Source code of Windows XP (NT5)
You can not select more than 25 topics Topics must start with a letter or number, can include dashes ('-') and can be up to 35 characters long.

252 lines
36 KiB

  1. {\rtf1\ansi \deff9\deflang1033{\fonttbl{\f3\fmodern\fcharset0\fprq1 Courier;}{\f5\fswiss\fcharset0\fprq2 Arial;}{\f9\fswiss\fcharset0\fprq2 Helvetica;}}{\colortbl;\red0\green0\blue0;\red0\green0\blue255;
  2. \red0\green255\blue255;\red0\green255\blue0;\red255\green0\blue255;\red255\green0\blue0;\red255\green255\blue0;\red255\green255\blue255;\red0\green0\blue128;\red0\green128\blue128;\red0\green128\blue0;\red128\green0\blue128;\red128\green0\blue0;
  3. \red128\green128\blue0;\red128\green128\blue128;\red192\green192\blue192;}{\stylesheet{\li120\sb80\sl-240\slmult1\nowidctlpar \f9\fs20 \snext0 Normal;}{\s1\li120\sb280\sa120\sl-320\slmult1\nowidctlpar \b\f9 \sbasedon0\snext15 heading 1;}{
  4. \s2\li120\sb120\sa60\sl-240\slmult1\nowidctlpar \b\f9\fs20 \sbasedon0\snext0 heading 2;}{\s3\li120\sb120\sa60\sl-240\slmult1\nowidctlpar \f9\fs20 \sbasedon0\snext0 heading 3;}{\*\cs10 \additive Default Paragraph Font;}{\s15\li120\sl-240\slmult1
  5. \nowidctlpar \f9\fs20 \snext0 Normal 2;}{\*\cs16 \additive\v \sbasedon10 Context String;}{\*\cs17 \additive\fs18\up6 \sbasedon10 footnote reference;}{\s18\li120\sb80\sl-240\slmult1\nowidctlpar \f9\fs20 \sbasedon0\snext0 footnote text;}{
  6. \s19\li360\sb80\sl-240\slmult1\nowidctlpar \f9\fs20 \sbasedon0\snext0 Normal Indent;}{\s20\fi-240\li600\sb60\sl-240\slmult1\nowidctlpar \f9\fs20 \snext20 Jli;}{\s21\li120\sb60\sl-240\slmult1\keep\nowidctlpar\tx520\tx920\tx1320\tx1720\tx2120 \f3\fs16
  7. \snext21 Ex;}{\s22\li120\sb160\sl-240\slmult1\nowidctlpar \f9\fs20 \snext23 Sa1;}{\s23\fi-240\li360\sb60\sl-240\slmult1\nowidctlpar \f9\fs20 \snext23 Jl;}{\s24\fi-240\li360\sl-240\slmult1\nowidctlpar\tx360 \f9\fs20 \snext25 Lb1;}{
  8. \s25\fi-240\li360\sb60\sl-240\slmult1\nowidctlpar\tx360 \f9\fs20 \snext25 Lb2;}{\s26\li360\sb60\sl-240\slmult1\nowidctlpar \f9\fs20 \snext25 Lp1;}{\s27\fi-1800\li1920\sb120\sa40\sl-240\slmult1\nowidctlpar\brdrb\brdrs\brdrw15\brsp20 \brdrbtw
  9. \brdrs\brdrw15\brsp20 \tx1920 \b\f9\fs20 \snext28 Th;}{\s28\fi-1800\li1920\sb60\sl-240\slmult1\nowidctlpar\tx1920 \f9\fs20 \snext28 Tp;}{\s29\li120\sb120\sa120\nowidctlpar \f9\fs20 \snext0 bitmap;}{\s30\li120\sb120\sl-240\slmult1\nowidctlpar \f9\fs20
  10. \snext23 Sa2;}{\s31\li120\sb80\sl-240\slmult1\nowidctlpar \f9\fs20\uldb \sbasedon0\snext31 Jump Text;}{\s32\nowidctlpar \f5\fs20\ul \sbasedon31\snext32 Popup Text;}{\s33\sb240\sa60\nowidctlpar \b\f5\fs28\kerning28 \sbasedon1\snext0 Heading 1p;}}{\info
  11. {\author Bob Watson}{\creatim\yr1994\mo10\dy24\hr9\min8}{\version1}{\edmins29}{\nofpages0}{\nofwords0}{\nofchars0}{\vern49221}}\widowctrl\ftnbj\aenddoc\noextrasprl\prcolbl\cvmme\sprsspbf\brkfrm\swpbdr\hyphcaps0 \fet0\sectd \linex0 {\*\pnseclvl1
  12. \pnucrm\pnstart1\pnindent720\pnhang{\pntxta .}}{\*\pnseclvl2\pnucltr\pnstart1\pnindent720\pnhang{\pntxta .}}{\*\pnseclvl3\pndec\pnstart1\pnindent720\pnhang{\pntxta .}}{\*\pnseclvl4\pnlcltr\pnstart1\pnindent720\pnhang{\pntxta )}}{\*\pnseclvl5
  13. \pndec\pnstart1\pnindent720\pnhang{\pntxtb (}{\pntxta )}}{\*\pnseclvl6\pnlcltr\pnstart1\pnindent720\pnhang{\pntxtb (}{\pntxta )}}{\*\pnseclvl7\pnlcrm\pnstart1\pnindent720\pnhang{\pntxtb (}{\pntxta )}}{\*\pnseclvl8\pnlcltr\pnstart1\pnindent720\pnhang
  14. {\pntxtb (}{\pntxta )}}{\*\pnseclvl9\pnlcrm\pnstart1\pnindent720\pnhang{\pntxtb (}{\pntxta )}}\pard\plain \s1\li115\sb280\sa120\sl-320\slmult1\keepn\widctlpar \b\f9 {\cs17\fs18\up6 #{\footnote \pard\plain \s18\li120\sb80\sl-240\slmult1\widctlpar \f9\fs20
  15. {\cs17\fs18\up6 #} IDH_FILE_SYSTEMS}} {\cs17\up6 ${\footnote \pard\plain \li120\sb80\sl-240\slmult1\widctlpar \f9\fs20 {\cs17\b\fs18\up6 $}{\b File Systems}}} {\cs17\up6 K{\footnote \pard\plain \li120\sb80\sl-240\slmult1\widctlpar \f9\fs20 {
  16. \cs17\b\fs18\up6 K}{\b File Systems}}} File Systems
  17. \par \pard\plain \s15\li120\sl-240\slmult1\widctlpar \f9\fs20 {\b\i Required for C2 Level Security
  18. \par }\pard\plain \li120\sb80\sl-240\slmult1\widctlpar \f9\fs20
  19. Under Windows NT, only the NT File System (NTFS) supports Discretionary Access Control to the files and directories. Consequently, only NTFS volumes are allowed on the system to provide secure and auditable
  20. access to the files. FAT volumes do not provide the necessary security functions to support C2 Level security.
  21. \par
  22. \par \pard\plain \s32\nowidctlpar \f5\fs20\ul File Systems Dialog{\v IDH_FILE_SYSTEM_DIALOG}
  23. \par \pard\plain \s1\li120\sb280\sa120\sl-320\slmult1\widctlpar \b\f9 \page {\cs17\fs18\up6 #{\footnote \pard\plain \s18\li120\sb80\sl-240\slmult1\widctlpar \f9\fs20 {\cs17\fs18\up6 #} IDH_OS_CONFIGURATION}} {\cs17\fs18\up6 ${\footnote \pard\plain
  24. \s18\li120\sb80\sl-240\slmult1\widctlpar \f9\fs20 {\cs17\fs18\up6 $} OS Configuration}} {\cs17\fs18\up6 K{\footnote \pard\plain \s18\li120\sb80\sl-240\slmult1\widctlpar \f9\fs20 {\cs17\fs18\up6 K} OS Configuration}} OS Configuration
  25. \par \pard\plain \s15\li120\sl-240\slmult1\widctlpar \f9\fs20 {\b\i Required for C2 Level Security
  26. \par }\pard\plain \li120\sb80\sl-240\slmult1\widctlpar \f9\fs20
  27. Allowing other operating systems, such as MS-DOS to run on a secure system, can allow users to circumvent Windows NT security. For a system to support C2 level security, Windows NT must be the only operating system on the computer.
  28. \par
  29. \par \pard\plain \s32\nowidctlpar \f5\fs20\ul Operating Systems Dialog{\v IDH_OPERATING_SYSTEM_DIALOG}
  30. \par \pard\plain \s1\li120\sb280\sa120\sl-320\slmult1\widctlpar \b\f9 \page {\cs17\fs18\up6 #{\footnote \pard\plain \s18\li120\sb80\sl-240\slmult1\widctlpar \f9\fs20 {\cs17\fs18\up6 #} IDH_OS2_SUBSYSTEM}} {\cs17\fs18\up6 ${\footnote \pard\plain
  31. \s18\li120\sb80\sl-240\slmult1\widctlpar \f9\fs20 {\cs17\fs18\up6 $} OS/2 Subsystem}} {\cs17\fs18\up6 K{\footnote \pard\plain \s18\li120\sb80\sl-240\slmult1\widctlpar \f9\fs20 {\cs17\fs18\up6 K} OS/2 Subsystem}} OS/2 Subsystem
  32. \par \pard\plain \s15\li120\sl-240\slmult1\widctlpar \f9\fs20 {\b\i Required for C2 Level Security
  33. \par }\pard\plain \li120\sb80\sl-240\slmult1\widctlpar \f9\fs20
  34. The OS/2 subsystem was not included in the current NCSC C2 evaluated configuration. For your system to conform to the evaluated configuration, the OS/2 system must be disabled. The C2Configuration manager disables the OS/2 subsystem by deleting the follow
  35. ing files from the SYSTEM32 directory under the systemroot:
  36. \par
  37. \par \tab OS2.EXE
  38. \par \tab OS2SS.EXE
  39. \par
  40. \par To restore the OS/2 subsystem to your computer, these files must be copied from the CD or Floppy disk to the SYSTEM32 directory under the system root using the {\b copy} or {\b expand} command.
  41. \par \pard\plain \s1\li120\sb280\sa120\sl-320\slmult1\widctlpar \b\f9 \page {\cs17\fs18\up6 #{\footnote \pard\plain \s18\li120\sb80\sl-240\slmult1\widctlpar \f9\fs20 {\cs17\fs18\up6 #} IDH_POSIX_SUBSYSTEM}} {\cs17\fs18\up6 ${\footnote \pard\plain
  42. \s18\li120\sb80\sl-240\slmult1\widctlpar \f9\fs20 {\cs17\fs18\up6 $} Posix Subsystem}} {\cs17\fs18\up6 K{\footnote \pard\plain \s18\li120\sb80\sl-240\slmult1\widctlpar \f9\fs20 {\cs17\fs18\up6 K} Posix Subsystem}} Posix Subsystem
  43. \par \pard\plain \s15\li120\sl-240\slmult1\widctlpar \f9\fs20 {\b\i Required for C2 Level Security
  44. \par }\pard\plain \li120\sb80\sl-240\slmult1\widctlpar \f9\fs20
  45. The Posix subsystem was not included in the current NCSC C2 evaluated configuration. For your system to conform to the evaluated configuration, the Posix system must be disabled. The C2Configuration manager disables the Posix subsystem by deleting the fol
  46. lowing file from the SYSTEM32 directory under the systemroot:
  47. \par
  48. \par \tab PSXSS.EXE
  49. \par \pard \li120\sb80\sl-240\slmult1\nowidctlpar
  50. \par \pard \li120\sb80\sl-240\slmult1\widctlpar To restore the Posix subsystem to your computer, this file must be copied from the CD or Floppy disk to the SYSTEM32 directory under the system root using the {\b copy} or {\b expand} command.
  51. \par \pard\plain \s1\li120\sb280\sa120\sl-320\slmult1\widctlpar \b\f9 \page {\cs17\fs18\up6 #{\footnote \pard\plain \s18\li120\sb80\sl-240\slmult1\widctlpar \f9\fs20 {\cs17\fs18\up6 #} IDH_SECURITY_LOG}} {\cs17\fs18\up6 ${\footnote \pard\plain
  52. \s18\li120\sb80\sl-240\slmult1\widctlpar \f9\fs20 {\cs17\fs18\up6 $} Security Log}} {\cs17\fs18\up6 K{\footnote \pard\plain \s18\li120\sb80\sl-240\slmult1\widctlpar \f9\fs20 {\cs17\fs18\up6 K} Security Log}} Security Log
  53. \par \pard\plain \s15\li120\sl-240\slmult1\widctlpar \f9\fs20 {\b\i Required for C2 Level Security}
  54. \par
  55. \par \pard\plain \li120\sb80\sl-240\slmult1\widctlpar \f9\fs20
  56. C2 Level security requires that a security audit log be maintained and events in the log may not be automatically overwritten. For systems that do not require C2 Level security, other logging options may be selected such as to overwrite events that are ol
  57. der than a certain age, or when the log is full.
  58. \par
  59. \par \pard\plain \s32\nowidctlpar \f5\fs20\ul Security Log Settings Dialog {\v IDH_SECURITY_LOG_DIALOG}
  60. \par \pard\plain \s1\li120\sb280\sa120\sl-320\slmult1\widctlpar \b\f9 \page {\cs17\fs18\up6 #{\footnote \pard\plain \s18\li120\sb80\sl-240\slmult1\widctlpar \f9\fs20 {\cs17\fs18\up6 #} IDH_HALT_ON_AUDIT_FAILURE}} {\cs17\fs18\up6 ${\footnote \pard\plain
  61. \s18\li120\sb80\sl-240\slmult1\widctlpar \f9\fs20 {\cs17\fs18\up6 $} Halt on Audit Failure}} {\cs17\fs18\up6 K{\footnote \pard\plain \s18\li120\sb80\sl-240\slmult1\widctlpar \f9\fs20 {\cs17\fs18\up6 K} Halt on Audit Failure}} Halt on Audit Failure
  62. \par \pard\plain \s15\li120\sl-240\slmult1\widctlpar \f9\fs20
  63. If the security log is full, it becomes possible for some events to not get logged. Selecting this option will halt the computer when the log is full to prevent losing any events. If the system halts as a result of a full log, an administrator must restar
  64. t the system and reset the log.
  65. \par \pard\plain \li120\sb80\sl-240\slmult1\widctlpar \f9\fs20
  66. \par \pard\plain \s32\nowidctlpar \f5\fs20\ul Audit Failure Settings Dialog {\v IDH_AUDIT_FAILURE_DIALOG}
  67. \par \pard\plain \s1\li120\sb280\sa120\sl-320\slmult1\widctlpar \b\f9 \page {\cs17\fs18\up6 #{\footnote \pard\plain \s18\li120\sb80\sl-240\slmult1\widctlpar \f9\fs20 {\cs17\fs18\up6 #} IDH_DISPLAY_LOGON_MESSAGE}} {\cs17\fs18\up6 ${\footnote \pard\plain
  68. \s18\li120\sb80\sl-240\slmult1\widctlpar \f9\fs20 {\cs17\fs18\up6 $} Display Logon Message}} {\cs17\fs18\up6 K{\footnote \pard\plain \s18\li120\sb80\sl-240\slmult1\widctlpar \f9\fs20 {\cs17\fs18\up6 K} Display Logon Message}} Display Logon Message
  69. \par \pard\plain \s15\li120\sl-240\slmult1\widctlpar \f9\fs20 On a secured system, a warning message may be displayed before the user is allowed to log on. Typically this mess
  70. age will inform the user that the system is for authorized users only and that unauthorized is considered trespass or is unwelcome.
  71. \par \pard\plain \li120\sb80\sl-240\slmult1\widctlpar \f9\fs20
  72. \par On the other hand, if the system is in use in a public forum, this message may be used to inform the user of current events or how to log on to the system.
  73. \par
  74. \par \pard\plain \s32\nowidctlpar \f5\fs20\ul Logon Message Dialog {\v IDH_LOGON_MESSAGE_DIALOG}
  75. \par \pard\plain \s1\li120\sb280\sa120\sl-320\slmult1\widctlpar \b\f9 \page {\cs17\fs18\up6 #{\footnote \pard\plain \s18\li120\sb80\sl-240\slmult1\widctlpar \f9\fs20 {\cs17\fs18\up6 #} IDH_LAST_USERNAME_DISPLAY}} {\cs17\fs18\up6 ${\footnote \pard\plain
  76. \s18\li120\sb80\sl-240\slmult1\widctlpar \f9\fs20 {\cs17\fs18\up6 $} Last Username Display}} {\cs17\fs18\up6 K{\footnote \pard\plain \s18\li120\sb80\sl-240\slmult1\widctlpar \f9\fs20 {\cs17\fs18\up6 K} Last Username Display}} Last Username Display
  77. \par \pard\plain \s15\li120\sl-240\slmult1\widctlpar \f9\fs20 Displaying the name of the last user can make logging in more convenient, however, hiding the name of the last user can prevent usernames from bei
  78. ng accidentally discovered and subsequently used to break in to the system. This option allows the last username to be hidden when the logon screen is displayed.
  79. \par \pard\plain \li120\sb80\sl-240\slmult1\widctlpar \f9\fs20
  80. \par \pard\plain \s32\nowidctlpar \f5\fs20\ul Last Username Display Dialog {\v IDH_LAST_USERNAME_DIALOG}
  81. \par \pard\plain \s1\li120\sb280\sa120\sl-320\slmult1\widctlpar \b\f9 \page {\cs17\fs18\up6 #{\footnote \pard\plain \s18\li120\sb80\sl-240\slmult1\widctlpar \f9\fs20 {\cs17\fs18\up6 #} IDH_SHUTDOWN_BUTTON}}{\cs16 }{\cs17\fs18\up6 ${\footnote \pard\plain
  82. \s18\li120\sb80\sl-240\slmult1\widctlpar \f9\fs20 {\cs17\fs18\up6 $} {\cs16 Shutdown Button}}}{\cs16 }{\cs17\fs18\up6 K{\footnote \pard\plain \s18\li120\sb80\sl-240\slmult1\widctlpar \f9\fs20 {\cs17\fs18\up6 K} {\cs16 Shutdown Button}}}{\cs16
  83. Shutdown Button
  84. \par }\pard\plain \s15\li120\sl-240\slmult1\widctlpar \f9\fs20 {\cs16 Hiding the \ldblquote Shutdown\rdblquote
  85. button from the logon screen prevents users from shutting the system down without first logging on to the computer. This option should only be selected if the power switch and reset button is not accessible by the user. Even though the shutdown butto
  86. n may be hidden, if the user has access to either the reset button or the power switch, they may still turn the system off without properly shutting down the operating system.
  87. \par }\pard\plain \li120\sb80\sl-240\slmult1\widctlpar \f9\fs20 {\cs16
  88. \par }\pard\plain \s32\nowidctlpar \f5\fs20\ul {\cs16 Shutdown Button Dialog} {\v IDH_SHUTDOWN_BUTTON_DIALOG}{\cs16
  89. \par }\pard\plain \s1\li120\sb280\sa120\sl-320\slmult1\widctlpar \b\f9 {\cs16 \page }{\cs17\fs18\up6 #{\footnote \pard\plain \s18\li120\sb80\sl-240\slmult1\widctlpar \f9\fs20 {\cs17\fs18\up6 #} IDH_PASSWORD_LENGTH}}{\cs16 }{\cs17\fs18\up6 ${\footnote
  90. \pard\plain \s18\li120\sb80\sl-240\slmult1\widctlpar \f9\fs20 {\cs17\fs18\up6 $} {\cs16 Password Length}}}{\cs16 }{\cs17\fs18\up6 K{\footnote \pard\plain \s18\li120\sb80\sl-240\slmult1\widctlpar \f9\fs20 {\cs17\fs18\up6 K} Password Length}}{\cs16
  91. Password Length
  92. \par }\pard\plain \s15\li120\sl-240\slmult1\widctlpar \f9\fs20 {\b\i Required for C2 Level Security
  93. \par }\pard\plain \li120\sb80\sl-240\slmult1\widctlpar \f9\fs20
  94. The longer the password, the less likely it will be discovered randomly, or deliberately by an intruder. C2 Level Security does not allow Blank Passwords. Using this item, the desired password policy can be selected.
  95. \par
  96. \par NOTE: Changing this setting will not affect passwords already defined in the system.
  97. \par
  98. \par \pard\plain \s32\nowidctlpar \f5\fs20\ul Password Length Dialog {\v IDH_PASSWORD_LENGTH_DIALOG}
  99. \par \pard\plain \s1\li120\sb280\sa120\sl-320\slmult1\widctlpar \b\f9 {\cs16 \page }{\cs17\fs18\up6 #{\footnote \pard\plain \s18\li120\sb80\sl-240\slmult1\widctlpar \f9\fs20 {\cs17\fs18\up6 #} IDH_GUEST_ACCOUNT}}{\cs16 }{\cs17\fs18\up6 ${\footnote
  100. \pard\plain \s18\li120\sb80\sl-240\slmult1\widctlpar \f9\fs20 {\cs17\fs18\up6 $} {\cs16 Guest Account}}}{\cs16 }{\cs17\fs18\up6 K{\footnote \pard\plain \s18\li120\sb80\sl-240\slmult1\widctlpar \f9\fs20 {\cs17\fs18\up6 K} Guest Account}}{\cs16
  101. Guest Account
  102. \par }\pard\plain \s15\li120\sl-240\slmult1\widctlpar \f9\fs20 {\b\i Required for C2 Level Security
  103. \par }
  104. The Guest account allows anonymous and therefore unauditable access to the system and its files. C2 Level security does not allow for anonymous access to the system and therefore requires that Guest accounts be disabled or deleted from the system. When th
  105. is item is selected, the C2 Configuration manager disables all Guest accounts.
  106. \par \pard\plain \li120\sb80\sl-240\slmult1\widctlpar \f9\fs20 {\cs16
  107. \par }\pard\plain \s32\nowidctlpar \f5\fs20\ul {\cs16 Guest Account Dialog }{\cs16\v IDH_GUEST_ACCOUNT_DIALOG}{\cs16
  108. \par }\pard\plain \s1\li120\sb280\sa120\sl-320\slmult1\widctlpar \b\f9 {\cs16 \page }{\cs17\fs18\up6 #{\footnote \pard\plain \s18\li120\sb80\sl-240\slmult1\widctlpar \f9\fs20 {\cs17\fs18\up6 #} IDH_NETWORKING}}{\cs16 }{\cs17\fs18\up6 ${\footnote \pard\plain
  109. \s18\li120\sb80\sl-240\slmult1\widctlpar \f9\fs20 {\cs17\fs18\up6 $} {\cs16 Networking}}}{\cs16 }{\cs17\fs18\up6 K{\footnote \pard\plain \s18\li120\sb80\sl-240\slmult1\widctlpar \f9\fs20 {\cs17\fs18\up6 K} Networking}}{\cs16 Networking
  110. \par }\pard\plain \s15\li120\sl-240\slmult1\widctlpar \f9\fs20 {\b\i Required for C2 Level Security
  111. \par }\pard\plain \li120\sb80\sl-240\slmult1\widctlpar \f9\fs20
  112. Windows NT networking services were not included in the NCSC C2 evaluated configuration. For your system to conform to the evaluated configuration, the network services must be removed or disabled.
  113. \par \pard\plain \s1\li120\sb280\sa120\sl-320\slmult1\widctlpar \b\f9 \page {\cs17\fs18\up6 #{\footnote \pard\plain \s18\li120\sb80\sl-240\slmult1\widctlpar \f9\fs20 {\cs17\fs18\up6 #} IDH_DRIVE_LETTER_AND_PRINT}}{\cs16 }{\cs17\fs18\up6 ${\footnote
  114. \pard\plain \s18\li120\sb80\sl-240\slmult1\widctlpar \f9\fs20 {\cs17\fs18\up6 $} Drive Letters & Printers}}{\cs16 }{\cs17\fs18\up6 K{\footnote \pard\plain \s18\li120\sb80\sl-240\slmult1\widctlpar \f9\fs20 {\cs17\fs18\up6 K} Drive Letters & Printers}}{
  115. \cs16 Drive Letters & Printers
  116. \par }\pard\plain \s15\li120\sl-240\slmult1\widctlpar \f9\fs20 {\cs16 To prevent redirection of data to a device or port that may not be authorized, the assignment of drive letters and printer ports can be restricted to administrators only.
  117. \par }\pard\plain \li120\sb80\sl-240\slmult1\widctlpar \f9\fs20 {\cs16
  118. \par }\pard\plain \s32\nowidctlpar \f5\fs20\ul {\cs16 Drives and Printers Dialog} {\v IDH_DRIVES_AND_PRINTERS_DIALOG}{\cs16
  119. \par }\pard\plain \s1\li120\sb280\sa120\sl-320\slmult1\widctlpar \b\f9 {\cs16 \page }{\cs17\fs18\up6 #{\footnote \pard\plain \s18\li120\sb80\sl-240\slmult1\widctlpar \f9\fs20 {\cs17\fs18\up6 #} IDH_ALLOCATE_DRIVES}}{\cs16 }{\cs17\fs18\up6 ${\footnote
  120. \pard\plain \s18\li120\sb80\sl-240\slmult1\widctlpar \f9\fs20 {\cs17\fs18\up6 $} Removable Media Drives}}{\cs16 }{\cs17\fs18\up6 K{\footnote \pard\plain \s18\li120\sb80\sl-240\slmult1\widctlpar \f9\fs20 {\cs17\fs18\up6 K} Removable Media Drives}}{\cs16
  121. Removable Media Drives
  122. \par }\pard\plain \s15\li120\sl-240\slmult1\widctlpar \f9\fs20 {\cs16
  123. Since Windows NT is a multi-user system and programs run by other users may be running in the background while a user is logged on. It is possible to prevent programs run by other users from accessing disks in removable media drives that may have been ins
  124. erted while a user is logged on by allocating these drives automatically when a user logs on.
  125. \par }\pard\plain \li120\sb80\sl-240\slmult1\widctlpar \f9\fs20 {\cs16
  126. \par }\pard\plain \s32\nowidctlpar \f5\fs20\ul {\cs16 Allocate Removable Drives} {\v IDH_ALLOCATE_REMOVABLE_DRIVES_DIALOG}{\cs16
  127. \par }\pard\plain \s1\li120\sb280\sa120\sl-320\slmult1\widctlpar \b\f9 {\cs16 \page }{\cs17\fs18\up6 #{\footnote \pard\plain \s18\li120\sb80\sl-240\slmult1\widctlpar \f9\fs20 {\cs17\fs18\up6 #} IDH_OTHER_SECURITY_ITEMS}}{\cs16 }{\cs17\fs18\up6 ${\footnote
  128. \pard\plain \s18\li120\sb80\sl-240\slmult1\widctlpar \f9\fs20 {\cs17\fs18\up6 $} Other Security Items}}{\cs16 }{\cs17\fs18\up6 K{\footnote \pard\plain \s18\li120\sb80\sl-240\slmult1\widctlpar \f9\fs20 {\cs17\fs18\up6 K} Other Security Items}}{\cs16
  129. Other Security Items
  130. \par }\pard\plain \s15\li120\sl-240\slmult1\nowidctlpar \f9\fs20 {\cs16
  131. C2Config is not able to detect nor set all aspects of a Windows NT system in order to make it conform to C2 Level Security. This dialog lists the items that C2Config is not able to detect and set and provides references to where additional information may
  132. be found on thc configuration of these items.
  133. \par }\pard\plain \s32\nowidctlpar \f5\fs20\ul {\cs16 Power On Password }{\cs16\v IDH_POWER_ON_PASSWORD}{\cs16
  134. \par Secure System Partition }{\cs16\v IDH_SECURE_SYSTEM_PARTITION}{\cs16
  135. \par Change User Manager Program Item }{\cs16\v IDH_CHANGE_USER_MANAGER_ICON}{\cs16
  136. \par Restrict Use of User Rights }{\cs16\v IDH_RESTRICT_USE_OF_USER_RIGHTS}{\cs16
  137. \par }\pard\plain \s1\li120\sb280\sa120\sl-320\slmult1\widctlpar \b\f9 {\cs16 \page }{\cs17\fs18\up6 #{\footnote \pard\plain \s18\li120\sb80\sl-240\slmult1\widctlpar \f9\fs20 {\cs17\fs18\up6 #} IDH_POWER_ON_PASSWORD}}{\cs16 }{\cs17\fs18\up6 ${\footnote
  138. \pard\plain \s18\li120\sb80\sl-240\slmult1\widctlpar \f9\fs20 {\cs17\fs18\up6 $} Power On Password}}{\cs16 }{\cs17\fs18\up6 K{\footnote \pard\plain \s18\li120\sb80\sl-240\slmult1\widctlpar \f9\fs20 {\cs17\fs18\up6 K} Power On Password}}{\cs16
  139. Power On Password
  140. \par }\pard\plain \s15\li120\sl-240\slmult1\nowidctlpar \f9\fs20 {\cs16 The Power On password requires the user to enter a password before the system starts. Refer to the computer system\rquote s documentation for information on setting the system\rquote
  141. s power-on password.
  142. \par }\pard\plain \s1\li120\sb280\sa120\sl-320\slmult1\widctlpar \b\f9 {\cs16 \page }{\cs17\fs18\up6 #{\footnote \pard\plain \s18\li120\sb80\sl-240\slmult1\widctlpar \f9\fs20 {\cs17\fs18\up6 #} IDH_SECURE_SYSTEM_PARTITION}}{\cs16 }{\cs17\fs18\up6 ${\footnote
  143. \pard\plain \s18\li120\sb80\sl-240\slmult1\widctlpar \f9\fs20 {\cs17\fs18\up6 $} Secure System Partition}}{\cs16 }{\cs17\fs18\up6 K{\footnote \pard\plain \s18\li120\sb80\sl-240\slmult1\widctlpar \f9\fs20 {\cs17\fs18\up6 K} Secure System Partition}}{
  144. \cs16 Secure System Partition
  145. \par }\pard\plain \s15\li120\sl-240\slmult1\nowidctlpar \f9\fs20 On a RISC computer, start Disk Administrator and select Secure System Partition from the Partition Menu. This ensures that only users logged on as members of the Administrators g
  146. roup can access files on the system partition.
  147. \par \pard\plain \li120\sb80\sl-240\slmult1\nowidctlpar \f9\fs20 {\cs16
  148. \par }{\cs16\b Note: this is only required on RISC computer systems.
  149. \par }\pard\plain \s1\li120\sb280\sa120\sl-320\slmult1\widctlpar \b\f9 {\cs16 \page }{\cs17\fs18\up6 #{\footnote \pard\plain \s18\li120\sb80\sl-240\slmult1\widctlpar \f9\fs20 {\cs17\fs18\up6 #} IDH_CHANGE_USER_MANAGER_ICON}}{\cs16 }{\cs17\fs18\up6 $
  150. {\footnote \pard\plain \s18\li120\sb80\sl-240\slmult1\widctlpar \f9\fs20 {\cs17\fs18\up6 $} Change User Manager Program Icon}}{\cs16 }{\cs17\fs18\up6 K{\footnote \pard\plain \s18\li120\sb80\sl-240\slmult1\widctlpar \f9\fs20 {\cs17\fs18\up6 K}
  151. Change User Manager Program Icon}}{\cs16 Change User Manager Program Icon
  152. \par }\pard\plain \s15\li120\sl-240\slmult1\nowidctlpar \f9\fs20 If you are setting up Windows\~NT Server, remove the User Manager For Domains program item and add the User Manager program item as described in the \ldblquote Program Manager\rdblquote
  153. chapter of the Windows\~NT Workstation or Windows\~NT Server {\i System} {\i Guide}. The name of the executable file for User Manager is {\b MUSRMGR.EXE.}{\cs16
  154. \par }\pard\plain \s1\li120\sb280\sa120\sl-320\slmult1\widctlpar \b\f9 {\cs16 \page }{\cs17\fs18\up6 #{\footnote \pard\plain \s18\li120\sb80\sl-240\slmult1\widctlpar \f9\fs20 {\cs17\fs18\up6 #} IDH_RESTRICT_USE_OF_USER_RIGHTS}}{\cs16 }{\cs17\fs18\up6 $
  155. {\footnote \pard\plain \s18\li120\sb80\sl-240\slmult1\widctlpar \f9\fs20 {\cs17\fs18\up6 $} Restrict Use of User Rights}}{\cs16 }{\cs17\fs18\up6 K{\footnote \pard\plain \s18\li120\sb80\sl-240\slmult1\widctlpar \f9\fs20 {\cs17\fs18\up6 K}
  156. Restrict Use of User Rights}}{\cs16 Restrict Use of User Rights
  157. \par }\pard\plain \s15\li120\sl-240\slmult1\nowidctlpar \f9\fs20 This is managed and configured by the User Manager program and is described in the \ldblquote User Manager\rdblquote chapter of the Windows\~NT Workstation or Windows\~NT Server {\i System Guide
  158. }. Rights should be limited as described in the {\i Windows NT C2 Security System Administrator\rquote s Guide}.{\cs16
  159. \par }\pard\plain \s1\li120\sb280\sa120\sl-320\slmult1\widctlpar \b\f9 {\cs16 \page }{\cs17\fs18\up6 #{\footnote \pard\plain \s18\li120\sb80\sl-240\slmult1\widctlpar \f9\fs20 {\cs17\fs18\up6 #} IDH_FILE_SYSTEM_DIALOG}}{\cs16 }{\cs17\fs18\up6 ${\footnote
  160. \pard\plain \s18\li120\sb80\sl-240\slmult1\widctlpar \f9\fs20 {\cs17\fs18\up6 $} File System {\cs16 Dialog}}}{\cs16 }{\cs17\fs18\up6 K{\footnote \pard\plain \s18\li120\sb80\sl-240\slmult1\widctlpar \f9\fs20 {\cs17\fs18\up6 K} File System Dialog}}{\cs16
  161. File System Dialog
  162. \par }\pard\plain \s15\li120\sl-240\slmult1\widctlpar \f9\fs20 {\b\i Required for C2 Level Security}
  163. \par \pard \s15\li120\sl-240\slmult1\widctlpar {\cs16
  164. \par }\pard\plain \li120\sb80\sl-240\slmult1\widctlpar \f9\fs20 {\cs16 The status of the disk volumes on the system is displayed in the list box. For Windows NT to support C2 Level security all disk volumes must use the NTFS file system.
  165. \par }\pard \li120\sb80\sl-240\slmult1\widctlpar {\cs16 To convert a volume to the NTFS file system, select the volume in the list box (multiple volumes can be selected by holding the shift key while selecting).
  166. \par }\pard \li120\sb80\sl-240\slmult1\widctlpar {\cs16 Selecting the C2 button will select all non-NTFS volumes for conversion.
  167. \par
  168. \par }\pard \li120\sb80\sl-240\slmult1\widctlpar {\cs16 NOTE: selecting a non-NTFS disk for conversion will NOT convert the disk immediately, rather it will schedule the disk for conversion the next time the system is shutdown and restarted.
  169. \par }\pard\plain \s1\li120\sb280\sa120\sl-320\slmult1\widctlpar \b\f9 {\cs16 \page }{\cs17\fs18\up6 #{\footnote \pard\plain \s18\li120\sb80\sl-240\slmult1\widctlpar \f9\fs20 {\cs17\fs18\up6 #} IDH_OPERATING_SYSTEM_DIALOG}}{\cs16 }{\cs17\fs18\up6 ${\footnote
  170. \pard\plain \s18\li120\sb80\sl-240\slmult1\widctlpar \f9\fs20 {\cs17\fs18\up6 $} Operating System {\cs16 Dialog}}}{\cs16 }{\cs17\fs18\up6 K{\footnote \pard\plain \s18\li120\sb80\sl-240\slmult1\widctlpar \f9\fs20 {\cs17\fs18\up6 K} Operating System Dialog
  171. }}{\cs16 Operating System Dialog
  172. \par }\pard\plain \s15\li120\sl-240\slmult1\widctlpar \f9\fs20 {\b\i Required for C2 Level Security}
  173. \par \pard \s15\li120\sl-240\slmult1\widctlpar {\cs16
  174. \par }\pard\plain \li120\sb80\sl-240\slmult1\widctlpar \f9\fs20 {\cs16
  175. The non-Windows NT operating systems are listed in the list box. Selecting items displayed in the list box will cause the C2 Configuration Manager to change that item to the value that supports C2 Level Security.
  176. \par }\pard \li120\sb80\sl-240\slmult1\widctlpar {\cs16 Selecting the C2 button will select all items in the list box.
  177. \par
  178. \par }\pard \li120\sb80\sl-240\slmult1\widctlpar {\cs16 The changes selected in this list box are made immediately after the OK button is selected, however they will not take effect until the system is restarted.
  179. \par }\pard\plain \s1\li120\sb280\sa120\sl-320\slmult1\widctlpar \b\f9 {\cs16 \page }{\cs17\fs18\up6 #{\footnote \pard\plain \s18\li120\sb80\sl-240\slmult1\widctlpar \f9\fs20 {\cs17\fs18\up6 #} IDH_SECURITY_LOG_DIALOG}}{\cs16 }{\cs17\fs18\up6 ${\footnote
  180. \pard\plain \s18\li120\sb80\sl-240\slmult1\widctlpar \f9\fs20 {\cs17\fs18\up6 $} Security Log Settings {\cs16 Dialog}}}{\cs16 }{\cs17\fs18\up6 K{\footnote \pard\plain \s18\li120\sb80\sl-240\slmult1\widctlpar \f9\fs20 {\cs17\fs18\up6 K}
  181. Security Log Settings Dialog}}{\cs16 Security Log Settings Dialog
  182. \par }\pard\plain \s15\li120\sl-240\slmult1\widctlpar \f9\fs20 {\b\i Required for C2 Level Security
  183. \par }\pard\plain \li120\sb80\sl-240\slmult1\widctlpar \f9\fs20 The characteristics of the security log can be set in this dialog. The options available are:
  184. \par \pard \li120\sb80\sl-240\slmult1\widctlpar {\b Overwrite Events As Needed }which will overwrite the oldest events in the log once the log is full.
  185. \par {\b Overwrite Events Older than ____ days} will overwrite events that are older the specified age regardless of how full the log is.
  186. \par \pard \li120\sb80\sl-240\slmult1\widctlpar {\b Do Not Overwrite Events (Clear Log Manually)}
  187. will prevent the log from automatically destroying any logged events. The administrator must manually reset the log. This option must be selected for C2 compliance.
  188. \par \pard \li120\sb80\sl-240\slmult1\widctlpar {\cs16 Selecting the C2 button will select the }{\b Do Not Overwrite Events (Clear Log Manually)} button.{\cs16
  189. \par }
  190. \par Changes made in this dialog are made immediately after the OK button has been selected.
  191. \par \pard\plain \s1\li120\sb280\sa120\sl-320\slmult1\widctlpar \b\f9 {\cs16 \page }{\cs17\fs18\up6 #{\footnote \pard\plain \s18\li120\sb80\sl-240\slmult1\widctlpar \f9\fs20 {\cs17\fs18\up6 #} IDH_AUDIT_FAILURE_DIALOG}}{\cs16 }{\cs17\fs18\up6 ${\footnote
  192. \pard\plain \s18\li120\sb80\sl-240\slmult1\widctlpar \f9\fs20 {\cs17\fs18\up6 $} Audit Failure Settings {\cs16 Dialog}}}{\cs16 }{\cs17\fs18\up6 K{\footnote \pard\plain \s18\li120\sb80\sl-240\slmult1\widctlpar \f9\fs20 {\cs17\fs18\up6 K}
  193. Audit Failure Settings Dialog}}{\cs16 Audit Failure Settings Dialog
  194. \par }\pard\plain \s15\li120\sl-240\slmult1\widctlpar \f9\fs20 {\cs16 Selecting the check box will configure the system to halt when the security log is filled. This setting prevents security events from occurring without an audit trail of them.
  195. \par }\pard\plain \li120\sb80\sl-240\slmult1\widctlpar \f9\fs20 {\cs16 Selecting the Secure button will select the check box.
  196. \par }\pard \li120\sb80\sl-240\slmult1\widctlpar
  197. \par \pard \li120\sb80\sl-240\slmult1\widctlpar Changes made in this dialog are made immediately after the OK button has been selected, however they will not take effect until the system is restarted.
  198. \par \pard\plain \s1\li120\sb280\sa120\sl-320\slmult1\widctlpar \b\f9 {\cs16 \page }{\cs17\fs18\up6 #{\footnote \pard\plain \s18\li120\sb80\sl-240\slmult1\widctlpar \f9\fs20 {\cs17\fs18\up6 #} IDH_LOGON_MESSAGE_DIALOG}}{\cs16 }{\cs17\fs18\up6 ${\footnote
  199. \pard\plain \s18\li120\sb80\sl-240\slmult1\widctlpar \f9\fs20 {\cs17\fs18\up6 $} Logon Message {\cs16 Dialog}}}{\cs16 }{\cs17\fs18\up6 K{\footnote \pard\plain \s18\li120\sb80\sl-240\slmult1\widctlpar \f9\fs20 {\cs17\fs18\up6 K} Logon Message Dialog}}{
  200. \cs16 Logon Message Dialog
  201. \par }\pard\plain \s15\li120\sl-240\slmult1\widctlpar \f9\fs20 {\cs16 The caption and text of a message box that is displayed prior to logon may be entered in the edit boxes contained in this display. The check
  202. box must be unchecked before the edit boxes are enabled.
  203. \par }\pard\plain \li120\sb80\sl-240\slmult1\widctlpar \f9\fs20 {\cs16 Selecting the Secure button will uncheck the check box and enable the edit boxes. You must then provide the caption and message text before exiting the dialog.
  204. \par }\pard \li120\sb80\sl-240\slmult1\widctlpar {\cs16
  205. \par }Changes made in this dialog are made immediately after the OK button has been selected.
  206. \par \pard\plain \s1\li120\sb280\sa120\sl-320\slmult1\widctlpar \b\f9 {\cs16 \page }{\cs17\fs18\up6 #{\footnote \pard\plain \s18\li120\sb80\sl-240\slmult1\widctlpar \f9\fs20 {\cs17\fs18\up6 #} IDH_LAST_USERNAME_DIALOG}}{\cs16 }{\cs17\fs18\up6 ${\footnote
  207. \pard\plain \s18\li120\sb80\sl-240\slmult1\widctlpar \f9\fs20 {\cs17\fs18\up6 $} Last Username Display {\cs16 Dialog}}}{\cs16 }{\cs17\fs18\up6 K{\footnote \pard\plain \s18\li120\sb80\sl-240\slmult1\widctlpar \f9\fs20 {\cs17\fs18\up6 K}
  208. Last Username Display Dialog}}{\cs16 Last Username Display Dialog
  209. \par }\pard\plain \s15\li120\sl-240\slmult1\widctlpar \f9\fs20 {\cs16 Checking the check box will prevent the last username from being displayed in the logon dialog box.
  210. \par }\pard\plain \li120\sb80\sl-240\slmult1\widctlpar \f9\fs20 {\cs16 Selecting the Secure button will check the check box.
  211. \par }\pard \li120\sb80\sl-240\slmult1\widctlpar {\cs16
  212. \par }Changes made in this dialog are made immediately after the OK button has been selected.
  213. \par \pard\plain \s1\li120\sb280\sa120\sl-320\slmult1\widctlpar \b\f9 {\cs16 \page }{\cs17\fs18\up6 #{\footnote \pard\plain \s18\li120\sb80\sl-240\slmult1\widctlpar \f9\fs20 {\cs17\fs18\up6 #} IDH_SHUTDOWN_BUTTON_DIALOG}}{\cs16 }{\cs17\fs18\up6 ${\footnote
  214. \pard\plain \s18\li120\sb80\sl-240\slmult1\widctlpar \f9\fs20 {\cs17\fs18\up6 $} Shutdown Button {\cs16 Dialog}}}{\cs16 }{\cs17\fs18\up6 K{\footnote \pard\plain \s18\li120\sb80\sl-240\slmult1\widctlpar \f9\fs20 {\cs17\fs18\up6 K} Shutdown Button Dialog}}
  215. {\cs16 Shutdown Button Dialog
  216. \par }\pard\plain \s15\li120\sl-240\slmult1\widctlpar \f9\fs20 {\cs16 Checking the check box will prevent the Shutdown button from being displayed in the logon dialog box. This will require the user to logon before being able to shutdown Windows NT.
  217. \par }\pard\plain \li120\sb80\sl-240\slmult1\widctlpar \f9\fs20 {\cs16 Selecting the Secure button will check the check box.
  218. \par }\pard \li120\sb80\sl-240\slmult1\widctlpar {\cs16
  219. \par }Changes made in this dialog are made immediately after the OK button has been selected.
  220. \par \pard\plain \s1\li120\sb280\sa120\sl-320\slmult1\widctlpar \b\f9 {\cs16 \page }{\cs17\fs18\up6 #{\footnote \pard\plain \s18\li120\sb80\sl-240\slmult1\widctlpar \f9\fs20 {\cs17\fs18\up6 #} IDH_PASSWORD_LENGTH_DIALOG}}{\cs16 }{\cs17\fs18\up6 ${\footnote
  221. \pard\plain \s18\li120\sb80\sl-240\slmult1\widctlpar \f9\fs20 {\cs17\fs18\up6 $} Password Length {\cs16 Dialog}}}{\cs16 }{\cs17\fs18\up6 K{\footnote \pard\plain \s18\li120\sb80\sl-240\slmult1\widctlpar \f9\fs20 {\cs17\fs18\up6 K} Password Length Dialog}}
  222. {\cs16 Password Length Dialog
  223. \par }\pard\plain \s15\li120\sl-240\slmult1\widctlpar \f9\fs20 {\b\i Required for C2 Level Security
  224. \par }\pard\plain \li120\sb80\sl-240\slmult1\widctlpar \f9\fs20
  225. \par \pard\plain \s15\li120\sl-240\slmult1\widctlpar \f9\fs20 {\cs16 The minimum password len
  226. gth for all new accounts and passwords may be specified in this dialog. The top radio button will allow blank passwords, while the bottom radio button will specify a minimum password length.
  227. \par }\pard\plain \li120\sb80\sl-240\slmult1\widctlpar \f9\fs20 {\cs16 Selecting the C2 button will require a minimum password length of 6 characters, however to support C2 Level Security, this value can be as small as 1.
  228. \par }\pard \li120\sb80\sl-240\slmult1\widctlpar {\cs16
  229. \par }Changes made in this dialog are made immediately after the OK button has been selected.
  230. \par \pard\plain \s1\li120\sb280\sa120\sl-320\slmult1\widctlpar \b\f9 {\cs16 \page }{\cs17\fs18\up6 #{\footnote \pard\plain \s18\li120\sb80\sl-240\slmult1\widctlpar \f9\fs20 {\cs17\fs18\up6 #} IDH_GUEST_ACCOUNT_DIALOG}}{\cs16 }{\cs17\fs18\up6 ${\footnote
  231. \pard\plain \s18\li120\sb80\sl-240\slmult1\widctlpar \f9\fs20 {\cs17\fs18\up6 $} Guest Account {\cs16 Dialog}}}{\cs16 }{\cs17\fs18\up6 K{\footnote \pard\plain \s18\li120\sb80\sl-240\slmult1\widctlpar \f9\fs20 {\cs17\fs18\up6 K} Guest Account Dialog}}{
  232. \cs16 Guest Account Dialog
  233. \par }\pard\plain \s15\li120\sl-240\slmult1\widctlpar \f9\fs20 {\b\i Required for C2 Level Security}
  234. \par \pard\plain \li120\sb80\sl-240\slmult1\widctlpar \f9\fs20 {\cs16 Checking the check box, will prevent users from logging on using the Guest account.
  235. \par }\pard \li120\sb80\sl-240\slmult1\widctlpar {\cs16 Selecting the C2 button will disable the Guest account.
  236. \par
  237. \par }Changes made in this dialog are made immediately after the OK button has been selected.
  238. \par \pard\plain \s1\li120\sb280\sa120\sl-320\slmult1\widctlpar \b\f9 {\cs16 \page }{\cs17\fs18\up6 #{\footnote \pard\plain \s18\li120\sb80\sl-240\slmult1\widctlpar \f9\fs20 {\cs17\fs18\up6 #} IDH_DRIVES_AND_PRINTERS_DIALOG}}{\cs16 }{\cs17\fs18\up6 $
  239. {\footnote \pard\plain \s18\li120\sb80\sl-240\slmult1\widctlpar \f9\fs20 {\cs17\fs18\up6 $} Drive and Printers Dialog}}{\cs16 }{\cs17\fs18\up6 K{\footnote \pard\plain \s18\li120\sb80\sl-240\slmult1\widctlpar \f9\fs20 {\cs17\fs18\up6 K}
  240. Drive and Printers Dialog}}{\cs16 Drives and Printers Dialog
  241. \par }\pard\plain \s15\li120\sl-240\slmult1\widctlpar \f9\fs20 {\cs16 Checking the check box will allow only administrators to assign drive letters and printers.
  242. \par }\pard\plain \li120\sb80\sl-240\slmult1\widctlpar \f9\fs20 {\cs16 Selecting the Secure button will check the check box
  243. \par }\pard \li120\sb80\sl-240\slmult1\widctlpar {\cs16
  244. \par }\pard \li120\sb80\sl-240\slmult1\widctlpar Changes made in this dialog are made immediately after the OK button has been selected, however they will not take effect until the system is restarted.
  245. \par \pard\plain \s1\li120\sb280\sa120\sl-320\slmult1\widctlpar \b\f9 {\cs16 \page }{\cs17\fs18\up6 #{\footnote \pard\plain \s18\li120\sb80\sl-240\slmult1\widctlpar \f9\fs20 {\cs17\fs18\up6 #} IDH_ALLOCATE_REMOVABLE_DRIVES_DIALOG}}{\cs16 }{\cs17\fs18\up6 $
  246. {\footnote \pard\plain \s18\li120\sb80\sl-240\slmult1\widctlpar \f9\fs20 {\cs17\fs18\up6 $} Allocate Removable Drives Dialog}}{\cs16 }{\cs17\fs18\up6 K{\footnote \pard\plain \s18\li120\sb80\sl-240\slmult1\widctlpar \f9\fs20 {\cs17\fs18\up6 K}
  247. Allocate Removable Drives Dialog}}{\cs16 Allocate Removable Drives Dialog
  248. \par }\pard\plain \s15\li120\sl-240\slmult1\widctlpar \f9\fs20 {\cs16
  249. Checking one or both of the check boxes will prevent access to the specified devices by programs started by another user while a user is logged on by allocating those drives when the user logs on.
  250. \par }\pard\plain \li120\sb80\sl-240\slmult1\widctlpar \f9\fs20 {\cs16 Selecting the Secure button will check both check boxes prohibiting access to both the floppy drives and the CD-ROM Drives by programs run by another user.
  251. \par }\pard \li120\sb80\sl-240\slmult1\widctlpar {\cs16
  252. \par }\pard \li120\sb80\sl-240\slmult1\widctlpar Changes made in this dialog are made immediately after the OK button has been selected, however they will not take effect until the system is restarted.
  253. \par }