Leaked source code of windows server 2003
You can not select more than 25 topics Topics must start with a letter or number, can include dashes ('-') and can be up to 35 characters long.

172 lines
8.8 KiB

  1. [Strings]
  2. ;================================ Accounts ============================================================================
  3. ;Specified in UI code - Accounts: Administrator account status
  4. ;Specified in UI code - Accounts: Guest account status
  5. ;Specified in UI code - Accounts: Rename administrator account
  6. ;Specified in UI code - Accounts: Rename guest account
  7. LimitBlankPasswordUse = "Accounts: Limit local account use of blank passwords to console logon only"
  8. ;================================ Audit ===============================================================================
  9. AuditBaseObjects="Audit: Audit the access of global system objects"
  10. FullPrivilegeAuditing="Audit: Audit the use of Backup and Restore privilege"
  11. CrashOnAuditFail="Audit: Shut down system immediately if unable to log security audits"
  12. ;================================ Devices =============================================================================
  13. AllocateDASD="Devices: Allowed to format and eject removable media"
  14. AllocateDASD0="Administrators"
  15. AllocateDASD1="Administrators and Power Users"
  16. AllocateDASD2="Administrators and Interactive Users"
  17. AddPrintDrivers="Devices: Prevent users from installing printer drivers"
  18. AllocateCDRoms="Devices: Restrict CD-ROM access to locally logged-on user only"
  19. AllocateFloppies="Devices: Restrict floppy access to locally logged-on user only"
  20. DriverSigning="Devices: Unsigned driver installation behavior"
  21. DriverSigning0="Silently succeed "
  22. DriverSigning1="Warn but allow installation"
  23. DriverSigning2="Do not allow installation"
  24. UndockWithoutLogon="Devices: Allow undock without having to log on"
  25. ;================================ Domain controller ====================================================================
  26. SubmitControl="Domain controller: Allow server operators to schedule tasks"
  27. RefusePWChange="Domain controller: Refuse machine account password changes"
  28. LDAPServerIntegrity = "Domain controller: LDAP server signing requirements"
  29. LDAPServer1 = "None"
  30. LDAPServer2 = "Require signing"
  31. ;================================ Domain member ========================================================================
  32. DisablePWChange="Domain member: Disable machine account password changes"
  33. MaximumPWAge="Domain member: Maximum machine account password age"
  34. SignOrSeal="Domain member: Digitally encrypt or sign secure channel data (always)"
  35. SealSecureChannel="Domain member: Digitally encrypt secure channel data (when possible)"
  36. SignSecureChannel="Domain member: Digitally sign secure channel data (when possible)"
  37. StrongKey="Domain member: Require strong (Windows 2000 or later) session key"
  38. ;================================ Interactive logon ====================================================================
  39. DisableCAD = "Interactive logon: Do not require CTRL+ALT+DEL"
  40. DontDisplayLastUserName = "Interactive logon: Do not display last user name"
  41. LegalNoticeText = "Interactive logon: Message text for users attempting to log on"
  42. LegalNoticeCaption = "Interactive logon: Message title for users attempting to log on"
  43. CachedLogonsCount = "Interactive logon: Number of previous logons to cache (in case domain controller is not available)"
  44. PasswordExpiryWarning = "Interactive logon: Prompt user to change password before expiration"
  45. ForceUnlockLogon = "Interactive logon: Require Domain Controller authentication to unlock workstation"
  46. ScForceOption = "Interactive logon: Require smart card"
  47. ScRemove = "Interactive logon: Smart card removal behavior"
  48. ScRemove0 = "No Action"
  49. ScRemove1 = "Lock Workstation"
  50. ScRemove2 = "Force Logoff"
  51. ;================================ Microsoft network client =============================================================
  52. RequireSMBSignRdr="Microsoft network client: Digitally sign communications (always)"
  53. EnableSMBSignRdr="Microsoft network client: Digitally sign communications (if server agrees)"
  54. EnablePlainTextPassword="Microsoft network client: Send unencrypted password to third-party SMB servers"
  55. ;================================ Microsoft network server =============================================================
  56. AutoDisconnect="Microsoft network server: Amount of idle time required before suspending session"
  57. RequireSMBSignServer="Microsoft network server: Digitally sign communications (always)"
  58. EnableSMBSignServer="Microsoft network server: Digitally sign communications (if client agrees)"
  59. EnableForcedLogoff="Microsoft network server: Disconnect clients when logon hours expire"
  60. ;================================ Network access =======================================================================
  61. ;Specified in UI code - Network access: Allow anonymous SID/Name translation
  62. DisableDomainCreds = "Network access: Do not allow storage of credentials or .NET Passports for network authentication"
  63. RestrictAnonymousSAM = "Network access: Do not allow anonymous enumeration of SAM accounts"
  64. RestrictAnonymous = "Network access: Do not allow anonymous enumeration of SAM accounts and shares"
  65. EveryoneIncludesAnonymous = "Network access: Let Everyone permissions apply to anonymous users"
  66. RestrictNullSessAccess = "Network access: Restrict anonymous access to Named Pipes and Shares"
  67. NullPipes = "Network access: Named Pipes that can be accessed anonymously"
  68. NullShares = "Network access: Shares that can be accessed anonymously"
  69. AllowedPaths = "Network access: Remotely accessible registry paths and sub-paths"
  70. AllowedExactPaths = "Network access: Remotely accessible registry paths"
  71. ForceGuest = "Network access: Sharing and security model for local accounts"
  72. Classic = "Classic - local users authenticate as themselves"
  73. GuestBased = "Guest only - local users authenticate as Guest"
  74. ;================================ Network security =====================================================================
  75. ;Specified in UI code - Network security: Enforce logon hour restrictions
  76. NoLMHash = "Network security: Do not store LAN Manager hash value on next password change"
  77. LmCompatibilityLevel = "Network security: LAN Manager authentication level"
  78. LMCLevel0 = "Send LM & NTLM responses"
  79. LMCLevel1 = "Send LM & NTLM - use NTLMv2 session security if negotiated"
  80. LMCLevel2 = "Send NTLM response only"
  81. LMCLevel3 = "Send NTLMv2 response only"
  82. LMCLevel4 = "Send NTLMv2 response only\refuse LM"
  83. LMCLevel5 = "Send NTLMv2 response only\refuse LM & NTLM"
  84. NTLMMinClientSec = "Network security: Minimum session security for NTLM SSP based (including secure RPC) clients"
  85. NTLMMinServerSec = "Network security: Minimum session security for NTLM SSP based (including secure RPC) servers"
  86. NTLMIntegrity = "Require message integrity"
  87. NTLMConfidentiality = "Require message confidentiality"
  88. NTLMv2Session = "Require NTLMv2 session security"
  89. NTLM128 = "Require 128-bit encryption"
  90. LDAPClientIntegrity = "Network security: LDAP client signing requirements"
  91. LDAPClient0 = "None"
  92. LDAPClient1 = "Negotiate signing"
  93. LDAPClient2 = "Require signing"
  94. ;================================ Recovery console ====================================================================
  95. RCAdmin="Recovery console: Allow automatic administrative logon"
  96. RCSet="Recovery console: Allow floppy copy and access to all drives and all folders"
  97. ;================================ Shutdown ============================================================================
  98. ShutdownWithoutLogon="Shutdown: Allow system to be shut down without having to log on"
  99. ClearPageFileAtShutdown="Shutdown: Clear virtual memory pagefile"
  100. ProtectionMode = "System objects: Strengthen default permissions of internal system objects (e.g. Symbolic Links)"
  101. NoDefaultAdminOwner = "System objects: Default owner for objects created by members of the Administrators group"
  102. DefaultOwner0 = "Administrators group"
  103. DefaultOwner1 = "Object creator"
  104. ObCaseInsensitive = "System objects: Require case insensitivity for non-Windows subsystems"
  105. ;================================ System cryptography =================================================================
  106. FIPS="System cryptography: Use FIPS compliant algorithms for encryption, hashing, and signing"
  107. ForceHighProtection="System cryptography: Force strong key protection for user keys stored on the computer"
  108. CryptAllowNoUI="User input is not required when new keys are stored and used"
  109. CryptAllowNoPass="User is prompted when the key is first used"
  110. CryptUsePass="User must enter a password each time they use a key"
  111. ;================================ System Settings =====================================================================
  112. AuthenticodeEnabled = "System settings: Use Certificate Rules on Windows Executables for Software Restriction Policies"
  113. OptionalSubSystems = "System settings: Optional subsystems"
  114. Unit-Logons="logons"
  115. Unit-Days="days"
  116. Unit-Minutes="minutes"
  117. Unit-Seconds="seconds"