Leaked source code of windows server 2003
You can not select more than 25 topics Topics must start with a letter or number, can include dashes ('-') and can be up to 35 characters long.

171 lines
9.9 KiB

  1. /*:
  2. @*: This file is organized into two main blocks. The first block contains
  3. @*: code (non-string) sections which are specific to languages. Please put
  4. @*: the code sections in the correct language.
  5. @*: The second block is reserved for [Strings] which localizers will be
  6. @*: working with. It is further divided using "#if LANGUAGE ==" for language
  7. @*: specific strings. For strings which are common to all languages
  8. @*: place outside the #ifs.
  9. @*:
  10. @*: This file is first precompiled with LANGUAGE_ID
  11. @*: set to the language (see inf\win4\inf\makefile.inc for details).
  12. @*: For example, for usa builds, the sections under #if LANGUAGE == 0x409
  13. @*: will appear.
  14. @*:
  15. @*: Important: To support locstudio, this file contains only ONE [Strings] section.
  16. @*:
  17. @*/
  18. #if LANGUAGE_ID != 0x804 && LANGUAGE_ID != 0x404 && LANGUAGE_ID != 0x411 && LANGUAGE_ID != 0x412
  19. // This section is for non-FE (chs,cht,jpn,kor) builds. So english, german, ...
  20. #elif LANGUAGE_ID == 0x804
  21. //CHS specific sections
  22. #elif LANGUAGE_ID == 0x404
  23. //CHT specific sections
  24. #elif LANGUAGE_ID == 0x411
  25. //JPN specific sections
  26. #elif LANGUAGE_ID == 0x412
  27. //KOR specific sections
  28. #endif
  29. // String section below for localizers
  30. [Strings]
  31. ;================================ Accounts ============================================================================
  32. ;Specified in UI code - Accounts: Administrator account status
  33. ;Specified in UI code - Accounts: Guest account status
  34. ;Specified in UI code - Accounts: Rename administrator account
  35. ;Specified in UI code - Accounts: Rename guest account
  36. LimitBlankPasswordUse = "Accounts: Limit local account use of blank passwords to console logon only"
  37. ;================================ Audit ===============================================================================
  38. AuditBaseObjects="Audit: Audit the access of global system objects"
  39. FullPrivilegeAuditing="Audit: Audit the use of Backup and Restore privilege"
  40. CrashOnAuditFail="Audit: Shut down system immediately if unable to log security audits"
  41. ;================================ Devices =============================================================================
  42. AllocateDASD="Devices: Allowed to format and eject removable media"
  43. AllocateDASD0="Administrators"
  44. AllocateDASD1="Administrators and Power Users"
  45. AllocateDASD2="Administrators and Interactive Users"
  46. AddPrintDrivers="Devices: Prevent users from installing printer drivers"
  47. AllocateCDRoms="Devices: Restrict CD-ROM access to locally logged-on user only"
  48. AllocateFloppies="Devices: Restrict floppy access to locally logged-on user only"
  49. DriverSigning="Devices: Unsigned driver installation behavior"
  50. DriverSigning0="Silently succeed "
  51. DriverSigning1="Warn but allow installation"
  52. DriverSigning2="Do not allow installation"
  53. UndockWithoutLogon="Devices: Allow undock without having to log on"
  54. ;================================ Domain controller ====================================================================
  55. SubmitControl="Domain controller: Allow server operators to schedule tasks"
  56. RefusePWChange="Domain controller: Refuse machine account password changes"
  57. LDAPServerIntegrity = "Domain controller: LDAP server signing requirements"
  58. LDAPServer1 = "None"
  59. LDAPServer2 = "Require signing"
  60. ;================================ Domain member ========================================================================
  61. DisablePWChange="Domain member: Disable machine account password changes"
  62. MaximumPWAge="Domain member: Maximum machine account password age"
  63. SignOrSeal="Domain member: Digitally encrypt or sign secure channel data (always)"
  64. SealSecureChannel="Domain member: Digitally encrypt secure channel data (when possible)"
  65. SignSecureChannel="Domain member: Digitally sign secure channel data (when possible)"
  66. StrongKey="Domain member: Require strong (Windows 2000 or later) session key"
  67. ;================================ Interactive logon ====================================================================
  68. DisableCAD = "Interactive logon: Do not require CTRL+ALT+DEL"
  69. DontDisplayLastUserName = "Interactive logon: Do not display last user name"
  70. LegalNoticeText = "Interactive logon: Message text for users attempting to log on"
  71. LegalNoticeCaption = "Interactive logon: Message title for users attempting to log on"
  72. CachedLogonsCount = "Interactive logon: Number of previous logons to cache (in case domain controller is not available)"
  73. PasswordExpiryWarning = "Interactive logon: Prompt user to change password before expiration"
  74. ForceUnlockLogon = "Interactive logon: Require Domain Controller authentication to unlock workstation"
  75. ScForceOption = "Interactive logon: Require smart card"
  76. ScRemove = "Interactive logon: Smart card removal behavior"
  77. ScRemove0 = "No Action"
  78. ScRemove1 = "Lock Workstation"
  79. ScRemove2 = "Force Logoff"
  80. ;================================ Microsoft network client =============================================================
  81. RequireSMBSignRdr="Microsoft network client: Digitally sign communications (always)"
  82. EnableSMBSignRdr="Microsoft network client: Digitally sign communications (if server agrees)"
  83. EnablePlainTextPassword="Microsoft network client: Send unencrypted password to third-party SMB servers"
  84. ;================================ Microsoft network server =============================================================
  85. AutoDisconnect="Microsoft network server: Amount of idle time required before suspending session"
  86. RequireSMBSignServer="Microsoft network server: Digitally sign communications (always)"
  87. EnableSMBSignServer="Microsoft network server: Digitally sign communications (if client agrees)"
  88. EnableForcedLogoff="Microsoft network server: Disconnect clients when logon hours expire"
  89. ;================================ Network access =======================================================================
  90. ;Specified in UI code - Network access: Allow anonymous SID/Name translation
  91. DisableDomainCreds = "Network access: Do not allow storage of credentials or .NET Passports for network authentication"
  92. RestrictAnonymousSAM = "Network access: Do not allow anonymous enumeration of SAM accounts"
  93. RestrictAnonymous = "Network access: Do not allow anonymous enumeration of SAM accounts and shares"
  94. EveryoneIncludesAnonymous = "Network access: Let Everyone permissions apply to anonymous users"
  95. RestrictNullSessAccess = "Network access: Restrict anonymous access to Named Pipes and Shares"
  96. NullPipes = "Network access: Named Pipes that can be accessed anonymously"
  97. NullShares = "Network access: Shares that can be accessed anonymously"
  98. AllowedPaths = "Network access: Remotely accessible registry paths and sub-paths"
  99. AllowedExactPaths = "Network access: Remotely accessible registry paths"
  100. ForceGuest = "Network access: Sharing and security model for local accounts"
  101. Classic = "Classic - local users authenticate as themselves"
  102. GuestBased = "Guest only - local users authenticate as Guest"
  103. ;================================ Network security =====================================================================
  104. ;Specified in UI code - Network security: Enforce logon hour restrictions
  105. NoLMHash = "Network security: Do not store LAN Manager hash value on next password change"
  106. LmCompatibilityLevel = "Network security: LAN Manager authentication level"
  107. LMCLevel0 = "Send LM & NTLM responses"
  108. LMCLevel1 = "Send LM & NTLM - use NTLMv2 session security if negotiated"
  109. LMCLevel2 = "Send NTLM response only"
  110. LMCLevel3 = "Send NTLMv2 response only"
  111. LMCLevel4 = "Send NTLMv2 response only\refuse LM"
  112. LMCLevel5 = "Send NTLMv2 response only\refuse LM & NTLM"
  113. NTLMMinClientSec = "Network security: Minimum session security for NTLM SSP based (including secure RPC) clients"
  114. NTLMMinServerSec = "Network security: Minimum session security for NTLM SSP based (including secure RPC) servers"
  115. NTLMIntegrity = "Require message integrity"
  116. NTLMConfidentiality = "Require message confidentiality"
  117. NTLMv2Session = "Require NTLMv2 session security"
  118. NTLM128 = "Require 128-bit encryption"
  119. LDAPClientIntegrity = "Network security: LDAP client signing requirements"
  120. LDAPClient0 = "None"
  121. LDAPClient1 = "Negotiate signing"
  122. LDAPClient2 = "Require signing"
  123. ;================================ Recovery console ====================================================================
  124. RCAdmin="Recovery console: Allow automatic administrative logon"
  125. RCSet="Recovery console: Allow floppy copy and access to all drives and all folders"
  126. ;================================ Shutdown ============================================================================
  127. ShutdownWithoutLogon="Shutdown: Allow system to be shut down without having to log on"
  128. ClearPageFileAtShutdown="Shutdown: Clear virtual memory pagefile"
  129. ProtectionMode = "System objects: Strengthen default permissions of internal system objects (e.g. Symbolic Links)"
  130. NoDefaultAdminOwner = "System objects: Default owner for objects created by members of the Administrators group"
  131. DefaultOwner0 = "Administrators group"
  132. DefaultOwner1 = "Object creator"
  133. ObCaseInsensitive = "System objects: Require case insensitivity for non-Windows subsystems"
  134. ;================================ System cryptography =================================================================
  135. FIPS="System cryptography: Use FIPS compliant algorithms for encryption, hashing, and signing"
  136. ForceHighProtection="System cryptography: Force strong key protection for user keys stored on the computer"
  137. CryptAllowNoUI="User input is not required when new keys are stored and used"
  138. CryptAllowNoPass="User is prompted when the key is first used"
  139. CryptUsePass="User must enter a password each time they use a key"
  140. ;================================ System Settings =====================================================================
  141. AuthenticodeEnabled = "System settings: Use Certificate Rules on Windows Executables for Software Restriction Policies"
  142. OptionalSubSystems = "System settings: Optional subsystems"
  143. Unit-Logons="logons"
  144. Unit-Days="days"
  145. Unit-Minutes="minutes"
  146. Unit-Seconds="seconds"