server. \n\nYou can use this setting to restrict the number of remote sessions that can be active on a server. If this number is exceeded, addtional users who try to connect receive an error message telling them that the server is busy and to try again later. Restricting the number of sessions improves performance because fewer sessions are demanding system resources. By default, terminal servers allow an unlimited number of remote sessions, and Remote Desktop for Administration allows two remote sessions. \n\nTo use this setting, enter the number of connections you want to specify as the maximum for the server. To specify an unlimited number of connections, type 999999. \n\nIf the status is set to Enabled, the maximum number of connections is limited to the specified number consistent with the version of Windows and the mode of Terminal Services running on the server. \n\nIf the status is set to Disabled or Not Configured, limits to the number of connections are not enforced at the Group Policy level. \n\nNote: This setting is designed to be used on terminal servers (that is, on servers running Windows with Terminal Server installed)."
  8581. TS_MAX_CON_POLICY="Limit number of connections"
  8582. TS_NoSecurityMenu_Help="Specifies whether to remove the Windows Security item from the Settings menu on Terminal Services clients. You can use this setting to prevent inexperienced users from logging off from Terminal Services inadvertently. \n\nIf the status is set to Enabled, Windows Security does not appear in Settings on the Start menu. As a result, users must type a security attention sequence, such as CTRL+ALT+END, to open the Windows Security dialog box on the client computer. \n\nIf the status is set to Disabled or Not Configured, Windows Security remains in the Settings menu."
  8583. TS_NoSecurityMenu="Remove Windows Security item from Start menu"
  8584. TS_NoDisconnectMenu_Help="Specifies whether to remove the Disconnect option from the Shut Down Windows dialog box on Terminal Services clients. \n\nYou can use this setting to prevent users from using this familiar method to disconnect their client from a terminal server. \n\nIf the status is set to Enabled, Disconnect does not appear as an option in the drop-down list in the Shut Down Windows dialog box. \n\nIf the status is set to Disabled, Disconnect always appears as an option in the drop-down list. \n\nIf the status is set to Not Configured, the appearance of the Disconnect option is not specified at the Group Policy level. \n\nNote: This setting affects the Shut Down Windows dialog box only. It does not prevent users from using other methods of disconnecting from a Terminal Services session. This setting also does not prevent disconnected sessions at the server. See the "Do not allow disconnected sessions" setting to configure this behavior."
  8585. TS_NoDisconnectMenu="Remove Disconnect option from Shut Down dialog"
  8586. TS_PASSWORD="Always prompt client for password upon connection"
  8587. TS_PATH_NOTE="Specify the path in the form, \\Computername\Sharename"
  8588. TS_PRINTERMAP_EXPLAIN="Specifies whether to prevent the mapping of client printers in Terminal Services sessions. \n\nYou can use this setting to prevent users from redirecting print jobs from the remote computer to a printer attached to their local (client) computer. By default, Terminal Services allows this client printer mapping. \n\nIf the status is set to Enabled, users cannot redirect print jobs from the remote computer to a local client printer in Terminal Services sessions. \n\nIf the status is set to Disabled, users can redirect print jobs with client printer mapping. \n\nIf the status is set to Not Configured, client printer mapping is not specified at the Group Policy level. However, an administrator can still disable client printer mapping using the Terminal Services Configuration tool."
  8589. TS_PreventLicenseUpgrade="Prevent License Upgrade"
  8590. TS_PreventLicenseUpgrade_Help="Specifies how a License Server distributes license upgrades to terminal servers running Windows 2000. \n\nA License Server attempts to provide the most appropriate Client Access License (CAL) for a connection. For example, a License Server provides a Windows 2000 Terminal Services (TS) CAL token for clients connecting to a terminal server running Windows 2000 operating system, and a Windows Server 2003 family TS CAL token for a connection to a terminal server running Windows Server 2003. \n\nBy default, this per-computer setting allows a License Server to supply a Windows Server 2003 family TS CAL token, if available, to a terminal server running Windows 2000 operating system if there is no Windows 2000 server TS CAL token available. \n\nIf the status is set to Enabled, when a terminal server running Windows 2000 server requests a license, but no Windows 2000 server TS CAL token is available, a temporary CAL is issued if the client has not already been issued a temporary CAL. Otherwise, no CAL is issued and the client is refused connection, unless the terminal server is within its grace period. \n\nIf the status is set to Disabled, the default behavior is enforced. \n\nIf the status is set to Not Configured, the License Server exhibits the default behavior."
  8591. TS_PROFILE_PATH="Profile path"
  8592. TS_PROGRAM_NAME="Program path and file name"
  8593. TS_PROMPT_PASSWORD="If enabled, Terminal Services always prompts users for passwords."
  8594. TS_PROMPT_PASSWORD_EXPLAIN="Specifies whether Terminal Services always prompts the client for a password upon connection. \n\nYou can use this setting to enforce a password prompt for users logging on to Terminal Services, even if they already provided the password in the Remote Desktop Connection client. \n\nBy default, Terminal Services allows users to automatically log on by entering a password in the Remote Desktop Connection client. \n\nIf the status is set to Enabled, users cannot automatically log on to Terminal Services by supplying their passwords in the Remote Desktop Connection client. They are prompted for a password to log on. \n\nIf the status is set to Disabled, users can always log on to Terminal Services automatically by supplying their passwords in the Remote Desktop Connection client. \n\nIf the status is set to Not Configured, automatic logon is not specified at the Group Policy level. However, an administrator can still enforce password prompting by using the Terminal Services Configuration tool."
  8595. TS_REDIRECTION="Client/Server data redirection"
  8596. TS_RemoteControl="Sets rules for remote control of Terminal Services user sessions"
  8597. TS_RemoteControl_EXPLAIN="Specifies the level of remote control permitted in a Terminal Services session. Remote control can be established with or without the session user's permission. \n\nYou can use this setting to select one of two levels of remote control: View Session permits the remote control user to watch a session, Full Control permits the remote control user to interact with the session. \n\nIf the status is set to Enabled, administrators can remotely interact with a user's Terminal Services session according to the specified rules. To set these rules, select the desired level of control and permission in the Options list. To disable remote control, select No remote control allowed. \n\nIf the status is set to Disabled or Not Configured, remote control rules are determined by the server administrator using the Terminal Services Configuration tool (tscc.msc). By default, remote control users can have full control with the session user's permission. \n\nNote: This setting appears in both Computer Configuration and User Configuration. If both settings are configured, the Computer Configuration setting overrides."
  8598. TS_RemoteControl_Levels="Options:"
  8599. TS_RemoteControl_0="No remote control allowed"
  8600. TS_RemoteControl_1="Full Control with user's permission"
  8601. TS_RemoteControl_2="Full Control without user's permission"
  8602. TS_RemoteControl_3="View Session with user's permission"
  8603. TS_RemoteControl_4="View Session without user's permission"
  8604. TS_RPC_EP="RPC Security Policy"
  8605. TS_RPC_ENCRYPTION="Secure Server (Require Security)"
  8606. TS_RPC_ENCRYPTION_EXPLAIN="Specifies whether a Terminal Server requires secure RPC communication with all clients or allows unsecured communication.\n\nYou can use this setting to strengthen the security of RPC communication with clients by allowing only authenticated and encrypted requests.\n\nIf the status is set to Enabled, the Terminal Server accepts requests from RPC clients that support secure requests, and does not allow unsecured communication with untrusted clients.\n\nIf the status is set to Disabled, the Terminal Server always requests security for all RPC traffic. However, unsecured communication is allowed for RPC clients that do not respond to the request.\n\nIf the status is set to Not Configured, unsecured communication is allowed.\n\nNote: The RPC interface is used for administering and configuring Terminal Services."
  8607. TS_SD_EXPOSE_ADDRESS="Terminal Server IP Address Redirection"
  8608. TS_SD_EXPOSE_ADDRESS_Explain="Specifies how client devices are directed when reconnecting to an existing terminal server session. \n\nIf the status is set to Enabled, client devices attempt to reconnect to disconnected sessions using the internal IP addresses of the terminal servers in the Session Directory. Enable this setting if clients can directly connect to an individual terminal server via that terminal server's IP address. \n\nIf the status is set to Disabled, client devices are redirected to disconnected sessions using the virtual IP address of the cluster. To direct the request to the proper terminal server, terminal server clients and the load balancing hardware must both support the use of routing tokens. This requires configuration and software support in the load balancing device specifically for terminal servers and routing tokens. Disable this setting if the clients only have visibility to the virtual IP address for the terminal server cluster, and cannot connect to an individual terminal server's IP address.\n\nIf the status is set to Not Configured, the IP address redirection setting in the Terminal Services Configuration tool is used. The default for this setting in the Terminal Services Configuration tool is enabled."
  8609. TS_SD_ClustName="Session Directory Cluster Name"
  8610. TS_SD_ClustName_Explain="Specifies the Cluster Name for the terminal server, associating it with other servers in the same logical group.\n\nIf the status is set to Enabled, you can specify the name of the terminal server cluster. If the name is invalid, an error is logged in the event log stating that the specified cluster could not be found.\n\nIf the status is set to Disabled or Not Configured, Cluster Name is not specified at the Group Policy level, and may be adjusted using the Terminal Services Configuration tool or the Terminal Services WMI provider.\n\nNote: Use this setting in combination with "Join Session Directory" and "Session Directory Server" settings."
  8611. TS_SD_Loc="Session Directory Server"
  8612. TS_SD_Loc_Explain="Specifies whether to configure a server as a Session Directory Server for Terminal Services sessions on your network. \n\nA Session Directory Server directs incoming Terminal Services connections for a terminal server cluster. \n\nIf the status is set to Enabled, you can specify a server and its DNS name, IP address, or fully qualified domain name to act as the Session Directory Server. Terminal Services Session Directory must be running on the specified server for this setting to be effective. If the name specified for the Session Directory Server is not valid, an error is logged in Event Viewer on the target computer indicating that the specified location could not be found.\n\nIf status is set to Disabled or Not Configured, the Session Directory Server is not specified at the Group Policy level, and can be adjusted using the Terminal Services Configuration tool or the Terminal Services WMI provider.\n\nNote: This setting must be used in combination with the "Join Session Directory" setting."
  8613. TS_SD_Node="Session Directory"
  8614. TS_Separation="_______________________________________"
  8615. TS_Session_End_On_Limit="Terminate session when time limits are reached"
  8616. TS_SESSION_END_ON_LIMIT_EXPLAIN="Specifies whether to terminate a timed-out Terminal Services session instead of disconnecting it. \n\nYou can use this setting to direct Terminal Services to terminate a session (that is, the user is logged off and the session is deleted from the server) after time limits for active or idle sessions are reached. By default, Terminal Services disconnects sessions that reach their time limits. \n\nTime limits are set locally by the server administrator or in Group Policy. See the "Sets a time limit for active Terminal Services sessions" and "Sets a time limit for active but idle Terminal Services sessions" settings. \n\nIf the status is set to Enabled, Terminal Services terminates any session that reaches its time-out limit. \n\nIf the status is set to Disabled, Terminal Services always disconnects a timed-out session, even if specified otherwise by the server administrator. \n\nIf the status is set to Not Configured, Terminal Services disconnects a timed-out session, unless specified otherwise in local settings. \n\nNote: This setting only applies to time-out limits that are deliberately set (in the Terminal Services Configuration tool or Group Policy Object Editor), not to time-out events that occur due to connectivity or network conditions. Also note that this setting appears in both Computer Configuration and User Configuration. If both settings are configured, the Computer Configuration setting overrides."
  8617. TS_Session_Reconnect_Same="Only allow reconnection from the original client"
  8618. TS_Sessions="Sessions"
  8619. TS_Sessions_ActiveLimit="Active session limit :"
  8620. TS_Sessions_EndDisconnected="End a disconnected session"
  8621. TS_SESSIONS_EXPLAIN="Sets limits for Terminal Services sessions. \n\nIf you enable this setting, Terminal Services sessions are subject to the specified limits. You can specify how long a session will be kept active in a disconnected state, and that active and idle connected sessions must be disconnected (or terminated) after a specified time. You can also specify that disconnected sessions must be reconnected from the original client.\n\nIf you disable this setting or do not enable it, the default values of no limits are used."
  8622. TS_Sessions_IdleLimit="Idle session limit:"
  8623. TS_Sessions_Limits="Sets a time limit for active Terminal Services sessions"
  8624. TS_SESSIONS_LIMITS_EXPLAIN="Specifies a time limit for active Terminal Services sessions. \n\nYou can use this setting to specify the maximum amount of time a Terminal Services session can be active before it is automatically disconnected.\n\nTo use this setting, select Enabled, and then select the desired limit in the Active session limit drop-down list. By default, Terminal Services allows sessions to remain active for an unlimited time. \n\nIf the status is set to Enabled, Terminal Services ends active sessions after the specified amount of time. The user receives a two-minute warning before the Terminal Services session ends, which allows the user to save open files and close programs. \n\nIf the status is set to Disabled or Not Configured, time limits for active sessions are not specified at the Group Policy level. However, an administrator can specify time limits for active sessions in the Terminal Services Configuration tool. \n\nNote: This setting appears in both Computer Configuration and User Configuration. If both settings are configured, the Computer Configuration setting overrides. Active session limits do not apply to the console session. To specify user sessions to be terminated at time-out, enable the "Terminate session when time limits are reached" setting."
  8625. TS_Sessions_Disconnected_Timeout="Set time limit for disconnected sessions"
  8626. TS_SESSIONS_DISCONNECTED_TIMEOUT_EXPLAIN="Specifies a time limit for disconnected Terminal Services sessions. \n\nYou can use this setting to specify the maximum amount of time that a disconnected session is kept active on the server. By default, Terminal Services allows users to disconnect from a remote session without logging off and ending the session. \n\nWhen a session is in a disconnected state, running programs are kept active even though the user is no longer actively connected. By default, these disconnected sessions are maintained for an unlimited time on the server. \n\nIf the status is set to Enabled, disconnected sessions are deleted from the server after the specified amount of time. To enforce the default behavior that disconnected sessions are maintained for an unlimited time, select Never. \n\nIf the status is set to Disabled or Not Configured, time limits for disconnected sessions are not specified at the Group Policy level. \n\nNote: This setting does not apply to console sessions such as Remote Desktop sessions with computers running Windows XP Professional. Also note that this setting appears in both Computer Configuration and User Configuration. If both settings are configured, the Computer Configuration setting overrides."
  8627. TS_Sessions_Idle_Limit="Sets a time limit for active but idle Terminal Services sessions"
  8628. TS_SESSIONS_IDLE_LIMIT_EXPLAIN="Specifies a time limit for active but idle Terminal Services sessions. \n\nYou can use this setting to specify the maximum amount of time that an active session can be idle (that is, no user input) before it is automatically disconnected. By default, Terminal Services allows active sessions to remain idle for an unlimited time. \n\nTo use this setting, select Enabled, and then select the desired time limit in the Idle session limit drop-down list. \n\nIf the status is set to Enabled, active but idle sessions are automatically disconnected after the specified amount of time. The user receives a two-minute warning before the session ends, which allows the user to press a key or move the mouse to keep the session active. \n\nIf the status is set to Disabled or Not Configured, the time limit for active but idle sessions is not specified at the Group Policy level. However, an administrator can specify time limits for idle sessions in the Terminal Services Configuration tool. \n\nNote: This setting appears in both Computer Configuration and User Configuration. If both settings are configured, the Computer Configuration setting overrides. Idle session limits do not apply to the console session. To specify that user sessions are terminated at time-out, enable the "Terminate session when time limits are reached" setting."
  8629. TS_Sessions_IdleLimitText="Idle session limit:"
  8630. TS_Sessions_Reconnect_Same="Allow reconnection from original client only"
  8631. TS_SESSIONS_RECONNECT_SAME_EXPLAIN="Specifies whether to allow users to reconnect to a disconnected Terminal Services session using a computer other than the original client computer. \n\nYou can use this setting to prevent Terminal Services users from reconnecting to the disconnected session using a computer other than the client computer from which they originally created the session. By default, Terminal Services allows users to reconnect to disconnected sessions from any client computer. \n\nIf the status is set to Enabled, users can reconnect to disconnected sessions only from the original client computer. If a user attempts to connect to the disconnected session from another computer, a new session is created instead. \n\nIf the status is set to Disabled, users can always connect to the disconnected session from any computer. \n\nIf the status is set to Not Configured, session reconnection from the original client computer is not specified at the Group Policy level. \n\nImportant: This option is only supported for Citrix ICA clients that provide a serial number when connecting; this setting is ignored if the user is connecting with a Windows client. Also note that this setting appears in both Computer Configuration and User Configuration. If both settings are configured, the Computer Configuration setting overrides."
  8632. TS_SINGLE_SESSION="Restrict Terminal Services users to a single remote session"
  8633. TS_SINGLE_SESSION_EXPLAIN="Specifies whether to restrict users to a single remote Terminal Services session. \n\nIf the status is set to Enabled, users who log on remotely via Terminal Services will be restricted to a single session on that server (either active or disconnected). If the user leaves the session in a disconnected state, the user automatically reconnects to that session at next logon. \n\nIf the status is set to Disabled, users are allowed to make unlimited simultaneous remote connections. \n\nIf the status is set to Not Configured, behavior is determined by the setting in the Terminal Services Configuration tool (the default is for users to be limited to one remote session)."
  8634. TS_SMART_CARD="Do not allow smart card device redirection"
  8635. TS_SMART_CARD_EXPLAIN="Specifies whether to prevent the mapping of smart card devices (smart card device redirection) in a Terminal Services session. The client computer must be running Windows 2000 server, Windows XP Professional, or Windows Server 2003 family. \n\nBy default, Terminal Services automatically maps smart card devices on connection. \n\nIf the status is set to Enabled, Terminal Services users cannot use a smart card to log on to a Terminal Services session. \n\nIf the status is set to Disabled, smart card device redirection is always allowed. \n\nIf the status is set to Not Configured, smart card device redirection is not specified at the Group Policy level. However, an administrator can disable local smart card device redirection by using the Terminal Services Configuration tool."
  8636. TS_START_PROGRAM="Start a program on connection"
  8637. TS_START_PROGRAM_EXPLAIN="Configures Terminal Services to run a specified program automatically upon connection.\n\nYou can use this setting to specify a program to run automatically when a user logs on to a remote computer.\n\nBy default, Terminal Services sessions provide access to the full Windows desktop, unless otherwise specified with this setting, by the server administrator, or by the user in configuring the client connection. Enabling this setting overrides the "Start Program" settings set by the server administrator or user. The Start menu and Windows Desktop are not displayed, and when the user exits the program the session is automatically logged off.\n\nTo use this setting, in Program path and file name, type the fully qualified path and file name of the executable file to be run when the user logs on. If necessary, in Working Directory, type the fully qualified path to the starting directory for the program. If you leave Working Directory blank, the program runs with its default working directory. If the specified program path, file name, or working directory is not the name of a valid directory, the terminal server connection fails with an error message. \n\nIf the status is set to Enabled, Terminal Services sessions automatically run the specified program and use the specified Working Directory (or the program default directory, if Working Directory is not specified) as the working directory for the program. \n\nIf the status is set to Disabled or Not Configured, Terminal Services sessions start with the full desktop, unless the server administrator or user specify otherwise. (See Computer Config\Administrative templates\Windows Components\System\Logon\"Run these programs at user logon" setting.) \n\nNote: This setting appears in both Computer Configuration and User Configuration. If both settings are configured, the Computer Configuration setting overrides."
  8638. TS_SUPPORTED_WindowsXP="At least Microsoft Windows XP Terminal Services"
  8639. TS_SUPPORTED_Win2k="At least Microsoft Windows 2000 Terminal Services"
  8640. TS_TIME_ZONE="Allow Time Zone Redirection"
  8641. TS_TIME_ZONE_EXPLAIN="Specifies whether to allow the client computer to redirect its time zone settings to the Terminal Services session.\n\nBy default, the session time zone is the same as the server time zone, and the client computer cannot redirect its time zone information.\n\nIf the status is set to Enabled, clients that are capable of time zone redirection send their time zone information to the server. The server base time is then used to calculate the current session time (current session time = server base time + client time zone). Currently, Remote Desktop Connection and Windows CE 5.1 are the only clients capable of time zone redirection.\n\nSession 0 (the console session) always has the server time zone and settings. To change the system time and time zone, connect to session 0.\n\nIf the status is set to Disabled, time zone redirection is not possible.\n\nIf the status is set to Not Configured, time zone redirection is not specified at the Group Policy level and the default behavior is for time zone redirection to be turned off.\n\nWhen an administrator changes this setting, only new connections display the behavior specified by the new setting. Sessions that were initiated before the change must log off and reconnect to be affected by the new setting. Microsoft recommends that all users log off the server after this setting is changed.\n\nNote: Time zone redirection is only possible when connecting to a Windows Server 2003 family terminal server."
  8642. TS_TEMP="Temporary folders"
  8643. TS_TEMP_DELETE="Do not delete temp folder upon exit"
  8644. TS_TEMP_DELETE_EXPLAIN="Specifies whether Terminal Services retains a user's per-session temporary folders at logoff. \n\nYou can use this setting to maintain a user's session-specific temporary folders on a remote computer, even if the user logs off from a session. By default, Terminal Services deletes a user's temporary folders when the user logs off. \n\nIf the status is set to Enabled, users' per-session temporary folders are retained when the user logs off from a session. \n\nIf the status is set to Disabled, temporary folders are deleted when a user logs off, even if the administrator specifies otherwise in the Terminal Services Configuration tool. \n\nIf the status is set to Not Configured, Terminal Services deletes the temporary folders from the remote computer at logoff, unless specified otherwise by the server administrator. \n\nNote: This setting only takes effect if per-session temporary folders are in use on the server. That is, if you enable the "Do not use temporary folders per session" setting, this setting has no effect."
  8645. TS_TEMP_EXPLAIN="Specifies whether to prevent Terminal Services from creating session-specific temporary folders. \n\nYou can use this setting to disable the creation of separate temporary folders on a remote computer for each session. By default, Terminal Services creates a separate temporary folder for each active session that a user maintains on a remote computer. Unless otherwise specified, these temporary folders are in %USERPROFILE%\Local Settings\Temp\<sessionID>. \n\nIf the status is set to Enabled, per-session temporary folders are not created. Instead, users' temporary files are stored in a common Temp directory for each user on the server (by default, %USERPROFILE%\Local Settings\Temp). \n\nIf the status is set to Disabled, per-session temporary folders are always created, even if the administrator specifies otherwise in the Terminal Services Configuration tool. \n\nIf the status is set to Not Configured, per-session temporary folders are created unless otherwise specified by the server administrator."
  8646. TS_TEMP_PER_SESSION="Do not use temp folders per session"
  8647. TS_TIME_NEVER="Never"
  8648. TS_TIME_1MIN="1 minute"
  8649. TS_TIME_5MIN="5 minutes"
  8650. TS_TIME_10MIN="10 minutes"
  8651. TS_TIME_15MIN="15 minutes"
  8652. TS_TIME_30MIN="30 minutes"
  8653. TS_TIME_1HR="1 hour"
  8654. TS_TIME_2HR="2 hours"
  8655. TS_TIME_3HR="3 hours"
  8656. TS_TIME_1DAY="1 day"
  8657. TS_TIME_2DAY="2 days"
  8658. TS_TSCC_PERMISSIONS_POLICY="Do not allow local administrators to customize permissions"
  8659. TS_TSCC_EXPLAIN="Specifies whether to disable the administrator rights to customize security permissions in the Terminal Services Configuration tool (tscc.msc). \n\nYou can use this setting to prevent administrators from making changes to the security descriptors for user groups in the TSCC Permissions tab. By default, administrators are able to make such changes. \n\nIf the status is set to Enabled, the TSCC Permissions tab cannot be used to customize per-connection security descriptors or to change the default security descriptors for an existing group. All of the security descriptors are Read Only. \n\nIf the status is set to Disabled or Not Configured, server administrators have full Read/Write privileges to the user security descriptors in the TSCC Permissions tab. \n\nNote: The preferred method of managing user access is by adding a user to the Remote Desktop Users group."
  8660. TS_USER_HOME="TS User Home Directory"
  8661. TS_USER_HOME_EXPLAIN="Specifies whether Terminal Services uses the specified network share or local directory path as the root of the user's home directory for a Terminal Services session. \n\nTo use this setting, select the location for the home directory (network or local) from the Location drop-down list. If you choose to place the directory on a network share, type the Home Dir Root Path in the form \\Computername\Sharename, and then select the drive letter to which you want the network share to be mapped. \n\nIf you choose to keep the home directory on the local computer, type the Home Dir Root Path in the form "Drive:\Path" (without quotes), without environment variables or ellipses. Do not specify a placeholder for user alias, because Terminal Services automatically appends this at logon. \n\nNote: The Drive Letter field is ignored if you choose to specify a local path. If you choose to specify a local path but then type the name of a network share in Home Dir Root Path, Terminal Services places user home directories in the network location. \n\nIf the status is set to Enabled, Terminal Services creates the user's home directory in the specified location on the local computer or the network. The home directory path for each user is the specified Home Dir Root Path and the user's alias. \n\nIf the status is set to Disabled or Not Configured, the user's home directory is as specified at the server."
  8662. TS_USER_HOME_LOCATION="Location:"
  8663. TS_USER_HOME_LOCAL="User home directory (local)"
  8664. TS_USER_HOME_NET="User home directory (network)"
  8665. TS_USER_PROFILE_EXPLAIN="Specifies whether Terminal Services uses the specified network path for roaming user profiles. \n\nYou can use this setting to specify a network share where the profiles are stored, allowing users to access the same profile for sessions on all terminal servers in the same organizational unit. By default, Terminal Services stores all user profiles locally on the terminal server. \n\nTo use this setting, type the path to the network share in the form \\Computername\Sharename. Do not specify a placeholder for user alias, because Terminal Services automatically appends this at logon. If the specified network share does not exist, Terminal Services displays an error message at the server and stores the user profiles locally. \n\nIf the status is set to Enabled, Terminal Services uses the specified path as the root directory for all user profiles. The profiles themselves are contained in subdirectories named for the alias of each user. \n\nIf the status is set to Disabled or Not Configured, user profiles are stored locally on the server, unless specified otherwise by the server administrator. \n\nNote: The roaming profiles specified with this setting apply to Terminal Services connections only; a user might also have a Windows roaming profile, in which case the Terminal Services roaming profile always takes precedence in a Terminal Services session."
  8666. TS_USER_PROFILES="Set path for TS Roaming Profiles"
  8667. TS_WORKDIR="Working Directory"
  8668. TS_On_the_Network="On the Network"
  8669. TS_on_the_Local_machine="On the Local machine"
  8670. TS_Color_Depth="Color Depth"
  8671. TS_Client_Compatible="Client Compatible"
  8672. TS_8_bit="8 bit"
  8673. TS_15_bit="15 bit"
  8674. TS_16_bit="16 bit"
  8675. TS_24_bit="24 bit"
  8676. TS_Low_Level="Low Level"
  8677. TS_High_Level="High Level"
  8678. TS_Maximum_Connections_allowed="TS Maximum Connections allowed"
  8679. TS_ENCRYPTION_LEVEL="Encryption Level"
  8680. TS_DRIVE_LETTER="Drive Letter"
  8681. UILang1="English"
  8682. UILang2="Japanese"
  8683. UILang3="Korean"
  8684. UILang4="German"
  8685. UILang5="Simplified Chinese"
  8686. UILang6="Traditional Chinese"
  8687. UILang7="French"
  8688. UILang8="Spanish"
  8689. UILang9="Italian"
  8690. UILang10="Swedish"
  8691. UILang11="Dutch"
  8692. UILang12="Brazilian"
  8693. UILang13="Finnish"
  8694. UILang14="Norwegian"
  8695. UILang15="Danish"
  8696. UILang16="Hungarian"
  8697. UILang17="Polish"
  8698. UILang18="Russian"
  8699. UILang19="Czech"
  8700. UILang20="Greek"
  8701. UILang21="Portuguese"
  8702. UILang22="Turkish"
  8703. UILang23="Arabic"
  8704. UILang24="Hebrew"
  8705. UILang25="Slovak"
  8706. UILang26="Slovenian"
  8707. UILang27="Romanian"
  8708. UILang28="Croatian"
  8709. UILang29="Bulgarian"
  8710. UILang30="Estonian"
  8711. UILang31="Lithuanian"
  8712. UILang32="Latvian"
  8713. UILang33="Thai"
  8714. UILangSelect="Restrict users to the following language:"
  8715. UserANDMachineT="This setting must be set for the machine and the user to be enforced."
  8716. UserORMachineT="This setting may be set for the machine or for the user."
  8717. UserPolicyMode_Help="Applies alternate user settings when a user logs on to a computer affected by this setting.\n\nThis setting directs the system to apply the set of Group Policy objects for the computer to any user who logs on to a computer affected by this setting. It is intended for special-use computers, such as those in public places, laboratories, and classrooms, where you must modify the user setting based on the computer that is being used.\n\nBy default, the user's Group Policy objects determine which user settings apply. If this setting is enabled, then, when a user logs on to this computer, the computer's Group Policy objects determine which set of Group Policy objects applies.\n\nTo use this setting, select one of the following modes from the Mode box:\n\n-- "Replace" indicates that the user settings defined in the computer's Group Policy objects replace the user settings normally applied to the user.\n\n-- "Merge" indicates that the user settings defined in the computer's Group Policy \
  8718. objects and the user settings normally applied to the user are combined. If the settings conflict, the user settings in the computer's Group Policy objects take precedence over the user's normal settings.\n\nIf you disable this setting or do not configure it, the user's Group Policy objects determines which user settings apply.\n\nNote: This setting is effective only when both the computer account and the user account are in Windows 2000 domains."
  8719. UserPolicyMode_Merge="Merge"
  8720. UserPolicyMode_Replace="Replace"
  8721. UserPolicyMode="User Group Policy loopback processing mode"
  8722. UserPolicyModeOp="Mode:"
  8723. UserProfiles="User Profiles"
  8724. VerboseStatus_Help="Directs the system to display highly detailed status messages.\n\nIf you enable this setting, the system displays status messages that reflect each step in the process of starting, shutting down, logging on, or logging off the system.\n\nThis setting is designed for sophisticated users that require this information.\n\nNote: This setting is ignored if the "Remove Boot / Shutdown / Logon / Logoff status messages" setting is enabled."
  8725. VerboseStatus="Verbose vs normal status messages"
  8726. VerifyPublishedState_Help="Directs the system to periodically verify that the printers published by this computer still appear in Active Directory. This setting also specifies how often the system repeats the verification.\n\nBy default, the system only verifies published printers at startup. This setting allows for periodic verification while the computer is operating.\n\nTo enable this additional verification, enable this setting, and then select a verification interval.\n\nTo disable verification, disable this setting, or enable this setting and select "Never" for the verification interval.\n\n"
  8727. VerifyPublishedState_Tip1="Verify that all published printers are in Active Directory."
  8728. VerifyPublishedState="Check published state"
  8729. VerifyPublishedState12Hours="12 Hours"
  8730. VerifyPublishedState1Day="1 Day"
  8731. VerifyPublishedState1Hour="1 Hour"
  8732. VerifyPublishedState30Minutes="30 Minutes"
  8733. VerifyPublishedState4Hours="4 Hours"
  8734. VerifyPublishedState8Hours="8 Hours"
  8735. VerifyPublishedStateNever="Never"
  8736. VerifyPublishedStateTitle="Published State Check Interval:"
  8737. WAB="Windows Address Book"
  8738. Wallpaper="Active Desktop Wallpaper"
  8739. Wallpaper_Help="Specifies the desktop background ("wallpaper") displayed on all users' desktops.\n\nThis setting lets you specify the wallpaper on users' desktops and prevents users from changing the image or its presentation. The wallpaper you specify can be stored in a bitmap (*.bmp), JPEG (*.jpg), or HTML (*.htm, *.html) file.\n\nTo use this setting, type the fully qualified path and name of the file that stores the wallpaper image. You can type a local path, such as C:\Windows\web\wallpaper\home.jpg or a UNC path, such as \\Server\Share\Corp.jpg. If the specified file is not available when the user logs on, no wallpaper is displayed. Users cannot specify alternative wallpaper. You can also use this setting to specify that the wallpaper image be centered, tiled, or stretched. Users cannot change this specification.\n\nIf you disable this setting or do not configure it, no wallpaper is displayed. However, users can select the wallpaper of their choice.\n\nAlso, see the "Allow only bitmapped wallpaper" in the same location, and the "Prevent changing wallpaper" setting in User Configuration\Administrative Templates\Control Panel.\n\nNote: You need to enable the Active Desktop to use this setting.\n\nNote: This setting does not apply to Terminal Server sessions."
  8740. WallpaperName="Wallpaper Name:"
  8741. WallpaperStyle="Wallpaper Style:"
  8742. WallpaperStyle_Center="Center"
  8743. WallpaperStyle_Tile="Tile"
  8744. WallpaperStyle_Stretch="Stretch"
  8745. Wallpaper_Tip1="Example: Using a local path: C:\windows\web\wallpaper\home.jpg"
  8746. Wallpaper_Tip2="Example: Using a UNC path: \\Server\Share\Corp.jpg"
  8747. WarnUser="Notify user when profile storage space is exceeded."
  8748. WarnUserTimeout="Remind user every X minutes:"
  8749. WFP="Windows File Protection"
  8750. WFPDllCacheDir_Help="Specifies an alternate location for the Windows File Protection cache.\n\nTo enable this setting, enter the fully qualified local path to the new location in the "Cache file path" box.\n\nIf you disable this setting or do not configure it, the Windows File Protection cache is located in the %Systemroot%\System32\Dllcache directory.\n\nNote: Do not put the cache on a network shared directory."
  8751. WFPDllCacheDir="Specify Windows File Protection cache location"
  8752. WFPDllCacheDirBox="Cache file path:"
  8753. WFPQuota_Help="Specifies the maximum amount of disk space that can be used for the Windows File Protection file cache.\n\nWindows File Protection adds protected files to the cache until the cache content reaches the quota. If the quota is greater than 50 MB, Windows File Protection adds other important Windows XP files to the cache until the cache size reaches the quota.\n\nTo enable this setting, enter the maximum amount of disk space to be used (in MB). To indicate that the cache size is unlimited, select "4294967295" as the maximum amount of disk space.\n\nIf you disable this setting or do not configure it, the default value is set to 50 MB on Windows XP Professional and is unlimited (4294967295 MB) on Windows Server 2003."
  8754. WFPQuota="Limit Windows File Protection cache size"
  8755. WFPQuota_Tip1="To indicate that the cache size is not limited, select the"
  8756. WFPQuota_Tip2=" maximum value, 4294967295."
  8757. WFPQuota_Size="Cache size (in MB)"
  8758. WFPScan_Help="Determines when Windows File Protection scans protected files. This setting directs Windows File Protection to enumerate and scan all system files for changes.\n\nYou can use this setting to direct Windows File Protection to scan files more often. By default, files are scanned only during setup.\n\nTo use this setting, enable the setting, and then select a rate from the "Scanning Frequency" box.\n\n-- "Do not scan during startup," the default, scans files only during setup.\n\n-- "Scan during startup" also scans files each time you start Windows XP. This setting delays each startup.\n\nNote: This setting affects file scanning only. It does not affect the standard background file change detection that Windows File Protection provides."
  8759. WFPScan="Set Windows File Protection scanning"
  8760. WFPScan_NotAtBoot="Do not scan during startup"
  8761. WFPScan_AtBoot="Scan during startup"
  8762. WFPScanList="Scanning frequency:"
  8763. WFPShowProgress_Help="Hides the file scan progress window.\n\nThis window provides status information to sophisticated users, but it might confuse novices.\n\nIf you enable this setting, the file scan window does not appear during file scanning.\n\nIf you disable this setting or do not configure it, the file scan progress window appears."
  8764. WFPShowProgress="Hide the file scan progress window"
  8765. Windows_NT_Diagnostic_Logging="Diagnostic Logging"
  8766. WindowsComponents="Windows Components"
  8767. WindowsExplorer="Windows Explorer"
  8768. WindowsUpdateCat="Windows Update"
  8769. W32TIME_ROOT="Windows Time Service"
  8770. W32TIME_TIMEPROVIDERS="Time Providers"
  8771. W32TIME_POLICY="Windows Time Policy"
  8772. W32TIME_POLICY_CONFIG="Global Configuration Settings"
  8773. W32TIME_POLICY_ENABLE_NTPCLIENT="Enable Windows NTP Client"
  8774. W32TIME_POLICY_CONFIGURE_NTPCLIENT="Configure Windows NTP Client"
  8775. W32TIME_POLICY_ENABLE_NTPSERVER="Enable Windows NTP Server"
  8776. W32TIME_FrequencyCorrectRate="FrequencyCorrectRate"
  8777. W32TIME_PollAdjustFactor="PollAdjustFactor"
  8778. W32TIME_LargePhaseOffset="LargePhaseOffset"
  8779. W32TIME_SpikeWatchPeriod="SpikeWatchPeriod"
  8780. W32TIME_HoldPeriod="HoldPeriod"
  8781. W32TIME_MaxPollInterval="MaxPollInterval"
  8782. W32TIME_LocalClockDispersion="LocalClockDispersion"
  8783. W32TIME_MaxNegPhaseCorrection="MaxNegPhaseCorrection"
  8784. W32TIME_MaxPosPhaseCorrection="MaxPosPhaseCorrection"
  8785. W32TIME_MaxAllowedPhaseOffset="MaxAllowedPhaseOffset"
  8786. W32TIME_Enabled="Enabled"
  8787. W32TIME_CrossSiteSyncFlags="CrossSiteSyncFlags"
  8788. W32TIME_ResolvePeerBackoffMinutes="ResolvePeerBackoffMinutes"
  8789. W32TIME_ResolvePeerBackoffMaxTimes="ResolvePeerBackoffMaxTimes"
  8790. W32TIME_EventLogFlags="EventLogFlags"
  8791. W32TIME_PhaseCorrectRate="PhaseCorrectRate"
  8792. W32TIME_MinPollInterval="MinPollInterval"
  8793. W32TIME_UpdateInterval="UpdateInterval"
  8794. W32TIME_SpecialPollInterval="SpecialPollInterval"
  8795. W32TIME_AnnounceFlags="AnnounceFlags"
  8796. W32TIME_NtpServer="NtpServer"
  8797. W32TIME_Type="Type"
  8798. W32TIME_Type_NoSync="NoSync"
  8799. W32TIME_Type_NTP="NTP"
  8800. W32TIME_Type_NT5DS="NT5DS"
  8801. W32TIME_Type_AllSync="AllSync"
  8802. W32TIME_ClockDisciplineParameters="Clock Discipline Parameters"
  8803. W32TIME_GeneralParameters="General Parameters"
  8804. W32TIME_CONFIG_EXPLAIN="Specifies a set of parameters for all time providers installed on your system. There are two sets of parameters: clock discipline parameters, which control how the Windows Time Service processes the time samples it receives from providers, and general parameters. The general parameters allow you to configure the following: whether the time service is discoverable through DsGetDcName, the verbosity of event logging, the reliability of the local CMOS clock, and the minimum and maximum suggested polling intervals for time providers."
  8805. W32TIME_ENABLE_NTPCLIENT_EXPLAIN="Specifies whether the Windows NTP Client is enabled. Enabling the Windows NTP Client allows your computer to synchronize its computer clock with other NTP servers. You may want to disable this service if you decide to use a third-party time provider."
  8806. W32TIME_CONFIGURE_NTPCLIENT_EXPLAIN="Specifies whether the Windows NTP Client synchronizes time from the domain hierarchy or a manually configured NTP server. Specifies whether the client can synchronize time from a source outside its site, how long the Windows NTP Client waits before attempting to re-resolve an unsuccessfully resolved NTP server name, and the verbosity of the NTP Client's event logging."
  8807. W32TIME_ENABLE_NTPSERVER_EXPLAIN="Specifies whether the Windows NTP Server is enabled. Enabling the Windows NTP Server allows your computer to service NTP requests from other machines."
  8808. WinMSG_WindowsMSG="Windows Messenger"
  8809. WinMSG_NoWindowsMsg_Comp="Do not allow Windows Messenger to be run"
  8810. WinMSG_NoWindowsMsg_User="Do not allow Windows Messenger to be run"
  8811. WinMSG_NoWindowsMsg_Help="Allows you to disable Windows Messenger.\n\nIf you enable this setting, Windows Messenger will not run.\n\nIf you disable or do not configure this setting, Windows Messenger can be used.\n\nNote: If you enable this setting, Remote Assistance also cannot use Windows Messenger.\n\nNote: This setting is available under both Computer Configuration and User Configuration. If both are present, the Computer Configuration version of this setting takes precedence."
  8812. WinMSG_NoAutoStartWindowsMsg_Comp="Do not automatically start Windows Messenger initially"
  8813. WinMSG_NoAutoStartWindowsMsg_User="Do not automatically start Windows Messenger initially"
  8814. WinMSG_NoAutoStartWindowsMsg_Help="Windows Messenger is automatically loaded and running when a user logs on to a Windows XP computer. You can use this setting to stop Windows Messenger from automatically being run at logon.\n\nIf you enable this setting, Windows Messenger will not be loaded automatically when a user logs on.\n\nIf you disable or do not configure this setting, the Windows Messenger will be loaded automatically at logon.\n\nNote: This setting simply prevents Windows Messenger from running intially. If the user invokes and uses Windows Messenger from that point on, Windows Messenger will be loaded.\n\nThe user can also configure this behavior on the Preferences tab on the Tools menu in the Windows Messenger user interface.\n\nNote: If you do not want users to use Windows Messenger, enable the "Do not allow Windows Messenger to run" setting.\n\nNote: This setting is available under both Computer Configuration and User Configuration. If both are present, the Computer Configuration version of this setting takes precedence."
  8815. WMDRMCat="Windows Media Digital Rights Management"
  8816. Y2K_Help="Determines how programs interpret two-digit years.\n\nThis setting specifies the largest two-digit year interpreted as being preceded by 20. All numbers less than or equal to the specified value are interpreted as being preceded by 20. All numbers greater than the specified value are interpreted as being preceded by 19.\n\nFor example, the default value, 2029, specifies that all two-digit years less than or equal to 29 (00 to 29) are interpreted as being preceded by 20, that is 2000 to 2029. Conversely, all two-digit years greater than 29 (30 to 99) are interpreted as being preceded by 19, that is, 1930 to 1999.\n\nThis setting only affects the programs that use this Windows feature to interpret two-digit years. If a program does not interpret two-digit years correctly, consult the documentation or manufacturer of the program."
  8817. Y2K="Century interpretation for Year 2000"
  8818. Y2KSysCtrl="Specify the maximum year for which two-digit years are interpreted as being 21st century:"
  8819. Y2KYear="Year "
  8820. ; Category Strings
  8821. ActiveDesktop_Help="Controls and configures the behavior of the Active Desktop. This includes enabling or disabling the Active Desktop and controlling its components."
  8822. ActiveDirectory_Help="Controls the settings for the user's interaction with Active Directory."
  8823. AdministrativeServices_Help="Allows configuration of various system component settings."
  8824. ARP_Help="Contains settings to control the behavior of the Add or Remove Programs applet."
  8825. CADOptions_Help="Manages user options that are displayed upon the user invocation of the Ctrl+Alt+Del key combination. These include disabling Task Manager, locking a computer, changing a Windows password, and logging off Windows."
  8826. Cat_OfflineFiles_Help="Allows configuration of offline files. This includes how to make files available offline, encryption, and synchronization details."
  8827. Comdlg_Help="Manages configuration of the Common Open File Dialog. Specifically, this controls the elements displayed in the UI for this dialog."
  8828. Cpl_Help="Contains settings to allow configuration of the Control Panel, including the items that it does or does not display."
  8829. Desktop_Help="Contains settings to manage behavior of the user's desktop, as well as which default icons are displayed on that desktop."
  8830. DiskQuota_Help="Determines and manages disk quota limits and properties."
  8831. Display_Explain="Controls settings available in Display, the Control Panel, or by right-clicking a user's desktop. This includes background properties, appearance settings and Screen Saver properties."
  8832. DNS_Client_Help="Allows configuration of DNS settings, including suffix and registration options."
  8833. Logon_Help="Determines users'logon experience and the configuration of programs run at logon."
  8834. HSS_HelpCenterPolicies_Explain="Allows configuration of Help and Support Center"
  8835. MMC_ExtensionSnapins_Help ="Allows you to permit and prohibit the use of Microsoft Management Console (MMC) extension snap-ins. These snap-ins include SNMP, Event Viewer, Remote Access, and Device Manager."
  8836. MMC_GroupPolicy_Help="Allows you to permit and prohibit the use of the Group Policy Object Editor snap-in and its extensions, as well as the Resultant Set of Policy (RSoP) snap-in."
  8837. MMC_GroupPolicy_GPSnapin_Help="Allows you to permit and prohibit the use of the Group Policy Object Editor snap-in and its extensions."
  8838. MMC_GroupPolicy_RSoPSnapin_Help="Allows you to permit and prohibit the use of the Resultant Set of Policy (RSoP) snap-in and its extensions."
  8839. MMC_Help="Contains settings that determine which Microsoft Management Console (MMC) snap-ins are permitted or restricted."
  8840. MMC_RESTRICT_Help="Allows you to permit and prohibit the use of MMC snap-ins. These snap-ins include Active Directory, Disk Management, IP Security, Shared Folders, and WMI Control."
  8841. MSI_Help="Controls settings to manage Window Installer, which is used to install .msi applications."
  8842. Netlogon_Help="Configures logon behavior in a domain environment. Specifically, Net Logon allows you to manage how clients locate and communicate with domain controllers."
  8843. Network_Help="Allows configuration of components of the operating system used by a client computer to connect to a network. This includes DNS settings and Offline Files."
  8844. NetworkConnections_Comp_Help="Manages network connections. This includes controlling the use of Internet Connection Firewall and Internet Connection Sharing (ICS)."
  8845. NetworkConnections_User_Help="Manages configuration and settings for Network Connections."
  8846. Net_DC_Locator_DNS_Records_Help="Allows configuration of Netlogin DC Locator DNS Records."
  8847. PCH_ApplicationFaults_Help="Manages Application Error Reporting settings and defaults."
  8848. PCH_SystemFaults_Help ="Manages Operating System Error Reporting."
  8849. PCHealth_Help="Contains settings to manage configuration of Error Reporting."
  8850. PCH_AdvancedReporting_Help="Controls advanced reporting options for Error Reporting. These settings let you filter the applications and types of errors you report.\n\nThese settings require that the "Report Errors" setting be enabled."
  8851. PolicyPolicies_Help="Manages Group Policy and Resultant Set of Policy (RSoP) settings. In addition to this, settings for the Group Policy extensions processing are also available."
  8852. Printers_Help="Manages network printer configuration and publishing options."
  8853. PW_Power_Help="Allows configuration of Power Management."
  8854. RegionalOptions_Help="Contains settings to control language configuration for a user's desktop."
  8855. RemoteAssist_Help="Controls settings to manage Remote Assistance."
  8856. RPC_Help="Contains settings to manage Remote Procedure Call troubleshooting ."
  8857. Scripts_Help="Contains settings to manage when, how, and if scripts are run."
  8858. SharedFolders_Help="Manages configuration and behavior of shared folders."
  8859. SNMP_Help="Allows configuration of SNMP. This includes SNMP Communities, Permitted Managers, and Traps for Public community."
  8860. SR_Help="Contains settings to manage System Restore."
  8861. StartMenu_Help ="Contains settings that allow you to add, remove, or disable items from the Start menu, taskbar, and notification area."
  8862. Themes_Help="Allows configuration of the Desktop Themes feature."
  8863. TaskScheduler_Help="Controls users' ability to manage tasks. This includes adding and removing tasks, creating and deleting new tasks, and viewing and changing properties."
  8864. TS_Comp_Help="Controls Terminal Services configuration and properties of client sessions for individual computers or groups of computers."
  8865. TS_EP_Help="Controls logon settings and data encryption for Terminal Services sessions."
  8866. TS_License_Help="Controls Terminal Services Licensing Configuration"
  8867. TS_REDIRECTION_Help="Controls access to data and devices on a client computer in Terminal Services sessions."
  8868. TS_Sessions_Comp_Help ="Controls time limits and reconnection configuration for all Terminal Services connections to the computer."
  8869. TS_Sessions_Help="Allows configuration of Terminal Services clusters in the Terminal Services Session Directory service."
  8870. TS_Sessions_User_Help="Controls time limits and reconnection configuration for Terminal Services connections for individual users or groups of users."
  8871. TS_TEMP_Help ="Manages temporary folder settings."
  8872. TS_User_Help="Controls user settings for Terminal Services sessions for individual users or groups of users."
  8873. UserProfiles_Help ="Contains settings to control the behavior of user profiles. This includes settings for both roaming and local profiles."
  8874. QosPsched_Help="Manages settings for the Quality of Service (QoS) Packet Scheduler."
  8875. QoSDSCP_Comforming_Help="Manages the IP DSCP value of conforming packets for each of the QoS service types."
  8876. QoSDSCP_NonComforming_Help="Manages the IP DSCP value of nonconforming packets for each of the QoS service types."
  8877. QosLayer2Priority_Help="Manages the Layer 2 priority or 802.1p value of conforming packets for each of the QoS service types."
  8878. WFP_Help="Sets Window File Protection settings, including scanning, hiding progress windows, limiting size, and determining location."
  8879. WindowsComponents_Help="Contains settings for operating system components."
  8880. WindowsExplorer_Help="Manages Windows Explorer settings. These include shell properties, folder options, file menus, and available drives."
  8881. WinMSG_WindowsMsg_Help="Contains settings for Windows Messenger."
  8882. WindowsUpdateCat_Help="Manages configuration of Windows Update."
  8883. W32TIME_Help="Manages settings for the Windows Time Service."
  8884. W32TIME_TIMEPROVIDERS_Help="Manages configuration of the Windows NTP Client and Server."
  8885. ; Online Help Strings
  8886. ADM_TITLE="Group Policy settings for Windows 2000, Windows XP, and the Windows Server 2003"
  8887. USER="User Configuration"
  8888. COMPUTER="Computer Configuration"
  8889. cOMPUTER_EXPLAIN="Contains settings that may only be used to configure Computers."
  8890. USER_EXPLAIN="Contains settings that may only be used to configure Users."
  8891. SUPPORTEDON="Requirements:"