AD_EnableFilter="Enable filter in Find dialog box"
AD_EnableFilter_Help="Displays the filter bar above the results of an Active Directory search. The filter bar consists of buttons for applying additional filters to search results.\n\nIf you enable this setting, the filter bar appears when the Active Directory Find dialog box opens, but users can hide it.\n\nIf you disable this setting or do not configure it, the filter bar does not appear, but users can display it by selecting "Filter" on the "View" menu.\n\nTo see the filter bar, open My Network Places, click Entire Network, and then click Directory. Right-click the name of a Windows 2000 domain, and click Find. Type the name of an object in the directory, such as "Administrator." If the filter bar does not appear above the resulting display, on the View menu, click Filter."
AD_HideDirectoryFolder="Hide Active Directory folder"
AD_HideDirectoryFolder_Help="Hides the Active Directory folder in My Network Places.\n\nThe Active Directory folder displays Active Directory objects in a browse window.\n\nIf you enable this setting, the Active Directory folder does not appear in the My Network Places folder.\n\nIf you disable this setting or do not configure it, the Active Directory folder appears in the My Network Places folder.\n\nThis setting is designed to let users search Active Directory but not tempt them to casually browse Active Directory."
AD_QueryLimit="Maximum size of Active Directory searches"
AD_QueryLimit_Box="Number of objects returned: "
AD_QueryLimit_Help="Specifies the maximum number of objects the system displays in response to a command to browse or search Active Directory. This setting affects all browse displays associated with Active Directory, such as those in Local Users and Groups, Active Directory Users and Computers, and dialog boxes used to set permissions for user or group objects in Active Directory.\n\nIf you enable this setting, you can use the "Number of objects returned" box to limit returns from an Active Directory search.\n\nIf you disable this setting or do not configure it, the system displays up to 10,000 objects. This consumes approximately 2 MB of memory or disk space.\n\nThis setting is designed to protect the network and the domain controller from the effect of expansive searches."
AddAdminGroupToRUP="Add the Administrators security group to roaming user profiles"
AddAdminGroupToRUP_Help="This setting adds the Administrator security group to the roaming user profile share.\n\nOnce an administrator has configured a users' roaming profile, the profile will be created at the user's next login. The profile is created at the location that is specified by the administrator.\n\nFor Windows 2000 and Windows XP operating systems, the default file permissions for the newly generated profile are full control, or read and write access for the user, and no file access for the administrators group.\n\nBy configuring this setting, you can alter this behavior.\n\nIf you enable this setting, the administrator group is also given full control to the user's profile folder.\n\nIf you disable or do not configure it, only the user is given full control of their user profile, and the administrators group has no file system access to this folder.\n\nNote: If the setting is enabled after the profile is created, the setting has no effect.\n\nNote: The setting must be configured on the client computer, not the server, for it to have any effect, because the client computer sets the file share permissions for the roaming profile at creation time.\n\nNote: In the default case, administrators have no file access to the user's profile, but they may still take ownership of this folder to grant themselves file permissions.\n\nNote: The behavior when this setting is enabled is exactly the same behavior as in Windows NT 4.0."
AdminComponents_Help="Adds and deletes specified Web content items.\n\nYou can use the "Add" box in this setting to add particular Web-based items or shortcuts to users' desktops. Users can close or delete the items (if settings allow), but the items are added again each time the setting is refreshed.\n\nYou can also use this setting to delete particular Web-based items from users' desktops. Users can add the item again (if settings allow), but the item is deleted each time the setting is refreshed.\n\nNote: Removing an item from the "Add" list for this setting is not the same as deleting it. Items that are removed from the "Add" list are not removed from the desktop. They are simply not added again.\n\nNote: For this setting to take affect, you must log off and log on to the system."
AdministrativeServices="System"
ALLDrives="Restrict all drives"
AllowBrowse="Prohibit Browse"
AllowBrowseHelp="Limits newly scheduled to items on the user's Start menu, and prevents the user from changing the scheduled program for existing tasks.\n\nThis setting removes the Browse button from the Schedule Task Wizard and from the Task tab of the properties dialog box for a task. Also, users cannot edit the "Run" box or the "Start in" box that determine the program and path for a task.\n\nAs a result, when users create a task, they must select a program from the list in the Scheduled Task Wizard, which displays only the tasks that appear on the Start menu and its submenus. Once a task is created, users cannot change the program a task runs.\n\nImportant: This setting does not prevent users from creating a new task by pasting or dragging any program into the Scheduled Tasks folder. To prevent this action, use the "Prohibit Drag-and-Drop" setting.\n\nNote: This setting appears in the Computer Configuration and User Configuration folders. If both settings are configured, the setting in Computer Configuration takes precedence over the setting in User Configuration."
AllowLockdownBrowse_Help="Allows users to search for installation files during privileged installations.\n\nThis setting enables the Browse button in the "Use feature from" dialog box. As a result, users can search for installation files, even when the installation program is running with elevated system privileges. By default, only system administrators can browse during installations with elevated privileges, such as installations offered on the desktop or displayed in Add or Remove Programs.\n\nBecause the installation is running with elevated system privileges, users can browse through directories that their own permissions would not allow.\n\nThis setting does not affect installations that run in the user's security context. Also, see the "Remove browse dialog box for new source" setting."
AllowLockdownBrowse="Enable user to browse for source while elevated"
AllowLockdownMedia_Help="Allows users to install programs from removable media, such as floppy disks and CD-ROMs, during privileged installations.\n\nThis setting permits all users to install programs from removable media, even when the installation program is running with elevated system privileges. By default, users can install programs from removable media only when the installation runs in the user's security context. During privileged installations, such as those offered on the desktop or displayed in Add or Remove Programs, only system administrators can install from removable media.\n\nThis setting does not affect installations that run in the user's security context. By default, users can install from removable media when the installation runs in their own security context.\n\nAlso, see the "Prevent removable media source for any install" setting in User Configuration\Administrative Templates\Windows Components\Windows Installer."
AllowLockdownMedia="Enable user to use media source while elevated"
AllowLockdownPatch_Help="Allows users to upgrade programs during privileged installations.\n\nThis setting permits all users to install patches, even when the installation program is running with elevated system privileges. Patches are updates or upgrades that replace only those program files that have changed. Because patches can easily be vehicles for malicious programs, some installations prohibit their use.\n\nBy default, only system administrators can apply patches during installations with elevated privileges, such as installations offered on the desktop or displayed in Add or Remove Programs.\n\nThis setting does not affect installations that run in the user's security context. By default, users can install patches to programs that run in their own security context. Also, see the "Prohibit patching" setting."
AllowLockdownPatch="Enable user to patch elevated products"
AllowWebPrinting_Help="Determines whether Internet printing is supported on this server.\n\nInternet printing lets you display printers on Web pages so the printers can be viewed, managed, and used across the Internet or an intranet.\n\nInternet printing is supported by default on Windows 2000. If you enable this setting or do not configure it, Internet printing remains supported. If you disable this setting, Internet printing is not supported.\n\nNote: This setting affects the server side of Internet printing only. It does not prevent the print client on the computer from printing across the Internet.\n\nAlso, see the "Custom support URL in the Printers folder's left pane" setting in this folder and the "Browse a common web site to find printers" setting in User Configuration\Administrative Templates\Control Panel\Printers."
AllowWebPrinting="Web-based printing"
AlwaysInstallElevated_Help="Directs Windows Installer to use system permissions when it installs any program on the system.\n\nThis setting extends elevated privileges to all programs. These privileges are usually reserved for programs that have been assigned to the user (offered on the desktop), assigned to the computer (installed automatically), or made available in Add or Remove Programs in Control Panel. This setting lets users install programs that require access to directories that the user might not have permission to view or change, including directories on highly restricted computers.\n\nIf you disable this setting or do not configure it, the system applies the current user's permissions when it installs programs that a system administrator does not distribute or offer.\n\nNote: This setting appears both in the Computer Configuration and User Configuration folders. To make this setting effective, you must enable the setting in both folders.\n\nCaution: Skilled users can take advantage of the permissions this setting grants to change their privileges and gain permanent access to restricted files and folders. Note that the User Configuration version of this setting is not guaranteed to be secure."
AlwaysInstallElevated="Always install with elevated privileges"
AppMgmt_COM_SearchForCLSID="Download missing COM components"
AppMgmt_COM_SearchForCLSID_Help="Directs the system to search Active Directory for missing Component Object Model (COM) components that a program requires.\n\nMany Windows programs, such as the MMC snap-ins, use the interfaces provided by the COM. These programs cannot perform all of their functions unless Windows 2000 has internally registered the required components.\n\nIf you enable this setting and a component registration is missing, the system searches for it in Active Directory and if it is found, downloads it. The resulting searches might make some programs start or run slowly.\n\nIf you disable this setting or do not configure it, the program continues without the registration. As a result, the program might not perform all of its functions, or it might stop.\n\nThis setting appears in the Computer Configuration and User Configuration folders. If both settings are configured, the setting in Computer Configuration takes precedence over the setting in User Configuration."
ARP="Add/Remove Programs"
ATC_NoComponents_Help="Removes Active Desktop content and prevents users from adding Active Desktop content. \n\nThis setting removes all Active Desktop items from the desktop. It also removes the Web tab from Display in Control Panel. As a result, users cannot add Web pages or pictures from the Internet or an intranet to the desktop.\n\nNote: This setting does not disable Active Desktop. Users can still use image formats, such as JPEG and GIF, for their desktop wallpaper."
AutoPublishing_Help="Determines whether the Add Printer Wizard automatically publishes the computer's shared printers in Active Directory.\n\nIf you enable this setting or do not configure it, the Add Printer Wizard automatically publishes all shared printers.\n\nIf you disable this setting, the Add Printer Wizard does not automatically publish printers. However, you can publish shared printers manually.\n\nThe default behavior is to automatically publish shared printers in Active Directory. \n\nNote: This setting is ignored if the "Allow printers to be published" setting is disabled."
AutoPublishing="Automatically publish new printers in Active Directory"
Autorun_Box="Turn off Autoplay on:"
Autorun_NoCD="CD-ROM drives"
Autorun_None="All drives"
Autorun_Help="Turns off the Autoplay feature.\n\nAutoplay begins reading from a drive as soon as you insert media in the drive. As a result, the setup file of programs and the music on audio media start immediately.\n\nBy default, Autoplay is disabled on removable drives, such as the floppy disk drive (but not the CD-ROM drive), and on network drives.\n\nIf you enable this setting, you can also disable Autoplay on CD-ROM drives or disable Autoplay on all drives.\n\nThis setting disables Autoplay on additional types of drives. You cannot use this setting to enable Autoplay on drives on which it is disabled by default.\n\nNote: This setting appears in both the Computer Configuration and User Configuration folders. If the settings conflict, the setting in Computer Configuration takes precedence over the setting in User Configuration.\n\nNote: This setting does not prevent Autoplay for music CDs."
Autorun="Turn off Autoplay"
Blank=" "
BITS_Job_Timeout="Background Intelligent Transfer Service (BITS) inactive job timeout"
BITS_Job_Timeout_Time="Inactive Job Timeout in Days:"
BITS_Job_Timeout_Help="The number of days a pending BITS job can remain inactive before being considered abandoned by the requestor.\n\nOnce a job is determined to be abandoned, it is removed by the system and any downloaded files pertaining to the job are deleted from the disk. Any property changes for the job or any successful download action resets this timer.\n\nIf the computer remains offline for a long period of time, no activity for the job will be recorded.\n\nYou might want to increase this value if computers tend to stay offline for a longer period of time and still have pending jobs. You might want to decrease this value if you are concerned about orphaned jobs occupying disk space.\n\nIf you enable this setting, you can configure the inactive job time-out to specified number of days. If you disable or do not configure this setting, the default value of 90 will be used for the inactive job time-out."
CADOptions="Ctrl+Alt+Del Options"
Cat_OfflineFiles="Offline Files"
Catname="Administrative Alerts"
ClassicShell_Help="This setting allows you to remove the Active Desktop and Web view features. If you enable this setting, it will disable the Active Desktop and Web view. Also, users cannot configure their system to open items by single-clicking (such as in Mouse in Control Panel). As a result, the user interface looks and operates like the interface for Windows NT 4.0, and users cannot restore the new features.\n\nNote: This setting takes precedence over the "Enable Active Desktop" setting. If both policies are enabled, Active Desktop is disabled.\n\nAlso, see the "Disable Active Desktop" setting in User Configuration\Administrative Templates\Desktop\Active Desktop and the "Remove the Folder Options menu item from the Tools menu" setting in User Configuration\Administrative Templates\Windows Components\Windows Explorer."
ClassicShell="Turn on Classic Shell"
ClearRecentDocsOnExit_Help="Clear history of recently opened documents on exit.\n\nIf you enable this setting, the system deletes shortcuts to recently used document files when the user logs off. As a result, the Documents menu on the Start menu is always empty when the user logs on.\n\nIf you disable or do not configure this setting, the system retains document shortcuts, and when a user logs on the Documents menu appears just as it did when the user logged off.\n\nNote: The system saves document shortcuts in the user profile in the System-drive\Documents and Settings\User-name\Recent folder.\n\nAlso, see the "Remove Documents menu from Start Menu" and "Do not keep history of recently opened documents" policies in this folder. The system only uses this setting when neither of these related settings are selected.\n\nThis setting does not clear the list of recent files that Windows programs display at the bottom of the File menu. See the "Do not keep history of recently opened documents" setting.\n\nThis policy setting also does not hide document shortcuts displayed in the Open dialog box. See the "Hide the dropdown list of recent files" setting."
ClearRecentDocsOnExit="Clear history of recently opened documents on exit"
Comdlg="Common Open File Dialog"
ComdlgSub="Common Open File Dialog Restrictions"
CompatibleRUPSecurity="Do not check for user ownership of Roaming Profile Folders"
CompatibleRUPSecurity_Help="Prevents Windows from checking for correct permissions on a user's roaming profile folder. Prior to Windows XP SP1, no checks are made for the correct permissions if the profile folder already exists.\n\nIf you disable or do not configure this setting AND the roaming profile folder exists AND either the user or the administrators group is not the owner of the folder, Windows will NOT copy files to or from the roaming folder.\n\nIf you enable this setting, the behavior is the same as Windows XP pre-SP1."
ConfirmFileDelete="Display confirmation dialog when deleting files"
ConfirmFileDelete_Help="Allows you to have Windows Explorer display a confirmation dialog whenever a file is deleted or moved to the Recycle Bin.\n\nIf you enable this setting, a confirmation dialog is displayed when a file is deleted or moved to the Recycle Bin by the user.\n\nIf you disable or do not configure this setting, the default behavior of not displaying a confirmation dialog occurs."
COnly="Restrict C drive only"
Connect_HomeDir_ToRoot_Explain="Restores the definitions of the %HOMESHARE% and %HOMEPATH% environment variables to those used in Windows NT 4.0 and earlier.\n\nIf you enable this setting, the system uses the Windows NT 4.0 definitions. If you disable this setting or do not configure it, the system uses the new definitions designed for Windows 2000.\n\nAlong with %HOMEDRIVE%, these variables define the home directory of a user profile. The home directory is a persistent mapping of a drive letter on the local computer to a local or remote directory.\n\nBy default, in Windows 2000, %HOMESHARE% stores the fully qualified path to the home directory (such as \\server\share\dir1\dir2\homedir). Users can access the home directory and any of its subdirectories from the home drive letter, but they cannot see or access its parent directories. %HOMEPATH% stores a final backslash and is included for compatibility with earlier systems.\n\nOn Windows NT 4.0 and earlier, %HOMESHARE% stores only the network share (such as \\server\share). %HOMEPATH% stores the remainder of the fully qualified path to the home directory (such as \dir1\dir2\homedir). As a result, users can access any directory on the home share by using the home directory drive letter.\n\nTip: To specify a home directory in Windows 2000, in Active Directory Users and Computers or Local Users and Groups, right-click the name of a user account, click Properties, click the Profile tab, and in the "Home folder" section, select the "Connect" option and select a drive letter and home directory.\n\nExample: Drive Z is mapped to \\server\share\dir1\dir2\homedir.\n\nIf this setting is disabled or not configured (Windows 2000 behavior):\n\n-- %HOMEDRIVE% = Z: (mapped to \\server\share\dir1\dir2\homedir)\n\n-- %HOMESHARE% = \\server\share\dir1\dir2\homedir\n\n-- %HOMEPATH% = \\n\nIf the setting is enabled (Windows NT 4.0 behavior):\n\n-- %HOMEDRIVE% = Z: (mapped to \\server\share)\n\n-- %HOMESHARE% = \\server\share\n\n-- %HOMEPATH% = \dir1\dir2\homedir"
Connect_HomeDir_ToRoot="Connect home directory to root of the share"
ControlPanel="Control Panel"
CPL_Display_Disable="Remove Display in Control Panel"
CPL_Display_HideAppearance="Hide Appearance and Themes tab"
CSE_AppMgmt_Help="Determines when software installation policies are updated.\n\nThis setting affects all policies that use the software installation component of Group Policy, such as policies in Software Settings\Software Installation. You can set software installation policy only for Group Policy objects stored in Active Directory, not for Group Policy objects on the local computer.\n\nThis policy overrides customized settings that the program implementing the software installation policy set when it was installed.\n\nIf you enable this setting, you can use the check boxes provided to change the options. If you disable this setting or do not configure it, it has no effect on the system.\n\nThe "Allow processing across a slow network connection" option updates the policies even when the update is being transmitted across a slow network connection, such as a telephone line. Updates across slow connections can cause significant delays.\n\nThe "Process even if the Group Policy objects have not changed" option updates and reapplies the policies even if the policies have not changed. Many policy implementations specify that they are updated only when changed. However, you might want to update unchanged policies, such as reapplying a desired setting in case a user has changed it."
CSE_DiskQuota="Disk Quota policy processing"
CSE_DiskQuota_Help="Determines when disk quota policies are updated.\n\nThis setting affects all policies that use the disk quota component of Group Policy, such as those in Computer Configuration\Administrative Templates\System\Disk Quotas.\n\nIt overrides customized settings that the program implementing the disk quota policy set when it was installed.\n\nIf you enable this setting, you can use the check boxes provided to change the options. If you disable this setting or do not configure it, it has no effect on the system.\n\nThe "Allow processing across a slow network connection" option updates the policies even when the update is being transmitted across a slow network connection, such as a telephone line. Updates across slow connections can cause significant delays.\n\nThe "Do not apply during periodic background processing" option prevents the system from updating affected policies in the background while the computer is in use. Background updates can disrupt the user, cause a program to stop or operate abnormally, and, in rare cases, damage data.\n\nThe "Process even if the Group Policy objects have not changed" option updates and reapplies the policies even if the policies have not changed. Many policy implementations specify that they are updated only when changed. However, you might want to update unchanged policies, such as reapplying a desired setting in case a user has changed it."
CSE_EFSRecovery="EFS recovery policy processing"
CSE_EFSRecovery_Help="Determines when encryption policies are updated.\n\nThis setting affects all policies that use the encryption component of Group Policy, such as policies related to encryption in Windows Settings\Security Settings.\n\nIt overrides customized settings that the program implementing the encryption policy set when it was installed.\n\nIf you enable this setting, you can use the check boxes provided to change the options. If you disable this setting or do not configure it, it has no effect on the system.\n\nThe "Allow processing across a slow network connection" option updates the policies even when the update is being transmitted across a slow network connection, such as a telephone line. Updates across slow connections can cause significant delays.\n\nThe "Do not apply during periodic background processing" option prevents the system from updating affected policies in the background while the computer is in use. Background updates can disrupt the user, cause a program to stop or operate abnormally, and, in rare cases, damage data.\n\nThe "Process even if the Group Policy objects have not changed" option updates and reapplies the policies even if the policies have not changed. Many policy implementations specify that they are updated only when changed. However, you might want to update unchanged policies, such as reapplying a desired setting in case a user has changed it."
CSE_FolderRedirection_Help="Determines when folder redirection policies are updated.\n\nThis setting affects all policies that use the folder redirection component of Group Policy, such as those in WindowsSettings\Folder Redirection. You can only set folder redirection policy for Group Policy objects, stored in Active Directory, not for Group Policy objects on the local computer.\n\nThis setting overrides customized settings that the program implementing the folder redirection policy set when it was installed.\n\nIf you enable this setting, you can use the check boxes provided to change the options. If you disable this setting or do not configure it, it has no effect on the system.\n\nThe "Allow processing across a slow network connection" option updates the policies even when the update is being transmitted across a slow network connection, such as a telephone line. Updates across slow connections can cause significant delays.\n\nThe "Process even if the Group Policy objects have not changed" option updates and reapplies the policies even if the policies have not changed. Many policy implementations specify that they are updated only when changed. However, you might want to update unchanged policies, such as reapplying a desired setting in case a user has changed it."
CSE_IEM="Internet Explorer Maintenance policy processing"
CSE_IEM_Help="Determines when Internet Explorer Maintenance policies are updated.\n\nThis setting affects all policies that use the Internet Explorer Maintenance component of Group Policy, such as those in Windows Settings\Internet Explorer Maintenance.\n\nIt overrides customized settings that the program implementing the Internet Explorer Maintenance policy set when it was installed.\n\nIf you enable this setting, you can use the check boxes provided to change the options. If you disable this setting or do not configure it, it has no effect on the system.\n\nThe "Allow processing across a slow network connection" option updates the policies even when the update is being transmitted across a slow network connection, such as a telephone line. Updates across slow connections can cause significant delays.\n\nThe "Do not apply during periodic background processing" option prevents the system from updating affected policies in the background while the computer is in use. Background updates can disrupt the user, cause a program to stop or operate abnormally, and, in rare cases, damage data.\n\nThe "Process even if the Group Policy objects have not changed" option updates and reapplies the policies even if the policies have not changed. Many policy implementations specify that they are updated only when changed. However, you might want to update unchanged policies, such as reapplying a desired setting in case a user has changed it."
CSE_IPSecurity="IP Security policy processing"
CSE_IPSecurity_Help="Determines when IP security policies are updated.\n\nThis setting affects all policies that use the IP security component of Group Policy, such as policies in Computer Configuration\Windows Settings\Security Settings\IP Security Policies on Local Machine.\n\nIt overrides customized settings that the program implementing the IP security policy set when it was installed.\n\nIf you enable this setting, you can use the check boxes provided to change the options. If you disable this setting or do not configure it, it has no effect on the system.\n\nThe "Allow processing across a slow network connection" option updates the policies even when the update is being transmitted across a slow network connection, such as a telephone line. Updates across slow connections can cause significant delays.\n\nThe "Do not apply during periodic background processing" option prevents the system from updating affected policies in the background while the computer is in use. Background updates can disrupt the user, cause a program to stop or operate abnormally, and, in rare cases, damage data.\n\nThe "Process even if the Group Policy objects have not changed" option updates and reapplies the policies even if the policies have not changed. Many policy implementations specify that they are updated only when changed. However, you might want to update unchanged policies, such as reapplying a desired setting in case a user has changed it."
CSE_NOCHANGES="Process even if the Group Policy objects have not changed"
CSE_NOBACKGROUND="Do not apply during periodic background processing"
CSE_Registry="Registry policy processing"
CSE_Registry_Help="Determines when registry policies are updated.\n\nThis setting affects all policies in the Administrative Templates folder and any other policies that store values in the registry.\n\nIt overrides customized settings that the program implementing a registry policy set when it was installed.\n\nIf you enable this setting, you can use the check boxes provided to change the options. If you disable this setting or do not configure it, it has no effect on the system.\n\nThe "Do not apply during periodic background processing" option prevents the system from updating affected policies in the background while the computer is in use. Background updates can disrupt the user, cause a program to stop or operate abnormally, and, in rare cases, damage data.\n\nThe "Process even if the Group Policy objects have not changed" option updates and reapplies the policies even if the policies have not changed. Many policy implementations specify that they are updated only when changed. However, you might want to update unchanged policies, such as reapplying a desired setting in case a user has changed it."
CSE_Security="Security policy processing"
CSE_Security_Help="Determines when security policies are updated.\n\nThis setting affects all policies that use the security component of Group Policy, such as those in Windows Settings\Security Settings.\n\nIt overrides customized settings that the program implementing the security policy set when it was installed.\n\nIf you enable this setting, you can use the check boxes provided to change the options. If you disable this setting or do not configure it, it has no effect on the system.\n\nThe "Do not apply during periodic background processing" option prevents the system from updating affected policies in the background while the computer is in use. Background updates can disrupt the user, cause a program to stop or operate abnormally, and in rare cases, damage data.\n\nThe "Process even if the Group Policy objects have not changed" option updates and reapplies the policies even if the policies have not changed. Many policy implementations specify that they be updated only when changed. However, you might want to update unchanged policies, such as reapplying a desired setting in case a user has changed it."
CSE_Scripts="Scripts policy processing"
CSE_Scripts_Help="Determines when policies that assign shared scripts are updated.\n\nThis setting affects all policies that use the scripts component of Group Policy, such as those in WindowsSettings\Scripts.\n\nIt overrides customized settings that the program implementing the scripts policy set when it was installed.\n\nIf you enable this policy, you can use the check boxes provided to change the options. If you disable this setting or do not configure it, it has no effect on the system.\n\nThe "Allow processing across a slow network connection" option updates the policies even when the update is being transmitted across a slow network connection, such as a telephone line. Updates across slow connections can cause significant delays.\n\nThe "Do not apply during periodic background processing" option prevents the system from updating affected policies in the background while the computer is in use. Background updates can disrupt the user, cause a program to stop or operate abnormally, and, in rare cases, damage data.\n\nThe "Process even if the Group Policy objects have not changed" option updates and reapplies the policies even if the policies have not changed. Many policy implementations specify that they are updated only when changed. However, you might want to update unchanged policies, such as reapplying a desired setting in case a user has changed it."
CSE_SLOWLINK="Allow processing across a slow network connection"
CustomizedSupportUrl_Help="Adds a customized Web page link to the Printers folder.\n\nBy default, the Printers folder includes a link to the Microsoft Support Web page called "Get help with printing". It can also include a link to a Web page supplied by the vendor of the currently selected printer.\n\nYou can use this setting to replace the "Get help with printing" default link with a link to a Web page customized for your enterprise.\n\nIf you disable this setting or do not configure it, or if you do not enter an alternate Internet address, the default link will appear in the Printers folder.\n\nNote: Web pages links only appear in the Printers folder when Web view is enabled. If Web view is disabled, the setting has no effect. (To enable Web view, open the Printers folder, and, on the Tools menu, click Folder Options, click the General tab, and then click "Enable Web content in folders.")\n\nAlso, see the "Web-based printing" setting in this setting folder and the "Browse a common web site to find printers" setting in User Configuration\Administrative Templates\Control Panel\Printers.\n\nWeb view is affected by the "Turn on Classic Shell" and "Remove the Folder Options menu item from the Tools menu" settings in User Configuration\Administrative Templates\Windows Components\Windows Explorer, and by the "Enable Active Desktop" setting in User Configuration\Administrative Templates\Desktop\Active Desktop."
CustomizedSupportUrl_Link="URL"
CustomizedSupportUrl_Tip1="Specify the URL. For example, the url would: http://www.microsoft.com/support"
CustomizedSupportUrl="Custom support URL in the Printers folder's left pane"
DefaultDirectoryScope_Help="Determines which information source is the default starting point when users search for people.\n\nThis setting specifies the information source that appears in the "Look in" box in the Find People dialog box when the dialog box opens. (To open the Find People dialog box, click Start, click Search, and then click "For people.") Users can search in the default information source or use the drop-down list beside "Look in" to change the source. If users change the source, the last source used appears in the "Look in" box the next time it opens.\n\nIf you disable this setting or do not configure it, the source listed first in alphabetical order appears in the "Look in" box when it opens. By default, Address Book appears first.\n\nTo use this setting, type the DNS-friendly name or the NetBIOS name of the server that is hosting the source you want to list first.\n\nThis setting appears in the Computer Configuration and User Configuration folders. If these settings conflict, the setting in Computer Configuration takes precedence over the setting in User Configuration.\n\nNote: This setting establishes a default value that users can change. It does not limit user actions or change system features."
DefaultDirectoryScope="Default directory scope"
DefaultExcludeMessage="Local Settings;Temporary Internet Files;History;Temp"
DefaultSizeMessage="You have exceeded your profile storage space. Before you can log off, you need to move some items from your profile to network or local storage."
DefaultCategory_Help="Specifies the category of programs that appears when users open the "Add New Programs" page.\n\nIf you enable this setting, only the programs in the category you specify are displayed when the "Add New Programs" page opens. Users can use the Category box on the "Add New Programs" page to display programs in other categories.\n\nTo use this setting, type the name of a category in the Category box for this setting. You must enter a category that is already defined in Add or Remove Programs. To define a category, use Software Installation.\n\nIf you disable this setting or do not configure it, all programs (Category: All) are displayed when the "Add New Programs" page opens.\n\nYou can use this setting to direct users to the programs they are most likely to need.\n\nNote: This setting is ignored if either the "Remove Add/Remove Programs" setting or the "Hide Add New Programs page" setting is enabled."
DefaultCategory="Specify default category for Add New Programs"
DefaultCategoryBox="Category:"
DeleteRoamingCachedProfiles_Help="Determines whether the system saves a copy of a user’s roaming profile on the local computer's hard drive when the user logs off.\n\nThis setting, and related settings in this folder, together describe a strategy for managing user profiles residing on remote servers. In particular, they tell the system how to respond when a remote profile is slow to load.\n\nRoaming profiles reside on a network server. By default, when users with roaming profiles log off, the system also saves a copy of their roaming profile on the hard drive of the computer they are using in case the server that stores the roaming profile is unavailable when the user logs on again. The local copy is also used when the remote copy of the roaming user profile is slow to load.\n\nIf you enable this setting, any local copies of the user’s roaming profile are deleted when the user logs off. The roaming profile still remains on the network server that stores it.\n\nImportant: Do not enable this setting if you are using the slow link detection feature of Windows 2000 and Windows XP. To respond to a slow link, the system requires a local copy of the user’s roaming profile."
DeleteRoamingCachedProfiles="Delete cached copies of roaming profiles"
DenyRsopToInteractiveUser_Help="This setting controls the ability of users to view their Resultant Set of Policy (RSoP) data.\n\nBy default, interactively logged on users can view their own Resultant Set of Policy (RSoP) data.\n\nIf this setting is enabled, interactive users cannot generate RSoP data.\n\nIf this setting is not configured or disabled, interactive Users can generate RSoP.\n\nNote: This setting does not affect administrators. If this setting is enabled or disabled, by default, administrators can view RSoP data.\n\nNote: To view RSoP data on a client computer, use the RSoP snap-in for the Microsoft Management Console. You can launch the RSoP snap-in from the command line by typing RSOP.msc\n\nNote: This setting exists as both a User Configuration and Computer Configuration setting.\n\nAlso, see the "Turn off Resultant set of Policy Logging" setting in Computer Configuration\Administrative Templates\System\GroupPolicy."
DenyRsopToInteractiveUser="Disallow Interactive Users from generating Resultant Set of Policy data"
Desktop="Desktop"
DesktopDisplay="Desktop and Display"
DesktopSub="General Desktop"
DFSDiscoverDC="Sets how often a DFS Client discovers DC's"
DFSDiscoverDC_Help="Allows you to configure how often a Distributed File System (DFS) client attempts to discover domain controllers on their network.\n\nBy default, a DFS client attempts to discover domain controllers every 15 minutes.\n\nIf you enable this setting, you can configure how often a DFS client attempts to discover domain controllers. This value is specified in minutes.\n\nIf you disable this setting or do not configure it, the default value of 15 minutes applies.\n\nNote: The minimum value you can select is 15 minutes. If you try to set this setting to a value less then 15 minutes, the default value of 15 minutes is applied."
DFSDiscoverDialog="Time in minutes:"
DisableAdvanced="Remove Advanced Menu"
DisableAdvancedHelp="Prevents users from viewing or changing the properties of newly created tasks.\n\nThis setting removes the "Open advanced properties for this task when I click Finish" item from the last page of the Scheduled Task Wizard. \n\nThis setting prevents users from viewing and changing task characteristics, such as the program the task runs, details of its schedule, idle time and power management settings, and its security context. It is designed to simplify task creation for beginning users.\n\nNote: This setting appears in the Computer Configuration and User Configuration folders. If both settings are configured, the setting in Computer Configuration takes precedence over the setting in User Configuration.\n\nTip: This setting affects newly created tasks only. To prevent users from changing the properties of existing tasks, use the "Hide Property Pages" setting."
DisableAlways="Always"
DisableAutoADMUpdate="Turn off automatic update of ADM files"
DisableAutoADMUpdate_Help="Prevents the system from updating the Administrative Templates source files automatically when you open Group Policy.\n\nBy default, when you start Group Policy, the system loads the most recently revised copies of the Administrative Templates source files (.adm) that it finds in the %Systemroot%\inf directory. The .adm files create the list of settings that appear under Administrative Templates in Group Policy.\n\nIf you enable this setting, the system loads the .adm files you used the last time you ran Group Policy. Thereafter, you must update the .adm files manually.\n\nNote: Upgrading your .adm files does not overwrite your configuration settings. The settings are stored in Active Directory, not in the .adm files.\n\nTip: To upgrade your .adm files manually, in Group Policy, right-click Administrative Templates (either instance), and then click Add/Remove Templates."
DisableBackgroundPolicy_Help="Prevents Group Policy from being updated while the computer is in use. This setting applies to Group Policy for computers, users, and domain controllers.\n\nIf you enable this setting, the system waits until the current user logs off the system before updating the computer and user settings.\n\nIf you disable this setting, updates can be applied while users are working. The frequency of updates is determined by the "Group Policy refresh interval for computers" and "Group Policy refresh interval for users" settings.\n\nNote: If you enable this setting, you must restart your computer for it to take effect."
DisableBackgroundPolicy="Turn off background refresh of Group Policy"
DisableBrowse_Help="Prevents users from searching for installation files when they add features or components to an installed program.\n\nThis setting disables the Browse button beside the "Use feature from" list in the Windows Installer dialog box. As a result, users must select an installation file source from the "Use features from" list that the system administrator configures.\n\nThis setting applies even when the installation is running in the user's security context.\n\nIf you disable this setting or do not configure it, the Browse button is enabled when an installation is running in the user's security context. But only system administrators can browse when an installation is running with elevated system privileges, such as installations offered on the desktop or in Add or Remove Programs.\n\nThis setting affects Windows Installer only. It does not prevent users from selecting other browsers, such as Windows Explorer or My Network Places, to search for installation files.\n\nAlso, see the "Enable user to browse for source while elevated" setting."
DisableBrowse="Remove browse dialog box for new source"
DisableChangePassword_Help="Prevents users from changing their Windows password on demand.\n\nThis setting disables the "Change Password" button on the Windows Security dialog box (which appears when you press Ctrl+Alt+Del).\n\nHowever, users are still able to change their password when prompted by the system. The system prompts users for a new password when an administrator requires a new password or their password is expiring."
DisableChangePassword="Remove Change Password"
DisableCMD_Help="Prevents users from running the interactive command prompt, Cmd.exe. This setting also determines whether batch files (.cmd and .bat) can run on the computer.\n\nIf you enable this setting and the user tries to open a command window, the system displays a message explaining that a setting prevents the action.\n\nNote: Do not prevent the computer from running batch files if the computer uses logon, logoff, startup, or shutdown batch file scripts, or for users that use Terminal Services."
DisableCMD="Prevent access to the command prompt"
DisableCMDScripts="Disable the command prompt script processing also?"
DisableCMD_YES="Yes"
DisableCMD_NO="No"
DisableExplorerRunLegacy_Help="Ignores the customized run list.\n\nYou can create a customized list of additional programs and documents that the system starts automatically when it runs on Windows XP, Windows 2000, Windows NT 4.0 and earlier. These programs are added to the standard run list of programs and services that the system starts.\n\nIf you enable this setting, the system ignores the run list for Windows NT 4.0, Windows 2000, and Windows XP.\n\nIf you disable or do not configure this setting, Windows 2000 adds any customized run list configured for Windows NT 4.0 and earlier to its run list.n\nThis setting appears in the Computer Configuration and User Configuration folders. If both policies are configured, the setting in Computer Configuration takes precedence over the setting in User Configuration.\n\nNote: To create a customized run list by using a policy, use the "Run these applications at startup" setting.\n\nThe customized run lists for Windows NT 4.0 and earlier are stored in the registry in HKEY_LOCAL_MACHINE\Software\Microsoft\Windows\CurrentVersion\Run and HKEY_CURRENT_USER\Software\Microsoft\Windows NT\CurrentVersion\Windows\Run. They can be configured by using the "Run" setting in System Policy Editor for Windows NT 4.0 and earlier.\n\nAlso, see the "Do not process the run once list" setting."
DisableExplorerRunLegacy="Do not process the legacy run list"
DisableExplorerRunOnceLegacy_Help="Ignores customized run-once lists.\n\nYou can create a customized list of additional programs and documents that are started automatically the next time the system starts (but not thereafter). These programs are added to the standard list of programs and services that the system starts.\n\nIf you enable this setting, the system ignores the run-once list.\n\nIf you disable this setting or do not configure it, the system runs the programs in the run-once list.\n\nThis setting appears in the Computer Configuration and User Configuration folders. If both settings are configured, the setting in Computer Configuration takes precedence over the setting in User Configuration.\n\nNote: Customized run-once lists are stored in the registry in HKEY_LOCAL_MACHINE\Software\Microsoft\Windows\CurrentVersion\RunOnce.\n\nAlso, see the "Do not process the legacy run list" setting."
DisableExplorerRunOnceLegacy="Do not process the run once list"
DisableFRAdminPin="Do not automatically make redirected folders available offline"
DisableFRAdminPin_Help="All redirected shell folders, such as My Documents, Desktop, Start Menu, and Application Data, are available offline by default. This setting allows you to change this behavior so that redirected shell folders are not automatically available for offline use. However, users can still choose to make files and folders available offline themselves.\n\nIf you enable this setting, the users must manually select the files they wish to be made available offline.\n\nIf you disable this setting or do not configure it, redirected shell folders are automatically made available offline. All subfolders within the redirected folders are also made available offline.\n\nNote: This setting does not prevent files from being automatically cached if the network share is configured for "Automatic Caching", nor does it affect the availability of the "Make Available Offline" menu option in the user interface.\n\nNote: Do not enable this setting unless you are certain that users will not need access to all of their redirected files in the event that the network or server holding the redirected files becomes unavailable."
DisableLockComputer_Help="Prevents users from locking the system.\n\nWhile locked, the desktop is hidden and the system cannot be used. Only the user who locked the system or the system administrator can unlock it.\n\nTip:To lock a computer without configuring a setting, press Ctrl+Alt+Delete, and then click "Lock Computer.""
DisableLockComputer="Remove Lock Computer"
DisableLogoff="Remove Logoff"
DisableMedia_Help="Prevents users from installing programs from removable media.\n\nIf a user tries to install a program from removable media, such as CD-ROMs, floppy disks, and DVDs, a message appears, stating that the feature cannot be found.\n\nThis setting applies even when the installation is running in the user's security context.\n\nIf you disable this setting or do not configure it, users can install from removable media when the installation is running in their own security context, but only system administrators can use removable media when an installation is running with elevated system privileges, such as installations offered on the desktop or in Add or Remove Programs.\n\nAlso, see the "Enable user to use media source while elevated setting" in Computer Configuration\Administrative Templates\Windows Components\Windows Installer.\n\nAlso, see the "Hide the 'Add a program from CD-ROM or floppy disk' option" setting in User Configuration\Administrative Templates\Control Panel\Add/Remove Programs."
DisableMedia="Prevent removable media source for any install"
DisableMSI_Help="Disables or restricts the use of Windows Installer.\n\nThis setting can prevent users from installing software on their systems or permit users to install only those programs offered by a system administrator.\n\nIf you enable this setting, you can use the options in the Disable Windows Installer box to establish an installation setting.\n\n-- The "Never" option indicates that Windows Installer is fully enabled. Users can install and upgrade software. Windows Installer is enabled by default on Windows 2000.\n\n-- The "For non-managed apps only" option permits users to install only those programs that a system administrator assigns (offers on the desktop) or publishes (adds them to Add or Remove Programs).\n\n-- The "Always" option indicates that Windows Installer is disabled.\n\nThis setting affects Windows Installer only. It does not prevent users from using other methods to install and upgrade programs."
DisableMSI="Disable Windows Installer"
DisableNever="Never"
DisableNonManaged="For non-managed apps only"
DisablePatch_Help="Prevents users from using Windows Installer to install patches.\n\nPatches are updates or upgrades that replace only those program files that have changed. Because patches can be easy vehicles for malicious programs, some installations prohibit their use.\n\nNote: This setting applies only to installations that run in the user's security context. By default, users who are not system administrators cannot apply patches to installations that run with elevated system privileges, such as those offered on the desktop or in Add or Remove Programs.\n\nAlso, see the "Enable user to patch elevated products" setting."
DisablePatch="Prohibit patching"
DisablePersonalDirChange_Help="Prevents users from changing the path to the My Documents folder.\n\nBy default, a user can change the location of the My Documents folder by typing a new path in the Target box of the My Documents Properties dialog box.\n\nIf you enable this setting, users are unable to type a new location in the Target box."
DisablePersonalDirChange="Prohibit user from changing My Documents path"
DisableRegedit_Help="Disables the Windows registry editors, Regedit.exe and Regedit.exe.\n\nIf this setting is enabled and the user tries to start a registry editor, a message appears explaining that a setting prevents the action.\n\nTo prevent users from using other administrative tools, use the "Run only allowed Windows applications" setting."
DisableRegedit="Prevent access to registry editing tools"
DisableRollback_Help="Prohibits Windows Installer from generating and saving the files it needs to reverse an interrupted or unsuccessful installation.\n\nThis setting prevents Windows Installer from recording the original state of the system and sequence of changes it makes during installation. It also prevents Windows Installer from retaining files it intends to delete later. As a result, Windows Installer cannot restore the computer to its original state if the installation does not complete.\n\nThis setting is designed to reduce the amount of temporary disk space required to install programs. Also, it prevents malicious users from interrupting an installation to gather data about the internal state of the computer or to search secure system files. However, because an incomplete installation can render the system or a program inoperable, do not use this setting unless it is essential.\n\nThis setting appears in the Computer Configuration and User Configuration folders. If the setting is enabled in either folder, it is considered be enabled, even if it is explicitly disabled in the other folder."
DisableRollback="Prohibit rollback"
DisableStatusMessages_Help="Suppresses system status messages.\n\nIf you enable this setting, the system does not display a message reminding users to wait while their system starts or shuts down, or while users log on or off."
DisableStatusMessages="Remove Boot / Shutdown / Logon / Logoff status messages"
DisableSystemPolicy_Help="Disables System Policy designed for Windows NT 4.0 and earlier.\n\nIn Windows 2000, Group Policy replace the System Policy that System Policy Editor created on Windows NT 4.0 and earlier. However, Windows 2000 continues to support System Policy for installations that use them.\n\nIf you enable this setting, the system does not recognize or implement System Policy. However, it continues its full support for Group Policy."
DisableSystemPolicy="Disable System Policy (use Group Policy only)"
DisableTaskMgr_Help="Prevents users from starting Task Manager (Taskmgr.exe).\n\nIf this setting is enabled and users try to start Task Manager, a message appears explaining that a policy prevents the action.\n\nTask Manager lets users start and stop programs; monitor the performance of their computers; view and monitor all programs running on their computers, including system services; find the executable names of programs; and change the priority of the process in which programs run."
DisableTaskMgr="Remove Task Manager"
DisableUsersFromMachGP="Remove users ability to invoke machine policy refresh"
DisableUsersFromMachGP_Help="This setting allows you to control a user's ability to invoke a computer policy refresh.\n\nIf you enable this setting, users may not invoke a refresh of computer policy. Computer policy will still be applied at startup or when an official policy refresh occurs.\n\nIf you disable or do not configure this setting, the default behavior applies. By default, computer policy is applied when the computer starts up. It also applies at a specified refresh interval or when manually invoked by the user.\n\nNote: This setting only applies to nonadministrators. Administrators can still invoke a refresh of computer policy at any time, no matter how this policy is configured.\n\nAlso, see the "Group Policy refresh interval for computers" setting to change the policy refresh interval."
DisallowApps_Help="Prevents Windows from running the programs you specify in this setting.\n\nIf you enable this setting, users cannot run programs that you add to the list of disallowed applications.\n\nThis setting only prevents users from running programs that are started by the Windows Explorer process. It does not prevent users from running programs, such as Task Manager, that are started by the system process or by other processes. Also, if you permit users to gain access to the command prompt, Cmd.exe, this setting does not prevent them from starting programs in the command window that they are not permitted to start by using Windows Explorer. Note: To create a list of disallowed applications, click Show, click Add, and then enter the application executable name (e.g., Winword.exe, Poledit.exe, Powerpnt.exe)."
DisallowApps_Tip1=" "
DisallowApps_Tip2="To create a list of disallowed applications, click Show,"
DisallowApps_Tip3="then Add, and enter the application executable name"
DisallowApps="Don't run specified Windows applications"
DisallowAppsList="List of disallowed applications"
DisallowCpls_Help="Hides specified Control Panel items and folders.\n\nThis setting removes Control Panel items (such as Display) and folders (such as Fonts) from the Control Panel window and the Start menu. It can remove Control Panel items you have added to your system, as well as Control Panel items included in Windows 2000.\n\nTo hide a Control Panel item, type the file name of the item, such as Ncpa.cpl (for Network). To hide a folder, type the folder name, such as Fonts.\n\nThis setting affects the Start menu and Control Panel window only. It does not prevent users from running Control Panel items.\n\nAlso, see the "Remove Display in Control Panel" setting in User Configuration\Administrative Templates\Control Panel\Display.\n\nIf both the "Hide specified Control Panel applets" setting and the "Show only specified Control Panel applets" setting are enabled, and the same item appears in both lists, the "Show only specified Control Panel applets" setting is ignored.\n\nNote: To find the file name of a Control Panel item, search for files with the .cpl file name extension in the %Systemroot%\System32 directory. Note: To create a list of disallowed Control Panel applets, click Show, click Add, and then enter the Control Panel file name (ends with .cpl) or the name displayed under that item in the Control Panel. (e.g., desk.cpl, powercfg.cpl, Printers and Faxes)\n\nNote: This setting does not affect the Categories that are displayed in the new Control Panel Category view in Windows XP. If you want to control which items are displayed in Control Panel, enable the "Force classic Control Panel Style" setting to remove the Category view, and then use this setting to control which .cpls are not displayed."
DisallowCpls="Hide specified Control Panel applets"
DisallowCplsList="List of disallowed Control Panel applets"
DNS_RegistrationRefreshInterval_Help="Specifies the Registration Refresh Interval of A and PTR resource records for computers to which this setting is applied. This setting may be applied to computers using dynamic update only.\n\nComputers running Windows 2000 and Windows XP, and configured to perform dynamic DNS registration of A and PTR resource records, periodically reregister their records with DNS servers, even if their records’ data has not changed. This reregistration is required to indicate to DNS servers configured to automatically remove (scavenge) stale records that these records are current and should be preserved in the database.\n\nWarning: If the DNS resource records are registered in zones with scavenging enabled, the value of this setting should never be longer than the Refresh Interval configured for these zones. Setting the Registration Refresh Interval to longer than the Refresh Interval of the DNS zones might result in the undesired deletion of A and PTR resource records.\n\nTo specify the Registration Refresh Interval, click Enable, and then enter a value larger than 1800. Remember, this value specifies the Registration Refresh Interval in seconds, for example, 1800 seconds is 30 minutes.\n\nIf this setting is not configured, it is not applied to any computers, and computers use their local configuration."
DNS_RegistrationRefreshIntervalLabel="Seconds:"
DNS_RegistrationEnabled="Dynamic Update"
DNS_RegistrationEnabled_Help="Determines if dynamic update is enabled.\n\nComputers configured for dynamic update automatically register and update their DNS resource records with a DNS server.\n\nIf you enable this setting, the computers to which this setting is applied may use dynamic DNS registration on each of their network connections, depending on the configuration of each individual network connection. For a dynamic DNS registration to be enabled on a specific network connection, it is necessary and sufficient that both computer-specific and connection-specific configurations allow dynamic DNS registration. This setting controls the computer-specific property controlling dynamic DNS registration. If you enable this setting, you allow dynamic update to be set individually for each of the network connections.\n\nIf you disable this setting, the computers to which this setting is applied may not use dynamic DNS registration for any of their network connections, regardless of the configuration for individual network connections.\n\nIf this setting is not configured, it is not applied to any computers, and computers use their local configuration."
DNS_RegistrationOverwritesInConflict="Replace Addresses In Conflicts"
DNS_RegistrationOverwritesInConflict_Help="Determines whether a DNS client that attempts to register its A resource record should overwrite an existing A resource record or records containing conflicting IP addresses.\n\nThis setting is designed for computers that register A resource records in DNS zones that do not support Secure Dynamic Update. Secure Dynamic Update preserves ownership of resource records and does not allow a DNS client to overwrite records that are registered by other computers.\n\nDuring dynamic update of a zone that does not use Secure Dynamic Update, a DNS client may discover that an existing A resource record associates the client’s host DNS name with an IP address of a different computer. According to the default configuration, the DNS client attempts to replace the existing A resource record with an A resource record associating the DNS name with the client’s IP address.\n\nIf you enable this setting, DNS clients attempt to replace conflicting A resource records during dynamic update.\n\nIf you disable this setting, the DNS client still performs the dynamic update of A resource records, but if the DNS client attempts to update A resource records containing conflicts, this attempt fails and an error is recorded in the Event Viewer log.\n\nIf this setting is not configured, it is not applied to any computers, and computers use their local configuration."
DNS_RegisterReverseLookup="Register PTR Records"
DNS_RegisterReverseLookup_Help="Determines whether the registration of PTR resource records is enabled for the computers to which this policy is applied.\n\nBy default, DNS clients configured to perform dynamic DNS registration attempt PTR resource record registration only if they successfully registered the corresponding A resource record. “A” resource records map a host DNS name to the host IP address, and “PTR” resource records map the host IP address to the host DNS name.\n\nTo enable this setting, click Enable, and then select one of the following values:\n\nDo not register - computers never attempt PTR resource records registration.\n\nRegister - computers attempt PTR resource records registration regardless of the success of the A records registration.\n\nRegister only if A record registration succeeds – computers attempt PTR resource records registration only if they successfully registered the corresponding A resource records.\n\nIf this setting is not configured, it is not applied to any computers, and computers use their local configuration."
DNS_RegisterReverseLookup_DoNotRegister="Do not register"
DNS_RegisterReverseLookup_RegisterOnlyIfASucceeds="Register only if A record registration succeeds "
DNS_Domain="Connection-Specific DNS Suffix"
DNS_Domain_Help="Specifies a connection-specific DNS suffix. This setting supersedes the connection-specific DNS suffixes set on the computers to which this setting is applied, those configured locally and those configured using DHCP.\n\nWarning: A connection-specific DNS suffix specified in this setting is applied to all the network connections used by multihomed computers to which this setting is applied.\n\nTo use this setting, click Enable, and then enter a string value representing the DNS suffix in the available field.\n\nIf this setting is not configured, it is not applied to any computers, and computers use their local or DHCP-configuration parameters."
DNS_DomainLabel="DNS Suffix:"
DNS_RegisterAdapterName="Register DNS records with connection-specific DNS suffix"
DNS_RegisterAdapterName_Help="Determines if a computer performing dynamic registration may register A and PTR resource records with a concatenation of its Computer Name and a connection-specific DNS suffix, in addition to registering these records with a concatenation of its Computer Name and the Primary DNS suffix.\n\nWarning: Enabling of this group setting is applied to all the network connections of multihomed computers to which this setting is applied.\n\nBy default, a DNS client performing dynamic DNS registration registers A and PTR resource records with a concatenation of its Computer Name and the primary DNS suffix. For example, a concatenation of a Computer Name, such as "mycomputer", and the primary DNS suffix, such as "microsoft.com", would result in "mycomputer.microsoft.com".\n\nIf this setting were enabled, a computer would register A and PTR resource records with its connection-specific DNS suffix in addition to registering A and PTR resource records with the primary DNS suffix. For example, a concatenation of a Computer Name "mycomputer" and the connection specific DNS suffix "VPNconnection" would be used when registering A and PTR resource records, resulting in "mycomputer.VPNconnection". Notice that if dynamic DNS registration is disabled on a computer to which this setting is applied, then, regardless of this setting’s settings, a computer does not attempt dynamic DNS registration of A and PTR records containing a concatenation of its Computer Name and a connection-specific DNS suffix. If dynamic DNS registration is disabled on a specific network connection of a computer to which this setting is applied, then, regardless of this setting’s settings, a computer does not attempt dynamic DNS registration of A and PTR records containing a concatenation of its Computer Name and a connection-specific DNS suffix on that network connection.\n\nIf this setting is disabled, a DNS client does not register A and PTR resource records with its connection-specific DNS suffix.\n\nIf this setting is not configured, it is not applied to any computers, and computers use their local configuration."
DNS_NameServer="DNS Servers"
DNS_NameServer_Help="Defines the DNS servers to which a computer sends queries when it attempts to resolve names.\n\nWarning: The list of the DNS servers defined in this setting supersedes DNS servers configured locally and those configured using DHCP. The list of DNS servers is applied to all network connections of multihomed computers to which this setting is applied.\n\nTo use this setting, click Enable, and then enter a space-delimited list of IP addresses (in dotted decimal format) in the available field. If you enable this setting, you must enter at least one IP address.\n\nIf this setting is not configured, it is not applied to any computers, and computers use their local or DHCP-configured parameters."
DNS_NameServerLabel="IP Addresses:"
DNS_SearchList="DNS Suffix Search List"
DNS_SearchList_Help="Determines the DNS suffixes to attach to an unqualified single-label name before submission of a DNS query for that name.\n\nAn unqualified single-label name contains no dots, such as "example". This is different from a fully qualified domain name, such as "example.microsoft.com.".\n\nWith this setting enabled, when a user submits a query for a single-label name, such as "example", a local DNS client attaches a suffix, such as "microsoft.com", resulting in the query "example.microsoft.com", before sending the query to a DNS server.\n\nIf you enable this setting, you can specify the DNS suffixes to attach before submission of a query for an unqualified single-label name. The values of the DNS suffixes in this setting may be set using comma-separated strings, such as "microsoft.com,serverua.microsoft.com,office.microsoft.com". One DNS suffix is attached for each submission of a query. If a query is unsuccessful, a new DNS suffix is added in place of the failed suffix, and this new query is submitted. The values are used in the order they appear in the string, starting with the leftmost value and preceding to the right.\n\nIf you enable this setting, you must specify at least one suffix.\n\nIf you disable this setting, the primary DNS suffix and network connection-specific DNS suffixes are appended to the unqualified queries.\n\nIf this setting is not configured, it is not applied to any computers, and computers use their local configuration."
DNS_SearchListLabel="DNS Suffixes:"
DNS_UseDomainNameDevolution="Primary DNS Suffix Devolution"
DNS_UseDomainNameDevolution_Help="Determines whether the DNS client performs primary DNS suffix devolution in a name resolution process.\n\nWhen a user submits a query for a single-label name, such as "example", a local DNS client attaches a suffix, such as "microsoft.com", resulting in the query "example.microsoft.com", before sending the query to a DNS server.\n\nIf a DNS Suffix Search List is not specified, the DNS client attaches the Primary DNS Suffix to a single-label name, and, if this query fails, the Connection-Specific DNS suffix is attached for a new query. If none of these queries are resolved, the client devolves the Primary DNS Suffix of the computer (drops the leftmost label of the Primary DNS Suffix), attaches this devolved Primary DNS suffix to the single-label name, and submits this new query to a DNS server.\n\nFor example, if the primary DNS suffix ooo.aaa.microsoft.com is attached to the non-dot-terminated single-label name "example," and the DNS query for example.ooo.aaa.reskit.com fails, the DNS client devolves the primary DNS suffix (drops the leftmost label), and submits a query for example.aaa.microsoft.com. If this query fails, the primary DNS suffix is devolved further and the query example.microsoft.com is submitted. If this query fails, devolution continues and the query example.microsoft.com is submitted. The primary DNS suffix would not be devolved further because the DNS suffix has two labels, "microsoft.com". The primary DNS suffix cannot be devolved to less than two labels.\n\nIf this setting is enabled, DNS clients on the computers to which this setting is applied attempt to resolve names that are concatenations of the single-label name to be resolved and the devolved Primary DNS Suffix.\n\nIf this setting is disabled, DNS clients on the computers to which this setting is applied donot attempt to resolve names that are concatenations of the single-label name to be resolved and the devolved Primary DNS Suffix.\n\nIf this setting is not configured, it is not applied to any computers, and computers use their local configuration."
DNS_PrimaryDnsSuffix_Help="Specifies the primary Domain Name System (DNS) suffix for all affected computers. The primary DNS suffix is used in DNS name registration and DNS name resolution.\n\nThis setting lets you specify a primary DNS suffix for a group of computers and prevents users, including administrators, from changing it.\n\nIf you disable this setting or do not configure it, each computer uses its local primary DNS suffix, which is usually the DNS name of Active Directory domain to which it is joined. However, administrators can use System in Control Panel to change the primary DNS suffix of a computer.\n\nTo use this setting, in the text box provided, type the entire primary DNS suffix you want to assign. For example, microsoft.com.\n\nThis setting does not disable the DNS Suffix and NetBIOS Computer Name dialog box that administrators use to change the primary DNS suffix of a computer. However, if administrators enter a suffix, that suffix is ignored while this setting is enabled.\n\nImportant: To make changes to this setting effective, you must restart Windows 2000 on all computers affected by the setting.\n\nNote: To change the primary DNS suffix of a computer without setting a setting, click System in Control Panel, click the Network Identification tab, click Properties, click More, and then enter a suffix in the "Primary DNS suffix of this computer" box.\n\nFor more information about DNS, see "Domain Name System (DNS)" in Help."
DNS_PrimaryDnsSuffix="Primary DNS Suffix"
DNS_PrimaryDnsSuffixBox="Enter a primary DNS suffix:"
DNS_RegistrationTtl="TTL Set in the A and PTR records"
DNS_RegistrationTtl_Help="Specifies the value for the Time-To-Live (TTL) field in A and PTR resource records registered by the computers to which this setting is applied.\n\nTo specify the TTL, click Enable, and then enter a value in seconds (for example, the value 900 is 15 minutes).\n\nIf this setting is not configured, it is not applied to any computer."
DNS_RegistrationTtlLabel="Seconds:"
DNS_UpdateSecurityLevel="Update Security Level"
DNS_UpdateSecurityLevel_Help="Specifies whether the computers to which this setting is applied use secure dynamic update or standard dynamic update for registration of DNS records.\n\nTo enable this setting, click Enable, and then choose one of the following values.\n\nUnsecure followed by secure - if this option is chosen, computers send secure dynamic updates only when nonsecure dynamic updates are refused.\n\nOnly Unsecure - if this option is chosen, computers send only nonsecure dynamic updates.\n\nOnly Secure - if this option is chosen, computers send only secure dynamic updates.\n\nIf this setting is not configured, it is not applied to any computers, and computers use their local configuration."
DNS_UpdateSecurityLevel_UnsecureFollowedBySecure="Unsecure followed by Secure"
DNS_AppendToMultiLabelName="Append DNS Suffixes to resolve multi-label names"
DNS_AppendToMultiLabelName_Help="Determines whether local a DNS client should attach DNS suffixes to a multi-label, non-dot-terminated name prior to submission of a DNS query for that name.\n\nA multi-label, non-dot-terminated name contains at least one dot, but not as its first or last character, for example, "www.microsoft.com".\n\nWith this setting enabled, when a user submits a query for a multi-label, non-dot-terminated name, such as "www.microsoft.com", a local DNS client attempts to resolve the name as is, that is, as "www.microsoft.com." or "www.hr". If such name resolution fails, then DNS client attaches a suffix, such as "microsoft.com" or "example.net", resulting in the query "www.microsoft.com.microsoft.com." or "www.hr.example.net", and sends the query to a DNS server.\n\nWith this setting disabled, when a user submits a query for a multi-label, non-dot-terminated name, such as "www.microsoft.com" or "www.hr", a local DNS client attempts to resolve the name only as is, that is, as "www.microsoft.com." or "www.hr". Regardless of the query result, the DNS client does not attempt to attach any DNS suffix to the specified name, and it resolves the query for the concatenated name.\n\nIf this setting is not configured, it is not applied to any computers, and computers use their local configuration.
DNS_UpdateTopLevelDomainZones="Update Top Level Domain Zones"
DNS_UpdateTopLevelDomainZones_Help="Specifies whether the computers to which this setting is applied may send dynamic updates to the zones named with a single label name, also known as top-level domain zones, for example, “com”.\n\nBy default, a DNS client configured to perform dynamic DNS update sends dynamic updates to the DNS zone that is authoritative for its DNS resource records, unless the authoritative zone is a top-level domain and root zone.\n\nIf this setting is enabled, computers to which this policy is applied send dynamic updates to any zone that is authoritative for the resource records that the computer needs to update, except the root zone.\n\nIf this setting is disabled, computers to which this policy is applied do not send dynamic updates to the root and/or top-level domain zones that are authoritative for the resource records that the computer needs to update.\n\nIf this setting is not configured, it is not applied to any computers, and computers use their local configuration."
DOnly="Restrict D drive only"
DownlevelBrowse_Help="Allows users to use the Add Printer Wizard to search the network for shared printers.\n\nIf you enable this setting or do not configure it, when users click "Add a network printer" but do not type the name of a particular printer, the Add Printer Wizard displays a list of all shared printers on the network and invites users to choose a printer from among them.\n\nIf you disable this setting, the network printer browse page is removed from within the Add Printer Wizard, and users cannot search the network but must type a printer name.\n\nNote: This setting affects the Add Printer Wizard only. It does not prevent users from using other programs to search for shared printers or to connect to network printers."
DownlevelBrowse="Browse the network to find printers"
DQ_Enable_Help="Enables and disables disk quota management on all NTFS volumes of the computer, and prevents users from changing the setting.\n\nIf you enable this setting, disk quota management is enabled, and users cannot disable it.\n\nIf you disable the setting, disk quota management is disabled, and users cannot enable it.\n\nIf this setting is not configured, disk quota management is disabled by default, but administrators can enable it.\n\nTo prevent users from changing the setting while a setting is in effect, the system disables the "Enable quota management" option on the Quota tab of NTFS volumes.\n\nNote: This setting enables disk quota management but does not establish or enforce a particular disk quota limit. To specify a disk quota limit, use the "Default quota limit and warning level" setting. Otherwise, the system uses the physical space on the volume as the quota limit.\n\nNote: To enable or disable disk quota management without specifying a setting, in My Computer, right-click the name of an NTFS volume, click Properties, click the Quota tab, and then click the "Enable quota management" option."
DQ_Enable="Enable disk quotas"
DQ_Enforce_Help="Determines whether disk quota limits are enforced and prevents users from changing the setting.\n\nIf you enable this setting, disk quota limits are enforced. If you disable this setting, disk quota limits are not enforced. When you enable or disable the setting, the system disables the "Deny disk space to users exceeding quota limit" option on the Quota tab so administrators cannot make changes while the setting is in effect.\n\nIf the setting is not configured, the disk quota limit is not enforced by default, but administrators change the setting.\n\nEnforcement is optional. When users reach an enforced disk quota limit, the system responds as though the physical space on the volume were exhausted. When users reach an unenforced limit, their status in the Quota Entries window changes, but they can continue to write to the volume as long as physical space is available.\n\nNote: This setting overrides user settings that enable or disable quota enforcement on their volumes.\n\nNote: To specify a disk quota limit, use the "Default quota limit and warning level" setting. Otherwise, the system uses the physical space on the volume as the quota limit."
DQ_Enforce="Enforce disk quota limit"
DQ_Limit_Help="Specifies the default disk quota limit and warning level for new users of the volume.\n\nThis setting determines how much disk space can be used by each user on each of the NTFS file system volumes on a computer. It also specifies the warning level, the point at which the user's status in the Quota Entries window changes to indicate that the user is approaching the disk quota limit.\n\nThis setting overrides new users’ settings for the disk quota limit and warning level on their volumes, and it disables the corresponding options in the "Select the default quota limit for new users of this volume" section on the Quota tab.\n\nThis setting applies to all new users as soon as they write to the volume. It does not affect disk quota limits for current users or affect customized limits and warning levels set for particular users (on the Quota tab in Volume Properties).\n\nIf you disable this setting or do not configure it, the disk space available to users is not limited. The disk quota management feature uses the physical space on each volume as its quota limit and warning level.\n\nWhen you select a limit, remember that the same limit applies to all users on all volumes, regardless of actual volume size. Be sure to set the limit and warning level so that it is reasonable for the range of volumes in the group.\n\nThis setting is effective only when disk quota management is enabled on the volume. Also, if disk quotas are not enforced, users can exceed the quota limit you set. When users reach the quota limit, their status in the Quota Entries window changes, but users can continue to write to the volume."
DQ_Limit="Default quota limit and warning level"
DQ_LimitLabel="Default quota limit:"
DQ_LimitTip1="Specify a quota limit and warning level applied to users when"
DQ_LimitTip2="they first write to a quota-enabled volume."
DQ_LimitUnits="Units"
DQ_LimitValue="Value"
DQ_LogEventOverLimit_Help="Determines whether the system records an event in the local Application log when users reach their disk quota limit on a volume, and prevents users from changing the logging setting.\n\nIf you enable this setting, the system records an event when the user reaches their limit. If you disable this setting, no event is recorded. Also, when you enable or disable this setting, the system disables the "Log event when a user exceeds their quota limit" option on the Quota tab, so administrators cannot change the setting while a setting is in effect.\n\nIf the setting is not configured, no events are recorded, but administrators can use the Quota tab option to change the setting.\n\nThis setting is independent of the enforcement settings for disk quotas. As a result, you can direct the system to log an event, regardless of whether or not you choose to enforce the disk quota limit.\n\nAlso, this setting does not affect the Quota Entries window on the Quota tab. Even without the logged event, users can detect that they have reached their limit, because their status in the Quota Entries window changes.\n\nNote: To find the logging option, in My Computer, right-click the name of an NTFS file system volume, click Properties, and then click the Quota tab."
DQ_LogEventOverLimit="Log event when quota limit exceeded"
DQ_LogEventOverThreshold_Help="Determines whether the system records an event in the Application log when users reach their disk quota warning level on a volume.\n\nIf you enable this setting, the system records an event. If you disable this setting, no event is recorded. When you enable or disable the setting, the system disables the corresponding "Log event when a user exceeds their warning level" option on the Quota tab, so that administrators cannot change logging while a setting is in effect.\n\nIf the setting is not configured, no event is recorded, but administrators can use the Quota tab option to change the logging setting.\n\nThis setting does not affect the Quota Entries window on the Quota tab. Even without the logged event, users can detect that they have reached their warning level because their status in the Quota Entries window changes.\n\nNote: To find the logging option, in My Computer, right-click the name of an NTFS file system volume, click Properties, and then click the Quota tab."
DQ_LogEventOverThreshold="Log event when quota warning level exceeded"
DQ_RemovableMedia_Help="Extends the disk quota policies in this folder to NTFS file system volumes on removable media.\n\nIf you disable this setting or do not configure it, the disk quota policies established in this folder apply to fixed-media NTFS volumes only. Note: When this setting is applied, the computer will apply the disk quota to both fixed and removable media."
DQ_RemovableMedia="Apply policy to removable media"
DQ_ThresholdLabel="Default warning level:"
DQ_ThresholdUnits="Units"
DQ_ThresholdValue="Value"
DQ_UnitsEB="EB"
DQ_UnitsGB="GB"
DQ_UnitsKB="KB"
DQ_UnitsMB="MB"
DQ_UnitsPB="PB"
DQ_UnitsTB="TB"
DragAndDrop="Prohibit Drag-and-Drop"
DragAndDropHelp="Prevents users from adding or removing tasks by moving or copying programs in the Scheduled Tasks folder.\n\nThis setting disables the Cut, Copy, Paste, and Paste shortcut items on the context menu and the Edit menu in Scheduled Tasks. It also disables the drag-and-drop features of the Scheduled Tasks folder.\n\nAs a result, users cannot add new scheduled tasks by dragging, moving, or copying a document or program into the Scheduled tasks folder.\n\nThis setting does not prevent users from using other methods to create new tasks, and it does not prevent users from deleting tasks.\n\nNote: This setting appears in the Computer Configuration and User Configuration folders. If both settings are configured, the setting in Computer Configuration takes precedence over the setting in User Configuration."
DriverSearchPlaces_Help="This setting configures the location that Windows searches for drivers when a new piece of hardware is found.\n\nBy default, Windows searches the following places for drivers: local installation, floppy drives, CD-ROM drives, Windows Update.\n\nUsing this setting, you may remove any or all of these from the search algorithm.\n\nIf you enable this setting, you can remove any of the three locations by selecting the associated check box beside the location name.\n\nIf you disable or do not configure this setting, Windows searches the location installation, floppy drives, CD-ROM drives, and Windows Update for drivers."
DriverSearchPlaces_Floppies="Don't search floppy disk drives"
DriverSearchPlaces_WindowsUpdate="Don't search Windows Update"
DriverSign_Block="Block"
DriverSign_None="Ignore"
DriverSign_Warn="Warn"
DriverSigning_Help="Determines how the system responds when a user tries to install device driver files that are not digitally signed.\n\nThis setting establishes the least secure response permitted on the systems of users in the group. Users can use System in Control Panel to select a more secure setting, but when this setting is enabled, the system does not implement any setting less secure than the one the setting established.\n\nWhen you enable this setting, use the drop-down box to specify the desired response.\n\n-- "Ignore" directs the system to proceed with the installation even if it includes unsigned files.\n\n-- "Warn" notifies the user that files are not digitally signed and lets the user decide whether to stop or to proceed with the installation and whether to permit unsigned files to be installed. "Warn" is the default.\n\n-- "Block" directs the system to refuse to install unsigned files. As a result, the installation stops, and none of the files in the driver package are installed.\n\nTo change driver file security without specifying a setting, use System in Control Panel. Right-click My Computer, click Properties, click the Hardware tab, and then click the Driver Signing button."
DriverSigning="Code signing for device drivers"
DriverSigningOp="When Windows detects a driver file without a digital signature:"
EnableAdminTSRemote_Help="Allows Terminal Services administrators to install and configure programs remotely.\n\nBy default, system administrators can install programs only when system administrators are logged on to the computer on which the program is being installed. This setting creates a special exception for computers running Terminal Services.\n\nThis setting affects system administrators only. Other users cannot install programs remotely."
EnableAdminTSRemote="Allow admin to install from Terminal Services session"
EnableSlowLinkDetect_Help="Disables the slow link detection feature.\n\nSlow link detection measures the speed of the connection between a user's computer and the remote server that stores the roaming user profile. When the system detects a slow link, the related settings in this folder tell the system how to respond.\n\nIf you enable this setting, the system does not detect slow connections or recognize any connections as being slow. As a result, the system does not respond to slow connections to user profiles, and it ignores the settings that tell the system how to respond to a slow connection.\n\nIf you disable this setting or do not configure it, slow link detection is enabled. The system measures the speed of the connection between the user's computer and profile server. If the connection is slow (as defined by the "Slow network connection timeout for user profiles" setting), the system applies the other settings set in this folder to determine how to proceed. By default, when the connection is slow, the system loads the local copy of the user profile."
EnableSlowLinkDetect="Do not detect slow network connections"
EnableSlowLinkUI="Prompt user when slow link is detected"
EnableSlowLinkUI_Help="Notifies users when their roaming profile is slow to load. The notice lets users decide whether to use a local copy or to wait for the roaming user profile.\n\nIf you disable this setting or do not configure it, when a roaming user profile is slow to load, the system does not consult the user. Instead, it loads the local copy of the profile. If you have enabled the "Wait for remote user profile" setting, the system loads the remote copy without consulting the user.\n\nThis setting and related settings in this folder together define the system's response when roaming user profiles are slow to load.\n\nTo adjust the time within which the user must respond to this notice, use the "Timeout for dialog boxes" setting.\n\nImportant: If the "Do not detect slow network connections" setting is enabled, this setting is ignored. Also, if the "Delete cached copies of roaming profiles" setting is enabled, there is no local copy of the roaming profile to load when the system detects a slow connection."
EnableUserControl_Help="Permits users to change installation options that typically are available only to system administrators.\n\nThis setting bypasses some of the security features of Windows Installer. It permits installations to complete that otherwise would be halted due to a security violation.\n\nThe security features of Windows Installer prevent users from changing installation options typically reserved for system administrators, such as specifying the directory to which files are installed. If Windows Installer detects that an installation package has permitted the user to change a protected option, it stops the installation and displays a message. These security features operate only when the installation program is running in a privileged security context in which it has access to directories denied to the user.\n\nThis setting is designed for less restrictive environments. It can be used to circumvent errors in an installation program that prevents software from being installed."
EnableUserControl="Enable user control over installs"
EnforcePoliciesOnly="Enforce Show Policies Only"
EnforcePoliciesOnly_Help="Prevents administrators from viewing or using Group Policy preferences.\n\nA Group Policy administration (.adm) file can contain both true settings and preferences. True settings, which are fully supported by Group Policy, must use registry entries in the Software\Policies or Software\Microsoft\Windows\CurrentVersion\Policies registry subkeys. Preferences, which are not fully supported, use registry entries in other subkeys.\n\nIf you enable this setting, the "Show Policies Only" command is turned on, and administrators cannot turn it off. As a result, Group Policy displays only true settings; preferences do not appear.\n\nIf you disable this setting or do not configure it, the "Show Policies Only" command is turned on by default, but administrators can view preferences by turning off the "Show Policies Only" command.\n\nNote: To find the "Show Policies Only" command, in Group Policy, click the Administrative Templates folder (either one), right-click the same folder, and then point to "View."\n\nIn Group Policy, preferences have a red icon to distinguish them from true settings, which have a blue icon."
EnforceShellExtensionSecurity_Help="This setting is designed to ensure that shell extensions can operate on a per-user basis. If you enable this setting, Windows is directed to only run those shell extensions that have either been approved by an administrator or that will not impact other users of the machine.\n\nA shell extension only runs if there is an entry in at least one of the following locations in registry.\n\nFor shell extensions that have been approved by the administrator and are available to all users of the computer, there must be an entry at HKEY_LOCAL_MACHINE\Software\Microsoft\Windows\CurrentVersion\Shell Extensions\Approved.\n\nFor shell extensions to run on a per-user basis, there must be an entry at HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Shell Extensions\Approved."
EnforceShellExtensionSecurity="Allow only per user or approved shell extensions"
Exclude_Tip1="You can enter multiple directory names, semi-colon separated,"
Exclude_Tip2="all relative to the root of the user's profile"
ExcludeDirectories_Help="Lets you add to the list of folders excluded from the user's roaming profile.\n\nThis setting lets you exclude folders that are normally included in the user's profile. As a result, these folders do not need to be stored by the network server on which the profile resides and do not follow users to other computers.\n\nBy default, the History, Local Settings, Temp, and Temporary Internet Files folders are excluded from the user's roaming profile.\n\nIf you enable this setting, you can exclude additional folders.\n\nIf you disable this setting or do not configure it, only the default folders are excluded.\n\nNote: You cannot use this setting to include the default folders in a roaming user profile."
ExcludeDirectories="Exclude directories in roaming profile"
ExcludeMessage="Prevent the following directories from roaming with the profile:"
Execution="Prevent Task Run or End"
ExecutionHelp="Prevents users from starting and stopping tasks manually.\n\nThis setting removes the Run and End Task items from the context menu that appears when you right-click a task. As a result, users cannot start tasks manually or force tasks to end before they are finished.\n\nNote: This setting appears in the Computer Configuration and User Configuration folders. If both settings are configured, the setting in Computer Configuration takes precedence over the setting in User Configuration."
ExplorerWindow="Windows Explorer window"
ForceActiveDesktopOn_Help="Enables Active Desktop and prevents users from disabling it.\n\nThis prevents users from trying to enable or disable Active Desktop while a policy controls it.\n\nIf you disable this setting or do not configure it, Active Desktop is disabled by default, but users can enable it.\n\nNote: If both the "Enable Active Desktop" setting and the "Disable Active Desktop" setting are enabled, the "Disable Active Desktop" setting is ignored. If the "Disable Active Desktop and Web view" setting (in User Configuration\Administrative Templates\Windows Components\Windows Explorer) is enabled, then Active Desktop is disabled and both of these settings are ignored."
ForceActiveDesktopOn_Tip="Allows HTML and JPEG Wallpaper"
ForceActiveDesktopOn="Enable Active Desktop"
ForceClassicControlPanel="Force classic Control Panel Style"
ForceClassicControlPanel_Help="This setting affects the visual style and presentation of the Control Panel.\n\nIt allows you to disable the new style of Control Panel, which is task-based, and use the Windows 2000 style, referred to as the "classic" Control Panel. The new Control Panel, referred to as the "simple" Control Panel, simplifies how users interact with settings by providing easy-to-understand tasks that help users get their work done quickly. The Control Panel allows the users to configure their computer, add or remove programs, and change settings.\n\nIf you enable this setting, Control Panel sets the classic Control Panel. The user cannot switch to the new simple style.\n\nIf you disable this setting, Control Panel is set to the task-based style. The user cannot switch to the classic Control Panel style.\n\nIf you do not configure it, the default is the task-based style, which the user can change."
ForceStartMenuLogoff_Help="Adds the "Log Off <username>" item to the Start menu and prevents users from removing it.\n\nIf you enable this setting, the Log Off <username> item appears in the Start menu. This setting also removes the Display Logoff item from Start Menu Options. As a result, users cannot remove the Log Off <username> item from the Start Menu.\n\nIf you disable this setting or do not configure it, users can use the Display Logoff item to add and remove the Log Off item.\n\nThis setting affects the Start menu only. It does not affect the Log Off item on the Windows Security dialog box that appears when you press Ctrl+Alt+Del.\n\nNote: To add or remove the Log Off item on a computer, click Start, click Settings, click Taskbar and Start Menu, click the Start Menu Options tab, and then, in the Start Menu Settings box, click Display Logoff.\n\nAlso, see "Remove Logoff" in User Configuration\Administrative Templates\System\Logon/Logoff."
ForceStartMenuLogoff="Add Logoff to the Start Menu"
DiskQuota="Disk Quotas"
GPDCOptionAny="Use any available domain controller"
GPDCOptionInherit="Inherit from Active Directory Snap-ins"
GPDCOptions_Help="Determines which domain controller the Group Policy snap-in uses.\n\n-- "Use the Primary Domain Controller" indicates that the Group Policy snap-in reads and writes changes to the domain controller designated as the PDC Operations Master for the domain.\n\n-- "Inherit from Active Directory Snap-ins" indicates that the Group Policy snap-in reads and writes changes to the domain controller that Active Directory Users and Computers or Active Directory Sites and Services snap-ins use.\n\n-- "Use any available domain controller" indicates that the Group Policy snap-in can read and write changes to any available domain controller.\n\nIf you disable this setting or do not configure it, the Group Policy snap-in uses the domain controller designated as the PDC Operations Master for the domain.\n\nNote: To change the PDC Operations Master for a domain, in Active Directory Users and Computers, right-click a domain, and then click "Operations Masters.""
GPDCOptionsDesc="When Group Policy is selecting a domain controller to use, it should:"
GPOnly_Tip1="The System.adm file you have loaded requires Group Policy"
GPOnly_Tip2="in Windows 2000. You cannot use the System Policy Editor"
GPOnly_Tip3="to display Windows 2000 Group Policy settings."
GPOnly_Tip4=" "
GPOnly_Tip5="Refer to the Group Policy White Paper for more information."
GPOnly="Unsupported Administrative Templates"
GPOnlyPolicy="System.adm"
GPO_Script_Tip="Range is 0 to 32000, use 0 for infinite wait time"
GPRefreshRate_C_Desc1="This setting allows you to customize how often Group Policy is applied"
GPRefreshRate_C_Desc2="to computers. The range is 0 to 64800 minutes (45 days)."
GPRefreshRate_DC_Desc1="This setting allows you to customize how often Group Policy is applied"
GPRefreshRate_DC_Desc2="to domain controllers. The range is 0 to 64800 minutes (45 days)."
GPRefreshRate_U_Desc1="This setting allows you to customize how often Group Policy is applied"
GPRefreshRate_U_Desc2="to users. The range is 0 to 64800 minutes (45 days)."
GPRefreshRate="Minutes:"
GPRefreshRateOffset_Desc1="This is a random time added to the refresh interval to prevent"
GPRefreshRateOffset_Desc2="all clients from requesting Group Policy at the same time."
GPRefreshRateOffset_Desc3="The range is 0 to 1440 minutes (24 hours)"
GPRefreshRateOffset="Minutes:"
GPTransferRate_Help="Defines a slow connection for purposes of applying and updating Group Policy.\n\nIf the rate at which data is transferred from the domain controller providing a policy update to the computers in this group is slower than the rate specified by this setting, the system considers the connection to be slow.\n\nThe system's response to a slow policy connection varies among policies. The program implementing the policy can specify the response to a slow link. Also, the policy processing settings in this folder lets you override the programs' specified responses to slow links.\n\nTo use this setting, in the "Connection speed" box, type a decimal number between 0 and 4,294,967,200 (0xFFFFFFA0), indicating a transfer rate in kilobits per second. Any connection slower than this rate is considered to be slow. If you type 0, all connections are considered to be fast.\n\nIf you disable this setting or do not configure it, the system uses the default value of 500 kilobits per second.\n\nThis setting appears in the Computer Configuration and User Configuration folders. The setting in Computer Configuration defines a slow link for policies in the Computer Configuration folder. The setting in User Configuration defines a slow link for settings in the User Configuration folder.\n\nAlso, see the "Do not detect slow network connections" and related policies in Computer Configuration\Administrative Templates\System\User Profile. Note: If the profile server has IP connectivity, the connection speed setting is used. If the profile server does not have IP connectivity, the SMB timing is used."
GPTransferRate="Group Policy slow link detection"
GreyMSIAds="Gray unavailable Windows Installer programs Start Menu shortcuts"
GreyMSIAds_Help="Displays Start menu shortcuts to partially installed programs in gray text.\n\nThis setting makes it easier for users to distinguish between programs that are fully installed and those that are only partially installed.\n\nPartially installed programs include those that a system administrator assigns using Windows Installer and those that users have configured for full installation upon first use.\n\nIf you disable this setting or do not configure it, all Start menu shortcuts appear as black text.\n\nNote: Enabling this setting can make the Start menu slow to open."
GroupPolicyRefreshRate_Help="Specifies how often Group Policy for computers is updated while the computer is in use (in the background). This setting specifies a background update rate only for Group Policies in the Computer Configuration folder.\n\nIn addition to background updates, Group Policy for the computer is always updated when the system starts.\n\nBy default, computer Group Policy is updated in the background every 90 minutes, with a random offset of 0 to 30 minutes.\n\nYou can specify an update rate from 0 to 64,800 minutes (45 days). If you select 0 minutes, the computer tries to update Group Policy every 7 seconds. However, because updates might interfere with users' work and increase network traffic, very short update intervals are not appropriate for most installations.\n\nIf you disable this setting, Group Policy is updated every 90 minutes (the default). To specify that Group Policy should never be updated while the computer is in use, select the "Turn off background refresh of Group Policy" policy.\n\nThe Group Policy refresh interval for computers policy also lets you specify how much the actual update interval varies. To prevent clients with the same update interval from requesting updates simultaneously, the system varies the update interval for each client by a random number of minutes. The number you type in the random time box sets the upper limit for the range of variance. For example, if you type 30 minutes, the system selects a variance of 0 to 30 minutes. Typing a large number establishes a broad range and makes it less likely that client requests overlap. However, updates might be delayed significantly.\n\nThis setting establishes the update rate for computer Group Policy. To set an update rate for user policies, use the "Group Policy refresh interval for users" setting (located in User Configuration\Administrative Templates\System\Group Policy).\n\nThis setting is only used when the "Turn off background refresh of Group Policy" setting is not enabled.\n\nNote: Consider notifying users that their policy is updated periodically so that they recognize the signs of a policy update. When Group Policy is updated, the Windows desktop is refreshed; it flickers briefly and closes open menus. Also, restrictions imposed by Group Policies, such as those that limit the programs users can run, might interfere with tasks in progress."
GroupPolicyRefreshRate="Group Policy refresh interval for computers"
GroupPolicyRefreshRateDC_Help="Specifies how often Group Policy is updated on domain controllers while they are running (in the background). The updates specified by this setting occur in addition to updates performed when the system starts.\n\nBy default, Group Policy on the domain controllers is updated every five minutes.\n\nYou can specify an update rate from 0 to 64,800 minutes (45 days). If you select 0 minutes, the domain controller tries to update Group Policy every 7 seconds. However, because updates might interfere with users' work and increase network traffic, very short update intervals are not appropriate for most installations.\n\nIf you disable this setting, the domain controller updates Group Policy every 5 minutes (the default). To specify that Group Policies for users should never be updated while the computer is in use, select the "Turn off background refresh of Group Policy" setting.\n\nThis setting also lets you specify how much the actual update interval varies. To prevent domain controllers with the same update interval from requesting updates simultaneously, the system varies the update interval for each controller by a random number of minutes. The number you type in the random time box sets the upper limit for the range of variance. For example, if you type 30 minutes, the system selects a variance of 0 to 30 minutes. Typing a large number establishes a broad range and makes it less likely that update requests overlap. However, updates might be delayed significantly.\n\nNote: This setting is used only when you are establishing policy for a domain, site, organizational unit (OU), or customized group. If you are establishing policy for a local computer only, the system ignores this setting."
GroupPolicyRefreshRateDC="Group Policy refresh interval for domain controllers"
GroupPolicyRefreshRateUser_Help="Specifies how often Group Policy for users is updated while the computer is in use (in the background). This setting specifies a background update rate only for the Group Policies in the User Configuration folder.\n\nIn addition to background updates, Group Policy for users is always updated when users log on.\n\nBy default, user Group Policy is updated in the background every 90 minutes, with a random offset of 0 to 30 minutes.\n\nYou can specify an update rate from 0 to 64,800 minutes (45 days). If you select 0 minutes, the computer tries to update user Group Policy every 7 seconds. However, because updates might interfere with users' work and increase network traffic, very short update intervals are not appropriate for most installations.\n\nIf you disable this setting, user Group Policy is updated every 90 minutes (the default). To specify that Group Policy for users should never be updated while the computer is in use, select the "Turn off background refresh of Group Policy" setting.\n\nThis setting also lets you specify how much the actual update interval varies. To prevent clients with the same update interval from requesting updates simultaneously, the system varies the update interval for each client by a random number of minutes. The number you type in the random time box sets the upper limit for the range of variance. For example, if you type 30 minutes, the system selects a variance of 0 to 30 minutes. Typing a large number establishes a broad range and makes it less likely that client requests overlap. However, updates might be delayed significantly.\n\nImportant: If the "Turn off background refresh of Group Policy" setting is enabled, this setting is ignored.\n\nNote: This setting establishes the update rate for user Group Policies. To set an update rate for computer Group Policies, use the "Group Policy refresh interval for computers" setting (located in Computer Configuration\Administrative Templates\System\Group Policy).\n\nTip: Consider notifying users that their policy is updated periodically so that they recognize the signs of a policy update. When Group Policy is updated, the Windows desktop is refreshed; it flickers briefly and closes open menus. Also, restrictions imposed by Group Policies, such as those that limit the programs a user can run, might interfere with tasks in progress."
GroupPolicyRefreshRateUser="Group Policy refresh interval for users"
ImmortalPrintQueue_Help="Determines whether the domain controller can prune (delete from Active Directory) the printers published by this computer.\n\nBy default, the pruning service on the domain controller prunes printer objects from Active Directory if the computer that published them does not respond to contact requests. When the computer that published the printers restarts, it republishes any deleted printer objects.\n\nIf you enable this setting or do not configure it, the domain controller prunes this computer's printers when the computer does not respond.\n\nIf you disable this setting, the domain controller does not prune this computer's printers. This setting is designed to prevent printers from being pruned when the computer is temporarily disconnected from the network.\n\nNote: You can use the "Directory Pruning Interval" and "Directory Pruning Retry" settings to adjust the contact interval and number of contact attempts."
ImmortalPrintQueue="Allow pruning of published printers"
IncludeRegInProQuota="Include registry in file list"
Intellimenus_Help="Disables personalized menus.\n\nWindows 2000 personalizes long menus by moving recently used items to the top of the menu and hiding items that have not been used recently. Users can display the hidden items by clicking an arrow to extend the menu.\n\nIf you enable this setting, the system does not personalize menus. All menu items appear and remain in standard order. Also, this setting removes the "Use Personalized Menus" option so users do not try to change the setting while a setting is in effect.\n\nNote: Personalized menus require user tracking. If you enable the "Turn off user tracking" setting, the system disables user tracking and personalized menus and ignores this setting.\n\nTip: To Turn off personalized menus without specifying a setting, click Start, click Settings, click Taskbar and Start Menu, and then, on the General tab, clear the "Use Personalized Menus" option."
Intellimenus="Turn off personalized menus"
IntranetPrintersUrl_Help="Adds a link to an Internet or intranet Web page to the Add Printer Wizard.\n\nYou can use this setting to direct users to a Web page from which they can install printers.\n\nIf you enable this setting and type an Internet or intranet address in the text box, the system adds a Browse button to the "Locate Your Printer" page in the Add Printer Wizard. The Browse button appears beside the "Connect to a printer on the Internet or your intranet" option. When users click Browse, the system opens an Internet browser and navigates to the specified URL address to display the available printers.\n\nThis setting makes it easy for users to find the printers you want them to add.\n\nAlso, see the "Custom support URL in the Printers folder's left pane" and "Web-based printing" settings in Computer Configuration\Administrative Templates\Printers."
IntranetPrintersUrl_Link="Printers Page URL"
IntranetPrintersUrl_Tip1="Enable this option to add a browse button for Internet printers "
IntranetPrintersUrl_Tip2="in the Add Printer Wizard. Use this setting to allow users browsing "
IntranetPrintersUrl_Tip3="the company's Intranet for printers. For example, you can "
IntranetPrintersUrl_Tip4="specify a URL like: http://www.company.com/printers. "
IntranetPrintersUrl_Tip5="To enable this option, the edit box below should not be empty."
IntranetPrintersUrl="Browse a common web site to find printers"
KMPrintersAreBlocked_Help="Determines whether printers using kernel-mode drivers may be installed on the local computer. Kernel-mode drivers have access to system-wide memory, and therefore poorly-written kernel-mode drivers can cause stop errors.\n\nIf you disable this setting or do not configure it, printers using kernel-mode drivers may be installed on the local computer.\n\nIf you enable this setting, installation of a printer using a kernel-mode driver will not be allowed. This setting is enabled by default.\n\nNote:This setting only affects printer installation. It does not affect pre-existing printers using kernel-mode drivers. It also does not affect 64-bit Itanium computers, because kernel-mode drivers cannot be installed on Intel 64-bit Itanium computers."
KMPrintersAreBlocked="Disallow installation of printers using kernel-mode drivers"
Lbl_AlwaysPinSubFoldersHelp1="Ensures all subfolders are available offline when a folder is made"
Lbl_AlwaysPinSubFoldersHelp2="available for offline use."
Lbl_AssignedOfflineFilesHelp1="Specify network files and folders that are always available offline."
Lbl_AssignedOfflineFilesHelp2="In the name field, type a fully-qualified UNC path for each file or folder. "
Lbl_AssignedOfflineFilesHelp3="Do not enter a value for the item."
Lbl_AssignedOfflineFilesList="Files and Folders: "
Lbl_CustomGoOfflineActionsHelp1="Specify non-default actions for servers that become unavailable."
Lbl_CustomGoOfflineActionsHelp2="Enter a server name paired with an action value listed below."
Lbl_CustomGoOfflineActionsHelp3="Values:"
Lbl_CustomGoOfflineActionsHelp4="0 = Work offline. Server's files are available to local computer"
Lbl_CustomGoOfflineActionsHelp5="1 = Never go offline. Server's files are unavailable to local computer"
Lbl_EventLoggingLevelHelp4="3 = Level 2 + log 'server available for reconnection'"
Lbl_EventLoggingLevelSpin="Enter [0-3]: "
Lbl_ExtExclusionListEdit="Extensions: "
Lbl_ExtExclusionListHelp1="Files may be excluded from caching on auto-cache shared folders based"
Lbl_ExtExclusionListHelp2="on their extension. Enter a list of extensions to be excluded. Extensions"
Lbl_ExtExclusionListHelp3="must be preceded by an asterisk and period. "e.g. *.dbf;*.ndx;*.lnk"
Lbl_Fail="Never go offline"
Lbl_FullSync="Full"
Lbl_GoOfflineActionCombo="Action: "
Lbl_GoOfflineActionHelp1="Specify how the system is to respond when a network server"
Lbl_GoOfflineActionHelp2="becomes unavailable."
Lbl_GoOfflineActionHelp3="Never go offline = Server's files are unavailable to local computer"
Lbl_GoOfflineActionHelp4="Work offline = Server's files are available to local computer"
Lbl_NoConfigCacheHelp1="Prevents users from changing any cache configuration settings."
Lbl_NoPinFilesHelp1="Click on Show and enter a UNC path for each file or folder"
Lbl_NoPinFilesList="Files and Folders: "
Lbl_PurgeOnlyAutoCachedFiles="Delete only the temporary offline files."
Lbl_PurgeAtLogoffHelp1="Causes the local copy of any offline file accessed by the user"
Lbl_PurgeAtLogoffHelp2="to be deleted when the user logs off of the computer."
Lbl_QuickSync="Quick"
Lbl_ReminderFreqHelp1="Number of minutes between reminder balloons"
Lbl_ReminderFreqSpin="Minutes: "
Lbl_ReminderInitTimeoutHelp1="Sets the lifetime of the initial notification balloon displayed"
Lbl_ReminderInitTimeoutHelp2="when an Offline Files event occurs."
Lbl_ReminderInitTimeoutSpin="Seconds: "
Lbl_ReminderTimeoutHelp1="Sets the lifetime of the balloon displayed periodically reminding"
Lbl_ReminderTimeoutHelp2="users of the current condition of Offline Files."
Lbl_ReminderTimeoutSpin="Seconds: "
Lbl_SlowLinkSpeed_Help1="Value entered is [ bps / 100 ] --> Example: 128,000bps, enter 1280"
Lbl_SlowLinkSpeedSpin="Value: "
Lbl_WorkOffline="Work offline"
LimitSize_Help="Sets the maximum size of each roaming user profile and determines the system's response when a roaming user profile reaches the maximum size.\n\nIf you disable this setting or do not configure it, the system does not limit the size of roaming user profiles.\n\nIf you enable this setting, you can do the following:\n\n-- Set a maximum permitted roaming profile size;\n\n-- Determine whether the registry files are included in the calculation of the profile size;\n\n-- Determine whether users are notified when the profile exceeds the permitted maximum size;\n\n-- Specify a customized message notifying users of the oversized profile;\n\n-- Determine how often the customized message is displayed."
LimitSize="Limit profile size"
LinkResolveIgnoreLinkInfo_Help="Determines whether Windows traces shortcuts back to their sources when it cannot find the target on the user's system.\n\nShortcut files typically include an absolute path to the original target file as well as the relative path to the current target file. When the system cannot find the file in the current target path, then, by default, it searches for the target in the original path. If the shortcut has been copied to a different computer, the original path might lead to a network computer, including external resources, such as an Internet server.\n\nIf you enable this setting, Windows only searches the current target path. It does not search for the original path even when it cannot find the target file in the current target path."
LinkResolveIgnoreLinkInfo="Do not track Shell shortcuts during roaming"
LoadBalance="Load balancing"
LocalProfile="Only allow local user profiles"
LocalProfile_Help="This setting determines if roaming user profiles are available on a particular computer. By default, when roaming profile users log on to a computer, their roaming profile is copied down to the local computer. If they have already logged on to this computer in the past, the roaming profile is merged with the local profile. Similarly, when the user logs off this computer, the local copy of their profile, including any changes they have made, is merged with the server copy of their profile.\n\nUsing the setting, you can prevent users configured to use roaming profiles from receiving their profile on a specific computer.\n\nIf you enable this setting, the following occurs on the affected computer: At first logon, the user receives a new local profile, rather than the roaming profile. At logoff, changes are saved to the local profile. All subsequent logons use the local profile. \n\nIf you disable this setting or do not configure it, the default behavior occurs, as indicated above.\n\nIf you enable both the "Prevent Roaming Profile changes from propagating to the server" setting and the "Only allow local user profiles" setting, roaming profiles are disabled.\n\nNote: This setting only affects roaming profile users."
LockTaskbar="Lock the Taskbar"
LockTaskbar_Help="This setting effects the taskbar, which is used to switch between running applications.\n\nThe taskbar includes the Start button, list of currently running tasks, and the notification area. By default, the taskbar is located at the bottom of the screen, but it can be dragged to any side of the screen. When it is locked, it cannot be moved or resized.\n\nIf you enable this setting, it prevents the user from moving or resizing the taskbar. While the taskbar is locked, auto-hide and other taskbar options are still available in Taskbar properties.\n\nIf you disable this setting or do not configure it, the user can configure the taskbar position.\n\nNote: Enabling this setting also locks the quicklaunch bar and any other toolbars that the user has on their taskbar. The toolbar's position is locked, and the user cannot show and hide various toolbars using the taskbar context menu."
Logon="Logon"
LogonType="Always use classic logon"
LogonType_Help="This setting forces the user to log on to the computer using the classic logon screen. By default, a workgroup is set to use the simple logon screen. This setting only works when the computer is not on a domain."
Readonlyuserprofile="Prevent Roaming Profile changes from propagating to the server"
Readonlyuserprofile_Help="This setting determines if the changes a user makes to their roaming profile are merged with the server copy of their profile.\n\nBy default, when a roaming profile user logs on to a computer, their roaming profile is copied down to the local computer. If they have already logged on to this computer in the past, the roaming profile is merged with the local profile. Similiarly, when the user logs off this computer, the local copy of their profile, including any changes they have made, is merged with the server copy of their profile.\n\nUsing the setting, you can prevent changes made to a roaming profile on a particular computer from being persisted.\n\nIf you enable this setting, the following occurs on the affected computer: At login, the user receives their roaming profile. But, any changes a user makes to their profile will not be merged to their roaming profile when they log off.\n\nIf this setting is disabled or not configured, the default behavior occurs, as indicated above.\n\nNote: This setting only affects roaming profile users."
MaxGPOScriptWait="Seconds:"
MaxGPOScriptWaitPolicy_Help="Determines how long the system waits for scripts applied by Group Policy to run.\n\nThis setting limits the total time allowed for all logon, startup, and shutdown scripts applied by Group Policy to finish running. If the scripts have not finished running when the specified time expires, the system stops script processing and records an error event.\n\nBy default, the system lets the combined set of scripts run for up to 600 seconds (10 minutes), but you can use this setting to adjust this interval.\n\nTo use this setting, in the Seconds box, type a number from 1 to 32,000 for the number of seconds you want the system to wait for the set of scripts to finish. To direct the system to wait until the scripts have finished, no matter how long they take, type 0.\n\nThis interval is particularly important when other system tasks must wait while the scripts complete. By default, each startup script must complete before the next one runs. Also, you can use the "Run logon scripts synchronously" setting to direct the system to wait for the logon scripts to complete before loading the desktop.\n\nAn excessively long interval can delay the system and inconvenience users. However, if the interval is too short, prerequisite tasks might not be done, and the system can appear to be ready prematurely."
MaxGPOScriptWaitPolicy="Maximum wait time for Group Policy scripts"
MaxRecentDocs_Help="Determines how many shortcuts the system can display in the Documents menu on the Start menu.\n\nThe Documents menu contains shortcuts to the nonprogram files the user has most recently opened. By default, the system displays shortcuts to the 10 most recently opened documents."
MaxRecentDocs="Maximum number of recent documents"
MemCheckBoxInRunDlg_Help="Lets users run a 16-bit program in a dedicated (not shared) Virtual DOS Machine (VDM) process.\n\nAll DOS and 16-bit programs run on Windows 2000 in the Windows Virtual DOS Machine program. VDM simulates a 16-bit environment, complete with the DLLs required by 16-bit programs. By default, all 16-bit programs run as threads in a single, shared VDM process. As such, they share the memory space allocated to the VDM process and cannot run simultaneously.\n\nEnabling this setting adds a check box to the Run dialog box, giving users the option of running a 16-bit program in its own dedicated NTVDM process. The additional check box is enabled only when a user enters a 16-bit program in the Run dialog box."
MemCheckBoxInRunDlg="Add "Run in Separate Memory Space" check box to Run dialog box"
MMC_ActiveDirDomTrusts="Active Directory Domains and Trusts"
MMC_ActiveDirSitesServices="Active Directory Sites and Services"
MMC_ActiveDirUsersComp="Active Directory Users and Computers"
MMC_LogicalMappedDrives="Logical and Mapped Drives"
MMC_OSPFRouting="OSPF Routing"
MMC_PerfLogsAlerts="Performance Logs and Alerts"
MMC_PublicKey="Public Key Policies"
MMC_QoSAdmission="QoS Admission Control"
MMC_RRA="Routing and Remote Access"
MMC_RAS_DialinUser="RAS Dialin - User Node"
MMC_RemoteAccess="Remote Access"
MMC_RemStore="Removable Storage"
MMC_Restrict_Author="Restrict the user from entering author mode"
MMC_restrict_Author_Explain="Prevents users from entering author mode.\n\nThis setting prevents users from opening the Microsoft Management Console (MMC) in author mode, explicitly opening console files in author mode, and opening any console files that open in author mode by default.\n\nAs a result, users cannot create console files or add or remove snap-ins. Also, because they cannot open author-mode console files, they cannot use the tools that the files contain.\n\nThis setting permits users to open MMC user-mode console files, such as those on the Administrative Tools menu in Windows 2000 Server. However, users cannot open a blank MMC console window on the Start menu. (To open the MMC, click Start, click Run, and type mmc.) Users also cannot open a blank MMC console window from a command prompt.\n\nIf you disable this setting or do not configure it, users can enter author mode and open author-mode console files."
MMC_Restrict_Explain="Permits or prohibits use of this snap-in.\n\nIf you enable this setting, the snap-in is permitted. If you disable the setting, the snap-in is prohibited.\n\nIf this setting is not configured, the setting of the "Restrict users to the explicitly permitted list of snap-ins" setting determines whether this snap-in is permitted or prohibited.\n\n-- If "Restrict users to the explicitly permitted list of snap-ins" is enabled, users cannot use any snap-in except those explicitly permitted.\n\n To explicitly permit use of this snap-in, enable this setting. If this setting is not configured (or disabled), this snap-in is prohibited.\n\n-- If "Restrict users to the explicitly permitted list of snap-ins" is disabled or not configured, users can use any snap-in except those explicitly prohibited.\n\n To explicitly prohibit use of this snap-in, disable this setting. If this setting is not configured (or enabled), the snap-in is permitted.\n\nWhen a snap-in is prohibited, it does not appear in the Add/Remove Snap-in window in MMC. Also, when a user opens a console file that includes a prohibited snap-in, the console file opens, but the prohibited snap-in does not appear."
MMC_Restrict_To_Permitted_Snapins="Restrict users to the explicitly permitted list of snap-ins"
MMC_restrict_To_Permitted_Snapins_Explain="Lets you selectively permit or prohibit the use of Microsoft Management Console (MMC) snap-ins.\n\n-- If you enable this setting, all snap-ins are prohibited, except those that you explicitly permit. Use this setting if you plan to prohibit use of most snap-ins.\n\n To explicitly permit a snap-in, open the Restricted/Permitted snap-ins setting folder and enable the settings representing the snap-in you want to permit. If a snap-in setting in the folder is disabled or not configured, the snap-in is prohibited.\n\n-- If you disable this setting or do not configure it, all snap-ins are permitted, except those that you explicitly prohibit. Use this setting if you plan to permit use of most snap-ins.\n\n To explicitly prohibit a snap-in, open the Restricted/Permitted snap-ins setting folder and then disable the settings representing the snap-ins you want to prohibit. If a snap-in setting in the folder is enabled or not configured, the snap-in is permitted.\n\nWhen a snap-in is prohibited, it does not appear in the Add/Remove Snap-in window in MMC. Also, when a user opens a console file that includes a prohibited snap-in, the console file opens, but the prohibited snap-in does not appear.\n\nNote: If you enable this setting, and you do not enable any settings in the Restricted/Permitted snap-ins folder, users cannot use any MMC snap-ins."
MMC_RESTRICT="Restricted/Permitted snap-ins"
MMC_ResultantSetOfPolicySnapIn="Resultant Set of Policy snap-in"
MSILogging_Help="Specifies the types of events that Windows Installer records in its transaction log for each installation. The log, Msi.log, appears in the Temp directory of the system volume.\n\nWhen you enable this setting, you can specify the types of events you want Windows Installer to record. To indicate that an event type is recorded, type the letter representing the event type. You can type the letters in any order and list as many or as few event types as you want.\n\nTo disable logging, delete all of the letters from the box.\n\nIf you disable this setting or do not configure it, Windows Installer logs the default event types, represented by the letters "iweap.""
MSILogging="Logging"
MSILoggingT1="To activate logging, enter one or more of the modes below."
MSILoggingT10="m - Out-of-memory"
MSILoggingT11="p - Terminal properties"
MSILoggingT12="v - Verbose output"
MSILoggingT13="o - Out of disk space messages"
MSILoggingT2=""iwearucmpvo" will log everything but adds time to the install."
MSILoggingT3="i - Status messages"
MSILoggingT4="w - Non-fatal warnings"
MSILoggingT5="e - All error messages"
MSILoggingT6="a - Start up of actions"
MSILoggingT7="r - Action-specific records"
MSILoggingT8="u - User requests"
MSILoggingT9="c - Initial UI parameters"
MSI_AllowUser="Allow User Installs"
MSI_DisableUserInstalls="Prohibit User Installs"
MSI_DisableUserInstalls_Help="This setting allows you to configure user installs. To configure this setting, set it to enabled and use the drop-down list to select the behavior you want.\n\nIf this setting is not configured, or if the setting is enabled and "Allow User Installs" is selected, the installer allows and makes use of products that are installed per user, and products that are installed per computer. If the installer finds a per-user install of an application, this hides a per-computer installation of that same product.\n\nIf this setting is enabled and "Hide User Installs" is selected, the installer ignores per-user applications. This causes a per-computer installed application to be visible to users, even if those users have a per-user install of the product registered in their user profile.\n\nIf this setting is enabled and "Prohibit User Installs" is selected, the installer prevents applications from being installed per user, and it ignores previously installed per-user applications. An attempt to perform a per-user installation causes the installer to display an error message and stop the installation. This setting is useful in environments where the administrator only wants per-computer applications installed, such as on a kiosk or a Windows Terminal Server."
MSI_DisAllowUser="Prohibit User Installs"
MSI_DisableSRCheckPoints="Turn off creation of System Restore Checkpoints"
MSI_DisableSRCheckPoints_Help="System Restore enables users, in the event of a problem, to restore their computers to a previous state without losing personal data files. By default, the Windows Installer automatically creates a System Restore checkpoint each time an application is installed, so that users can restore their computer to the state it was in before installing the application.\n\nIf you enable this setting, the windows Installer does not generate System Restore checkpoints when installing applications.\n\nIf you disable this setting or do not configure it, the Windows Installer automatically creates a System Restore checkpoint each time an application is installed.\n\nNote: This setting only applies to Windows XP Professional."
NC_RenameConnection_Help="Determines whether users can rename LAN or all user remote access connections.\n\nIf you enable this setting, the Rename option is enabled for all users. Users can rename connections by clicking the icon representing a connection or by using the File menu.\n\nIf you disable this setting (and enable the "Enable Network Connections settings for Administrators" setting), the Rename option for LAN and all user remote access connections is disabled for all users (including Administrators and Network Configuration Operators).\n\nImportant: If the "Enable Network Connections settings for Administrators" is disabled or not configured, this setting will not apply to administrators on post-Windows 2000 computers.\n\nIf this setting is not configured, only Administrators and Network Configuration Operators have the right to rename LAN or all user remote access connections.\n\nNote: When configured, this setting always takes precedence over the "Ability to rename LAN connections" and "Ability to rename all user remote access connections" settings.\n\nNote: This setting does not prevent users from using other programs, such as Internet Explorer, to rename remote access connections."
NC_RenameConnection="Ability to rename LAN connections or remote access connections available to all users"
NC_LanChangeProperties_Help="Determines whether Administrators and Network Configuration Operators can change the properties of components used by a LAN connection.\n\nThis setting determines whether the Properties button for components of a LAN connection is enabled.\n\nIf you enable this setting (and enable the "Enable Network Connections settings for Administrators" setting), the Properties button is disabled for Administrators. Network Configuration Operators are prohibited from accessing connection components, regardless of the "Enable Network Connections settings for Administrators" setting.\n\nImportant: If the "Enable Network Connections settings for Administrators" is disabled or not configured, this setting does not apply to administrators on post-Windows 2000 computers.\n\nIf you disable this setting or do not configure it, the Properties button is enabled for administrators and Network Configuration Operators.\n\nThe Local Area Connection Properties dialog box includes a list of the network components that the connection uses. To view or change the properties of a component, click the name of the component, and then click the Properties button beneath the component list.\n\nNote: Not all network components have configurable properties. For components that are not configurable, the Properties button is always disabled.\n\nNote: When the "Prohibit access to properties of a LAN connection" setting is enabled, users are blocked from accessing the Properties button for LAN connection components.\n\nNote: Network Configuration Operators only have permission to change TCP/IP properties. Properties for all other components are unavailable to these users.\n\nNote: Nonadministrators are already prohibited from accessing properties of components for a LAN connection, regardless of this setting."
NC_LanChangeProperties="Prohibit access to properties of components of a LAN connection"
NC_RasChangeProperties_Help="Determines whether users can view and change the properties of components used by a private or all-user remote access connection.\n\nThis setting determines whether the Properties button for components used by a private or all-user remote access connection is enabled.\n\nIf you enable this setting (and enable the "Enable Network Connections settings for Administrators" setting), the Properties button is disabled for all users (including administrators).\n\nImportant: If the "Enable Network Connections settings for Administrators" is disabled or not configured, this setting does not apply to administrators on post-Windows 2000 computers.\n\nIf you disable this setting or do not configure it, the Properties button is enabled for all users.\n\nThe Networking tab of the Remote Access Connection Properties dialog box includes a list of the network components that the connection uses. To view or change the properties of a component, click the name of the component, and then click the Properties button beneath the component list.\n\nNote: Not all network components have configurable properties. For components that are not configurable, the Properties button is always disabled.\n\nNote: When the "Ability to change properties of an all user remote access connection" or "Prohibit changing properties of a private remote access connection" settings are set to deny access to the Remote Access Connection Properties dialog box, the Properties button for remote access connection components is blocked.\n\nNote: This setting does not prevent users from using other programs, such as Internet Explorer, to bypass this setting."
NC_RasChangeProperties="Prohibit access to properties of components of a remote access connection"
NC_ShowSharedAccessUI_Help="Determines whether administrators can enable and configure the Internet Connection Sharing (ICS) feature of an Internet connection and if the ICS service can run on the computer.\n\nImportant: This setting is location aware. It only applies when a computer is connected to the same DNS domain network it was connected to when the setting was refreshed on that computer. If a computer is connected to a DNS domain network other than the one it was connected to when the setting was refreshed, this setting does not apply.\n\nICS lets administrators configure their system as an Internet gateway for a small network and provides network services, such as name resolution and addressing through DHCP, to the local private network.\n\nIf you enable this setting, ICS cannot be enabled or configured by administrators, and the ICS service cannot run on the computer. The Advanced tab in the Properties dialog box for a LAN or remote access connection is removed. The Internet Connection Sharing page is removed from the New Connection Wizard. The Network Setup Wizard is disabled.\n\nIf you disable this setting or do not configure it and have two or more connections, administrators can enable ICS. The Advanced tab in the properties dialog box for a LAN or remote access connection is available. In addition, the user is presented with the option to enable Internet Connection Sharing in the Network Setup Wizard and Make New Connection Wizard. (The Network Setup Wizard is available only in Windows XP Professional.)\n\nBy default, ICS is disabled when you create a remote access connection, but administrators can use the Advanced tab to enable it. When running the New Connection Wizard or Network Setup Wizard, administrators can choose to enable ICS.\n\nNote: Internet Connection Sharing is only available when two or more network connections are present.\n\nNote: When the "Prohibit access to properties of a LAN connection," "Ability to change properties of an all user remote access connection," or "Prohibit changing properties of a private remote access connection" settings are set to deny access to the Connection Properties dialog box, the Advanced tab for the connection is blocked.\n\nNote: Nonadministrators are already prohibited from configuring Internet Connection Sharing, regardless of this setting."
NC_ShowSharedAccessUI="Prohibit use of Internet Connection Sharing on your DNS domain network"
NC_PersonalFirewallConfig_Help="Prohibits use of Internet Connection Firewall on your DNS domain network.\n\nDetermines whether users can enable the Internet Connection Firewall feature on a connection, and if the Internet Connection Firewall service can run on a computer.\n\nImportant: This setting is location aware. It only applies when a computer is connected to the same DNS domain network it was connected to when the setting was refreshed on that computer. If a computer is connected to a DNS domain network other than the one it was connected to when the setting was refreshed, this setting does not apply.\n\nThe Internet Connection Firewall is a stateful packet filter for home and small office users to protect them from Internet network security threats.\n\nIf you enable this setting, Internet Connection Firewall cannot be enabled or configured by users (including administrators), and the Internet Connection Firewall service cannot run on the computer. The option to enable the Internet Connection Firewall through the Advanced tab is removed. In addition, the Internet Connection Firewall is not enabled for remote access connections created through the Make New Connection Wizard. The Network Setup Wizard is disabled.\n\nIf you disable this setting or do not configure it, the Internet Connection Firewall is disabled when a LAN Connection or VPN connection is created, but users can use the Advanced tab in the connection properties to enable it. The Internet Connection Firewall is enabled by default on the connection for which Internet Connection Sharing is enabled. In addition, remote access connections created through the Make New Connection Wizard have the Internet Connection Firewall enabled."
NC_PersonalFirewallConfig="Prohibit use of Internet Connection Firewall on your DNS domain network"
NC_AllowNetBridge_NLA="Prohibit installation and configuration of Network Bridge on your DNS domain network"
NC_AllowNetBridge_NLA_Help = "Determines whether a user can install and configure the Network Bridge.\n\nImportant: This settings is location aware. It only applies when a computer is connected to the same DNS domain network it was connected to when the setting was refreshed on that computer. If a computer is connected to a DNS domain network other than the one it was connected to when the setting was refreshed, this setting does not apply.\n\nThe Network Bridge allows users to create a layer 2 MAC bridge, enabling them to connect two or more network segements together. This connection appears in the Network Connections folder.\n\nIf you disable this setting or do not configure it, the user will be able to create and modify the configuration of a Network Bridge. Enabling this setting does not remove an existing Network Bridge from the user's computer."
NC_AllowAdvancedTCPIPConfig_Help="Determines whether users can configure advanced TCP/IP settings.\n\nIf you enable this setting (and enable the "Enable Network Connections settings for Administrators" setting), the Advanced button on the Internet Protocol (TCP/IP) Properties dialog box is disabled for all users (including administrators). As a result, users cannot open the Advanced TCP/IP Settings Properties page and modify IP settings, such as DNS and WINS server information.\n\nImportant: If the "Enable Network Connections settings for Administrators" is disabled or not configured, this setting will not apply to administrators on post-Windows 2000 computers.\n\nIf you disable this setting, the Advanced button is enabled, and all users can open the Advanced TCP/IP Setting dialog box.\n\nNote: This setting is superseded by settings that prohibit access to properties of connections or connection components. When these policies are set to deny access to the connection properties dialog box or Properties button for connection components, users cannot gain access to the Advanced button for TCP/IP configuration.\n\nNote: Nonadministrators (excluding Network Configuration Operators) do not have permission to access TCP/IP advanced configuration for a LAN connection, regardless of this setting.\n\nTip: To open the Advanced TCP/IP Setting dialog box, in the Network Connections folder, right-click a connection icon, and click Properties. For remote access connections, click the Networking tab. In the "Components checked are used by this connection" box, click Internet Protocol (TCP/IP), click the Properties button, and then click the Advanced button.\n\nNote: Changing this setting from Enabled to Not Configured does not enable the Advanced button until the user logs off."
NC_AdvancedSettings_Help="Determines whether the Advanced Settings item on the Advanced menu in Network Connections is enabled for administrators.\n\nThe Advanced Settings item lets users view and change bindings and view and change the order in which the computer accesses connections, network providers, and print providers.\n\nIf you enable this setting (and enable the "Enable Network Connections settings for Administrators" setting), the Advanced Settings item is disabled for administrators.\n\nImportant: If the "Enable Network Connections settings for Administrators" is disabled or not configured, this setting will not apply to administrators on post-Windows 2000 computers.\n\nIf you disable this setting or do not configure it, the Advanced Settings item is enabled for administrators.\n\nNote: Nonadministrators are already prohibited from accessing the Advanced Settings dialog box, regardless of this setting."
NC_AdvancedSettings="Prohibit access to the Advanced Settings item on the Advanced menu"
NC_AddRemoveComponents_Help="Determines whether administrators can add and remove network components for a LAN or remote access connection. This setting has no effect on nonadministrators.\n\nIf you enable this setting (and enable the "Enable Network Connections settings for Administrators" setting), the Install and Uninstall buttons for components of connections are disabled, and administrators are not permitted to access network components in the Windows Components Wizard.\n\nImportant: If the "Enable Network Connections settings for Administrators" is disabled or not configured, this setting will not apply to administrators on post-Windows 2000 computers.\n\nIf you disable this setting or do not configure it, the Install and Uninstall buttons for components of connections in the Network Connections folder are enabled. Also, administrators can gain access to network components in the Windows Components Wizard.\n\nThe Install button opens the dialog boxes used to add network components. Clicking the Uninstall button removes the selected component in the components list (above the button).\n\nThe Install and Uninstall buttons appear in the properties dialog box for connections. These buttons are on the General tab for LAN connections and on the Networking tab for remote access connections.\n\nNote: When the "Prohibit access to properties of a LAN connection", "Ability to change properties of an all user remote access connection", or "Prohibit changing properties of a private remote access connection" settings are set to deny access to the connection properties dialog box, the Install and Uninstall buttons for connections are blocked.\n\nNote: Nonadministrators are already prohibited from adding and removing connection components, regardless of this setting."
NC_AddRemoveComponents="Prohibit adding and removing components for a LAN or remote access connection"
NC_LanProperties_Help="Determines whether users can change the properties of a LAN connection.\n\nThis setting determines whether the Properties menu item is enabled, and thus, whether the Local Area Connection Properties dialog box is available to users.\n\nIf you enable this setting (and enable the "Enable Network Connections settings for Administrators" setting), the Properties menu items are disabled for all users, and users cannot open the Local Area Connection Properties dialog box.\n\nImportant: If the "Enable Network Connections settings for Administrators" is disabled or not configured, this setting will not apply to administrators on post-Windows 2000 computers.\n\nIf you disable this setting or do not configure it, a Properties menu item appears when users right-click the icon representing a LAN connection. Also, when users select the connection, Properties is enabled on the File menu.\n\nNote: This setting takes precedence over settings that manipulate the availability of features inside the Local Area Connection Properties dialog box. If this setting is enabled, nothing within the properties dialog box for a LAN connection is available to users.\n\nNote: Nonadministrators have the right to view the properties dialog box for a connection but not to make changes, regardless of this setting."
NC_LanProperties="Prohibit access to properties of a LAN connection"
NC_ChangeBindState_Help="Determines whether administrators can enable and disable the components used by LAN connections.\n\nIf you enable this setting (and enable the "Enable Network Connections settings for Administrators" setting), the check boxes for enabling and disabling components are disabled. As a result, administrators cannot enable or disable the components that a connection uses.\n\nImportant: If the "Enable Network Connections settings for Administrators" is disabled or not configured, this setting will not apply to administrators on post-Windows 2000 computers.\n\nIf you disable this setting or do not configure it, the Properties dialog box for a connection includes a check box beside the name of each component that the connection uses. Selecting the check box enables the component, and clearing the check box disables the component.\n\nNote: When the "Prohibit access to properties of a LAN connection" setting is enabled, users are blocked from accessing the check boxes for enabling and disabling the components of a LAN connection.\n\nNote: Nonadministrators are already prohibited from enabling or disabling components for a LAN connection, regardless of this setting."
NC_ChangeBindState="Prohibit Enabling/Disabling components of a LAN connection"
NC_RasAllUserProperties_Help="Determines whether a user can view and change the properties of remote access connections that are available to all users of the computer.\n\nTo create an all-user remote access connection, on the Connection Availability page in the New Connection Wizard, click the "For all users" option.\n\nThis setting determines whether the Properties menu item is enabled, and thus, whether the Remote Access Connection Properties dialog box is available to users.\n\nIf you enable this setting, a Properties menu item appears when any user right-clicks the icon for a remote access connection. Also, when any user selects the connection, Properties appears on the File menu.\n\nIf you disable this setting (and enable the "Enable Network Connections settings for Administrators" setting), the Properties menu items are disabled, and users (including administrators) cannot open the remote access connection properties dialog box.\n\nImportant: If the "Enable Network Connections settings for Administrators" is disabled or not configured, this setting will not apply to administrators on post-Windows 2000 computers.\n\nIf you do not configure this setting, only Administrators and Network Configuration Operators can change properties of all-user remote access connections.\n\nNote: This setting takes precedence over settings that manipulate the availability of features inside the Remote Access Connection Properties dialog box. If this setting is disabled, nothing within the properties dialog box for a remote access connection will be available to users.\n\nNote: This setting does not prevent users from using other programs, such as Internet Explorer, to bypass this setting."
NC_RasAllUserProperties="Ability to change properties of an all user remote access connection"
NC_RasMyProperties_Help="Determines whether users can view and change the properties of their private remote access connections.\n\nPrivate connections are those that are available only to one user. To create a private connection, on the Connection Availability page in the New Connection Wizard, click the "Only for myself" option.\n\nThis setting determines whether the Properties menu item is enabled, and thus, whether the Remote Access Connection Properties dialog box for a private connection is available to users.\n\nIf you enable this setting (and enable the "Enable Network Connections settings for Administrators" setting), the Properties menu items are disabled, and no users (including administrators) can open the Remote Access Connection Properties dialog box for a private connection.\n\nImportant: If the "Enable Network Connections settings for Administrators" is disabled or not configured, this setting will not apply to administrators on post-Windows 2000 computers.\n\nIf you disable this setting or do not configure it, a Properties menu item appears when any user right-clicks the icon representing a private remote access connection. Also, when any user selects the connection, Properties appears on the File menu.\n\nNote: This setting takes precedence over settings that manipulate the availability of features in the Remote Access Connection Properties dialog box. If this setting is enabled, nothing within the properties dialog box for a remote access connection will be available to users.\n\nNote: This setting does not prevent users from using other programs, such as Internet Explorer, to bypass this setting."
NC_RasMyProperties="Prohibit changing properties of a private remote access connection"
NC_DeleteConnection_Help="Determines whether users can delete remote access connections.\n\nIf you enable this setting (and enable the "Enable Network Connections settings for Administrators" setting), users (including administrators) cannot delete any remote access connections. This setting also disables the Delete option on the context menu for a remote access connection and on the File menu in the Network Connections folder.\n\nImportant: If the "Enable Network Connections settings for Administrators" is disabled or not configured, this setting will not apply to administrators on post-Windows 2000 computers.\n\nIf you disable this setting or do not configure it, all users can delete their private remote access connections. Private connections are those that are available only to one user. (By default, only Administrators and Network Configuration Operators can delete connections available to all users, but you can change the default by using the "Ability to delete all user remote access connections" setting.)\n\nImportant: When enabled, this setting takes precedence over the "Ability to delete all user remote access connections" setting. Users cannot delete any remote access connections, and the "Ability to delete all user remote access connections" setting is ignored.\n\nNote: LAN connections are created and deleted automatically when a LAN adapter is installed or removed. You cannot use the Network Connections folder to create or delete a LAN connection.\n\nNote: This setting does not prevent users from using other programs, such as Internet Explorer, to bypass this setting."
NC_DeleteConnection="Prohibit deletion of remote access connections"
NC_DeleteAllUserConnection_Help="Determines whether users can delete all user remote access connections.\n\nTo create an all-user remote access connection, on the Connection Availability page in the New Connection Wizard, click the "For all users" option.\n\nIf you enable this setting, all users can delete shared remote access connections. In addition, if your file system is NTFS, users need to have Write access to Documents and Settings\All Users\Application Data\Microsoft\Network\Connections\Pbk to delete a shared remote access connection.\n\nIf you disable this setting (and enable the "Enable Network Connections settings for Administrators" setting), users (including administrators) cannot delete all-user remote access connections. (By default, users can still delete their private connections, but you can change the default by using the "Prohibit deletion of remote access connections" setting.)\n\nImportant: If the "Enable Network Connections settings for Administrators" is disabled or not configured, this setting will not apply to administrators on post-Windows 2000 computers.\n\nIf you do not configure this setting, only Administrators and Network Configuration Operators can delete all user remote access connections.\n\nImportant: When enabled, the "Prohibit deletion of remote access connections" setting takes precedence over this setting. Users (including administrators) cannot delete any remote access connections, and this setting is ignored.\n\nNote: LAN connections are created and deleted automatically by the system when a LAN adapter is installed or removed. You cannot use the Network Connections folder to create or delete a LAN connection.\n\nNote: This setting does not prevent users from using other programs, such as Internet Explorer, to bypass this setting."
NC_DeleteAllUserConnection="Ability to delete all user remote access connections"
NC_RasConnect_Help="Determines whether users can connect and disconnect remote access connections.\n\nIf you enable this setting (and enable the "Enable Network Connections settings for Administrators" setting), double-clicking the icon has no effect, and the Connect and Disconnect menu items are disabled for all users (including administrators).\n\nImportant: If the "Enable Network Connections settings for Administrators" is disabled or not configured, this setting will not apply to administrators on post-Windows 2000 computers.\n\nIf you disable this setting or do not configure it, the Connect and Disconnect options for remote access connections are available to all users. Users can connect or disconnect a remote access connection by double-clicking the icon representing the connection, by right-clicking it, or by using the File menu."
NC_RasConnect="Prohibit connecting and disconnecting a remote access connection"
NC_LanConnect_Help="Determines whether users can enable/disable LAN connections.\n\nIf you enable this setting, the Enable and Disable options for LAN connections are available to users (including nonadministrators). Users can enable/disable a LAN connection by double-clicking the icon representing the connection, by right-clicking it, or by using the File menu.\n\nIf you disable this setting (and enable the "Enable Network Connections settings for Administrators" setting), double-clicking the icon has no effect, and the Enable and Disable menu items are disabled for all users (including administrators).\n\nImportant: If the "Enable Network Connections settings for Administrators" is disabled or not configured, this setting will not apply to administrators on post-Windows 2000 computers.\n\nIf you do not configure this setting, only Administrators and Network Configuration Operators can enable/disable LAN connections.\n\nNote: Administrators can still enable/disable LAN connections from Device Manager when this setting is disabled."
NC_LanConnect="Ability to Enable/Disable a LAN connection"
NC_NewConnectionWizard_Help="Determines whether users can use the New Connection Wizard, which creates new network connections.\n\nIf you enable this setting (and enable the "Enable Network Connections settings for Administrators" setting), the Make New Connection icon does not appear in the Start Menu on in the Network Connections folder. As a result, users (including administrators) cannot start the New Connection Wizard.\n\nImportant: If the "Enable Network Connections settings for Administrators" is disabled or not configured, this setting will not apply to administrators on post-Windows 2000 computers.\n\nIf you disable this setting or do not configure it, the Make New Connection icon appears in the Start menu and in the Network Connections folder for all users. Clicking the Make New Connection icon starts the New Connection Wizard.\n\nNote: Changing this setting from Enabled to Not Configured does not restore the Make New Connection icon until the user logs off or on. When other changes to this setting are applied, the icon does not appear or disappear in the Network Connections folder until the folder is refreshed.\n\nNote: This setting does not prevent users from using other programs, such as Internet Explorer, to bypass this setting."
NC_NewConnectionWizard="Prohibit access to the New Connection Wizard"
NC_RenameLanConnection_Help="Determines whether nonadministrators can rename a LAN connection.\n\nIf you enable this setting, the Rename option is enabled for LAN connections. Nonadministrators can rename LAN connections by clicking an icon representing the connection or by using the File menu.\n\nIf you disable this setting, the Rename option is disabled for nonadministrators only.\n\nIf you do not configure this setting, only Administrators and Network Configuration Operators can rename LAN connections\n\nNote: This setting does not apply to Administrators.\n\nNote: When the "Ability to rename LAN connections or remote access connections available to all users" setting is configured (set to either enabled or disabled), this setting does not apply."
NC_RenameLanConnection="Ability to rename LAN connections"
NC_RenameAllUserRasConnection_Help="Determines whether nonadministrators can rename all-user remote access connections.\n\nTo create an all-user connection, on the Connection Availability page in the New Connection Wizard, click the "For all users" option.\n\nIf you enable this setting, the Rename option is enabled for all-user remote access connections. Any user can rename all-user connections by clicking an icon representing the connection or by using the File menu.\n\nIf you disable this setting, the Rename option is disabled for nonadministrators only.\n\nIf you do not configure the setting, only Administrators and Network Configuration Operators can rename all-user remote access connections.\n\nNote: This setting does not apply to Administrators\n\nNote: When the "Ability to rename LAN connections or remote access connections available to all users" setting is configured (set to either Enabled or Disabled), this setting does not apply.\n\nNote: This setting does not prevent users from using other programs, such as Internet Explorer, to bypass this setting."
NC_RenameAllUserRasConnection="Ability to rename all user remote access connections"
NC_RenameMyRasConnection_Help="Determines whether users can rename their private remote access connections.\n\nPrivate connections are those that are available only to one user. To create a private connection, on the Connection Availability page in the New Connection Wizard, click the "Only for myself" option.\n\nIf you enable this setting (and enable the "Enable Network Connections settings for Administrators" setting), the Rename option is disabled for all users (including administrators).\n\nImportant: If the "Enable Network Connections settings for Administrators" is disabled or not configured, this setting will not apply to administrators on post-Windows 2000 computers.\n\nIf you disable this setting or do not configure it, the Rename option is enabled for all users' private remote access connections. Users can rename their private connection by clicking an icon representing the connection or by using the File menu.\n\nNote: This setting does not prevent users from using other programs, such as Internet Explorer, to bypass this setting."
NC_DialupPrefs_Help="Determines whether the Dial-up Preferences item on the Advanced menu in Network Connections folder is enabled.\n\nThe Dial-up Preferences item lets users create and change connections before logon and configure automatic dialing and callback features.\n\nIf you enable this setting (and enable the "Enable Network Connections settings for Administrators" setting), the Dial-up Preferences item is disabled for all users (including administrators).\n\nImportant: If the "Enable Network Connections settings for Administrators" is disabled or not configured, this setting will not apply to administrators on post-Windows 2000 computers.\n\nIf you disable this setting or do not configure it, the Dial-up Preferences item is enabled for all users."
NC_DialupPrefs="Prohibit access to the Dial-up Preferences item on the Advanced menu"
NC_Statistics_Help="Determines whether users can view the status for an active connection.\n\nConnection status is available from the connection status taskbar icon or from the Status dialog box. The Status dialog box displays information about the connection and its activity. It also provides buttons to disconnect and to configure the properties of the connection.\n\nIf you enable this setting, the connection status taskbar icon and Status dialog box are not available to users (including administrators). The Status option is disabled in the context menu for the connection and on the File menu in the Network Connections folder. Users cannot choose to show the connection icon in the taskbar from the Connection Properties dialog box.\n\nImportant: If the "Enable Network Connections settings for Administrators" is disabled or not configured, this setting will not apply to administrators on post-Windows 2000 computers.\n\nIf you disable this setting or do not configure it, the connection status taskbar icon and Status dialog box are available to all users."
NC_Statistics="Prohibit viewing of status for an active connection"
NC_EnableAdminProhibits_Help="Determines whether settings that existed in Windows 2000 will apply to Administrators.\n\nThe set of Network Connections group settings that existed in Windows 2000 also exists in Windows XP. In Windows 2000, all of these settings had the ability to prohibit the use of certain features from Administrators.\n\nBy default, Network Connections group settings in Windows XP do not have the ability to prohibit the use of features from Administrators.\n\nIf you enable this setting, the Windows XP settings that existed in Windows 2000 will have the ability to prohibit Administrators from using certain features. These settings are "Ability to rename LAN connections or remote access connections available to all users", "Prohibit access to properties of components of a LAN connection", "Prohibit access to properties of components of a remote access connection", "Ability to access TCP/IP advanced configuration", "Prohibit access to the Advanced Settings Item on the Advanced Menu", "Prohibit adding and removing components for a LAN or remote access connection", "Prohibit access to properties of a LAN connection", "Prohibit Enabling/Disabling components of a LAN connection", "Ability to change properties of an all user remote access connection", "Prohibit changing properties of a private remote access connection", "Prohibit deletion of remote access connections", "Ability to delete all user remote access connections", "Prohibit connecting and disconnecting a remote access connection", "Ability to Enable/Disable a LAN connection", "Prohibit access to the New Connection Wizard", "Prohibit renaming private remote access connections", "Prohibit access to the Dial-up Preferences item on the Advanced menu", "Prohibit viewing of status for an active connection". When this setting is enabled, settings that exist in both Windows 2000 and Windows XP behave the same for administrators.\n\nIf you disable this setting or do not configure it, Windows XP settings that existed in Windows 2000 will not apply to administrators.\n\nNote: This setting is intended to be used in a situation in which the Group Policy object that these settings are being applied to contains both Windows 2000 and Windows XP computers, and identical Network Connections policy behavior is required between all Windows 2000 and Windows XP computers."
NC_EnableAdminProhibits="Enable Windows 2000 Network Connections settings for Administrators"
NC_8021XCAName="IEEE 802.1x Certificate Authority for Machine Authentication"
NC_8021XCAName_Help="If you want to use IEEE 802.1x machine authentication, configure this setting.\n\nIf you enable this setting, it configures the Certificate Authority to be used on the client for authentication.\n\nTo allow successful authentication, enable this setting and indicate the thumbprint or hash for your Certificate Authority.\n\nIf you disable or do not configure this setting, the Certificate Authority for IEEE 802.1x machine authentication will not be configured on your client. This might cause machine authentication to fail.\n\nNote: The Certificate Authority that is configured by this setting only applies to machine authentication, and not to user authentication."
NC_8021xCertAuth="Certificate Authority Hash: "
Netlogon="Net Logon"
Netlogon_DC_Locator_DNS_Records="DC Locator DNS Records"
Netlogon_UseDynamicDns="Dynamic Registration of the DC Locator DNS Records"
Netlogon_UseDynamicDns_Help="Determines if Dynamic Registration of the domain controller (DC) locator DNS resource records is enabled. These DNS records are dynamically registered by the Net Logon service and are used by the Locator algorithm to locate the DC.\n\nIf you enable this setting, DCs to which this setting is applied dynamically register DC Locator DNS resource records through dynamic DNS update-enabled network connections.\n\nIf you disable this setting, DCs will not register DC Locator DNS resource records.\n\nIf this setting is not configured, it is not applied to any DCs, and DCs use their local configuration."
Netlogon_DnsAvoidRegisterRecords="DC Locator DNS records not registered by the DCs"
Netlogon_DnsAvoidRegisterRecords_Help="Determines which Domain Controller (DC) Locator DNS records are not registered by the Netlogon service.\n\nTo enable this setting, select Enable and specify a list of space-delimited mnemonics (instructions) for the DC Locator DNS records that will not be registered by the DCs to which this setting is applied.\n\nSelect the mnemonics from the following list:\n\nMnemonic Type DNS Record\n\nLdapIpAddress A <DnsDomainName>\nLdap SRV _ldap._tcp.<DnsDomainName>\nLdapAtSite SRV _ldap._tcp.<SiteName>._sites.<DnsDomainName>\nPdc SRV _ldap._tcp.pdc._msdcs.<DnsDomainName>\nGc SRV _ldap._tcp.gc._msdcs.<DnsForestName>\nGcAtSite SRV _ldap._tcp.<SiteName>._sites.gc._msdcs.<DnsForestName>\nDcByGuid SRV _ldap._tcp.<DomainGuid>.domains._msdcs.<DnsForestName>\nGcIpAddress A _gc._msdcs.<DnsForestName>\nDsaCname CNAME <DsaGuid>._msdcs.<DnsForestName>\nKdc SRV _kerberos._tcp.dc._msdcs.<DnsDomainName>\nKdcAtSite SRV _kerberos._tcp.dc._msdcs.<SiteName>._sites.<DnsDomainName>\nDc SRV _ldap._tcp.dc._msdcs.<DnsDomainName>\nDcAtSite SRV _ldap._tcp.<SiteName>._sites.dc._msdcs.<DnsDomainName>\nRfc1510Kdc SRV _kerberos._tcp.<DnsDomainName>\nRfc1510KdcAtSite SRV _kerberos._tcp.<SiteName>._sites.<DnsDomainName>\nGenericGc SRV _gc._tcp.<DnsForestName>\nGenericGcAtSite SRV _gc._tcp.<SiteName>._sites.<DnsForestName>\nRfc1510UdpKdc SRV _kerberos._udp.<DnsDomainName>\nRfc1510Kpwd SRV _kpasswd._tcp.<DnsDomainName>\nRfc1510UdpKpwd SRV _kpasswd._udp.<DnsDomainName>\n\nIf this setting is disabled, DCs configured to perform dynamic registration of DC Locator DNS records register all DC locator DNS resource records.\n\nIf this setting is not applied to DCs, DCs use their local configuration."
Netlogon_DnsRefreshInterval="Refresh Interval of the DC Locator DNS Records"
Netlogon_DnsRefreshInterval_Help="Specifies the Refresh Interval of the domain controller (DC) Locator DNS resource records for DCs to which this setting is applied. These DNS records are dynamically registered by the Net Logon service and are used by the Locator algorithm to locate the DC. This setting may be applied only to DCs using dynamic update.\n\nDCs configured to perform dynamic registration of the DC Locator DNS resource records periodically reregister their records with DNS servers, even if their records’ data has not changed. If authoritative DNS servers are configured to perform scavenging of the stale records, this reregistration is required to instruct the DNS servers configured to automatically remove (scavenge) stale records that these records are current and should be preserved in the database.\n\nWarning: If the DNS resource records are registered in zones with scavenging enabled, the value of this setting should never be longer than the Refresh Interval configured for these zones. Setting the Refresh Interval of the DC Locator DNS records to longer than the Refresh Interval of the DNS zones may result in the undesired deletion of DNS resource records.\n\nTo specify the Refresh Interval of the DC records, click Enabled, and then enter a value larger than 1800. This value specifies the Refresh Interval of the DC records in seconds (for example, the value 3600 is 60 minutes).\n\nIf this setting is not configured, it is not applied to any DCs, and DCs use their local configuration."
Netlogon_DnsRefreshIntervalLabel="Seconds:"
Netlogon_LdapSrvWeight="Weight Set in the DC Locator DNS SRV Records"
Netlogon_LdapSrvWeight_Help="Specifies the Weight field in the SRV resource records registered by the domain controllers (DC) to which this setting is applied. These DNS records are dynamically registered by the Net Logon service, and they are used to locate the DC.\n\nThe Weight field in the SRV record can be used in addition to the Priority value to provide a load-balancing mechanism where multiple servers are specified in the SRV records Target field and are all set to the same priority. The probability with which the DNS client randomly selects the target host to be contacted is proportional to the Weight field value in the SRV record.\n\nTo specify the Weight in the DC Locator DNS SRV records, click Enabled, and then enter a value. The range of values is 0 to 65535.\n\nIf this setting is not configured, it is not applied to any DCs, and DCs use their local configuration."
Netlogon_LdapSrvWeightLabel="Weight:"
Netlogon_LdapSrvPriority="Priority Set in the DC Locator DNS SRV Records"
Netlogon_LdapSrvPriority_Help="Specifies the Priority field in the SRV resource records registered by domain controllers (DC) to which this setting is applied. These DNS records are dynamically registered by the Net Logon service and are used to locate the DC.\n\nThe Priority field in the SRV record sets the preference for target hosts (specified in the SRV record’s Target field). DNS clients that query for SRV resource records attempt to contact the first reachable host with the lowest priority number listed.\n\nTo specify the Priority in the DC Locator DNS SRV resource records, click Enabled, and then enter a value. The range of values is 0 to 65535.\n\nIf this setting is not configured, it is not applied to any DCs, and DCs use their local configuration."
Netlogon_LdapSrvPriorityLabel="Priority:"
Netlogon_DnsTtl="TTL Set in the DC Locator DNS Records"
Netlogon_DnsTtl_Help="Specifies the value for the Time-To-Live (TTL) field in Net Logon registered SRV resource records. These DNS records are dynamically registered by the Net Logon service, and they are used to locate the domain controller (DC).\n\nTo specify the TTL for DC Locator DNS records, click Enabled, and then enter a value in seconds (for example, the value "900" is 15 minutes).\n\nIf this setting is not configured, it is not applied to any DCs, and DCs use their local configuration."
Netlogon_DnsTtlLabel="Seconds:"
Netlogon_AutoSiteCoverage="Automated Site Coverage by the DC Locator DNS SRV Records"
Netlogon_AutoSiteCoverage_Help="Determines whether domain controllers (DC) will dynamically register DC Locator site-specific SRV records for the closest sites where no DC for the same domain exists (or no Global Catalog for the same forest exists). These DNS records are dynamically registered by the Net Logon service, and they are used to locate the DC.\n\nIf this setting is enabled, the DCs to which this setting is applied dynamically register DC Locator site-specific DNS SRV records for the closest sites where no DC for the same domain, or no Global Catalog for the same forest, exists.\n\nIf you disable this setting, the DCs will not register site-specific DC Locator DNS SRV records for any other sites but their own.\n\nIf this setting is not configured, it is not applied to any DCs, and DCs use their local configuration."
Netlogon_SiteCoverage="Sites Covered by the DC Locator DNS SRV Records"
Netlogon_SiteCoverage_Help="Specifies the sites for which the domain controllers (DC) register the site-specific DC Locator DNS SRV resource records. These records are registered in addition to the site-specific SRV records registered for the site where the DC resides, and records registered by a DC configured to register DC Locator DNS SRV records for those sites without a DC that are closest to it. \n\nThe DC Locator DNS records are dynamically registered by the Net Logon service, and they are used to locate the DC. An Active Directory site is one or more well-connected TCP/IP subnets that allow administrators to configure Active Directory access and replication.\n\nTo specify the sites covered by the DC Locator DNS SRV records, click Enabled, and then enter the sites names in a space-delimited format.\n\nIf this setting is not configured, it is not applied to any DCs, and DCs use their local configuration."
Netlogon_SiteCoverageLabel="Sites:"
Netlogon_GcSiteCoverage="Sites Covered by the GC Locator DNS SRV Records"
Netlogon_GcSiteCoverage_Help="Specifies the sites for which the global catalogs (GC) should register site-specific GC locator DNS SRV resource records. These records are registered in addition to the site-specific SRV records registered for the site where the GC resides, and records registered by a GC configured to register GC Locator DNS SRV records for those sites without a GC that are closest to it. \n\nThe GC Locator DNS records and the site-specific SRV records are dynamically registered by the Net Logon service, and they are used to locate the GC. An Active Directory site is one or more well-connected TCP/IP subnets that allow administrators to configure Active Directory access and replication. A GC is a domain controller that contains a partial replica of every domain in Active Directory.\n\nTo specify the sites covered by the GC Locator DNS SRV records, click Enabled, and enter the sites' names in a space-delimited format.\n\nIf this setting is not configured, it is not applied to any GCs, and GCs use their local configuration."
Netlogon_GcSiteCoverageLabel="Sites:"
Netlogon_NdncSiteCoverage="Sites Covered by the Application Directory Partition Locator DNS SRV Records"
Netlogon_NdncSiteCoverage_Help="Specifies the sites for which the domain controllers (DC) housing application directory partition should register the site-specific, application directory partition-specific DC Locator DNS SRV resource records. These records are registered in addition to the site-specific SRV records registered for the site where the DC resides, and records registered by a DC configured to register DC Locator DNS SRV records for those sites without a DC that are closest to it. \n\nThe application directory partition locator DNS records and the site-specific SRV records are dynamically registered by the Net Logon service, and they are used to locate the application directory partition-specific DC. An Active Directory site is one or more well-connected TCP/IP subnets that allow administrators to configure Active Directory access and replication.\n\nTo specify the sites covered by the DC Locator application directory partition-specific DNS SRV records, click Enabled, and then enter the site names in a space-delimited format.\n\nIf this setting is not configured, it is not applied to any DCs, and DCs use their local configuration."
Netlogon_NdncSiteCoverageLabel="Sites:"
Netlogon_ExpectedDialupDelay="Expected dial-up delay on logon"
Netlogon_ExpectedDialupDelay_Help="Specifies the additional time for the computer to wait for the domain controller’s (DC) response when logging on to the network.\n\nTo specify the Expected dial-up delay at logon, click Enable, and then enter the desired value in seconds (for example, the value "60" is 1 minute).\n\nIf this setting is not configured, it is not applied to any computers, and computers use their local configuration."
Netlogon_ExpectedDialupDelayLabel="Seconds:"
Netlogon_SiteName="Site Name"
Netlogon_SiteName_Help="Specifies the Active Directory site to which computers belong.\n\nAn Active Directory site is one or more well-connected TCP/IP subnets that allow administrators to configure Active Directory access and replication.\n\nTo specify the site name for this setting, click Enabled, and then enter the site name. When the site to which a computer belongs is not specified, the computer automatically discovers its site from Active Directory.\n\nIf this setting is not configured, it is not applied to any computers, and computers use their local configuration."
Netlogon_SiteNameLabel="Site:"
Netlogon_NegativeCachePeriod="Negative DC Discovery Cache Setting"
Netlogon_NegativeCachePeriod_Help="Specifies the amount of time (in seconds) the DC locator remembers that a domain controller (DC) could not be found in a domain. When a subsequent attempt to locate the DC occurs within the time set in this setting, DC Discovery immediately fails, without attempting to find the DC.\n\nThe default value for this setting is 45 seconds. The maximum value for this setting is 7 days (7*24*60*60). The minimum value for this setting is 0.\n\nWarning: If the value for this setting is too large, a client will not attempt to find any DCs that were initially unavailable. If the value for this setting is too small, clients will attempt to find DCs even when none are available."
Netlogon_NegativeCachePeriodLabel="Seconds:"
Netlogon_BackgroundRetryInitialPeriod="Initial DC Discovery Retry Setting for Background Callers"
Netlogon_BackgroundRetryInitialPeriod_Help="When applications performing periodic searches for domain controllers (DC) are unable to find a DC, the value set in this setting determines the amount of time (in seconds) before the first retry.\n\nThe default value for this setting is 10 minutes (10*60). The maximum value for this setting is 49 days (0x4294967). The minimum value for this setting is 0.\n\nThis setting is relevant only to those callers of DsGetDcName that have specified the DS_BACKGROUND_ONLY flag.\n\nIf the value of this setting is less than the value specified in the NegativeCachePeriod subkey, the value in the NegativeCachePeriod subkey is used.\n\nWarning: If the value for this setting is too large, a client will not attempt to find any DCs that were initially unavailable. If the value set in this setting is very small and the DC is not available, the traffic caused by periodic DC discoveries may be excessive."
Netlogon_BackgroundRetryMaximumPeriod="Maximum DC Discovery Retry Interval Setting for Background Callers"
Netlogon_BackgroundRetryMaximumPeriod_Help="When applications performing periodic searches for Domain Controllers (DCs) are unable to find a DC, the value set in this setting determines the maximum retry interval allowed.\n\nFor example, the retry intervals may be set at 10 minutes, then 20 minutes and then 40 minutes, but when the interval reaches the value set in this setting, that value becomes the retry interval for all subsequent retries until the value set in Final DC Discovery Retry Setting is reached.\n\nThe default value for this setting is 60 minutes (60*60). The maximum value for this setting is 49 days (0x4294967). The minimum value for this setting is 0.\n\nIf the value for this setting is smaller than the value specified for the Initial DC Discovery Retry Setting, the Initial DC Discovery Retry Setting is used.\n\nWarning: If the value for this setting is too large, a client may take very long periods to try to find a DC.\n\nIf the value for this setting is too small and the DC is not available, the frequent retries may produce excessive network traffic."
Netlogon_BackgroundRetryQuitTime="Final DC Discovery Retry Setting for Background Callers"
Netlogon_BackgroundRetryQuitTime_Help="When applications performing periodic searches for domain controllers (DC) are unable to find a DC, the value set in this setting determines when retries are no longer allowed. For example, retires may be set to occur according to the Maximum DC Discovery Retry Interval Setting, but when the value set in this setting is reached, no more retries occur. If a value for this setting is smaller than the value in Maximum DC Discovery Retry Interval Setting, the value for Maximum DC Discovery Retry Interval Setting is used.\n\nThe default value for this setting is to not quit retrying (0). The maximum value for this setting is 49 days (0x4294967). The minimum value for this setting is 0.\n\nWarning: If the value for this setting is too small, a client will stop trying to find a DC too soon."
Netlogon_BackgroundRetryQuitTimeLabel="Seconds:"
Netlogon_BackgroundSuccessfulRefreshPeriod="Positive Periodic DC Cache Refresh for Background Callers"
Netlogon_BackgroundSuccessfulRefreshPeriod_Help="Determines when a successful DC cache entry is refreshed. This setting is applied to caller programs that periodically attempt to locate DCs, and it is applied before the returning the DC information to the caller program. The default value for this setting is infinite (4294967200). The maximum value for this setting is (4294967200), while the maximum that is not treated as infinity is 49 days (4294967). Any larger value is treated as infinity. The minimum value for this setting is to always refresh (0)."
Netlogon_NonBackgroundSuccessfulRefreshPeriod="Positive Periodic DC Cache Refresh for Non-Background Callers"
Netlogon_NonBackgroundSuccessfulRefreshPeriod_Help="Determines when a successful DC cache entry is refreshed. This setting is applied to caller programs that do not periodically attempt to locate DCs, and it is applied before the returning the DC information to the caller program. This setting is relevant to only those callers of DsGetDcName that have not specified the DS_BACKGROUND_ONLY flag.\n\nThe default value for this setting is 30 minutes (1800). The maximum value for this setting is (4294967200), while the maximum that is not treated as infinity is 49 days (4294967). Any larger value will be treated as infinity. The minimum value for this setting is to always refresh (0)."
Netlogon_ScavengeInterval_Help="Determines the interval at which Netlogon performs the following scavenging operations:\n\n- Checks if a password on a secure channel needs to be modified, and modifies it if necessary.\n- On the domain controllers (DC), discovers a DC that has not been discovered.\n- On the PDC, attempts to add the <DomainName>[1B] NetBIOS name if it hasn’t already been successfully added.\n\nNone of these operations are critical. 15 minutes is optimal in all but extreme cases. For instance, if a DC is separated from a trusted domain by an expensive (e.g., ISDN) line, this parameter might be adjusted upward to avoid frequent automatic discovery of DCs in a trusted domain.\n\nTo enable the setting, click Enabled, and then specify the interval in seconds."
Netlogon_ScavengeIntervalLabel="Seconds:"
Netlogon_AvoidPdcOnWan="Contact PDC on logon failure"
Netlogon_AvoidPdcOnWan_Help="Defines whether a domain controller (DC) should attempt to verify with the PDC the password provided by a client if the DC failed to validate the password.\n\nContacting the PDC is useful in case the client’s password was recently changed and did not propagate to the DC yet. Users may want to disable this feature if the PDC is located over a slow WAN connection.\n\nTo enable this feature, click Enabled.\n\nTo disable this feature, click Disabled."
Netlogon_AllowSingleLabelDnsDomain="Location of the DCs hosting a domain with single label DNS name"
Netlogon_AllowSingleLabelDnsDomain_Help="Specifies whether the computers to which this setting is applied attempt DNS name resolution of a single-label domain names.\n\nBy default, when a computer (or the DC Locator running on a computer, to be more specific) needs to locate a domain controller hosting an Active Directory domain specified with a single-label name, the computer exclusively uses NetBIOS name resolution, but not the DNS name resolution, unless the computer is joined to an Active Directory forest in which at least one domain has a single-label DNS name. \n\nIf this setting is enabled, computers to which this policy is applied will attempt to locate a domain controller hosting an Active Directory domain specified with a single-label name using DNS name resolution.\n\nIf this setting is disabled, computers to which this setting is applied will attempt to locate a domain controller hosting an Active Directory domain specified with a single-label name only using NetBIOS name resolution, but not the DNS name resolution, unless the computer is joined to an Active Directory forest in which at least one domain has a single-label DNS name.\n\nIf this setting is not configured, it is not applied to any computers, and computers use their local configuration."
NoStartPage="Force classic Start Menu"
NoStartPage_Help="This setting effects the presentation of the Start menu.\n\nThe classic Start menu in Windows 2000 allows users to begin common tasks, while the new Start menu consolidates common items onto one menu. When the classic Start menu is used, the following icons are placed on the desktop: My Documents, My Pictures, My Music, My Computer, and My Network Places. The new Start menu starts them directly.\n\nIf you enable this setting, the Start menu displays the classic Start menu in the Windows 2000 style and displays the standard desktop icons.\n\nIf you disable this setting, the Start menu only displays in the new style, meaning the desktop icons are now on the Start page.\n\nIf you do not configure this setting, the default is the new style, and the user can change the view."
SharedFolders="Shared Folders"
PublishSharedFolders="Allow shared folders to be published"
PublishSharedFolders_Help="Determines whether the user can publish shared folders in Active Directory.\n\nIf you enable this setting or do not configure it, users can use the "Publish in Active Directory" option in the Shared Folders snap-in to publish shared folders in Active Directory.\n\nIf you disable this setting, the user cannot publish shared folders in Active Directory, and the "Publish in Active Directory" option is disabled. Note: The default is to allow shared folders to be published when this setting is not configured"
PublishDfsRoots="Allow DFS roots to be published"
PublishDfsRoots_Help="Determines whether the user can publish DFS roots in Active Directory.\n\nIf you enable this setting or do not configure it, users can use the "Publish in Active Directory" option to publish DFS roots as shared folders in Active Directory.\n\nIf you disable this setting, the user cannot publish DFS roots in Active Directory, and the "Publish in Active Directory" option is disabled. Note: The default is to allow shared folders to be published when this setting is not configured."
Network="Network"
NetworkConnections="Network Connections"
NewGPODisplayName="Default name for new Group Policy objects"
NewGPODisplayName_Help="Sets the default display name for new Group Policy objects.\n\nThis setting allows you to specify the default name for new Group Policy objects created from the Group Policy tab in Active Directory tools or created from the GPO browser.\n\nThe display name may contain environment variables and can be a maximum of 255 characters long.\n\nIf this setting is Disabled or Not Configured, the default display name of New Group Policy object is used."
NewGPODisplayNameHeading="GPO Name:"
NewGPOLinksDisabled="Create new Group Policy object links disabled by default"
NewGPOLinksDisabled_Help="Creates new Group Policy object links in the disabled state.\n\nThis setting creates all new Group Policy object links in the disabled state by default. After you configure and test the new object links, either by using Active Directory Users and Computers or Active Directory Sites and Services, you can enable the object links for use on the system.\n\nIf you disable this setting or do not configure it, new Group Policy object links are created in the enabled state. If you do not want them to be effective until they are configured and tested, you must disable the object link."
NoActiveDesktop_Help="Disables Active Desktop and prevents users from enabling it.\n\nThis prevents users from trying to enable or disable Active Desktop while a policy controls it.\n\nIf you disable this setting or do not configure it, Active Desktop is disabled by default, but users can enable it.\n\nNote: If both the "Enable Active Desktop" setting and the "Disable Active Desktop" setting are enabled, the "Disable Active Desktop" setting is ignored. If the "Disable Active Desktop and Web view" setting (in User Configuration\Administrative Templates\Windows Components\Windows Explorer) is enabled, Active Desktop is disabled and both of these policies are ignored."
NoActiveDesktop_Tip="Disallows HTML and Jpg Wallpaper"
NoActiveDesktop="Disable Active Desktop"
NoActiveDesktopChanges_Help="Prevents the user from enabling or disabling Active Desktop or changing the Active Desktop configuration.\n\nThis is a comprehensive setting that locks down the configuration you establish by using other policies in this folder. This setting removes the Web tab from Display in Control Panel. As a result, users cannot enable or disable Active Desktop. If Active Desktop is already enabled, users cannot add, remove, or edit Web content or disable, lock, or synchronize Active Desktop components."
NoActiveDesktopChanges="Prohibit changes"
NoAddFromCDorFloppy_Help="Removes the "Add a program from CD-ROM or floppy disk" section from the Add New Programs page. This prevents users from using Add or Remove Programs to install programs from removable media.\n\nIf you disable this setting or do not configure it, the "Add a program from CD-ROM or floppy disk" option is available to all users.\n\nThis setting does not prevent users from using other tools and methods to add or remove program components.\n\nNote: If the "Hide Add New Programs page" setting is enabled, this setting is ignored. Also, if the "Prevent removable media source for any install" setting (located in User Configuration\Administrative Templates\Windows Components\Windows Installer) is enabled, users cannot add programs from removable media, regardless of this setting."
NoAddFromCDorFloppy="Hide the "Add a program from CD-ROM or floppy disk" option"
NoAddFromInternet_Help="Removes the "Add programs from Microsoft" section from the Add New Programs page. This setting prevents users from using Add or Remove Programs to connect to Windows Update.\n\nIf you disable this setting or do not configure it, "Add programs from Microsoft" is available to all users.\n\nThis setting does not prevent users from using other tools and methods to connect to Windows Update.\n\nNote: If the "Hide Add New Programs page" setting is enabled, this setting is ignored."
NoAddFromInternet="Hide the "Add programs from Microsoft" option"
NoAddFromNetwork_Help="Prevents users from viewing or installing published programs.\n\nThis setting removes the "Add programs from your network" section from the Add New Programs page. The "Add programs from your network" section lists published programs and provides an easy way to install them.\n\nPublished programs are those programs that the system administrator has explicitly made available to the user with a tool such as Windows Installer. Typically, system administrators publish programs to notify users that the programs are available, to recommend their use, or to enable users to install them without having to search for installation files.\n\nIf you enable this setting, users cannot tell which programs have been published by the system administrator, and they cannot use Add or Remove Programs to install published programs. However, they can still install programs by using other methods, and they can view and install assigned (partially installed) programs that are offered on the desktop or on the Start menu.\n\nIf you disable this setting or do not configure it, "Add programs from your network" is available to all users.\n\nNote: If the "Hide Add New Programs page" setting is enabled, this setting is ignored."
NoAddFromNetwork="Hide the "Add programs from your network" option"
NoAddingComponents_Help="Prevents users from adding Web content to their Active Desktop.\n\nThis setting removes the "New" button from Web tab in Display in Control Panel. As a result, users cannot add Web pages or pictures from the Internet or an intranet to the desktop. This setting does not remove existing Web content from their Active Desktop, or prevent users from removing existing Web content.\n\nAlso, see the "Disable all items" setting."
NoAddPage_Help="Removes the Add New Programs button from the Add or Remove Programs bar. As a result, users cannot view or change the attached page.\n\nThe Add New Programs button lets users install programs published or assigned by a system administrator.\n\nIf you disable this setting or do not configure it, the Add New Programs button is available to all users.\n\nThis setting does not prevent users from using other tools and methods to install programs."
NoAddPage="Hide Add New Programs page"
NoAddPrinter_Help="Prevents users from using familiar methods to add local and network printers.\n\nThis setting removes the Add Printer option from the Start menu. (To find the Add Printer option, click Start, click Printers, and then click Add Printer.) This setting also removes Add Printer from the Printers folder in Control Panel.\n\nAlso, users cannot add printers by dragging a printer icon into the Printers folder. If they try, a message appears explaining that the setting prevents the action.\n\nHowever, this setting does not prevent users from using the Add Hardware Wizard to add a printer. Nor does it prevent users from running other programs to add printers.\n\nThis setting does not delete printers that users have already added. However, if users have not added a printer when this setting is applied, they cannot print.\n\nNote: You can use printer permissions to restrict the use of printers without specifying a setting. In the Printers folder, right-click a printer, click Properties, and then click the Security tab."
NoAddPrinter="Prevent addition of printers"
NoAddRemovePrograms_Help="Prevents users from using Add or Remove Programs.\n\nThis setting removes Add or Remove Programs from Control Panel and removes the Add or Remove Programs item from menus.\n\nAdd or Remove Programs lets users install, uninstall, repair, add, and remove features and components of Windows 2000 and a wide variety of Windows programs. Programs published or assigned to the user appear in Add or Remove Programs.\n\nIf you disable this setting or do not configure it, Add or Remove Programs is available to all users.\n\nWhen enabled, this setting takes precedence over the other settings in this folder.\n\nThis setting does not prevent users from using other tools and methods to install or uninstall programs."
NoAutoUpdate_Help="This setting controls automatic updates to a user's computer.\n\nWhenever a user connects to the Internet, Windows searches for updates available for the software and hardware on their computer and automatically downloads them. This happens in the background, and the user is prompted when downloaded components are ready to be installed, or prior to downloading, depending on their configuration.\n\nIf you enable this setting, it prohibits Windows from searching for updates.\n\nIf you disable or do not configure it, Windows searches for updates and automatically downloads them.\n\nNote: Windows Update is an online catalog customized for your computer that consists of items such as drivers, critical updates, Help files, and Internet products that you can download to keep your computer up to date.\n\nAlso, see the "Remove links and access to Windows Update" setting. If the "Remove links and access to Windows Update" setting is enabled, the links to Windows Update on the Start menu are also removed."
NoAutoTrayNotify="Turn off notification area cleanup"
NoAutoTrayNotify_Help="This setting effects the notification area, also called the "system tray."\n\nThe notification area is located in the task bar, generally at the bottom of the screen, and itincludes the clock and current notifications. This setting determines whether the items are always expanded or always collapsed. By default, notifications are collapsed. The notification cleanup << icon can be referred to as the "notification chevron."\n\nIf you enable this setting, the system notification area expands to show all of the notifications that use this area.\n\nIf you disable this setting, the system notification area will always collapse notifications.\n\nIf you do not configure it, the user can choose if they want notifications collapsed."
NoBackButton_Help="Removes the Back button from the Open dialog box.\n\nThis setting, and others in this folder, lets you remove new features added in Windows 2000, so that the Open dialog box looks like it did in Windows NT 4.0 and earlier. These policies only affect programs that use the standard Open dialog box provided to developers of Windows programs.\n\nTo see an example of the standard Open dialog box, run Notepad and, on the File menu, click Open.\n\nNote: It is a requirement for third-party applications with Windows 2000 or later certification to adhere to this setting."
NoBackButton="Hide the common dialog back button"
NoBalloonTip_Help="Hides pop-up text on the Start menu and in the notification area.\n\nWhen you hold the cursor over an item on the Start menu or in the notification area, the system displays pop-up text providing additional information about the object.\n\nIf you enable this setting, some of this pop-up text is not displayed. The pop-up text affected by this setting includes "Click here to begin" on the Start button, "Where have all my programs gone" on the Start menu, and "Where have my icons gone" in the notification area.\n\nIf you disable this setting or do not configure it, all pop-up text is displayed on the Start menu and in the notification area."
NoBalloonTip="Remove Balloon Tips on Start Menu items"
NoCacheThumbNailPictures="Turn off caching of thumbnail pictures"
NoCacheThumbNailPictures_Help="This settings controls whether the thumbnail views are cached.\n\nIf you enable this setting, thumbnail views are not cached.\n\nIf you disable or do not configure this setting, thumbnail views are cached.\n\nNote: For shared corporate workstations or computers where security is a top concern, you should enable this setting to turn off the thumbnail view cache, because the thumbnail cache can be read by everyone."
NoCDBurning="Remove CD Burning features"
NoCDBurning_Help="Windows Explorer allows you to to create and modify re-writable CDs if you have a CD writer connected to your PC.\n\nIf you enable this setting, all features in the Windows Exlorer that allow you to use your CD writer are removed.\n\nIf you disable or do not configure this setting, users are able to use the Windows Explorer CD burning features.\n\nNote: This setting does not prevent users from using third-party applications to create or modify CDs using a CD writer."
NoChangeAnimation_Help="Prevents users from selecting the option to animate the movement of windows, menus, and lists.\n\nIf you enable this setting, the "Use transition effects for menus and tooltips" option in Display in Control Panel is disabled.\n\nEffects, such as animation, are designed to enhance the user's experience but might be confusing or distracting to some users."
NoChangeAnimation="Remove UI to change menu animation setting"
NoChangeKeyboardNavigationIndicators_Help="Disables the "Hide keyboard navigation indicators until I use the ALT key" option in Display in Control Panel.\n\nWhen this Display Properties option is selected, the underlining that indicates a keyboard shortcut character (hot key) does not appear on menus until you press ALT.\n\nEffects, such as transitory underlines, are designed to enhance the user's experience but might be confusing or distracting to some users."
NoChangeKeyboardNavigationIndicators="Remove UI to change keyboard navigation indicator setting"
NoChangeStartMenu_Help="Prevents users from using the drag-and-drop method to reorder or remove items on the Start menu. Also, it removes context menus from the Start menu.\n\nIf you disable this setting or do not configure it, users can remove or reorder Start menu items by dragging and dropping the item. They can display context menus by right-clicking a Start menu item.\n\nThis setting does not prevent users from using other methods of customizing the Start menu or performing the tasks available from the context menus.\n\nAlso, see the "Prevent changes to Taskbar and Start Menu Settings" and the "Remove access to the context menus for taskbar" settings."
NoChangeStartMenu="Remove Drag-and-drop context menus on the Start Menu"
NoChangingWallPaper_Help="Prevents users from adding or changing the background design of the desktop.\n\nBy default, users can use the Desktop tab of Display in Control Panel to add a background design (wallpaper) to their desktop.\n\nIf you enable this setting, the Desktop tab still appears, but all options on the tab are disabled.\n\nTo remove the Desktop tab, use the "Hide Desktop tab" setting.\n\nTo specify wallpaper for a group, use the "Active Desktop Wallpaper" setting.\n\nAlso, see the "Allow only bitmapped wallpaper" setting."
NoClose_Help="Prevents users from shutting down or restarting Windows.\n\nThis setting removes the Shut Down option from the Start menu and disables the Shut Down button on the Windows Security dialog box, which appears when you press CTRL+ALT+DEL.\n\nThis setting prevents users from using the Windows user interface to shut down the system, although it does not prevent them from running programs that shut down Windows.\n\nIf you disable this setting or do not configure it, the Shut Down menu option appears, and the Shut Down button is enabled.\n\nNote: It is a requirement for third-party applications with Windows 2000 or later certification to adhere to this setting."
NoClose="Remove and prevent access to the Shut Down command"
NoCloseDragDropBands_Help="Prevents users from manipulating desktop toolbars.\n\nIf you enable this setting, users cannot add or remove toolbars from the desktop. Also, users cannot drag toolbars on to or off of docked toolbars.\n\nNote: If users have added or removed toolbars, this setting prevents them from restoring the default configuration.\n\nTip: To view the toolbars that can be added to the desktop, right-click a docked toolbar (such as the taskbar beside the Start button), and point to "Toolbars."\n\nAlso, see the "Prohibit adjusting desktop toolbars" setting."
NoClosingComponents_Help="Prevents users from removing Web content from their Active Desktop.\n\nIn Active Desktop, you can add items to the desktop but close them so they are not displayed.\n\nIf you enable this setting, items added to the desktop cannot be closed; they always appear on the desktop. This setting removes the check boxes from items on the Web tab in Display in Control Panel.\n\nNote: This setting does not prevent users from deleting items from their Active Desktop."
NoCommonGroups_Help="Removes items in the All Users profile from the Programs menu on the Start menu.\n\nBy default, the Programs menu contains items from the All Users profile and items from the user's profile. If you enable this setting, only items in the user's profile appear in the Programs menu.\n\nTip: To see the Program menu items in the All Users profile, on the system drive, go to Documents and Settings\All Users (WINNT)\Start Menu\Programs."
NoCommonGroups="Remove common program groups from Start Menu"
NoControlPanel_Help="Disables all Control Panel programs.\n\nThis setting prevents Control.exe, the program file for Control Panel, from starting. As a result, users cannot start Control Panel or run any Control Panel items.\n\nThis setting also removes Control Panel from the Start menu. (To open Control Panel, click Start, point to Settings, and then click Control Panel.) This setting also removes the Control Panel folder from Windows Explorer.\n\nIf users try to select a Control Panel item from the Properties item on a context menu, a message appears explaining that a setting prevents the action.\n\nAlso, see the "Remove Display in Control Panel" and "Remove programs on Settings menu" settings."
NoControlPanel="Prohibit access to the Control Panel"
NoDeletePrinter_Help="Prevents users from deleting local and network printers.\n\nIf a user tries to delete a printer, such as by using the Delete option in Printers in Control Panel, a message appears explaining that a setting prevents the action.\n\nThis setting does not prevent users from running other programs to delete a printer."
NoDeletePrinter="Prevent deletion of printers"
NoDeletingComponents_Help="Prevents users from deleting Web content from their Active Desktop.\n\nThis setting removes the Delete button from the Web tab in Display in Control Panel. As a result, users can temporarily remove, but not delete, Web content from their Active Desktop.\n\nThis setting does not prevent users from adding Web content to their Active Desktop.\n\nAlso, see the "Prohibit closing items" and "Disable all items" settings."
NoDesktop_Help="Removes icons, shortcuts, and other default and user-defined items from the desktop, including Briefcase, Recycle Bin, My Computer, and My Network Places.\n\nRemoving icons and shortcuts does not prevent the user from using another method to start the programs or opening the items they represent.\n\nAlso, see "Items displayed in Places Bar" in User Configuration\Administrative Templates\Windows Components\Common Open File Dialog to remove the Desktop icon from the Places Bar. This will help revent users from saving data to the Desktop."
NoDesktop="Hide and disable all items on the desktop"
NoDesktopCleanupWizard="Remove the Desktop Cleanup Wizard"
NoDesktopCleanupWizard_Help="Prevents users from using the Desktop Cleanup Wizard.\n\nIf you enable this setting, the Desktop Cleanup wizard does not automatically run on a users workstation every 60 days. The user will also not be able to access the Desktop Cleanup Wizard.\n\nIf you disable this setting or do not configure it, the default behavior of the Desktop Clean Wizard running every 60 days occurs.\n\nNote: When this setting is not enabled, users can run the Desktop Cleanup Wizard, or have it run automatically every 60 days from Display, by clicking the Desktop tab and then clicking the Customize Desktop button."
NoDFSTab_Help="Removes the DFS tab from Windows Explorer.\n\nThis setting removes the DFS tab from Windows Explorer and from other programs that use the Windows Explorer browser, such as My Computer. As a result, users cannot use this tab to view or change the properties of the Distributed File System (DFS) shares available from their computer.\n\nThis setting does not prevent users from using other methods to configure DFS."
NoDFSTab="Remove DFS tab"
NoDispAppearancePage_Help="Removes the Appearance and Themes tabs from Display in Control Panel.\n\nWhen this setting is enabled, it removes the desktop color selection option from the Desktop tab.\n\nThis setting prevents users from using Control Panel to change the colors or color scheme of the desktop and windows.\n\nIf this setting is disabled or not configured, the Appearance and Themes tabs are available in Dislay in Control Panel."
NoDispBackgroundPage_Help="Removes the Desktop tab from Display in Control Panel.\n\nThis setting prevents users from using Control Panel to change the pattern and wallpaper on the desktop.\n\nEnabling this setting also prevents the user from customizing the desktop by changing icons or adding new Web content through Control Panel."
NoDispCpl_Help="Disables Display in Control Panel.\n\nIf you enable this setting, Display in Control Panel does not run. When users try to start Display, a message appears explaining that a setting prevents the action.\n\nAlso, see the "Prohibit access to the Control Panel" (User Configuration\Administrative Templates\Control Panel) and "Remove programs on Settings menu" (User Configuration\Administrative Templates\Start Menu & Taskbar) settings."
NoDispScrSavPage_Help="Removes the Screen Saver tab from Display in Control Panel.\n\nThis setting prevents users from using Control Panel to add, configure, or change the screen saver on the computer."
NoDispSettingsPage_Help="Removes the Settings tab from Display in Control Panel.\n\nThis setting prevents users from using Control Panel to add, configure, or change the display settings on the computer."
NoDrives_Help="Removes the icons representing selected hard drives from My Computer and Windows Explorer. Also, the drive letters representing the selected drives do not appear in the standard Open dialog box.\n\nTo use this setting, select a drive or combination of drives in the drop-down list. To display all drives, disable this setting or select the "Do not restrict drives" option in the drop-down list.\n\nNote: This setting removes the drive icons. Users can still gain access to drive contents by using other methods, such as by typing the path to a directory on the drive in the Map Network Drive dialog box, in the Run dialog box, or in a command window.\n\nAlso, this setting does not prevent users from using programs to access these drives or their contents. And, it does not prevent users from using the Disk Management snap-in to view and change drive characteristics.\n\nAlso, see the "Prevent access to drives from My Computer" setting.\n\nNote: It is a requirement for third-party applications with Windows 2000 or later certification to adhere to this setting."
NoDrives="Hide these specified drives in My Computer"
NoDrivesDropdown="Pick one of the following combinations"
NoEditingComponents_Help="Prevents users from changing the properties of Web content items on their Active Desktop.\n\nThis setting disables the Properties button on the Web tab in Display in Control Panel. Also, it removes the Properties item from the menu for each item on the Active Desktop. As a result, users cannot change the properties of an item, such as its synchronization schedule, password, or display characteristics."
NoEncryptOnMove="Do not automatically encrypt files moved to encrypted folders"
NoEncryptOnMove_Help="Prevents Windows Explorer from encrypting files that are moved to an encrypted folder.\n\nIf you disable this setting or do not configure it, Windows Explorer automatically encrypts files that are moved to an encrypted folder.\n\nThis setting applies only to files moved within a volume. When files are moved to other volumes, or if you create a new file in an encrypted folder, Windows Explorer encrypts those files automatically."
NoEntireNetwork_Help="Removes all computers outside of the user's workgroup or local domain from lists of network resources in Windows Explorer and My Network Places.\n\nIf you enable this setting, the system removes the Entire Network option and the icons representing networked computers from My Network Places and from the browser associated with the Map Network Drive option.\n\nThis setting does not prevent users from viewing or connecting to computers in their workgroup or domain. It also does not prevent users from connecting to remote computers by other commonly used methods, such as by typing the share name in the Run dialog box or the Map Network Drive dialog box.\n\nTo remove computers in the user's workgroup or domain from lists of network resources, use the "No "Computers Near Me" in My Network Places" setting.\n\nNote: It is a requirement for third-party applications with Windows 2000 or later certification to adhere to this setting."
NoEntireNetwork="No "Entire Network" in My Network Places"
NoFavoritesMenu_Help="Prevents users from adding the Favorites menu to the Start menu or classic Start menu.\n\nIf you enable this setting, the Display Favorites item does not appear in the Advanced Start menu options box.\n\nIf you disable or do not configure this setting, the Display Favorite item is available.\n\nNote:The Favorities menu does not appear on the Start menu by default. To display the Favorites menu, right-click Start, click Properties, and then click Customize. If you are using Start menu, click the Advanced tab, and then, under Start menu items, click the Favorites menu. If you are using the classic Start menu, click Display Favorites under Advanced Start menu options.\n\nNote:The items that appear in the Favorites menu when you install Windows are preconfigured by the system to appeal to most users. However, users can add and remove items from this menu, and system administrators can create a customized Favorites menu for a user group.\n\nNote:This setting only affects the Start menu. The Favorites item still appears in Windows Explorer and in Internet Explorer."
NoFavoritesMenu="Remove Favorites menu from Start Menu"
NoFileMenu_Help="Removes the File menu from My Computer and Windows Explorer.\n\nThis setting does not prevent users from using other methods to perform tasks available on the File menu."
NoFileMenu="Remove File menu from Windows Explorer"
NoFileMRU_Help="Removes the list of most recently used files from the Open dialog box.\n\nIf you disable this setting or do not configure it, the "File name" field includes a drop-down list of recently used files. If you enable this setting, the "File name" field is a simple text box. Users must browse directories to find a file or type a file name in the text box.\n\nThis setting, and others in this folder, lets you remove new features added in Windows 2000, so that the Open dialog box looks like it did in Windows NT 4.0 and earlier. These policies only affect programs that use the standard Open dialog box provided to developers of Windows programs.\n\nTo see an example of the standard Open dialog box, start Notepad and, on the File menu, click Open.\n\nNote: It is a requirement for third-party applications with Windows 2000 or later certification to adhere to this setting."
NoFileMRU="Hide the dropdown list of recent files"
NoFind_Help="Removes the Search item from the Start menu, and disables some Windows Explorer search elements.\n\nThis setting removes the Search item from the Start menu and from the context menu that appears when you right-click the Start menu. Also, the system does not respond when users press the Application key (the key with the Windows logo)+ F.\n\nIn Windows Explorer, the Search item still appears on the Standard buttons toolbar, but the system does not respond when the user presses Ctrl+F. Also, Search does not appear in the context menu when you right-click an icon representing a drive or a folder.\n\nThis setting affects the specified user interface elements only. It does not affect Internet Explorer and does not prevent the user from using other methods to search.\n\nAlso, see the "Remove Search button from Windows Explorer" setting in User Configuration\Administrative Templates\Windows Components\Windows Explorer.\n\nNote:\n\nThis setting also prevents the user from using the F3 key."
NoFind="Remove Search menu from Start Menu"
NoFolderOptions_Help="Removes the Folder Options item from all Windows Explorer menus and removes the Folder Options item from Control Panel. As a result, users cannot use the Folder Options dialog box.\n\nThe Folder Options dialog box lets users set many properties of Windows Explorer, such as Active Desktop, Web view, Offline Files, hidden system files, and file types.\n\nAlso, see the "Enable Active Desktop" setting in User Configuration\AdministrativeTemplates\Desktop\Active Desktop and the "Prohibit user configuration of Offline Files" setting in User Configuration\Administrative Templates\Network\Offline Files."
NoFolderOptions="Removes the Folder Options menu item from the Tools menu"
NoHardwareTab_Help="Removes the Hardware tab.\n\nThis setting removes the Hardware tab from Mouse, Keyboard, and Sounds and Audio Devices in Control Panel. It also removes the Hardware tab from the Properties dialog box for all local drives, including hard drives, floppy disk drives, and CD-ROM drives. As a result, users cannot use the Hardware tab to view or change the device list or device properties, or use the Troubleshoot button to resolve problems with the device."
NoHardwareTab="Remove Hardware tab"
NoHelp_Help="Removes the Help command from the Start menu.\n\nThis setting only affects the Start menu. It does not remove the Help menu from Windows Explorer and does not prevent users from running Help."
NoHelp="Remove Help menu from Start Menu"
NoHTMLWallPaper_Help="Permits only bitmap images for wallpaper. This setting limits the desktop background ("wallpaper") to bitmap (.bmp) files. If users select files with other image formats, such as JPEG, GIF, PNG, or HTML, through the Browse button on the Desktop tab, the wallpaper does not load. Files that are autoconverted to a .bmp format, such as JPEG, GIF, and PNG, can be set as Wallpaper by right-clicking the image and selecting "Set as Wallpaper".\n\nAlso, see the "Active Desktop Wallpaper" and the "Prevent changing wallpaper" (in User Configuration\Administrative Templates\Control Panel\Display) settings."
NoInstrumentation_Help="Disables user tracking.\n\nThis setting prevents the system from tracking the programs users run, the paths they navigate, and the documents they open. The system uses this information to customize Windows features, such as personalized menus.\n\nIf you enable this setting, the system does not track these user actions. The system disables customized features that require user tracking information, including personalized menus.\n\nAlso, see the "Turn off personalized menus" setting."
NoInstrumentation="Turn off user tracking"
NoInternetIcon_Help="Removes the Internet Explorer icon from the desktop and from the Quick Launch bar on the taskbar.\n\nThis setting does not prevent the user from starting Internet Explorer by using other methods."
NoInternetIcon="Hide Internet Explorer icon on desktop"
NoLogOff_Help="Prevents the user from logging off.\n\nThis setting does not let the user log off the system by using any method, including programs run from the command line, such as scripts. It also disables or removes all menu items and buttons that log the user off the system.\n\nAlso, see the "Remove Logoff on the Start Menu" setting."
NoLogoff="Remove Logoff"
NoManageMyComputerVerb="Hides the Manage item on the Windows Explorer context menu"
NoManageMyComputerVerb_Help="Removes the Manage item from the Windows Explorer context menu. This context menu appears when you right-click Windows Explorer or My Computer.\n\nThe Manage item opens Computer Management (Compmgmt.msc), a console tool that includes many of the primary Windows 2000 administrative tools, such as Event Viewer, Device Manager, and Disk Management. You must be an administrator to use many of the features of these tools.\n\nThis setting does not remove the Computer Management item from the Start menu (Start, Programs, Administrative Tools, Computer Management), nor does it prevent users from using other methods to start Computer Management.\n\nTip: To hide all context menus, use the "Remove Windows Explorer's default context menu" setting."
NoMovingBands_Help="Prevents users from adjusting the length of desktop toolbars. Also, users cannot reposition items or toolbars on docked toolbars.\n\nThis setting does not prevent users from adding or removing toolbars on the desktop.\n\nNote: If users have adjusted their toolbars, this setting prevents them from restoring the default configuration.\n\nAlso, see the "Prevent adding, dragging, dropping and closing the Taskbar's toolbars" setting."
NoPropertiesMyComputer="Remove Properties from the My Computer context menu"
NoPropertiesMyComputer_Help="This setting hides Properties on the context menu for My Computer.\n\nIf you enable this setting, the Properties option will not be present when the user right-clicks My Computer or clicks My Computer and then goes to the File menu. Likewise, Alt-Enter does nothing when My Computer is selected.\n\nIf you disable or do not configure this setting, the Properties option is displayed as usual."
NoMyComputerSharedDocuments="Remove Shared Documents from My Computer"
NoMyComputerSharedDocuments_Help="Removes the Shared Documents folders from My Computer.\n\nWhen a Windows client in is a workgroup, a Shared Documents icon appears in the Windows Explorer Web view under "Other Places" and also under "Files Stored on This Computer" in My Computer. Using this policy setting, you can choose not to have these items displayed.\n\nIf you enable this setting, the Shared Documents folders is not displayed in the Web view or in My Computer.\n\nIf you disable or do not configure this setting, the Shared Documents folders is displayed in Web view and also in My Computer when the client is part of a workgroup."
NoMyComputerIcon="Remove My Computer icon on the desktop"
NoMyComputerIcon_Help="This setting hides My Computer from the desktop and from the new Start menu. It also hides links to My Computer in the Web view of all Explorer windows, and it hides My Computer in the Explorer folder tree pane. If the user navigates into My Computer via the "Up" button while this setting is enabled, they view an empty My Computer folder. This setting allows administrators to restrict their users from seeing My Computer in the shell namespace, allowing them to present their users with a simpler desktop environment.\n\nIf you enable this setting, My Computer is hidden on the desktop, the new Start menu, the Explorer folder tree pane, and the Explorer Web views. If the user manages to navigate to My Computer, the folder will be empty.\n\nIf you disable this setting, My Computer is displayed as usual, appearing as normal on the desktop, Start menu, folder tree pane, and Web views, unless restricted by another setting.\n\nIf you do not configure this setting, the default is to display My Computer as usual.\n\nNote: Hiding My Computer and its contents does not hide the contents of the child folders of My Computer. For example, if the users navigate into one of their hard drives, they see all of their folders and files there, even if this setting is enabled."
NoMyDocumentsIcon_Help="Removes most occurrences of the My Documents icon.\n\nThis setting removes the My Documents icon from the desktop, from Windows Explorer, from programs that use the Windows Explorer windows, and from the standard Open dialog box.\n\nThis setting does not prevent the user from using other methods to gain access to the contents of the My Documents folder.\n\nThis setting does not remove the My Documents icon from the Start menu. To do so, use the "Remove My Documents icon from Start Menu" setting.\n\nNote: To make changes to this setting effective, you must log off from and log back on to Windows 2000."
NoMyDocumentsIcon="Remove My Documents icon on the desktop"
NoPinnedPrograms="Remove pinned programs list from the Start Menu"
NoPinnedPrograms_Help="If you enable this setting, the "Pinned Programs" list is removed from the Start menu, and the Internet and Email checkboxes are removed from the simple Start menu customization CPL.\n\nIf you disable this setting or do not configure it, the "Pinned Programs" list remains on the simple Start menu."
NoFrequentUsedPrograms="Remove frequent programs list from the Start Menu"
NoFrequentUsedPrograms_Help="If you enable this setting, the frequently used programs list is removed from the Start menu.\n\nIf you disable this setting or do not configure it, the frequently used programs list remains on the simple Start menu."
NoMoreProgramsList="Remove All Programs list from the Start menu"
NoMoreProgramsList_Help="If you enable this setting, the "All Programs" item is removed from the simple Start menu.\n\nIf you disable this setting or do not configure it, the "All Programs" item remains on the simple Start menu."
NoUserNameOnStartMenu="Remove user name from Start Menu"
NoUserNameOnStartMenu_Help="If you enable this setting, the user name is removed from the simple Start menu.\n\nIf you disable this setting or do not configure it, the user name remains on the simple Start menu."
NoRecycleBinIcon="Remove Recycle Bin icon from desktop"
NoRecycleBinIcon_Help="Removes most occurrences of the Recycle Bin icon.\n\nThis setting removes the Recycle Bin icon from the desktop, from Windows Explorer, from programs that use the Windows Explorer windows, and from the standard Open dialog box.\n\nThis setting does not prevent the user from using other methods to gain access to the contents of the Recycle Bin folder.\n\nNote: To make changes to this setting effective, you must log off and then log back on."
NoRecycleBinProperties="Remove Properties from the Recycle Bin context menu"
NoRecycleBinProperties_Help="Removes the Properties option from the Recycle Bin context menu.\n\nIf you enable this setting, the Properties option will not be present when the user right-clicks on Recycle Bin or opens Recycle Bin and then clicks File. Likewise, Alt-Enter does nothing when Recycle Bin is selected.\n\nIf you disable or do not configure this setting, the Properties option is displayed as usual."
NoRecycleFiles="Do not move deleted files to the Recycle Bin"
NoRecycleFiles_Help="When a file or folder is deleted in Windows Explorer, a copy of the file or folder is placed in the Recycle Bin. Using this setting, you can change this behavior.\n\nIf you enable this setting, files and folders that are deleted using Windows Explorer will not be placed in the Recycle Bin and will therefore be permanently deleted.\n\nIf you disable or do not configure this setting, files and folders deleted using Windows Explorer will be placed in the Recyele Bin."
RecycleBinSize="Maximum allowed Recycle Bin size"
RecycleBinSize_Help="Limits the percentage of a volume's disk space that can be used to store deleted files.\n\nIf you enable this setting, the user has a maximum amount of disk space that may be used for the Recycle Bin on their workstation.\n\nIf you disable or do not configure this setting, users can change the total amount of disk space used by the Recycle Bin.\n\nNote: This setting is applied to all volumes."
RecycleBinSizeHelp1="Value represents percentage of hard disk that can be used (0 - 100)."
RecycleBinSizeSpin="Maximum Recycle Bin size: "
NoSecurityTab="Remove Security tab"
NoSecurityTab_Help="Removes the Security tab from Windows Explorer.\n\nIf you enable this setting, users opening the Properties dialog box for all file system objects, including folders, files, shortcuts, and drives, will not be able to access the Security tab. As a result, users will be able to neither change the security settings nor view a list of all users that have access to the resource in question.\n\nIf you disable or do not configure this setting, users will be able to access the security tab."
NoSMMyPictures_Help="Removes the My Pictures icon from the Start Menu.
NoSMMyPictures="Remove My Pictures icon from Start Menu"
NoSMMyNetworkPlaces_Help="Removes the My Network Places icon from the Start Menu.
NoSMMyNetworkPlaces="Remove My Network Places icon from Start Menu"
NoSMMyMusic_Help="Removes the My Music icon from the Start Menu.
NoSMMyMusic="Remove My Music icon from Start Menu"
NoNetAndDialupConnect_Help="Prevents users from running Network Connections.\n\nThis setting prevents the Network Connections folder from opening. This setting also removes Network Connections from Settings on the Start menu.\n\nNetwork Connections still appears in Control Panel and in Windows Explorer, but if users try to start it, a message appears explaining that a setting prevents the action.\n\nAlso, see the "Disable programs on Settings menu" and "Disable Control Panel" settings and the settings in the Network Connections folder (Computer Configuration and User Configuration\Administrative Templates\Network\Network Connections)."
NoNetAndDialupConnect="Remove Network Connections from Start Menu"
NoNetConnectDisconnect_Help="Prevents users from using Windows Explorer or My Network Places to map or disconnect network drives.\n\nIf you enable this setting, the system removes the Map Network Drive and Disconnect Network Drive commands from the toolbar and Tools menus in Windows Explorer and My Network Places and from menus that appear when you right-click the Windows Explorer or My Network Places icons. It also removes the Add Network Place option from My Network Places.\n\nThis setting does not prevent users from connecting to another computer by typing the name of a shared folder in the Run dialog box.\n\nNote:\n\nThis setting was documented incorrectly on the Explain tab in Group Policy for Windows 2000. The Explain tab states incorrectly that this setting prevents users from connecting and disconnecting drives.\n\nNote: It is a requirement for third-party applications with Windows 2000 or later certification to adhere to this setting."
NoNetConnectDisconnect="Remove "Map Network Drive" and "Disconnect Network Drive""
NoNetHood_Help="Removes the My Network Places icon from the desktop.\n\nThis setting only affects the desktop icon. It does not prevent users from connecting to the network or browsing for shared computers on the network."
NoNetHood="Hide My Network Places icon on desktop"
NoOptions_Help="Removes the Folder Options item from all Windows Explorer menus and removes the Internet Options item from Internet Explorer. This setting also removes the Folder Options icon from Control Panel.\n\nFolder Options appears on the Tools menu in both Control Panel and Windows Explorer. (To open Folder Options, click My Computer, click My Documents, and then click My Network Places). Folder Options also appears as an item in Control Panel.\n\nThe Folder Options dialog box lets users set many properties of Windows Explorer, such as enabling Active Desktop, setting a single-click option for icons, displaying hidden system files, adding and deleting file types, and saving local copies of network files.\n\nInternet Options appears on the Tools menu in Internet Explorer. The Internet Options dialog box is the primary configuration tool for Internet Explorer. It lets users customize their displays, establish security and content standards, configure LAN and dial-up connections, set advanced browser options, and gain access to Certificate Manager and Microsoft Wallet.\n\nThis setting is more restrictive than the "Remove the Folder Options menu item from the Settings menu" setting, which removes Folder Options but displays Internet Options."
NoPropertiesMyDocuments="Remove Properties from the My Documents context menu"
NoPropertiesMyDocuments_Help="This setting hides Properties for the context menu on My Documents.\n\nIf you enable this setting, the Properties option will not be present when the user right-clicks My Documents or clicks My Documents and then goes to the File menu. Likewise, Alt-Enter does nothing when My Documents is selected.\n\nIf you disable or do not configure this setting, the Properties option is displayed as usual."
NoPlacesBar_Help="Removes the shortcut bar from the Open dialog box.\n\nThis setting, and others in this folder, lets you remove new features added in Windows 2000, so that the Open dialog box looks like it did in Windows NT 4.0 and earlier. These policies only affect programs that use the standard Open dialog box provided to developers of Windows programs.\n\nTo see an example of the standard Open dialog box, start Notepad and, on the File menu, click Open.\n\nNote: It is a requirement for third-party applications with Windows 2000 or later certification to adhere to this setting."
NoPlacesBar="Hide the common dialog places bar"
NoRecentDocsHistory_Help="Prevents the operating system and installed programs from creating and displaying shortcuts to recently opened documents.\n\nIf you enable this setting, the system and Windows programs do not create shortcuts to documents opened while the setting is in effect. Also, they retain but do not display existing document shortcuts. The system empties the Documents menu on the Start menu, and Windows programs do not display shortcuts at the bottom of the File menu.\n\nIf you disable this setting, the system defaults are enforced. Disabling this setting has no effect on the system.\n\nNote: The system saves document shortcuts in the user profile in the System-drive\Documents and Settings\User-name\Recent folder.\n\nAlso, see the "Remove Documents menu from Start Menu" and "Clear history of recently opened documents on exit" policies in this folder.\n\nIf you enable this setting but do not enable the "Remove Documents menu from Start Menu" setting, the Documents menu appears on the Start menu, but it is empty.\n\nIf you enable this setting, but then later disable it or set it to Not Configured, the document shortcuts saved before the setting was enabled reappear in the Documents menu and program File menus.\n\nThis setting does not hide document shortcuts displayed in the Open dialog box. See the "Hide the dropdown list of recent files" setting.\n\nNote: It is a requirement for third-party applications with Windows 2000 or later certification to adhere to this setting."
NoRecentDocsHistory="Do not keep history of recently opened documents"
NoRecentDocsMenu_Help="Removes the Documents menu from the Start menu.\n\nThe Documents menu contains links to the nonprogram files that users have most recently opened. It appears so that users can easily reopen their documents.\n\nIf you enable this setting, the system saves document shortcuts but does not display them in the Documents menu. If you later disable it or set it to Not Configured, the document shortcuts saved before the setting was enabled and while it was in effect appear in the Documents menu.\n\nNote: This setting does not prevent Windows programs from displaying shortcuts to recently opened documents. See the "Do not keep history of recently opened documents" setting.\n\nAlso, see the "Do not keep history of recently opened documents" and "Clear history of recenTly opened documents on exit" policies in this folder.\n\nThis setting also does not hide document shortcuts displayed in the Open dialog box. See the "Hide the dropdown list of recent files" setting."
NoRecentDocsMenu="Remove Documents menu from Start Menu"
NoRecentDocsNetHood="Do not add shares of recently opened documents to My Network Places"
NoRecentDocsNetHood_Help="Remote shared folders are not added to My Network Places whenever you open a document in the shared folder.\n\nIf you disable this setting or do not configure it, when you open a document in a remote shared folder, the system adds a connection to the shared folder to My Network Places.\n\nIf you enable this setting, shared folders are not added to My Network Places automatically when you open a document in the shared folder."
NoRemovePage_Help="Removes the Change or Remove Programs button from the Add or Remove Programs bar. As a result, users cannot view or change the attached page.\n\nThe Change or Remove Programs button lets users uninstall, repair, add, or remove features of installed programs.\n\nIf you disable this setting or do not configure it, the Change or Remove Programs page is available to all users.\n\nThis setting does not prevent users from using other tools and methods to delete or uninstall programs."
NoRemovePage="Hide Change or Remove Programs page"
NoResolveSearch_Help="Prevents the system from conducting a comprehensive search of the target drive to resolve a shortcut.\n\nBy default, when the system cannot find the target file for a shortcut (.lnk), it searches all paths associated with the shortcut. If the target file is located on an NTFS partition, the system then uses the target's file ID to find a path. If the resulting path is not correct, it conducts a comprehensive search of the target drive in an attempt to find the file.\n\nIf you enable this setting, the system does not conduct the final drive search. It just displays a message explaining that the file is not found.\n\nNote: This setting only applies to target files on NTFS partitions. FAT partitions do not have this ID tracking and search capability.\n\nAlso, see the "Do not track Shell shortcuts during roaming" and the "Do not use the tracking-based method when resolving shell shortcuts" settings."
NoResolveSearch="Do not use the search-based method when resolving shell shortcuts"
NoResolveTrack_Help="Prevents the system from using NTFS tracking features to resolve a shortcut.\n\nBy default, when the system cannot find the target file for a shortcut (.lnk), it searches all paths associated with the shortcut. If the target file is located on an NTFS partition, the system then uses the target's file ID to find a path. If the resulting path is not correct, it conducts a comprehensive search of the target drive in an attempt to find the file.\n\nIf you enable this setting, the system does not try to locate the file by using its file ID. It skips this step and begins a comprehensive search of the drive specified in the target path.\n\nNote: This setting only applies to target files on NTFS partitions. FAT partitions do not have this ID tracking and search capability.\n\nAlso, see the "Do not track Shell shortcuts during roaming" and the "Do not use the search-based method when resolving shell shortcuts" settings."
NoResolveTrack="Do not use the tracking-based method when resolving shell shortcuts"
NoRun_Help="Allows you to remove the Run command from the Start menu, Internet Explorer, and Task Manager.\n\nIf you enable this setting, the following changes occur:\n\n(1) The Run command is removed from the Start menu.\n\n(2) The New Task (Run) command is removed from Task Manager.\n\n(3) The user will be blocked from entering the following into the Internet Explorer Address Bar:\n\n--- A UNC path: \\<server>\<share> \n\n---Accessing local drives: e.g., C:\n\n--- Accessing local folders: e.g., \temp>\n\nAlso, users with extended keyboards will no longer be able to display the Run dialog box by pressing the Application key (the key with the Windows logo) + R.\n\nIf you disable or do not configure this setting, users will be able to access the Run command in the Start menu and in Task Manager and use the Internet Explorer Address Bar.\n\n\n\nNote:This setting affects the specified interface only. It does not prevent users from using other methods to run programs.\n\nNote: It is a requirement for third-party applications with Windows 2000 or later certification to adhere to this setting."
NoRun="Remove Run menu from Start Menu"
NoRunAsInstallPrompt_Help="Prevents users from submitting alternate logon credentials to install a program.\n\nThis setting suppresses the "Install Program As Other User" dialog box for local and network installations. This dialog box, which prompts the current user for the user name and password of an administrator, appears when users who are not administrators try to install programs locally on their computers. This setting allows administrators who have logged on as regular users to install programs without logging off and logging on again using their administrator credentials.\n\nMany programs can be installed only by an administrator. If you enable this setting and a user does not have sufficient permissions to install a program, the installation continues with the current user's logon credentials. As a result, the installation might fail, or it might complete but not include all features. Or, it might appear to complete successfully, but the installed program might not operate correctly.\n\nIf you disable this setting or do not configure it, the "Install Program As Other User" dialog box appears whenever users install programs locally on the computer.\n\nBy default, users are not prompted for alternate logon credentials when installing programs from a network share. If enabled, this setting overrides the "Request credentials for network installations" setting."
NoRunasInstallPrompt="Do not request alternate credentials"
NoSaveSettings_Help="Prevents users from saving certain changes to the desktop.\n\nIf you enable this setting, users can change the desktop, but some changes, such as the position of open windows or the size and position of the taskbar, are not saved when users log off. However, shortcuts placed on the desktop are always saved."
NoSaveSettings="Don't save settings at exit"
NoServices_Help="Prevents users from using Add or Remove Programs to configure installed services.\n\nThis setting removes the "Set up services" section of the Add/Remove Windows Components page. The "Set up services" section lists system services that have not been configured and offers users easy access to the configuration tools.\n\nIf you disable this setting or do not configure it, "Set up services" appears only when there are unconfigured system services. If you enable this setting, "Set up services" never appears.\n\nThis setting does not prevent users from using other methods to configure services.\n\nNote: When "Set up services" does not appear, clicking the Add/Remove Windows Components button starts the Windows Component Wizard immediately. Because the only remaining option on the Add/Remove Windows Components page starts the wizard, that option is selected automatically, and the page is bypassed.\n\nTo remove "Set up services" and prevent the Windows Component Wizard from starting, enable the "Hide Add/Remove Windows Components page" setting. If the "Hide Add/Remove Windows Components page" setting is enabled, this setting is ignored."
NoServices="Go directly to Components Wizard"
NoSetFolders_Help="Prevents Control Panel, Printers, and Network Connections from running.\n\nThis setting removes the Control Panel, Printers, and Network and Connection folders from Settings on the Start menu, and from My Computer and Windows Explorer. It also prevents the programs represented by these folders (such as Control.exe) from running.\n\nHowever, users can still start Control Panel items by using other methods, such as right-clicking the desktop to start Display or right-clicking My Computer to start System.\n\nAlso, see the "Disable Control Panel," "Disable Display in Control Panel," and "Remove Network Connections from Start Menu" settings."
NoSetFolders="Remove programs on Settings menu"
NoSetTaskbar_Help="Removes the Taskbar and Start Menu item from Settings on the Start menu. This setting also prevents the user from opening the Taskbar Properties dialog box.\n\nIf the user right-clicks the taskbar and then clicks Properties, a message appears explaining that a setting prevents the action."
NoSetTaskbar="Prevent changes to Taskbar and Start Menu Settings"
NoShellSearchButton="Remove Search button from Windows Explorer"
NoShellSearchButton_Help="Removes the Search button from the Windows Explorer toolbar.\n\nThis setting removes the Search button from the Standard Buttons toolbar that appears in Windows Explorer and other programs that use the Windows Explorer window, such as My Computer and My Network Places.\n\nIt does not remove the Search button or affect any search features of Internet browser windows, such as the Internet Explorer window.\n\nThis setting does not affect the Search items on the Windows Explorer context menu or on the Start menu. To remove Search from the Start menu, use the "Remove Search menu from Start menu" setting (in User Configuration\Administrative Templates\Start Menu and Taskbar). To hide all context menus, use the "Remove Windows Explorer's default context menu" setting."
NoSMMyDocuments_Help="Removes the My Documents icon from the Start menu and its submenus.\n\nThis setting only removes the icon. It does not prevent the user from using other methods to gain access to the contents of the My Documents folder.\n\nNote: To make changes to this setting effective, you must log off and then log on.\n\nAlso, see the "Remove My Documents icon on the desktop" setting."
NoSMMyDocuments="Remove My Documents icon from Start Menu"
NoStartMenuSubFolders_Help="Hides all folders on the user-specific (top) section of the Start menu. Other items appear, but folders are hidden.\n\nThis setting is designed for use with redirected folders. Redirected folders appear on the main (bottom) section of the Start menu. However, the original, user-specific version of the folder still appears on the top section of the Start menu. Because the appearance of two folders with the same name might confuse users, you can use this setting to hide user-specific folders.\n\nNote that this setting hides all user-specific folders, not just those associated with redirected folders.\n\nIf you enable this setting, no folders appear on the top section of the Start menu. If users add folders to the Start Menu directory in their user profiles, the folders appear in the directory but not on the Start menu.\n\nIf you disable this setting or do not configured it, Windows 2000 and Windows XP display folders on both sections of the Start menu."
NoStartMenuSubFolders="Remove user's folders from the Start Menu"
NoSupportInfo_Help="Removes links to the Support Info dialog box from programs on the Change or Remove Programs page.\n\nPrograms listed on the Change or Remove Programs page can include a "Click here for support information" hyperlink. When clicked, the hyperlink opens a dialog box that displays troubleshooting information, including a link to the installation files and data that users need to obtain product support, such as the Product ID and version number of the program. The dialog box also includes a hyperlink to support information on the Internet, such as the Microsoft Product Support Services Web page.\n\nIf you disable this setting or do not configure it, the Support Info hyperlink appears.\n\nNote: Not all programs provide a support information hyperlink."
NoSupportInfo="Remove Support Information"
NoToolbarsOnTaskbar="Do not display any custom toolbars in the taskbar"
NoToolbarsOnTaskbar_Help="This setting affects the taskbar.\n\nThe taskbar includes the Start button, buttons for currently running tasks, custom toolbars, the notification area, and the system clock. Toolbars include Quick Launch, Address, Links, Desktop, and other custom toolbars created by the user or by an application.\n\nIf this setting is enabled, the taskbar does not display any custom toolbars, and the user cannot add any custom toolbars to the taskbar. Moreover, the “Toolbars” menu command and submenu are removed from the context menu. The taskbar displays only the Start button, taskbar buttons, the notification area, and the system clock.\n\nIf this setting is disabled or is not configured, the taskbar displays all toolbars. Users can add or remove custom toolbars, and the “Toolbars” command appears in the context menu."
NoTrayItemsDisplay="Hide the notification area"
NoTrayItemsDisplay_Help="This setting affects the notification area (previously called the “system tray”) on the taskbar.\n\nDescription: The notification area is located at the far right end of the task bar and includes the icons for current notifications and the system clock.\n\nIf this setting is enabled, the user’s entire notification area, including the notification icons, is hidden. The taskbar displays only the Start button, taskbar buttons, custom toolbars (if any), and the system clock.\n\nIf this setting is disabled or is not configured, the notification area is shown in the user's taskbar.\n\nNote: Enabling this setting overrides the "Turn off notification area cleanup" setting, because if the notification area is hidden, there is no need to clean up the icons."
NoTaskBarClock="Remove Clock from the system notification area"
NoTaskBarClock_Help="Prevents the clock in the system notification area from being displayed.\n\nIf you enable this setting, the clock will not be displayed in the system notification area.\n\nIf you disable or do not configure this setting, the default behavior of the clock appearing in the notification area will occur."
NoTaskGrouping="Prevent grouping of taskbar items"
NoTaskGrouping_Help="This setting effects the taskbar buttons used to switch between running programs.\n\nTaskbar grouping consolidates similar applications when there is no room on the taskbar. It kicks in when the user's taskbar is full.\n\nIf you enable this setting, it prevents the taskbar from grouping items that share the same program name. By default, this setting is always enabled.\n\nIf you disable or do not configure it, items on the taskbar that share the same program are grouped together. The users have the option to disable grouping if they choose."
NoTrayContextMenu_Help="Hides the menus that appear when you right-click the taskbar and items on the taskbar, such as the Start button, the clock, and the taskbar buttons.\n\nThis setting does not prevent users from using other methods to issue the commands that appear on these menus."
NoTrayContextMenu="Remove access to the context menus for the taskbar"
NoViewContextMenu_Help="Removes shortcut menus from the desktop and Windows Explorer. Shortcut menus appear when you right-click an item.\n\nIf you enable this setting, menus do not appear when you right-click the desktop or when you right-click the items in Windows Explorer. This setting does not prevent users from using other methods to issue commands available on the shortcut menus."
NoViewContextMenu="Remove Windows Explorer's default context menu"
NoViewOnDrive_Help="Prevents users from using My Computer to gain access to the content of selected drives.\n\nIf you enable this setting, users cannot view the contents of the selected drives in My Computer or Windows Explorer. Also, they cannot use the Run dialog box, the Map Network Drive dialog box, or the Dir command to view the directories on these drives.\n\nTo use this setting, select a drive or combination of drives from the drop-down list. To allow access to all drive directories, disable this setting or select the "Do not restrict drives" option from the drop-down list.\n\nNote: The icons representing the specified drives still appear in My Computer, but if users double-click the icons, a message appears explaining that a setting prevents the action.\n\nAlso, this setting does not prevent users from using programs to access local and network drives. And, it does not prevent them from using the Disk Management snap-in to view and change drive characteristics.\n\nAlso, see the "Hide these specified drives in My Computer" setting."
NoViewOnDrive="Prevent access to drives from My Computer"
NoWelcomeTips_Help="Supresses the welcome screen.\n\nThis setting hides the welcome screen that is displayed on Windows 2000 Professional and Windows XP Professional each time the user logs on.\n\nUsers can still display the welcome screen by selecting it on the Start menu or by typing "Welcome" in the Run dialog box.\n\nThis setting applies only to Windows 2000 Professional and Windows XP Professional. It does not affect the "Configure Your Server on a Windows 2000 Server"screen on Windows 2000 Server.\n\nNote: This setting appears in the Computer Configuration and User Configuration folders. If both settings are configured, the setting in Computer Configuration takes precedence over the setting in User Configuration.\n\nTip: To display the welcome screen, click Start, point to Programs, point to Accessories, point to System Tools, and then click "Getting Started." To suppress the welcome screen without specifying a setting, clear the "Show this screen at startup" check box on the welcome screen."
NoWelcomeTips="Don't display the Getting Started welcome screen at logon"
NoWindowsSetupPage_Help="Removes the Add/Remove Windows Components button from the Add or Remove Programs bar. As a result, users cannot view or change the associated page.\n\nThe Add/Remove Windows Components button lets users configure installed services and use the Windows Component Wizard to add, remove, and configure components of Windows 2000 from the installation files.\n\nIf you disable this setting or do not configure it, the Add/Remove Windows Components button is available to all users.\n\nThis setting does not prevent users from using other tools and methods to configure services or add or remove program components. However, this setting blocks user access to the Windows Component Wizard."
NoWindowsSetupPage="Hide Add/Remove Windows Components page"
NoWindowsUpdate_Help="Prevents users from connecting to the Windows Update Web site.\n\nThis setting blocks user access to the Windows Update Web site at http://windowsupdate.microsoft.com. Also, the setting removes the Windows Update hyperlink from the Start menu and from the Tools menu in Internet Explorer.\n\nWindows Update, the online extension of Windows, offers software updates to keep a user’s system up-to-date. The Windows Update Product Catalog determines any system files, security fixes, and Microsoft updates that users need and shows the newest versions available for download.\n\nAlso, see the "Hide the "Add programs from Microsoft" option" setting."
NoWindowsUpdate="Remove links and access to Windows Update"
NoWorkGroupContents_Help="Removes computers in the user's workgroup and domain from lists of network resources in Windows Explorer and My Network Places.\n\nIf you enable this setting, the system removes the "Computers Near Me" option and the icons representing nearby computers from My Network Places. This setting also removes these icons from the Map Network Drive browser.\n\nThis setting does not prevent users from connecting to computers in their workgroup or domain by other commonly used methods, such as typing the share name in the Run dialog box or the Map Network Drive dialog box.\n\nTo remove network computers from lists of network resources, use the "No Entire Network in My Network Places" setting."
NoWorkgroupContents="No "Computers Near Me" in My Network Places"
PCH_ShowUI_Help="Use this setting to control whether or not a user is given the choice to report an error.\n\nWhen Display Error Notification is enabled, the user will be notified that an error has occurred and will be given access to details about the error. If the Report Errors setting is also enabled, the user will also be given the choice of whether to report the error.\n\nWhen Display Error Notification is not enabled, the user will not be given the choice of whether to report the error. If the Report Errors setting is enabled, the error will be automatically reported, but the user will not be notified that an error has occurred.\nDisabling this setting is useful for server machines that do not have interactive users.\n\nIf you do not configure this setting, the user will be able to adjust the setting via the control panel, which is set to 'enable notification' by default on Windows XP Personal and Windows XP Professional machines and 'disable notification' on servers.\n\nAlso, see the "Report Errors" policy."
PCH_ShowUI_Chk="Enable error notification."
PCH_DoReport="Report Errors"
PCH_DoReport_Help="Use this setting to control whether or not errors are reported.\n\nIf Report Errors is enabled, the errors may be reported to Microsoft via the Internet or to a corporate file share.\nIf the 'Do not display links to any Microsoft "more information" web sites' checkbox is checked, links to Microsoft web sites that have more information about the error message will not be displayed.\nIf the 'Do not collect additional files' checkbox is checked, additional files will not be collected and included in the error reports.\nIf the 'Do not collect additional machine data' checkbox is checked, additional information about the machine will not be collected and included in the error reports.\nIf the 'Force queue mode for application errors' checkbox is checked, then the user will not be offered the chance to report when an error occurs. Instead, the error will be placed in a queue directory, and the next admin to log onto the machine will be given the chance to report the error.\nUse the 'Corporate file path' setting to set a UNC path that errors reports will be uploaded to. By entering a path, all error reports will go to the UNC path and Corporate Error Reporting will be enabled.\nIf an entry is made in the 'Replace instances of the word "Microsoft" with' setting, instances of the word "Microsoft" will be replaced with the contents of the entry in the error notification dialog boxes. This can be used to customize the error reporting dialogs with your company's name.\n\nIf Report Errors is disabled, users will not be given the option to report errors. If Display Error Notification is enabled, then users will still get a message indicating that a problem occurred, but will not have the option to report.\n\nIf you do not configure this setting, the user will be able to adjust the setting via the control panel, which is set to 'enable reporting' by default on Windows XP Personal and Windows XP Professional and 'disable reporting' on servers.\n\nIf this setting is enabled, it will override any settings made via the control panel for error reporting. If this setting is enabled, default values will be used for any error reporting policies that are not configured (even if settings were adjusted via the control panel).\n\nAlso, see the "Display Error Notification" setting."
PCH_NoExternalURL_Chk="Do not display links to any Microsoft provided 'more information' web sites."
PCH_NoFileCollect_Chk="Do not collect additional files"
PCH_NoLevelTwo_Chk="Do not collect additional machine data"
PCH_ForceQ_Chk="Force queue mode for application errors"
PCH_DumpPath_Edit="Corporate upload file path:"
PCH_CompanyText_Edit="Replace instances of the word 'Microsoft' with:"
PCH_AllOrNoneDef_Help="This setting controls whether or not errors in general applications are included when error reporting is enabled.\n\nWhen this setting is enabled, The 'Default' dropdown list allows you to choose whether or not to report all application errors or no application errors by default.\n\nWhen the 'Report all errors in Microsoft applications' checkbox is checked, all errors in Microsoft applications will be reported, regardless of the setting in the 'Default' dropdown list.\n\nWhen the 'Report all errors in Windows components' checkbox is checked, all errors in Windows applications will be reported, regardless of the setting in the 'Default' dropdown list.\n\nIf this setting is disabled, or not configured, the user will be able to adjust this setting via the control panel, which is set to 'upload all applications' by default.\n\nThis setting is ignored if the 'Report Errors' setting is disabled or not configured.\n\nAlso see the 'Report Errors' and 'Report Operating System Errors' policies."
PCH_AllOrNoneDef_List="Default:"
PCH_AllOrNoneDef_Include="Report all application errors"
PCH_AllOrNoneDef_Exclude="Do not report any application errors"
PCH_AllOrNoneWinComp_Chk="Report all errors in Windows components."
PCH_AllOrNoneIncMS_Chk="Report all errors in Microsoft applications."
PCH_AllOrNoneInc="List of applications to always report errors for"
PCH_AllOrNoneInc_Help="This setting specifies the applications that are always included in error reporting.\n\nWhen this setting is enabled, You can create a list of applications that are always included in error reporting: click the 'Show' button, and edit the list of application file names. The file names must include the .exe file extension (for example, 'notepad.exe'). Errors generated by applications on this list will be reported, even if the Default dropdown in the Default Application Reporting setting is set to report no application errors.\nIf the 'Report all errors in Microsoft applications' or 'Report all errors in Windows components' checkbox in the Default Application Reporting setting is checked, error reporting will report errors as though all applications in these categories were added to this list. (Note: The 'Microsoft applications' category includes the 'Windows components' category.\n\nWhen this setting is disabled or not configured, no list of explicitly included files will be used, though the two checkboxes mentioned above will still be honored.\n\nAlso see the "Default Application Reporting" and "Application Exclusion List" policies.\n\nThis setting will be ignored if the 'Report Errors' setting is disabled or not configured."
PCH_AllOrNoneInc_List="Report errors for applications on this list:"
PCH_AllOrNoneEx="List of applications to never report errors for"
PCH_AllOrNoneEx_Help="This setting controls error reporting for errors in general applications when error reporting is enabled.\n\nThe "Default" dropdown list allows you to choose whether or not to report all application errors or no application errors by default.\n\nTo create a list of applications that error reporting will report for, click the "Show" button next to "Report errors for applications on this list" and edit the list of application filenames (example: notepad.exe). Errors generated by applications in this list will be reported, even if "Default" is set to report no application errors. You may use the "Report all errors in Microsoft applications" and "Report all errors in Windows components" checkboxes to implicitly add applications in these categories to the include list. Note that the "Microsoft applications" category includes the "Windows components" category.\n\nTo create a list of applications that error reporting will exclude from reporting, click the "Show" button next to "Exclude errors for applications on this list". Errors generated by applications in this list will never be reported, even if the default is set to report all application errors.\n\nThe exclude list has priority, so if an application is listed in the include list and exclude list the application will be excluded. You may also use the exclude list to exclude specific Microsoft applications or Windows components if you implicitly included these categories in the include list via the two checkboxes.\n\nIf you disable this setting or do not configure it, the user will be able to adjust this setting via the control panel, which is set to 'upload all applications' by default."
PCH_AllOrNoneEx_List="Exclude errors for applications on this list:"
PCH_ReportOperatingSystemFaults="Report operating system errors"
PCH_ReportOperatingSystemFaults_Help="This setting controls whether or not errors in the operating system are included when error reporting is enabled.\n\nWhen this setting is enabled, error reporting will include operating system errors.\n\nWhen this setting is disabled, operating system errors will not be included in error reporting.\n\nIf you do not configure this setting, the user will be able to adjust this setting via the control panel, which is set to 'upload operating system errors' by default\n\nAlso see the 'Report Errors' setting."
PCH_ReportOperatingSystemFaults_Chk="Enable error reporting for operating system errors"
PCH_ReportShutdownEvents_Help="This setting controls whether or not unplanned shutdown events can be reported when error reporting is enabled.\n\nWhen this setting is enabled, error reporting will include unplanned shutdown events.\n\nWhen this setting is disabled, unplanned shutdown events will not be included in error reporting.\n\nIf you do not configure this setting, the user will be able to adjust this setting via the control panel, which is set to 'upload unplanned shutdown events' by default.\n\nAlso see the 'Report Errors' setting."
PD_DOWNLOAD="Download profile"
PD_USELOCAL="Use local profile"
PhysicalLocation_Help="Specifies the default location criteria used when searching for printers.\n\nThis setting is a component of the Location Tracking feature of Windows 2000 printers. To use this setting, enable Location Tracking by enabling the "Pre-populate printer search location text" setting.\n\nWhen Location Tracking is enabled, the system uses the specified location as a criterion when users search for printers. The value you type here overrides the actual location of the computer conducting the search.\n\nType the location of the user's computer. When users search for printers, the system uses the specified location (and other search criteria) to find a printer nearby. You can also use this setting to direct users to a particular printer or group of printers that you want them to use.\n\nIf you disable this setting or do not configure it, and the user does not type a location as a search criterion, the system searches for a nearby printer based on the IP address and subnet mask of the user's computer."
PhysicalLocation_Name="Location"
PhysicalLocation_Tip1="Enter the location of this computer"
PhysicalLocationSupport_Help="Enables the physical Location Tracking support feature of Windows 2000 printers.\n\nLocation tracking lets you design a location scheme for your enterprise and assign computers and printers to locations in your scheme. Location tracking overrides the standard method of locating and associating users and printers, which uses the IP address and subnet mask of a computer to estimate its physical location and proximity to other computers.\n\nIf you enable Location Tracking, a Browse button appears beside the Location field in the Find Printers dialog box. (To go to the Browse button, click Start, click Search, and click For printers.) The Browse button also appears on the General tab of the Properties dialog box for a printer. It lets users browse for printers by location without their having to know the precise location (or location naming scheme). Also, if you enable the "Computer location" setting, the default location you type appears in the Location field.\n\nIf you disable this setting or do not configure it, Location Tracking is disabled. Printer proximity is estimated based on IP address and subnet mask."
PlacesBar_Help="Configures the list of items displayed in the Places Bar in the Windows File/Open dialog. If enable this setting you can specify from 1 to 5 items to be displayed in the Places Bar.\n\nThe valid items you may display in the Places Bar are:\n\n1) Shortcuts to a local folders\n-- (ex. C:\Windows)\n\n2) Shortcuts to remote folders\n-- (\\server\share)\n\n3) Common Shell folders.\n\nThe list of Common Shell Folders that may be specified:\n\nCommonDocuments, CommonMusic, CommonPictures, Desktop, MyComputer, MyDocuments, MyFavorites, MyMusic, MyNetworkPlaces, MyPictures, Printers, ProgramFiles, Recent.\n\nIf you disable or do not configure this setting the default list of items will be displayed in the Places Bar."
Places="Places to to display:
Places0="Item 1"
Places1="Item 2"
Places2="Item 3"
Places3="Item 4"
Places4="Item 5"
PointAndPrint_Restrictions="Point and Print Restrictions"
PointAndPrint_TrustedForest_Chk="Users can only point and print to machines in their forest."
PointAndPrint_TrustedServers_Chk="Users can only point and print to these servers:"
PointAndPrint_TrustedServers_Edit="Enter fully qualified server names separated by semicolons"
Pol_AlwaysPinSubFolders="Subfolders always available offline"
Pol_AlwaysPinSubFolders_Help ="Makes subfolders available offline whenever their parent folder is made available offline.\n\nThis setting automatically extends the "make available offline" setting to all new and existing subfolders of a folder. Users do not have the option of excluding subfolders.\n\nIf you enable this setting, when you make a folder available offline, all folders within that folder are also made available offline. Also, new folders that you create within a folder that is available offline are made available offline when the parent folder is synchronized.\n\nIf you disable this setting or do not configure it, the system asks users whether they want subfolders to be made available offline when they make a parent folder available offline."
Pol_AssignedOfflineFiles_Help="Lists network files and folders that are always available for offline use. This setting makes the specified files and folders available offline to users of the computer.\n\nTo assign a folder, click Show, and then click Add. In the "Type the name of the item to be added" box, type the fully qualified UNC path to the file or folder. Leave the "Enter the value of the item to be added" field blank.\n\nNote: This setting appears in the Computer Configuration and User Configuration folders. If both settings are configured, the settings will be combined and all specified files will be available for offline use."
Pol_CustomGoOfflineActions_Help="Determines how computers respond when they are disconnected from particular offline file servers. This setting overrides the default response, a user-specified response, and the response specified in the "Action on server disconnect" setting.\n\nTo use this setting, click Show, and then click Add. In the "Type the name of the item to be added" box, type the server's computer name. Then, in the "Type the value of the item to be added" box, type "0" if users can work offline when they are disconnected from this server, or type "1" if they cannot.\n\nThis setting appears in the Computer Configuration and User Configuration folders. If both settings are configured for a particular server, the setting in Computer Configuration takes precedence over the setting in User Configuration. Both Computer and User configuration take precedence over a user's setting. This setting does not prevent users from setting custom actions through the Offline Files tab. However, users are unable to change any custom actions established via this setting.\n\nTip: To configure this setting without establishing a setting, in Windows Explorer, on the Tools menu, click Folder Options, click the Offline Files tab, and then click Advanced. This setting corresponds to the settings in the "Exception list" section."
Pol_CustomGoOfflineActions="Non-default server disconnect actions"
Pol_DefCacheSize_Help="Limits the percentage of the computer's disk space that can be used to store automatically cached offline files.\n\nThis setting also disables the "Amount of disk space to use for temporary offline files" option on the Offline Files tab. This prevents users from trying to change the option while a setting controls it.\n\nAutomatic caching can be set on any network share. When a user opens a file on the share, the system automatically stores a copy of the file on the user's computer.\n\nThis setting does not limit the disk space available for files that user's make available offline manually.\n\nIf you enable this setting, you can specify an automatic-cache disk space limit.\n\nIf you disable this setting, the system limits the space that automatically cached files occupy to 10 percent of the space on the system drive.\n\nIf you do not configure this setting, disk space for automatically cached files is limited to 10 percent of the system drive by default, but users can change it.\n\nTip: To change the amount of disk space used for automatic caching without specifying a setting, in Windows Explorer, on the Tools menu, click Folder Options, click the Offline Files tab, and then use the slider bar associated with the "Amount of disk space to use for temporary offline files" option."
Pol_DefCacheSize="Default cache size"
Pol_Enabled_Help="Determines whether the Offline Files feature is enabled.\n\nThis setting also disables the "Enable Offline Files" option on the Offline Files tab. This prevents users from trying to change the option while a setting controls it.\n\nOffline Files saves a copy of network files on the user's computer for use when the computer is not connected to the network.\n\nIf you enable this setting, Offline Files is enabled and users cannot disable it.\n\nIf you disable this setting, Offline Files is disabled and users cannot enable it.\n\nBy default, Offline Files is enabled on Windows 2000 Professional and is disabled on Windows 2000 Server.\n\nTip: To enable Offline Files without specifying a setting, in Windows Explorer, on the Tools menu, click Folder Options, click the Offline Files tab, and then click "Enable Offline Files."\n\nNote: To make changes to this setting effective, you must restart Windows 2000."
Pol_Enabled="Allow or Disallow use of the Offline Files feature"
Pol_EncryptOfflineFiles="Encrypt the Offline Files cache"
Pol_EncryptOfflineFiles_Help="This setting determines whether offline files are encrypted.\n\nOffline files reside on a user's hard drive, not the network, and they are stored in a local cache on the computer. Encrypting this cache enhances security on a local computer. If the cache on the local computer is not encrypted, any encrypted files cached from the network will not be encrypted on the local computer. This may pose a security risk in some environments.\n\nIf you enable this setting, all files in the Offline Files cache are encrypted. This includes existing files as well as files added later. The cached copy on the local computer is affected, but the associated network copy is not. The user cannot unencrypt Offline Files through the user interface.\n\nIf you disable this setting, all files in the Offline Files cache are unencrypted. This includes existing files as well as files added later. The cached copy on the local computer is affected, but the associa