Team LiB   Previous Section   Next Section

A.1 Administrative Templates

User Configuration\Administrative Templates

A.1.1 Windows Components

User Configuration\Administrative Templates\Windows Components
A.1.1.1 NetMeeting
User Configuration\Administrative Templates\Windows Components\NetMeeting
Enable Automatic Configuration

This policy configures NetMeeting to download settings from the URL listed in the Configuration URL text box each time it starts.

Disable Directory Services

Controls the directory feature of NetMeeting. If you enable this policy, users can't log on to a directory (ILS) server when NetMeeting starts and users can't view or place calls via a NetMeeting directory.

Prevent adding Directory servers

If you enable this policy, users can't add directory (ILS) servers to the list of those they can use to place calls.

Prevent viewing Web directory

If you enable this policy, users can't view directories as web pages in a browser.

Set the intranet support Web page

Controls the URL NetMeeting displays when users choose the Help Online Support command.

Set the NetMeeting home page

Controls the URL NetMeeting displays when users choose the Microsoft Home Page command under Help Microsoft on the Web.

Set Call Security options

Controls security levels for incoming/outgoing NetMeeting calls.

Prevent changing Call placement method

Controls how calls are placed--either directly or via a gatekeeper server--and prevents users from changing how calls are placed once the policy is enabled.

Prevent automatic acceptance of Calls

When enabled, this policy stops users from turning on automatic acceptance of incoming calls, which ensures that other users don't call and connect to NetMeeting when the user isn't present.

Prevent sending files

When enabled, this policy stops users from sending files to others in a conference.

Prevent receiving files

When enabled, this policy stops users from receiving files from others in a conference.

Limit the size of sent files

This policy limits the size of files users send to others in a conference.

Disable Chat

Enabling this feature disables NetMeeting's Chat feature.

Disable NetMeeting 2.x Whiteboard

Enabling this feature disables NetMeeting's 2.x whiteboard feature (available for compatibility).

Disable NetMeeting Whiteboard

Enabling this feature disables NetMeeting's T.126 whiteboard feature.

A.1.1.2 Internet Explorer
User Configuration\Administrative Templates\Windows Components\Internet Explorer
Search: Disable Search Customization

Changes the appearance of the Customize button in the Search Assistant so that it's dimmed. Enabling this policy prevents users from making changes to the Search Assistant settings.

Search: Disable Find Files via F3 within the browser

When you enable this feature, users can't use the F3 key to search in Internet Explorer or Windows Explorer. This policy pertains to situations where administrators want to restrict users from searching the Internet or the hard disk.

Disable external branding of Internet Explorer

Enabling this policy ensures that third parties (such as ISPs) can't customize (or brand) the Internet Explorer and Outlook Express logos and title bars.

Disable importing and exporting of favorites

When you enable this policy, users can't export or import favorite links by using the Import/Export wizard.

Disable changing Advanced page settings

When you enable this policy, users can't change settings on the Advanced tab in the Internet Options dialog box. This policy prevents users from changing advanced Internet settings.

Disable changing home page settings

Controls the home page. If you enable this policy, users can't change their home page.

Use Automatic Detection for dial-up connections

When you enable this policy, Automatic Detection is used automatically to configure dial-up settings for users. Automatic Detection customizes the browser the first time it's started using a DHCP (Dynamic Host Configuration Protocol) or DNS (Domain Name System) server.

Disable caching of Auto-Proxy scripts

When you enable this feature, automatic proxy scripts aren't stored in the users' cache. These scripts interact with a server to automatically configure users' proxy settings.

Display error message on proxy script download failure

Enabling this feature ensures that error messages are displayed to users if problems occur with proxy scripts.

Disable changing Temporary Internet files settings

Controls the browser cache settings. If you enable this policy, users can't change the browser cache settings such as the location of the Temporary Internet Files folder. Note that the Disable the General page removes the General tab from interface.

Disable changing history settings

Controls the history settings. If you enable this policy, users can't change the history settings for the browser. Note that the Disable the General page removes the General tab from interface.

Disable changing color settings

Controls the default web page colors. If you enable this policy, users can't change the default background and text color of web pages. Note that the Disable the General page removes the General tab from interface.

Disable changing link color settings

Controls the color of links on web pages. If you enable this policy, users can't change the colors of their browser's web links. Note that the Disable the General page removes the General tab from interface.

Disable changing font settings

Controls the font settings. If you enable this policy, users can't change the font setting on their browsers. Note that the Disable the General page removes the General tab from interface.

Disable changing language settings

Controls the language settings. If you enable this policy, users can't change the language settings on their browsers. Note that the Disable the General page removes the General tab from interface.

Disable changing accessibility settings

Controls the accessibility settings. If you enable this policy, users can't change the accessibility settings on their browsers. Note that the Disable the General page removes the General tab from interface.

Disable Internet Connection wizard

Controls the Internet Connection wizard. If you enable this policy, users can't use the Internet Connection wizard. Note that this policy overlaps with the Disable the Connections page, which removes the Connections tab from the interface.

Disable changing connection settings

Controls the connection setting. If you enable this policy, users can't use the connections settings on their browsers. Note that this policy overlaps with the Disable the Connections page, which removes the Connections tab from the interface.

Disable changing proxy settings

Controls the proxy settings. If you enable this policy, users can't change their proxy settings. Note that this policy overlaps with the Disable the Connections page, which removes the Connections tab from the interface.

Disable changing Automatic Configuration settings

Controls automatic configuration settings. Administrators can use automatic configuration to update browser settings periodically. If enabled, this policy prevents users from changing automatic configuration settings. Note that this policy overlaps with the Disable the Connections page, which removes the Connections tab from the interface.

Disable changing ratings settings

Controls the ratings that help determine the type of Internet content that can be viewed. Enabling this policy prevents users from changing these ratings settings. Note that the Disable the Content page policy removes the Content tab from Internet Explorer in the Control Panel and takes precedence over this policy.

Disable changing certificate settings

Controls the certificates that verify the identity of software publishers. Enabling this policy prevents users from changing the certificate settings in Internet Explorer. Note that the Disable the Content page policy removes the Content tab from Internet Explorer in the Control Panel and takes precedence over this policy.

Disable changing Profile Assistant settings

Controls the Profile Assistant settings. If you enable this policy, users can't change the Profile Assistant settings. The Disable the Content page policy removes the Content tab from Internet Explorer in the Control Panel and takes precedence over this policy.

Disable AutoComplete for forms

Enabling this policy disables Internet Explorer's AutoComplete feature. This features automatically completes information in forms for users, such as names and addresses. Note that the Disable the Content page policy removes the Content tab from Internet Explorer in the Control Panel and takes precedence over this policy.

Do not allow AutoComplete to save passwords

If you enable this policy, usernames and passwords aren't completed automatically for users. Additionally, users can't choose whether or not their browser remembers passwords automatically. Note that the Disable the Content page policy removes the Content tab from Internet Explorer in the Control Panel and takes precedence over this policy.

Disable changing Messaging settings

If you enable this policy, users can't change their default programs for messaging tasks such as email. Note that the Disable Programs page policy removes the Programs tab and takes precedence over this policy.

Disable changing Calendar and Contact settings

Controls the default programs for managing schedules and contacts. If you enable this policy, users can only use the default programs for managing their schedules and contacts if they default programs are installed.

Disable the Reset Web Settings feature

If you enable this policy, users can't restore their default settings for their home and search pages. Note that the Disable Programs page policy removes the Programs tab and takes precedence over this policy.

Disable changing default browser check

Controls whether Internet Explorer checks to see if it is the default browser. When Internet Explorer performs this check, users are prompted to choose a default browser. This policy is suggested for companies that want to control their organization's default browser.

Identity Manager: Prevent users from using Identities

Controls the ability to configure unique identities by using Identity Manager. Enabling this policy prevents users from creating new identities, managing existing identities, or switching identities.

A.1.1.2.1 Internet Control Panel
User Configuration\Administrative Templates\Windows Components\Internet 
Explorer\Internet Control Panel
Disable the General page

If you enable this policy, the General tab is removed from the Internet Options dialog box. If you remove the General tab, users can't see and change settings for the home page, the cache, history, web page appearance, and accessibility.

Disable the Security page

If you enable this policy, the Security tab is removed from the Internet Options dialog box. If you remove the Security tab, users can't see and change settings for security zones, such as scripting, downloads, and user authentication.

Disable the Content page

If you enable this policy, the Content tab is removed from the Internet Options dialog box. If you remove the Content tab, users can't see and change ratings, certificates, AutoComplete, Wallet, and Profile Assistant settings.

Disable the Connections page

If you enable this policy, the Connections tab is removed from the Internet Options dialog box. If you remove the Connections tab, users can't see and change connection and proxy settings.

Disable the Programs page

If you enable this policy, the Programs tab is removed from the Internet Options dialog box. If you remove the Connections tab, users can't see and change default settings for Internet programs.

Disable the Advanced page

If you enable this policy, the Advanced tab is removed from the Internet Options dialog box. If you remove the Connections tab, users can't see and change advanced Internet settings, such as security, multimedia, and printing.

A.1.1.2.2 Offline Pages
User Configuration\Administrative Templates\Windows Components\Internet 
Explorer\Offline Pages
Disable adding channels

If you enable this policy, users can't add channels to Internet Explorer or or content that's based on a channel to their desktop. Channels are web sites that are updated automatically by channel providers for users who have added the channel to their web browsers.

Disable removing channels

If you enable this policy, users can't disable channel synchronization in Internet Explorer. Channels are web sites that are updated automatically by channel providers for users who have added the channel to their web browsers. This policy is recommended for administrators who wish to ensure that users' computers are being updated uniformly.

Disable adding schedules for offline pages

If you enable this policy, users can't specify web pages for offline viewing or add new schedules for downloading offline content. This policy helps administrators who wish to control their server load for downloading content.

Disable editing schedules for offline pages

If you enable this policy, users can't edit an existing schedule to download web pages for offline viewing or display the schedule properties of pages that have been set up for offline viewing. This policy helps administrators that wish to control their server load for downloading content.

Disable removing schedules for offline pages

If you enable this policy, users can't clear the preconfigured settings for web pages to be downloaded for offline viewing. It helps administrators who wish to control their server load for downloading content.

Disable offline page hit logging

Enabling this policy disables any channel logging settings set by channel providers in the channel definition format (.cdf ) file; this prevents channel providers from recording information about when their channel pages are viewed by users who are working offline.

Disable all scheduled offline pages

Enabling this policy disables existing schedules for downloading web pages for offline viewing. This policy helps administrators who wish to control their server load for downloading content. Note that the Hide Favorites Menu policy takes precedence over this policy.

Disable channel user interface completely

If you enable this policy, users can't view the Channel bar interface. Channels are web sites updated automatically by channel providers for users who have added the channel to their web browsers.

Disable downloading of site subscription content

If you enable this policy, subscription content from sites users have subscribed to aren't downloaded. Note that the Hide Favorites Menu policy and the Disable editing schedules for offline pages policy takes precedence over this policy.

Disable editing and creating of schedule groups

If you enable this policy, users can't add, edit, or remove schedules for offline viewing of web pages and groups of web pages they've subscribed to. Note that the Hide Favorites Menu policy and the Disable editing schedules for offline pages policy takes precedence over this policy.

Subscription Limits

Controls the amount of information downloaded for offline viewing. Enabling this policy lets you set limits for the size and number of pages users can download.

A.1.1.2.3 Browser Menus
User Configuration\Administrative Templates\Windows Components\Internet 
Explorer\Browser menus
File menu: Disable Save As... menu option

If you enable this policy, users can't save web pages from the browser File menu to their hard disk or to a network share. Note that this policy takes precedence over the File Menu: Disable Save As Web Page Complete policy.

File menu: Disable New menu option

If you enable this policy, users can't use the File menu to open a new browser. While the File menu user interface remains the same, the New menu item doesn't work for users; they are informed that the command is not available to them.

File menu: Disable Open menu option

If you enable this policy, users can't open a file or web page by using the File menu in Internet Explorer. While the File-menu user interface remains the same, the Open menu item won't work for users; they are informed the command isn't available to them.

File menu: Disable Save As Web Page Complete

If you enable this policy, users can't save the entire contents of a web page, including graphics, scripts, linked files, and other elements. Users can save content from a web page.

File menu: Disable closing the browser and Explorer windows

If you enable this policy, users can't close Internet Explorer and Windows Explorer from either the File menu or the X (close) button in the upper-right corner of the interface.

View menu: Disable Source menu option

If you enable this policy, users can't view the HTML source of web pages by clicking the Source command on the View menu. In order to prevent users from viewing source code at all, also refer to the Disable context menu policy.

View menu: Disable Full Screen menu option

If you enable this policy, users can't display their browsers in full-screen (kiosk) mode, without the standard toolbar. This policy is useful for organizations with many beginning users, because using the browser without the toolbar can be confusing for beginners.

Hide Favorites menu

If you enable this policy, users can't add, remove, or edit the list of Favorite links. This policy is useful for organizations that wish to keep a consistent list of Favorites across their company.

Tools menu: Disable Internet Options... menu option

If you enable this policy, users can't open the Internet Options dialog box from the Tools menu in Internet Explorer. This prevents users from changing options such as default home page, cache size, and connection and proxy settings from the Tools menu.

Help menu: Remove "Tip of the Day" menu option

If you enable this policy, users can't view or change the Tip of the Day; the Tip of the Day command is removed from the Help menu.

Help menu: Remove "For Netscape Users" menu option

If you enable this policy, tips for users who are switching from Netscape aren't displayed. This policy doesn't remove the tips for Netscape users from the Internet Explorer Help file.

Help menu: Remove "Tour" menu option

If you enable this policy, users can't run the Internet Explorer Tour from the Help menu in Internet Explorer; the Tour menu item is removed from the Help menu.

Help menu: Remove "Send Feedback" menu option

If you enable this policy, users can't send feedback to Microsoft by clicking the Send Feedback menu item on the Help menu; the Send Feedback menu item is removed from the Help menu.

Disable Context menu

If you enable this policy, users don't see context menus when they right-click their mouse while using the browser. This policy is useful if you need to make certain that users don't run commands you have removed from other parts of the interface.

Disable Open in New Window menu option

If you enable this policy, users can't open a link in a new browser window. In order to prevent users from opening new browser windows further, also refer to the File menu: Disable Menu option policy.

Disable Save this program to disk option

If you enable this policy, users can't save files or programs to the hard disk Internet Explorer has downloaded.

A.1.1.2.4 Toolbars
User Configuration\Administrative Templates\Windows Components\Internet 
Explorer\Toolbars
Disable customizing browser toolbar buttons

Controls the buttons that appear on the Internet Explorer and Windows Explorer standard toolbars. For more information on toolbar policies, refer to the Disable customizing browser toolbars policy.

Disable customizing browser toolbars

Controls which toolbars are displayed in Internet Explorer and Windows Explorer. For more information on toolbar policies, refer to the Disable customizing browser toolbar buttons policy.

Configure Toolbar Buttons

Controls which buttons are displayed on the standard toolbar in Internet Explorer. This policy allows you to select the buttons that are displayed on the toolbar by checking or clearing a checkbox for each button.

A.1.1.2.5 Persistance Behavior
User Configuration\Administrative Templates\Windows Components\Internet 
Explorer\Persistance Behavior
File size limits for Local Machine zone

Controls the amount of storage a page or site using the DHTML Persistence behavior can use for the Local Computer security zone. This policy allows you to set the persistence storage amount per domain or per document for this security zone.

File size limits for Intranet zone

Controls the amount of storage a page or site using the DHTML Persistence behavior can use for the Local Intranet security zone. This policy allows you to set the persistence storage amount per domain or per document for this security zone.

File size limits for Trusted Sites zone

Controls the amount of storage a page or site using the DHTML Persistence behavior can use for the Trusted Sites security zone. This policy allows you to set the persistence storage amount per domain or per document for this security zone.

File size limits for Internet zone

Controls the amount of storage a page or site using the DHTML persistence behavior can use for the Internet security zone. This policy allows you to set the persistence storage amount per domain or per document for this security zone.

File size limits for Restricted Sites zone

Controls the amount of storage a page or site using the DHTML Persistence behavior can use for the Restricted Sites security zone. This policy allows you to set the persistence storage amount per domain or per document for this security zone.

A.1.1.2.6 Administrator Approved Controls
User Configuration\Administrative Templates\Windows Components\Internet 
Explorer\Administrator Approved Controls
Databinding
User Configuration\Administrative Templates\Windows Components\Internet 
Explorer\Administrator Approved Controls\Databinding
RDS

This policy allows web developers to move data from a server to a client application or web page, manipulate the data on the client, and return updates to the server in a single round trip. If you enable this policy, it gives administrator approval to the Remote Data Service (RDS) ActiveX control.

TDC

This policy allows data to be displayed in a delimited text file within tables or within a form and allows data to be sorted and filtered by the browser without interaction with the web server. You can run this control in security zones where you specify that administrator-approved controls can be run if you enable this policy.

XML

This policy marks the Extensible Markup Language (XML) Data Source Object as administrator-approved. This control enables developers to use data-binding functionality in Dynamic HTML to connect to XML data and provide it to an HTML page. If you enable this policy, you can run this control in security zones where you specify that administrator-approved controls can be run.

Internet Explorer
User Configuration\Administrative Templates\Windows Components\Internet 
Explorer\Administrator Approved Controls\Internet Explorer
Active Setup

Enabling this policy marks Active Setup ActiveX control as administrator-approved. If a connection is lost during setup, Active Setup recovers the setup process. If you enable this policy, you can run this control in security zones where you specify that administrator-approved controls can be run.

Media Player

Enabling this policy marks Media Player ActiveX control as administrator-approved. Sounds, videos, and other media are made possible by the use of this control.

Extras

Enabling this policy marks this group of Microsoft ActiveX controls (the Extras) that extend browser functionality as administrator-approved. If you enable this policy, you can run this control in security zones where you specify that administrator-approved controls can be run.

Menu Controls

Enabling this policy marks a set of Microsoft ActiveX controls used to manipulate pop-up menus in the browser as administrator-approved.

Microsoft Agent

Enabling this policy marks the Microsoft Agent ActiveX control as administrator-approved. If you enable this policy, you can run this control in security zones where you specify that administrator-approved controls can be run.

Microsoft Chat

Enabling this policy marks the Microsoft Chat ActiveX control as administrator-approved. Web authors can use this control to build text- and graphical-based Chat communities for real-time conversations on the Web. If you enable this policy, you can run this control in security zones where you specify that administrator-approved controls can be run.

Webpost

Enabling this policy marks the WebPost ActiveX control as administrator-approved. This control enables administrators to post web content to web servers and is based on the Web Publishing wizard. If you enable this policy, you can run this control in security zones where you specify that administrator-approved controls can be run.

MSN
User Configuration\Administrative Templates\Windows Components\Internet 
Explorer\Administrator Approved Controls\MSN
Cache Preloader

Enabling this policy marks the Microsoft Network (MSN) Cache Preloader ActiveX control as administrator-approved. This control enables administrators to load a web page into the user's cache before the user views it.

Carpoint

Enabling this policy marks the Microsoft Network (MSN) Carpoint automatic pricing control as administrator-approved. Users come to the Carpoint web site to get information about vehicles and shop for vehicles. This control enables users to benefit from enhanced pricing functionality on the Carpoint web site.

Install

Enabling this policy marks the Microsoft Network (MSN) Install controls as administrator-approved. Microsoft Network (MSN) Install controls install and manage MSN services.

Investor

Enabling this policy marks Microsoft Network (MSN) Investor controls as administrator-approved. Users can view updated lists of stocks on their web pages with Microsoft Network (MSN) Investor controls. If you enable this policy, you can run this control in security zones where you specify that administrator-approved controls can be run.

MSNBC

Enabling this policy marks MSNBC controls as administrator-approved. Users will benefit from enhanced browsing of news reports on the MSNBC web site with MSNBC controls. If you enable this policy, you can run this control in security zones where you specify that administrator-approved controls can be run.

Music

Enabling this policy marks Microsoft Network (MSN) music controls as administrator-approved. Users benefit from enhanced music services on the MSN web site with Microsoft Network (MSN) music controls. If you enable this policy, you can run this control in security zones where you specify that administrator-approved controls can be run.

Quick View Access

Enabling this policy marks Quick View Access control as administrator-approved. Quick View Access displays the number of email messages a user has received on the user's taskbar and provides quick access to MSN sites. If you enable this policy, you can run this control in security zones where you specify that administrator-approved controls can be run.

A.1.1.3 Windows Explorer
User Configuration\Administrative Templates\Windows Components\Windows Explorer
Enable Classic Shell

Enabling this policy prevents users from using Active Desktop, Web view, and thumbnail views. The interface resembles and operates as Windows NT 4.0 does.

Remove the Folder Options menu item from the Tools menu

Enabling this policy prevents users from using the Folder Options dialog box, which in turn prevents them from setting the properties of Windows Explorer, including Active Desktop and Web view.

Remove File menu from Windows Explorer

Enabling this policy prevents users from using File menu but doesn't prevent users from performing File menu tasks run with other methods.

Remove "Map Network Drive" and "Disconnect Network Drive"

Enabling this policy prevents users from connecting to other computers or closing existing connections from Windows Explorer or My Network Places. Note that users can still connect to other computers by typing the name of a shared folder in the Run dialog box.

Remove Search button from Windows Explorer

Enabling this policy removes the Search button from Windows Explorer toolbar in all the places the Windows Explorer toolbar is used.

Disable Windows Explorer's default context menu

If you enable this policy, users can't see or use shortcut menus when they right-click on their desktop or in Windows Explorer.

Hides the Manage item on the Windows Explorer context menu

If you enable this policy, users can't see or use the Manage item in the Windows Explorer context menu when they right-click Windows Explorer or My Computer.

Only allow approved Shell extensions

If you enable this policy, Windows starts only user interface extensions the system security or the users have approved. Administrators interested in protecting their system from damage caused by programs that don't operate correctly or are intended to cause harm may be interested in using this policy.

Do not track Shell shortcuts during roaming

Controls whether or not Windows 2000 traces shortcuts back to their sources when it can't find the target on the user's system. If enabled, this policy prevents the system from searching for the original path when it can't find the target file in the current target path.

Hide these specified drives in My Computer

If you enable this policy, selected hard drives are removed from My Computer, Windows Explorer, and My Network Places and the drive letters representing the selected drives don't appear in the standard Open dialog.

Prevent access to drives from My Computer

If you enable this policy, users can't gain access to the content of selected drives through My Computer. Users aren't prevented from using programs to access local and network drives or from using the Disk Management snap-in to view and change drive characteristics.

Hide Hardware tab

Enabling this policy removes the Hardware tab from the Mouse, Keyboard, Sounds and Multimedia in Control Panel, and from the Properties dialog box for all local drives.

Disable UI to change menu animation setting

Controls the Hide keyboard navigation indicators until the ALT key option in Display in Control Panel is used. If you enable this policy, the underlining that indicates a keyboard shortcut character (hot key) doesn't appear on menus until you press ALT.

Disable UI to change keyboard navigation indicator setting

Enabling this policy marks Media Player ActiveX control as administrator-approved. Sounds, videos, and other media are enabled with this control.

Disable DFS tab

When you enable this policy, the Distributed File System tab is removed from Windows Explorer and from other programs that use the Windows Explorer browser, such as My Computer.

No "Computers Near Me" in My Network Places

If you enable this policy, computers in the user's workgroup and domain are removed from lists of network resources in Windows Explorer and My Network Places. Note that users can still connect to computers in their workgroup and domain with other methods, such as typing the share name in the Run dialog box or using the Map Network Drive dialog box.

No "Entire Network" in My Network Places

If you enable this policy, computers outside the user's workgroup and domain are removed from lists of network resources in Windows Explorer and My Network Places. Note that users can still connect to computers in their workgroup and domain with other methods, such as typing the share name in the Run dialog box or using the Map Network Drive dialog box.

Maximum number of recent documents

Controls the number of shortcuts displayed in the Documents menu on the Start menu. Note that the system displays 15 documents by default.

Do not request alternate credentials

If you enable this policy, users can't submit alternate logon credentials to install a program.

Request credentials for network installations

Controls whether or not users are prompted for alternate logon credentials during network-based installations. If you enable this policy, a Install Program As Other User dialog box is displayed when files are being installed.

A.1.1.3.1 Common Open File Dialog
User Configuration\Administrative Templates\Windows Components\Windows 
Explorer\Common Open File Dialog
Hide the common dialog places bar

If you enable this policy, the shortcut bar is removed from the Open dialog box. Administrators can use this policy to remove new features added in Windows 2000, which causes the Open dialog box to resemble the Open dialog box in Windows NT 4.0 and earlier versions.

Hide the common dialog back button

If you enable this policy, the Back button is removed from the Open dialog box. Administrators can use this policy to remove new features added in Windows 2000, which causes the Open dialog box to resemble the Open dialog box in Windows NT 4.0 and earlier versions.

Hide dropdown list of recent files

If you enable this policy, the list of most recently used files is removed from the Open dialog box. Administrators can use this policy to remove new features added in Windows 2000, which causes the Open dialog box to resemble the Open dialog box in Windows NT 4.0 and earlier versions.

A.1.1.4 Microsoft Management Console
User Configuration\Administrative Templates\Windows Components\Microsoft 
Management Console
Restrict the user from entering author mode

If you enable this policy, users can't enter author mode. This includes opening the MMC in author mode, opening console files in author mode, and opening any console files that open in author mode by default.

Restrict users to the explicitly permitted list of snap-ins

If you enable this policy, you can permit the use of Microsoft Management Console (MMC) snap-ins on a select basis, which you determine, or not at all. If you don't enable this policy, users can access all snap-ins.

A.1.1.4.1 Restricted/Permitted snap-ins
User Configuration\Administrative Templates\Windows Components\Microsoft 
Management Console\Restricted/Permitted snap-ins
Active Directory Users and Computers

Controls use of this snap-in. This policy is affected by the setting of the Restrict users to the explicitly permitted list of snap-ins policy. You can prohibit users from accessing any snap-ins by enabling the Restrict users to the explicitly permitted list of snap-ins policy and not configuring any of the policies in this folder.

Active Directory Domains and Trusts

Controls use of this snap-in. This policy is affected by the setting of the Restrict users to the explicitly permitted list of snap-ins policy. You can prohibit users from accessing any snap-ins by enabling the Restrict users to the explicitly permitted list of snap-ins policy and not configuring any of the policies in this folder.

Active Directory Sites and Services

Controls use of this snap-in. This policy is affected by the setting of the Restrict users to the explicitly permitted list of snap-ins policy. You can prohibit users from accessing any snap-ins by enabling the Restrict users to the explicitly permitted list of snap-ins policy and not configuring any of the policies in this folder.

Certificates

Controls the use of this snap-in. This policy is affected by the setting of the Restrict users to the explicitly permitted list of snap-ins policy. You can prohibit users from accessing any snap-ins by enabling the Restrict users to the explicitly permitted list of snap-ins policy and not configuring any of the policies in this folder.

Computer Management

Controls the use of this snap-in. This policy is affected by the setting of the Restrict users to the explicitly permitted list of snap-ins policy. You can prohibit users from accessing any snap-ins by enabling the Restrict users to the explicitly permitted list of snap-ins policy and not configuring any of the policies in this folder.

DCOM Config

Controls the use of this snap-in. This policy is affected by the setting of the Restrict users to the explicitly permitted list of snap-ins policy. You can prohibit users from accessing any snap-ins by enabling the Restrict users to the explicitly permitted list of snap-ins policy and not configuring any of the policies in this folder.

Device Manager

Controls the use of this snap-in. This policy is affected by the setting of the Restrict users to the explicitly permitted list of snap-ins policy. You can prohibit users from accessing any snap-ins by enabling the Restrict users to the explicitly permitted list of snap-ins policy and not configuring any of the policies in this folder.

Disk Management

Controls the use of this snap-in. This policy is affected by the setting of the Restrict users to the explicitly permitted list of snap-ins policy. You can prohibit users from accessing any snap-ins by enabling the Restrict users to the explicitly permitted list of snap-ins policy and not configuring any of the policies in this folder.

Disk Defragmenter

Controls the use of this snap-in. This policy is affected by the setting of the Restrict users to the explicitly permitted list of snap-ins policy. You can prohibit users from accessing any snap-ins by enabling the Restrict users to the explicitly permitted list of snap-ins policy and not configuring any of the policies in this folder.

Distributed File System

Controls the use of this snap-in. This policy is affected by the setting of the Restrict users to the explicitly permitted list of snap-ins policy. You can prohibit users from accessing any snap-ins by enabling the Restrict users to the explicitly permitted list of snap-ins policy and not configuring any of the policies in this folder.

Event Viewer

Controls the use of this snap-in. This policy is affected by the setting of the Restrict users to the explicitly permitted list of snap-ins policy. You can prohibit users from accessing any snap-ins by enabling the Restrict users to the explicitly permitted list of snap-ins policy and not configuring any of the policies in this folder.

FAX Service

Controls the use of this snap-in. This policy is affected by the setting of the Restrict users to the explicitly permitted list of snap-ins policy. You can prohibit users from accessing any snap-ins by enabling the Restrict users to the explicitly permitted list of snap-ins policy and not configuring any of the policies in this folder.

Indexing Service

Controls the use of this snap-in. This policy is affected by the setting of the Restrict users to the explicitly permitted list of snap-ins policy. You can prohibit users from accessing any snap-ins by enabling the Restrict users to the explicitly permitted list of snap-ins policy and not configuring any of the policies in this folder.

Internet Authentication Service (IAS)

Controls the use of this snap-in. This policy is affected by the setting of the Restrict users to the explicitly permitted list of snap-ins policy. You can prohibit users from accessing any snap-ins by enabling the Restrict users to the explicitly permitted list of snap-ins policy and not configuring any of the policies in this folder.

IAS Logging

Controls the use of this snap-in. This policy is affected by the setting of the Restrict users to the explicitly permitted list of snap-ins policy. You can prohibit users from accessing any snap-ins by enabling the Restrict users to the explicitly permitted list of snap-ins policy and not configuring any of the policies in this folder.

Internet Information Services

Controls the use of this snap-in. This policy is affected by the setting of the Restrict users to the explicitly permitted list of snap-ins policy. You can prohibit users from accessing any snap-ins by enabling the Restrict users to the explicitly permitted list of snap-ins policy and not configuring any of the policies in this folder.

IP Security

Controls the use of this snap-in. This policy is affected by the setting of the Restrict users to the explicitly permitted list of snap-ins policy. You can prohibit users from accessing any snap-ins by enabling the Restrict users to the explicitly permitted list of snap-ins policy and not configuring any of the policies in this folder.

Local Users and Groups

Controls the use of this snap-in. This policy is affected by the setting of the Restrict users to the explicitly permitted list of snap-ins policy. You can prohibit users from accessing any snap-ins by enabling the Restrict users to the explicitly permitted list of snap-ins policy and not configuring any of the policies in this folder.

Performance Logs and Alerts

Controls the use of this snap-in. This policy is affected by the setting of the Restrict users to the explicitly permitted list of snap-ins policy. You can prohibit users from accessing any snap-ins by enabling the Restrict users to the explicitly permitted list of snap-ins policy and not configuring any of the policies in this folder.

QoS Admission Control

Controls the use of this snap-in. This policy is affected by the setting of the Restrict users to the explicitly permitted list of snap-ins policy. You can prohibit users from accessing any snap-ins by enabling the Restrict users to the explicitly permitted list of snap-ins policy and not configuring any of the policies in this folder.

Removable Storage Management

Controls the use of this snap-in. This policy is affected by the setting of the Restrict users to the explicitly permitted list of snap-ins policy. You can prohibit users from accessing any snap-ins by enabling the Restrict users to the explicitly permitted list of snap-ins policy and not configuring any of the policies in this folder.

Routing and Remote Access

Controls the use of this snap-in extension. This policy is affected by the setting of the Restrict users to the explicitly permitted list of snap-ins policy. You can prohibit users from accessing any snap-ins by enabling the Restrict users to the explicitly permitted list of snap-ins policy and not configuring any of the policies in this folder.

Security Configuration and Analysis

Controls the use of this snap-in. This policy is affected by the setting of the Restrict users to the explicitly permitted list of snap-ins policy. You can prohibit users from accessing any snap-ins by enabling the Restrict users to the explicitly permitted list of snap-ins policy and not configuring any of the policies in this folder.

Security Templates

Controls the use of this snap-in. This policy is affected by the setting of the Restrict users to the explicitly permitted list of snap-ins policy. You can prohibit users from accessing any snap-ins by enabling the Restrict users to the explicitly permitted list of snap-ins policy and not configuring any of the policies in this folder.

Services

Controls the use of this snap-in. This policy is affected by the setting of the Restrict users to the explicitly permitted list of snap-ins policy. You can prohibit users from accessing any snap-ins by enabling the Restrict users to the explicitly permitted list of snap-ins policy and not configuring any of the policies in this folder.

Shared Folders

Controls the use of this snap-in. This policy is affected by the setting of the Restrict users to the explicitly permitted list of snap-ins policy. You can prohibit users from accessing any snap-ins by enabling the Restrict users to the explicitly permitted list of snap-ins policy and not configuring any of the policies in this folder.

System Information

Controls the use of this snap-in. This policy is affected by the setting of the Restrict users to the explicitly permitted list of snap-ins policy. You can prohibit users from accessing any snap-ins by enabling the Restrict users to the explicitly permitted list of snap-ins policy and not configuring any of the policies in this folder.

Telephony

Controls the use of this snap-in. This policy is affected by the setting of the Restrict users to the explicitly permitted list of snap-ins policy. You can prohibit users from accessing any snap-ins by enabling the Restrict users to the explicitly permitted list of snap-ins policy and not configuring any of the policies in this folder.

Extension snap-ins
User Configuration\Administrative Templates\Windows Components\Microsoft 
Management Console\Restricted/Permitted snap-ins\Extension snap-ins
AppleTalk Routing

Controls the use of this snap-in extension. This policy is affected by the setting of the Restrict users to the explicitly permitted list of snap-ins policy. You can prohibit users from accessing any snap-ins by enabling the Restrict users to the explicitly permitted list of snap-ins policy and not configuring any of the policies in this folder.

Certification Authority

Controls the use of this snap-in extension. This policy is affected by the setting of the Restrict users to the explicitly permitted list of snap-ins policy. You can prohibit users from accessing any snap-ins by enabling the Restrict users to the explicitly permitted list of snap-ins policy and not configuring any of the policies in this folder.

Component Services

Controls the use of this snap-in extension. This policy is affected by the setting of the Restrict users to the explicitly permitted list of snap-ins policy. You can prohibit users from accessing any snap-ins by enabling the Restrict users to the explicitly permitted list of snap-ins policy and not configuring any of the policies in this folder.

Connection Sharing (NAT)

Controls the use of this snap-in extension. This policy is affected by the setting of the Restrict users to the explicitly permitted list of snap-ins policy. You can prohibit users from accessing any snap-ins by enabling the Restrict users to the explicitly permitted list of snap-ins policy and not configuring any of the policies in this folder.

Device Manager

Controls the use of this snap-in extension. This policy is affected by the setting of the Restrict users to the explicitly permitted list of snap-ins policy. You can prohibit users from accessing any snap-ins by enabling the Restrict users to the explicitly permitted list of snap-ins policy and not configuring any of the policies in this folder.

DHCP Relay Management

Controls the use of this snap-in extension. This policy is affected by the setting of the Restrict users to the explicitly permitted list of snap-ins policy. You can prohibit users from accessing any snap-ins by enabling the Restrict users to the explicitly permitted list of snap-ins policy and not configuring any of the policies in this folder.

Event Viewer

Controls the use of this snap-in extension. This policy is affected by the setting of the Restrict users to the explicitly permitted list of snap-ins policy. You can prohibit users from accessing any snap-ins by enabling the Restrict users to the explicitly permitted list of snap-ins policy and not configuring any of the policies in this folder.

IGMP Routing

Controls the use of this snap-in extension. This policy is affected by the setting of the Restrict users to the explicitly permitted list of snap-ins policy. You can prohibit users from accessing any snap-ins by enabling the Restrict users to the explicitly permitted list of snap-ins policy and not configuring any of the policies in this folder.

IP Routing

Controls the use of this snap-in extension. This policy is affected by the setting of the Restrict users to the explicitly permitted list of snap-ins policy. You can prohibit users from accessing any snap-ins by enabling the Restrict users to the explicitly permitted list of snap-ins policy and not configuring any of the policies in this folder.

IPX RIP Routing

Controls the use of this snap-in extension. This policy is affected by the setting of the Restrict users to the explicitly permitted list of snap-ins policy. You can prohibit users from accessing any snap-ins by enabling the Restrict users to the explicitly permitted list of snap-ins policy and not configuring any of the policies in this folder.

IPX Routing

Controls the use of this snap-in extension. This policy is affected by the setting of the Restrict users to the explicitly permitted list of snap-ins policy. You can prohibit users from accessing any snap-ins by enabling the Restrict users to the explicitly permitted list of snap-ins policy and not configuring any of the policies in this folder.

IPX SAP Routing

Controls the use of this snap-in extension. This policy is affected by the setting of the Restrict users to the explicitly permitted list of snap-ins policy. You can prohibit users from accessing any snap-ins by enabling the Restrict users to the explicitly permitted list of snap-ins policy and not configuring any of the policies in this folder.

Logical and Mapped Drives

Controls the use of this snap-in extension. This policy is affected by the setting of the Restrict users to the explicitly permitted list of snap-ins policy. You can prohibit users from accessing any snap-ins by enabling the Restrict users to the explicitly permitted list of snap-ins policy and not configuring any of the policies in this folder.

OSPF Routing

Controls the use of this snap-in extension. This policy is affected by the setting of the Restrict users to the explicitly permitted list of snap-ins policy. You can prohibit users from accessing any snap-ins by enabling the Restrict users to the explicitly permitted list of snap-ins policy and not configuring any of the policies in this folder.

Public Key Policies

Controls the use of this snap-in extension. This policy is affected by the setting of the Restrict users to the explicitly permitted list of snap-ins policy. You can prohibit users from accessing any snap-ins by enabling the Restrict users to the explicitly permitted list of snap-ins policy and not configuring any of the policies in this folder.

RAS Dialin - User Node

Controls the use of this snap-in extension. This policy is affected by the setting of the Restrict users to the explicitly permitted list of snap-ins policy. You can prohibit users from accessing any snap-ins by enabling the Restrict users to the explicitly permitted list of snap-ins policy and not configuring any of the policies in this folder.

Remote Access

Controls the use of this snap-in extension. This policy is affected by the setting of the Restrict users to the explicitly permitted list of snap-ins policy. You can prohibit users from accessing any snap-ins by enabling the Restrict users to the explicitly permitted list of snap-ins policy and not configuring any of the policies in this folder.

Removable Storage

Controls the use of this snap-in extension. This policy is affected by the setting of the Restrict users to the explicitly permitted list of snap-ins policy. You can prohibit users from accessing any snap-ins by enabling the Restrict users to the explicitly permitted list of snap-ins policy and not configuring any of the policies in this folder.

RIP Routing

Controls the use of this snap-in extension. This policy is affected by the setting of the Restrict users to the explicitly permitted list of snap-ins policy. You can prohibit users from accessing any snap-ins by enabling the Restrict users to the explicitly permitted list of snap-ins policy and not configuring any of the policies in this folder.

Routing

Controls the use of this snap-in extension. This policy is affected by the setting of the Restrict users to the explicitly permitted list of snap-ins policy. You can prohibit users from accessing any snap-ins by enabling the Restrict users to the explicitly permitted list of snap-ins policy and not configuring any of the policies in this folder.

Send Console Message

Controls the use of this snap-in extension. This policy is affected by the setting of the Restrict users to the explicitly permitted list of snap-ins policy. You can prohibit users from accessing any snap-ins by enabling the Restrict users to the explicitly permitted list of snap-ins policy and not configuring any of the policies in this folder.

Service Dependencies

Controls the use of this snap-in extension. This policy is affected by the setting of the Restrict users to the explicitly permitted list of snap-ins policy. You can prohibit users from accessing any snap-ins by enabling the Restrict users to the explicitly permitted list of snap-ins policy and not configuring any of the policies in this folder.

SMTP Protocol

Controls the use of this snap-in extension. This policy is affected by the setting of the Restrict users to the explicitly permitted list of snap-ins policy. You can prohibit users from accessing any snap-ins by enabling the Restrict users to the explicitly permitted list of snap-ins policy and not configuring any of the policies in this folder.

SNMP

Controls the use of this snap-in extension. This policy is affected by the setting of the Restrict users to the explicitly permitted list of snap-ins policy. You can prohibit users from accessing any snap-ins by enabling the Restrict users to the explicitly permitted list of snap-ins policy and not configuring any of the policies in this folder.

System Properties

Controls the use of this snap-in extension. This policy is affected by the setting of the Restrict users to the explicitly permitted list of snap-ins policy. You can prohibit users from accessing any snap-ins by enabling the Restrict users to the explicitly permitted list of snap-ins policy and not configuring any of the policies in this folder.

Group Policy
User Configuration\Administrative Templates\Windows Components\Microsoft 
Management Console\Restricted/Permitted snap-ins\Group Policy
Group Policy snap-in

Controls the use of this snap-in extension-allows or prohibits use of the Group Policy snap-in. This policy is affected by the setting of the Restrict users to the explicitly permitted list of snap-ins policy. You can prohibit users from accessing any snap-ins by enabling the Restrict users to the explicitly permitted list of snap-ins policy and not configuring any of the policies in this folder.

Group Policy Tab for Active Directory Tools

Allows or prohibits use of Administrative Templates (Computers) Group Policy folder. This policy is affected by the setting of the Restrict users to the explicitly permitted list of snap-ins policy. You can prohibit users from accessing any snap-ins by enabling the Restrict users to the explicitly permitted list of snap-ins policy and not configuring any of the policies in this folder.

Administrative Templates (Computers)

Allows or prohibits use of the Group Policy Tab for Active Directory Tools. This policy is affected by the setting of the Restrict users to the explicitly permitted list of snap-ins policy. You can prohibit users from accessing any snap-ins by enabling the Restrict users to the explicitly permitted list of snap-ins policy and not configuring any of the policies in this folder.

Administrative Templates (Users)

Allows or prohibits use of the Administrative Templates (Users) Group Policy folder. This policy is affected by the setting of the Restrict users to the explicitly permitted list of snap-ins policy. You can prohibit users from accessing any snap-ins by enabling the Restrict users to the explicitly permitted list of snap-ins policy and not configuring any of the policies in this folder.

Folder Redirection

Allows or prohibits use of the Group Policies that use the Folder Redirection client-side extension. This policy is affected by the setting of the Restrict users to the explicitly permitted list of snap-ins policy. You can prohibit users from accessing any snap-ins by enabling the Restrict users to the explicitly permitted list of snap-ins policy and not configuring any of the policies in this folder.

Remote Installation Services

Allows or prohibits use of the Group Policies that use the Remote Installation Services client-side extension. This policy is affected by the setting of the Restrict users to the explicitly permitted list of snap-ins policy. You can prohibit users from accessing any snap-ins by enabling the Restrict users to the explicitly permitted list of snap-ins policy and not configuring any of the policies in this folder.

Scripts (Logon/Logoff)

Allows or prohibits use of the Group Policies that use the Logon/Logoff Scripts client-side extension. This policy is affected by the setting of the Restrict users to the explicitly permitted list of snap-ins policy. You can prohibit users from accessing any snap-ins by enabling the Restrict users to the explicitly permitted list of snap-ins policy and not configuring any of the policies in this folder.

Scripts (Startup/Shutdown)

Allows or prohibits use of the Group Policies that use the Startup/Shutdown Scripts client-side extension. This policy is affected by the setting of the Restrict users to the explicitly permitted list of snap-ins policy. You can prohibit users from accessing any snap-ins by enabling the Restrict users to the explicitly permitted list of snap-ins policy and not configuring any of the policies in this folder.

Security Settings

Allows or prohibits use of the policies in the Security Settings folder in Group Policy. This policy is affected by the setting of the Restrict users to the explicitly permitted list of snap-ins policy. You can prohibit users from accessing any snap-ins by enabling the Restrict users to the explicitly permitted list of snap-ins policy and not configuring any of the policies in this folder.

Software Installation (Computers)

Allows or prohibits use of policies in the Software Installation (Computers) folder in Group Policy. This policy is affected by the setting of the Restrict users to the explicitly permitted list of snap-ins policy. You can prohibit users from accessing any snap-ins by enabling the Restrict users to the explicitly permitted list of snap-ins policy and not configuring any of the policies in this folder.

Software Installation (Users)

Allows or prohibits use of policies in the Software Installation (Users) folder in Group Policy. This policy is affected by the setting of the Restrict users to the explicitly permitted list of snap-ins policy. You can prohibit users from accessing any snap-ins by enabling the Restrict users to the explicitly permitted list of snap-ins policy and not configuring any of the policies in this folder.

A.1.1.5 Task Scheduler
User Configuration\Administrative Templates\Windows Components\Task Scheduler
Hide Property Pages

When this policy is enabled, users can't view or change the properties of an existing task, which simplifies task creation for beginning users. These properties may include the program the task runs, details of its schedule, idle time and power management settings, and its security context. Note that this policy appears in both the Computer Configuration and User Configuration folders, but the Computer Configuration folder takes precedence.

Prevent Task Run or End

When this policy is enabled, users can't start or stop tasks manually. This means that users can't force tasks to end before they are finished or start tasks manually. Note that this policy appears in both the Computer Configuration and User Configuration folders, but the Computer Configuration folder takes precedence.

Disable drag-and-drop

When you enable this policy, users can't use the drag-and-drop method to add or remove tasks in the Scheduled Tasks folder.

Disable New Task Creation

When you enable this policy, users can't create new tasks. This policy also prevents the system from responding when users try to move, paste, or drag programs or documents into the Scheduled Tasks folder. Note that this policy appears in both the Computer Configuration and User Configuration folders, but the Computer Configuration folder takes precedence.

Disable Task Deletion

When you enable this policy, users can't delete tasks from the Scheduled Tasks folder. Additionally, the system doesn't respond if users try to cut or drag a task from the Scheduled Tasks folder. Note that this policy appears in both the Computer Configuration and User Configuration folders, but the Computer Configuration folder takes precedence.

Disable Advanced Menu

When this policy is enabled, users can't view or change the properties of newly created tasks, which simplifies task creation for beginning users. These properties may include the program the task runs, details of its schedule, idle time and power management settings, and its security context. Note that this policy appears in both the Computer Configuration and User Configuration folders, but the Computer Configuration folder takes precedence.

Prohibit Browse

When this policy is enabled, users' newly scheduled tasks are limited to items on the user's Start menu, and users can't change the scheduled program for existing tasks. Note that this policy appears in both the Computer Configuration and User Configuration folders, but the Computer Configuration folder takes precedence.

A.1.1.6 Windows Installer
User Configuration\Administrative Templates\Windows Components\Windows Installer
Always install with elevated privileges

Enabling this policy directs Windows Installer to use system permissions when it installs any program on the system. This allows a user to install programs that require access to directories the user may not have permission to view or change. Note that this policy appears in both the Computer Configuration and User Configuration folders; the policy must be enabled in both folders to make the policy effective.

Search order

This policy allows you to set the order Windows Installer uses to search the installation files. Note that Windows Installer searches the network first, then removable media (floppy drive, CD-ROM, or DVD), and finally, the Internet (URL) by default.

Disable rollback

When this policy is enabled, Windows Installer doesn't generate and save the files it needs to reverse an interrupted or unsuccessful installation; it's unable to record the original state of the computer. This policy reduces the amount of temporary disk space required to install programs.

Disable media source for any install

When this policy is enabled, users can't install programs from removable media including CD-ROMs, floppy disks, and DVDs. If you enable this policy, it continues to run when the installation is running in the user's security context.

A.1.2 Start Menu & Taskbar

User Configuration\Administrative Templates\Start Menu & Taskbar
Remove user's folders from the Start Menu

When you enable this policy, users can't see the user-specific (top) section of the Start menu. This policy works best with redirected folders, because they appear on the main (bottom) section of the Start menu. Removing them from the top of the Start menu means that users don't see them twice in the Start menu, which can be confusing.

Disable and remove links to Windows Update

When you enable this policy, users can't connect to the Windows Update web site. The Windows Update web site is the online extension of Windows. The site provides software updates to keep a user's system up to date in addition to other information.

Remove common program groups from Start Menu

This policy removes items in the All Users profile from the Programs menu on the Start menu. If you enable this policy, users see only items in the user's profile in the Programs menu.

Remove Documents menu from Start Menu

When you enable this policy, users can't access the Documents menu from the Start menu; it's removed. This prohibits users from opening recently used files.

Disable programs on Settings menu

Controls the user's ability to run Control Panel, Printers, and Network and Dial-up Connections. If you enable this policy, the Control Panel, Printers, and Network and Dial-up Connections are removed from My Computer and Windows Explorer, and programs represented by these folders won't run.

Remove Network and Dial-up Connections from Start Menu

Controls the user's ability to run Network and Dial-up Connections. If you enable this policy, users can't utilize Network and Dial-up Connections.

Remove Favorites menu from Start Menu

Controls the Favorites menu on the Start menu. The Favorites menu doesn't appear on the Start menu by default; if you enable this policy users can't add it manually.

Remove Search menu from Start Menu

If you enable this policy, the Search item on the Start menu and some Windows Explorer search elements are removed or disabled. Additionally, users won't get a response if they press the Application key (the key with the Windows logo) + F.

Remove Help menu from Start Menu

If you enable this policy, the Help menu is removed from the Start menu only; it isn't removed or affected in other locations.

Remove Run menu from Start Menu

If you enable this policy, the Run command is removed from the Start menu, and the New Task (Run) command is removed from Task Manager.

Add Logoff to the Start Menu

This policy adds the Log Off <username> item to the Start menu and prevents users from removing it. Be aware that this policy affects only the Start menu; it doesn't affect the Log Off item on the Windows Security dialog box.

Disable Logoff on the Start Menu

Enabling this policy removes the Log Off <username> item from the Start menu and the Display Logoff item from Start Menu Options. Also, users can't restore the Log Off <username> item.

Disable and remove the Shut Down command

When you enable this policy, users can't shut down or restart Windows. This policy doesn't prevent users from running other programs to shut Windows down, but it does prevent them from using the Windows interface to shut down.

Disable drag-and-drop context menus on the Start Menu

When you enable this policy, users can't reorder or remove items from the Start menu using the drag-and-drop method. This policy also removes the context menus from the Start menu. Users can use other means to customize the Start menu or to perform context menu tasks.

Disable changes to Start Menu & Taskbar Settings

Enabling this policy removes the Start Menu & Taskbar item from Settings on the Start menu and prevents users from opening the Taskbar Properties dialog box.

Disable context menu for taskbar

This policy eliminates the menus that appear when you right-click the taskbar and items on the taskbar for users.

Do not keep history of recently opened documents

If you enable this policy, the system doesn't save shortcuts to the Documents menu. Users use these shortcuts to quickly open their most recently used documents.

Clear history of recently opened documents on exit

Controls whether the system deletes the contents of the Documents menu on the Start menu when the user logs off. If you enable this policy, users will have an empty documents menu when they log on.

Disable personalized menus

Enabling this policy turns off personalized menus for users. Personalized menus work by moving recently used items to the top of the menu and hiding the remaining items.

Disable user tracking

If you enable this policy, the system doesn't track the programs users run, the paths they navigate, and the documents they open. Windows 2000 uses tracking information to customize features.

Add "Run in Separate Memory Space" check box to Run dialog box

Allows users to run a 16-bit program in a dedicated (not shared) Virtual DOS Machine (VDM) process. This policy lets users run a 16-bit program in its own dedicated NTVDM process.

Do not use the search-based method when resolving shell shortcuts

If you enable this policy, the system doesn't perform a search of the target drive when it can't find a target file for a shortcut (.lnk).

Do not use the tracking-based method when resolving shell shortcuts

If you enable this policy, the system doesn't try to locate a file by using its file ID if a the system can't find a target file for a shortcut. Note that FAT partitions don't have this ID tracking and search capability, as a result, this policy doesn't apply.

Gray unavailable Windows Installer programs Start Menu shortcuts

If you enable this policy, Start menu shortcuts to partially installed programs are displayed in gray text. This helps users quickly distinguish between fully and partially installed programs.

A.1.3 Desktop

User Configuration\Administrative Templates\Desktop
Hide all icons on Desktop

If you enable this policy, icons, shortcuts, and other default and user-defined items are removed from the desktop. These include Briefcase, Recycle Bin, My Computer, and My Network Places. Removing these icons doesn't prevent users from opening these items by other means.

Remove My Documents icon from desktop

If you enable this policy, the My Documents icon is removed from the desktop, from Windows Explorer, from programs that use the Windows Explorer windows, and from the standard Open dialog box. Removing these icons doesn't prevent users from opening My Documents by other means and doesn't remove My Documents from the Start menu.

Remove My Documents icon from Start Menu

If you enable this policy, the My Documents icon is removed from the Start menu. Removing this icon doesn't prevent users from opening My Documents by other means.

Hide My Network Places icon on desktop

If you enable this policy, the My Network Places icon is removed from the desktop. Removing this icon doesn't prevent users connecting to the network or browsing for shared computers on the network. Removing this icon doesn't prevent users from starting Internet Explorer by other means.

Do not add shares from recently opened documents to the My Network Places folder

Enabling this policy prevents remote-shared folders from being added to My Network Places when you open a document in the shared folder.

Prohibit user from changing My Documents path

If you enable this policy, users can't change the path to the My Documents folder by typing a new path in the Target box of the Properties dialog box for My Documents.

Disable adding, dragging, dropping and closing the Taskbar's toolbars

Controls the manipulation of desktop toolbars. This policy prevents users from adding or removing toolbars from the desktop and dragging toolbars on to or off of docked toolbars when enabled.

Disable adjusting desktop toolbars

Enabling this policy prevents users from adjusting the length of desktop toolbars or repositioning items or toolbars on docked toolbars.

Don't save settings at exit

Enabling this policy prevents users from saving such changes as the positions of open windows and the size and position of the taskbar. Note that shortcuts placed on the desktop are always saved.

A.1.3.1 Active Directory
User Configuration\Administrative Templates\Desktop\Active Directory
Maximum size of Active Directory searches

With this policy, you can set the maximum number of objects the system displays in response to a command to browse or search Active Directory. This policy protects your network and domain controller from the sometimes negative effects of expansive searches.

Enable filter in Find dialog box

If you enable this policy, the filter bar appears automatically above the results of an Active Directory search. The filter bar allows users to quickly refine their search results.

Hide Active Directory folder

If you enable this policy, the Active Directory folder doesn't appear in My Network Places. The Active Directory folder displays Active Directory objects in a browse window.

A.1.3.2 Active Desktop
User Configuration\Administrative Templates\Desktop\Active Desktop
Enable Active Desktop

Controls use of Active Desktop. If you enable this policy, Active Desktop is enabled, and users can't disable it. Note that Active Desktop is disabled by default, but users can choose to enable it if this policy isn't in effect.

Disable Active Desktop

Controls use of Active Desktop. If you enable this policy, it locks down the configuration you establish by using other policies in this folder. Users can't enable or disable the Active Desktop themselves.

Prohibit changes

This policy allows you to remove Active Desktop content and prevents users from adding Active Desktop content. Note that this policy doesn't disable Active Desktop.

Disable all items

This policy allows you to removes Active Desktop content and prevent users from adding Active Desktop content. Note that this policy doesn't disable Active Desktop.

Prohibit adding items

If you enable this policy, users can't add web content to their Active Desktop; they can, however, remove web content from their Active Desktop. Note that this policy will not remove any existing content from Active Desktop.

Prohibit editing items

If you enable this policy, users can't change the properties of web content items on their Active Desktop.

Prohibit deleting items

If you enable this policy, users can only remove--not delete--web content from their Active Desktop. Note that with this policy enabled, users can still add content to their Active Desktop.

Prohibit closing items

If you enable this policy, users can't remove web content from their Active Desktop. This means that items added to the Active Directory remain on the desktop at all times; they can't be closed.

Add/Delete items

You can use this policy to add or delete certain items to or from users' desktops. Note that if policies allow, users can still add or delete items from their desktops.

Active Desktop Wallpaper

Controls the desktop background (or wallpaper) displayed on all users' desktops. This policy allows you to specify users' wallpaper and the characteristics of the wallpaper--whether it is centered, tiled, and so on.

Allow only bitmapped wallpaper

Limits users to only bitmap images for desktop backgrounds, or wallpaper. Wallpaper doesn't load if it has another image format, such as JPEG, GIF, PNG, or HTML.

A.1.4 Control Panel

User Configuration\Administrative Templates\Control Panel
Disable Control Panel

If you enable this policy, Control.exe doesn't run. Additionally, the Control Panel menu item is removed from the Start menu, and the Control Panel folder is removed from Windows Explorer.

Show only specified control panel applets

This policy lets you specify which Control Panel items and folders are visible to users. Enabling this policy hides all the Control Panel items and folders, except for the items and folders you specify. This policy can be overridden by the Hide specified Control Panel applets policy.

Hide specified control panel applets

This policy lets you specify which Control Panel items and folders to hide from users. This policy overrides the Show only specified Control Panel applets policy.

A.1.4.1 Add/Remove Programs
User Configuration\Administrative Templates\Control Panel\Add/Remove Programs
Disable Add/Remove Programs

Controls use of Add/Remove Programs. Users can install, uninstall, repair, add, and remove features and components of Windows 2000 and a wide variety of Windows programs with the Add/Remove Programs feature. This feature is enabled for users by default.

Hide Change or Remove Programs page

Enabling this policy removes the Change or Remove Programs button from the Add/Remove Programs bar, which prevents users from users uninstalling, repairing, adding, or removing features of installed programs by this means.

Hide Add New Programs page

Enabling this policy removes the Add New Programs button from the Add/Remove Programs bar, which prevents users from installing programs published or assigned by a system administrator by this means.

Hide Add/Remove Windows Components page

Enabling this policy removes the Add/Remove Windows Components button from the Add/Remove Programs bar, which prevents users from configuring installed services and using the Windows Component wizard to add, remove, and configure components of Windows 2000 from the installation files by this means.

Hide the "Add a program from CD-ROM or floppy disk" option

Enabling this policy removes the "Add a program from CD-ROM or floppy disk" section from the Add New Programs page, which prevents users from installing media with Add/Remove Programs. Note that this doesn't prevent users from installing media by other means.

Hide the "Add programs from Microsoft" option

Enabling this policy removes the "Add programs from Microsoft" section from the Add New Programs page, which prevents users from connecting to the Windows update using Add/Remove Programs. Note that this doesn't prevent users connecting to the Windows update by other means.

Hide the "Add programs from your network" option

If you enable this policy, users can't add or install published programs. Users can't tell which programs have been published by the administrator and they can't use Add/Remove Programs to install published programs. Published programs are those programs that administrators make available to users.

Go directly to Components wizard

If you enable this policy users can't use the Set Up Services section of the Add/Remove Windows Components Page. Instead, the Windows Component wizard runs.

Disable Support Information

When you enable this policy, hyperlinks to the Support Info dialog box from programs on the Change or Remove Programs page are removed. The programs on the Change or Remove Programs page sometimes include a hyperlink called "Click here for support information."

Specify default category for Add New Programs

If you enable this policy, you can choose one category of programs to display when users display the Add New Programs page. Users can view additional programs by using the Category drop-down list on the Add New Programs page.

A.1.4.2 Display
User Configuration\Administrative Templates\Control Panel\Display
Disable Display in control panel

When you enable this policy, users can't use Display in the Control Panel; it won't run.

Hide Background tab

This policy prevents users from changing the pattern and wallpaper on the desktop through the Control Panel by removing the Background tab from Display in Control Panel.

Disable Changing Wallpaper

This policy prevents users from adding or changing the background design (or wallpaper) of the desktop.

Hide Appearance tab

This policy prevents users from changing colors or color schemes of the desktop and windows through the Control Panel, because it removes the Appearance tab from Display in Control Panel.

Hide Settings tab

This policy prevents users from adding, configuring, or changing the display settings on the computer through the Control Panel, because it removes the Settings tab from Display in Control Panel.

Hide Screen Saver tab

This policy prevents users from adding, configuring, or changing the screen saver on the computer through the Control Panel, because it removes the Screen Saver tab from Display in Control Panel.

No screen saver

Enabling this policy ensures that all screen savers are disabled. Further, users can't change screen-saver options through the Control Panel.

Screen saver executable name

Enabling this policy ensures that all the computers in your system will display the specific screen saver you designate. Further, users can't change the screen saver because this policy disables the drop-down list of screen savers on the Screen Saver tab in Display in Control Panel.

Password protect the screen saver

If you enable this policy all screen savers must be password-protected. If you disable it, passwords can't be set up for screen savers. If you don't configure it, users can set up a password if they like, but it isn't required.

A.1.4.3 Printers
User Configuration\Administrative Templates\Control Panel\Printers
Disable deletion of printers

Enabling this policy also prevents users from deleting local and network printers. Users can delete printers by other means.

Disable addition of printers

Controls the methods that add local and network printers. Enabling this policy also prevents users from adding printers by dragging a printer icon into the Printers folder. Note that this policy doesn't prevent users from adding printers with the Add Hardware wizard or from running additional programs to add printers.

Browse the network to find printers

This policy allows users to search the network for shared printers through the Add Printer wizard. When enabled, this policy allows users to select a printer from a list the Add Printer wizard displays if users click "Add a network printer", but don't fill in a printer name while searching.

Default Active Directory path when searching for printers

This policy allows you to choose the Active Directory location where users' searches for printers begin when they use the Add Printer wizard. If you enable this policy, users start their search at the location you specify instead of starting at the default location. The root of the Active Directory is the default.

Browse a common web site to find printers

This policy adds a web link to the Add Printer wizard. The web link directs users to a web page that they can install printers from.

A.1.4.4 Regional Options
User Configuration\Administrative Templates\Control Panel\Regional Options
Restrict selection of Windows 2000 menus and dialogs language

If you enable this policy, users are restricted to either a specified language or the default language, which is English.

A.1.5 Network

User Configuration\Administrative Templates\Network
A.1.5.1 Offline Files
User Configuration\Administrative Templates\Network\Offline Files
Disable user configuration of Offline Files

If you enable this policy, users can't enable, disable, or change the configuration of Offline Files. This policy uses other policies in this folder to lock down the configuration you set up.

Synchronize all offline files before logging off

Controls whether the system performs a quick or full synchronization of offline files when users log off. Enabling this policy ensures that the system performs a full synchronization.

Action on server disconnect

Controls whether network files remain available if the computer is suddenly disconnected from the server hosting the files. Enabling this policy allows you to use the Action box to specify whether or not users can work offline when the server is inaccessible.

Non-default server disconnect actions

Controls how computers respond when they are disconnected from particular offline file servers. This policy allows you to determine whether or not users can access a server's files offline when they are disconnected from that particular server. This policy takes precedence over default response, a user-specified response, and the response specified in the Action on server disconnect policy.

Disable "Make Available Offline"

Controls the ability to make network files and folders available offline. If you enable this policy, users can't save files for offline use. The system isn't prevented from saving local copies of files located on network shares designated for automatic caching.

Prevent use of Offline Files folder

If you enable this policy, users can't access the Offline Files Folder to view or open copies of network files stored on their computer. Users can still work offline and save local copies of files available offline.

Administratively assigned offline files

Controls the specified files and folders available offline to users. This policy provides a list of network files and folders users can access at any time for offline use.

Disable reminder balloons

Enabling this policy removes the reminder balloons. Reminder balloons notify users when they have lost the connection to a networked file and are working on a local copy of the file.

Reminder balloon frequency

Controls when reminder balloon updates appear. You can use this policy to change the default update interval, which displays a reminder balloon every 60 minutes for 15 seconds.

Initial reminder balloon lifetime

Controls how long the initial reminder balloon update appears onscreen. You can use this policy to change the default display time for an initial reminder balloon. Thirty seconds is the default time for the first reminder.

Reminder balloon lifetime

Controls how long reminder balloon updates appear for onscreen. You can use this policy to change the default display time for an reminder balloon updates. Fifteen seconds is the default time for the reminder balloon updates.

Event logging level

Controls the events that are recorded in the Offline Files feature records in the event log. If you enable this policy, you can choose a number in between and 3 to determine the number of events you want recorded.

A.1.5.2 Network and Dial-up Connections
User Configuration\Administrative Templates\Network\Network and Dial-up Connections
Enable deletion of RAS connections

Controls users' ability to delete private dial-up connections. Users can delete their private RAS connections if you enable this policy. Users can also delete their private RAS connections if you don't configure this policy.

Enable deletion of RAS connections available to all users

Controls users' ability to delete shared dial-up connections. Users can delete their private RAS connections if you enable this policy. Note that the Enable deletion of RAS connections policy overrides this policy if it's disabled.

Enable connecting and disconnecting a RAS connection

Controls users' ability to connect and disconnect from dial-up connections. Enabling this policy allows users to connect and disconnect from dial-up connections. Note that this doesn't prevent users from connecting and disconnecting to a dial-up connection via the Status page.

Enable connecting and disconnecting a LAN connection

Controls users' ability to connect and disconnect local area connections. Enabling this policy allows users to connect and disconnect from local area connections. Note that this doesn't prevent users from connecting and disconnecting to a dial-up connection via the Status page.

Enable access to properties of a LAN connection

Controls users' ability to view and change the properties of a local area connection for users. Enabling this policy allows users to view and change the properties of a local area connection. Note that this policy overrides any policies that removes or disables parts of the Local Area Connection Properties dialog box.

Allow access to current user's RAS connection properties

Controls users' ability to view and change the properties of private dial-up connections. Private connections are only available to one user. Note that this policy overrides other policies that remove or disable parts of the Dial-up Connection Properties dialog box.

Enable access to properties of RAS connections available to all users

Controls users' ability to view and change the properties of dial-up connections that are available to all users of the computer. Enabling this policy allows users to view and change the properties. Note that this policy overrides other policies that remove or disable parts of the Dial-up Connection Properties dialog box.

Enable renaming of connections, if supported

Controls users' ability to rename dial-up and local area connections. Enabling this policy allows users to rename all connections, including their private dial-up connections.

Enable renaming of RAS connections belonging to the current user

Controls users' ability to rename their private dial-up connections. Enabling this policy allows users to rename their private dial-up connection.

Enable adding or removing components of a RAS or LAN connection

Controls users' ability to add and remove network components. Enabling this policy allows users to add and remove network components through the Install and Uninstall buttons in Network and Dial-up Connections or through the Windows Components wizard.

Allow connection components to be enabled or disabled

Controls users' ability to enable and disable the components used by dial-up and local area connections. This policy adds a checkbox beside the name of each component listed in each connection's Properties dialog box. Checking the box enables the component.

Enable access to properties of components of a LAN connection

Controls users' ability to change the properties of components used by a local area connection. Enabling this policy (or not configuring it at all) allows users to change the properties. Note that some network components properties are never configurable.

Enable access to properties of components of a RAS connection

Controls users' ability to view and change the properties of components used by a dial-up connection. Enabling this policy (or not configuring it at all) will allow users to change the properties. Note that some network components properties are never configurable.

Display and enable the Network Connection wizard

Controls users' ability to create new network connections with the Network Connection wizard. Enabling this policy allows users to utilize the Make New Connection icon in Network and Dial-up Connections to start the Network Connection wizard.

Enable status statistics for an active connection

Controls users' ability to view the Status page for an active connection. Enabling this policy allows users to utilize the Status page to view information about the connection and its activity and to disconnect and configure the properties of the connection through buttons on this page.

Enable the Dial-up Preferences item on the Advanced menu

If you enable this policy, the Dial-up Preferences item on the Advanced menu in Network and Dial-up Connections is enabled. This allows users to create and change connections before logon and to configure AutoDialing and callback features.

Enable the Advanced Settings item on the Advanced menu

If you enable this policy, the Advanced Settings item on the Advanced menu in Network and Dial-up Connections are enabled. This allows users to view and change bindings, the order that the computer accesses connections, network providers, and print providers.

Allow configuration of connection sharing

Controls the ability to enable, disable, and configure the Internet Connection Sharing feature of a dial-up connection. If this policy is enabled, administrators and power users can manipulate the Internet Connections Sharing feature. Internet Connection Sharing provides network services to the network and allows users to configure their system as an Internet gateway for a small network.

Allow TCP/IP advanced configuration

Controls users' ability to use Network and Dial-up Connections to configure TCP/IP, DNS, and WINS settings. Enabling this policy allows users to open the Advanced TCP/IP Settings Properties page and modify IP settings.

A.1.6 System

User Configuration\Administrative Templates\System
Don't display welcome screen at logon

If you enable this policy, the "Getting Started with Windows 2000" welcome screen is hidden from users. Users can access this screen from the Start menu. Note that this policy appears in both the Computer Configuration and User Configuration folders, but the Computer Configuration folder takes precedence.

Century interpretation for Year 2000

Controls how two-digit years are interpreted by programs. Two-digit numbers greater than the number you specify (the default number is 29) are preceded by 19, and two-digit numbers less than the number specified are preceded by 20.

Code signing for device drivers

Controls what happens when a user tries to install device driver files that aren't digitally signed. You can set up the least secure response permitted on the system with this policy. After you enable this policy, you can use the drop-down box to specify the desired response: either Ignore, Warn, or Block.

Custom user interface

Controls the user interface for the system. With this policy, you can enable a user interface other than the default Windows interface.

Disable the command prompt

If you enable this policy, users can't run the interactive command prompt, Cmd.exe or run batch files (.cmd and .bat) on their computers. Keep in mind that you don't want to disable batch files if your system uses logon, logoff, startup, or shutdown batch file scripts, or if you have users that use Terminal Services.

Disable registry editing tools

Enabling this policy disables the Windows registry editors, Regedt32.exe and Regedit.exe. See the "Run only allowed Windows" applications policy for more information.

Run only allowed Windows applications

If you enable this policy, you can control and limit the programs users run that are started by the Windows Explorer process by creating a List of Allowed Applications. After you enable this policy, the system allow users to run only programs you have entered from your approved list.

Don't run specified Windows applications

If you enable this policy, you can prevent users from running programs that are started by the Windows Explorer process by creating a List of Allowed Applications. After you enable this policy, the system allows users to run only programs you have entered from your approved list.

Disable Autoplay

Enabling this feature disables Autoplay. As a result, setup files for programs and the music on audio media don't start immediately; users have to start the setup files themselves. Note that this policy appears in both the Computer Configuration and User Configuration folders, but the Computer Configuration folder takes precedence.

Download missing COM components

If you enable this policy, your system searches the Active Directory for all missing Component Object Model (COM) components a program requires. Enabling this policy may cause programs to start or run slower, but the programs won't suffer impaired functionality or stop functioning as a result of missing COM components.

A.1.6.1 Logon/Logoff
User Configuration\Administrative Templates\System\Logon/Logoff
Disable Task Manager

Controls the Task Manager. If you enable this policy, users can't use the Task Manager. The Task Manager's many functions include allowing users to start and stop programs.

Disable Lock Computer

When you enable this policy, users can't lock the system.

Disable Change Password

When you enable this policy, users can't change their passwords on demand. Users can still change their passwords when prompted by the system.

Disable Logoff

When you enable this policy, users can't log off the system using any method.

Run logon scripts synchronously

Enabling this policy ensures that logon script processing is complete before the user starts working. If you enable this policy, the system waits for the logon scripts to finish running before it starts the Windows Explorer interface program and creates the desktop. Keep in mind that this policy can delay the appearance of the desktop.

Run legacy logon scripts hidden

Enabling this policy ensures that the instructions in logon scripts written for Windows NT 4.0 and earlier are hidden from users. By default, these scripts run in a command window. This policy is recommended for beginning users.

Run logon scripts visible

Enabling this policy ensures that the instructions in logon scripts written for Windows NT 4.0 and earlier run in a command window for users. This policy is recommended for advanced users.

Run logoff scripts visible

Enabling this policy ensures that logoff scripts run in a command window for users. This policy is recommended for advanced users.

Connect home directory to root of the share

Controls the definitions of the %HOMESHARE% and %HOMEPATH% environment variables. Enabling this policy ensures that the system uses the definitions for Windows NT. Disabling or not configuring this policy ensures that the system uses the definitions that come with Windows 2000.

Limit profile size

This policy allows you to determine the maximum size of a roaming user profile and the system's response when a roaming user profile reaches the maximum size. The maximum size of a roaming user profile is unlimited if you don't configure this policy.

Exclude directories in roaming profile

If you enable this policy, you can exclude folders normally included in the user's profile. The History, Local Settings, Temp, and Temporary Internet Files folders are excluded by default. Folders that you exclude aren't stored by the network server on which the profile resides and won't follow users to other computers.

Run these programs at user logon

Enabling this policy allows you to choose additional programs or documents that Windows 2000 starts automatically when a user logs on to the system. Note that this policy appears in both the Computer Configuration and User Configuration folders and, if both are configured, the Computer Configuration programs and documents starts first.

Disable the run once list

The system ignores the run-once list if you enable this policy. Note that this policy appears in both the Computer Configuration and User Configuration folders, but the Computer Configuration folder takes precedence.

Disable legacy run list

When you enable this policy, the system ignores any customized run lists for Windows NT 4.0 and earlier. Thus, the items on these legacy lists aren't started automatically by the system.

A.1.6.2 Group Policy
User Configuration\Administrative Templates\System\Group Policy
Group Policy refresh interval for users

Controls the background update rate for Group Policies in the User Configuration folder. Enabling this policy allows you to change the update rate from the default, which is an update in the background every 90 minutes, with a random offset of to 30 minutes.

Group Policy slow link detection

Enabling this policy allows you to define a slow connection for purposes of applying and updating Group Policy for your system. Connection speed is determined by the rate at which data is transferred from the domain controller providing a policy update to the computers in the group. After you define the slow connection speed, the system interprets a slow connection as one that exceeds your specification.

Group Policy domain controller selection

Enabling this policy allows you to choose which domain controller the Group Policy snap-in uses. You can choose from three options: Use the Primary Domain Controller, Inherit from the Active Directory Snap-ins, or Use any available domain controller. The Group Policy snap-in uses the domain controller designated as the PDC Operations Master for the domain by default if you disable or don't configure this policy.

Create new Group Policy object links disabled by default

This policy creates new Group Policy object links in the disabled state. You can then configure and test the new object links. If the links pass your testing, you can enable them to use on the system.

Enforce Show Policies Only

This policy stops administrators from viewing or using Group Policy preferences. Enabling this policy ensures that Group Policy displays only true policies; preferences aren't displayed.

Disable automatic update of ADM files

Controls the systems' ability to update the Administrative Templates source files automatically when you open Group Policy. If you enable this policy, you have to update the .adm files manually, because the system loads the .adm files you used the last time you ran Group Policy.

    Team LiB   Previous Section   Next Section