B.2 Administrative Templates
Computer Configuration\Administrative Templates
B.2.1 Windows Components
Computer Configuration\Administrative Templates\Windows Components
B.2.1.1 NetMeeting
Computer Configuration\Administrative Templates\Windows Components\NetMeeting
- Disable remote desktop sharing
If you enable this policy, users can't set up the remote
desktop sharing feature of NetMeeting. Thus, they also can't
use it to control their computers remotely.
B.2.1.2 Internet Explorer
Computer Configuration\Administrative Templates\Windows Components\Internet Explorer
- Security Zones: Use only machine settings
If you enable this policy, when a user makes changes to a security
zone, those changes apply to all users of that computer. If this
policy is disabled, each user can set up their own security zone
settings. A group of web sites with the same security level is a
security zone.
- Security Zones: Do not allow users to change policies
If you enable this policy, users can't change security zone
settings the administrator has set up. A group of web sites with the
same security level is a security zone.
- Security Zones: Do not allow users to add/delete sites
If you enable this policy, users can't add or remove sites from
security zones. A group of web sites with the same security level is
a security zone.
- Make proxy settings per-machine (rather than per user)
If you enable this policy, all users on a single computer can use the
same proxy settings. If this policy is disabled, users can set their
own proxy settings.
- Disable Automatic Install of Internet Explorer components
Enabling this policy ensures that Internet Explorer components
aren't automatically downloaded. This policy is recommended for
administrators who wish to control the components that are downloaded
onto their system.
- Disable Periodic Check of Internet Explorer software updates
Enabling this policy ensures that users aren't notified if
Microsoft Software Distribution Channel installs new components on
their computer. This policy allows administrators to utilize the
Software Distribution Channels to update their users' programs
without user intervention.
- Disable software update shell notifications on program launch
Enabling this policy ensures users can't download new version
of Internet Explorer components because they will not be
automatically downloaded. This policy allows administrators to have
version control across their system.
- Disable showing the splash screen
Enabling this policy ensures that the splash screen doesn't
appear for users on your system. The splash screen displays the
program name, licensing, and copyright information.
B.2.1.3 Task Scheduler
Computer Configuration\Administrative Templates\Windows Components\Task Scheduler
- Hide Property Pages
When this policy is enabled, users can't view or change the
properties of an existing task, which simplifies task creation for
beginning users. These properties may include the program the task
runs, details of its schedule, idle time and power management
settings, and its security context. Note that this policy appears in
both the Computer Configuration and User Configuration folders, but
the Computer Configuration folder takes precedence.
- Prevent Task Run or End
When this policy is enabled users can't start or stop tasks
manually. This means that users can't force tasks to end before
they are finished or start tasks manually. Note that this policy
appears in both the Computer Configuration and User Configuration
folders, but the Computer Configuration folder takes precedence.
- Disable drag-and-drop
When you enable this policy users can't use the drag-and-drop
method to move or copy programs in the Scheduled Tasks folder. This
policy removes Cut, Copy, Paste, and Paste shortcut items on the
context menu and the Edit menu in Scheduled Tasks. Note that this
policy appears in both the Computer Configuration and User
Configuration folders, but the Computer Configuration folder takes
precedence.
- Disable New Task Creation
When you enable this policy, users can't create new tasks. This
policy also prevents the system from responding when users try to
move, paste, or drag programs or documents into the Scheduled Tasks
folder. Note that this policy appears in both the Computer
Configuration and User Configuration folders but the Computer
Configuration folder takes precedence.
- Disable Task Deletion
When you enable this policy, users can't delete tasks from the
Scheduled Tasks folder. Additionally, the system doesn't
respond if users try to cut or drag a task from the Scheduled Tasks
folder. Note that this policy appears in both the Computer
Configuration and User Configuration folders, but the Computer
Configuration folder takes precedence.
- Disable Advanced Menu
When this policy is enabled, users can't view or change the
properties of newly created tasks, which simplifies task creation for
beginning users. These properties may include the program the task
runs, details of its schedule, idle time and power management
settings, and its security context. Note that this policy appears in
both the Computer Configuration and User Configuration folders, but
the Computer Configuration folder takes precedence.
- Prohibit Browse
When this policy is enabled, users' newly scheduled tasks are
limited to items on the user's Start menu, and users
can't change the scheduled program for existing tasks. Note
that this policy appears in both the Computer Configuration and User
Configuration folders, but the Computer Configuration folder takes
precedence.
B.2.1.4 Windows Installer
Computer Configuration\Administrative Templates\Windows Components\Windows Installer
- Disable Windows Installer
If you enable this policy, Windows Installer is disabled or
restricted. You can use this policy to set up one of three
installation policies: Never, For non-managed apps only, or Always.
- Always install with elevated privileges
Enabling this program directs Windows Installer to use system
permissions when it installs any program on the system. This allows a
user to install programs that require access to directories the user
might not have permission to view or change. Note that this policy
appears in both the Computer Configuration and User Configuration
folders; the policy must be enabled in both folders to make the
policy effective.
- Disable rollback
When this policy is enabled, Windows Installer doesn't generate
and save the files it needs to reverse an interrupted or unsuccessful
installation; it is unable to record the original state of the
computer. This policy reduces the amount of temporary disk space
required to install programs.
- Disable browse dialog box for new source
If you enable this policy, users can't search for installation
files when they add features or components to an installed program.
Thus, users' only option is to choose an installation file
source from the Use features from list. This list is configured by
the system administrator.
- Disable patching
If you enable this policy, users can't install patches by using
Windows Installer. Patches are program updates or upgrades that
replace specific files.
- Disable IE security prompt for Windows Installer scripts
If you enable this policy, a user on your system isn't notified
when web-based programs install software the user's computer.
By default, when web-based programs install software, users are
warned and asked to select or refuse the installation.
- Enable user control over installs
Enabling this policy allows users to change installation options that
are usually available only to system administrators. Note that this
policy bypasses some Windows Installer security settings.
- Enable user to browse for source while elevated
Enabling this policy allows users to search for installation files
during privileged installations (installations with elevated
privileges). System administrators usually perform this task because
the default setting grants permission only to administrators.
- Enable user to use media source while elevated
If you enable this policy, users can use removable media, such as
floppy disks and CD-ROMs, to install programs during privileged
installations. System administrators usually perform this task
because the default setting grants permission only to administrators.
- Enable user to patch elevated products
If you enable this policy, users can upgrade programs during
privileged installations. System administrators usually perform this
task because the default setting grants permission only to
administrators.
- Allow admin to install from Terminal Services session
If you enable this policy, Terminal Services administrators can
install and configure programs remotely. This policy enhances only
the capabilities of system administrators; users can't install
and configure programs remotely.
- Cache transforms in secure location on workstation
Enabling this policy ensures that the transform file is saved in a
secure location on the user's computer. Usually transform files
are saved into the user profile. This policy protects larger
organizations that must safeguard transform files from unauthorized
editing.
- Logging
If you enable this policy, you can define which types of events the
Windows Installer record. The list of events can be typed in any
order and can include as many events as you choose.
B.2.2 System
Computer Configuration\Administrative Templates\System
- Remove security option from Start menu (Terminal Services only)
If you enable this policy, the Windows Security item is removed from
the Settings menu on a Terminal Services client. This policy ensures
that users don't log on to Terminal Services inadvertently.
- Remove Disconnect item from Start menu (Terminal Services only)
If you enable this policy, the Disconnect item is removed from the
Shut Down Windows dialog box on Terminal Services clients. This
prevents Terminal Services users from disconnecting their client from
a Terminal Services server using this method.
- Disable Boot/Shutdown/Logon/Logoff status messages
If you enable this policy, status messages -- such as the
messages that remind users to wait while their system starts --
aren't displayed.
- Verbose vs normal status messages
If you enable this policy, highly detailed status messages --
messages that include each step in a process -- are displayed to
users.
- Disable Autoplay
Enabling this feature disables Autoplay. As a result, setup files for
programs and the music on audio media don't start immediately;
users have to start the setup files themselves. Note that this policy
appears in both the Computer Configuration and User Configuration
folders, but the Computer Configuration folder takes precedence.
- Don't display welcome screen at logon
If you enable this policy, the Getting Started with Windows 2000
welcome screen is hidden from users. Users can access this screen
from the Start menu. This policy appears in both the Computer
Configuration and User Configuration folders, but the Computer
Configuration folder takes precedence.
- Run these programs at user logon
Enabling this policy allows you to specify additional programs or
documents that Windows 2000 starts automatically when a user logs on
to the system. You will have to specify the fully qualified path to
each file you wish to use. This policy can be set in the Computer
Configuration and User Configuration folders; the Computer
Configuration folder overrides the User Configuration folder setting.
- Disable the run once list
If you enable this policy, the computer ignores the customized
run-once list, which details additional programs and documents that
are started automatically the next time the system starts. The run
once list isn't started the next time the system runs. This
policy can be set in the Computer Configuration and User
Configuration folders; the Computer Configuration folder overrides
the User Configuration folder setting.
- Disable legacy run list
If you enable this policy, the computer ignores the legacy run list,
a customized list of additional programs and documents that the
system starts automatically on startup. This policy can be set in the
Computer Configuration and User Configuration folders; the Computer
Configuration folder overrides the User Configuration folder setting.
- Do not automatically encrypt files moved to encrypted folders
If you enable this policy, Windows Explorer doesn't encrypt
files that are moved to an encrypted folder. Note that this policy
applies only to files moved within a volume.
- Download missing COM components
If you enable this policy, your system searches the Active Directory
for the missing Component Object Model (COM) components a program
requires. Enabling this policy might cause programs to start or run
slower, but the programs don't suffer from impaired
functionality or stop functioning as a result of missing COM
components.
B.2.2.1 Logon
Computer Configuration\Administrative Templates\System\Logon
- Run logon scripts synchronously
Enabling this policy ensures that logon script processing is complete
before the user starts working. If you enable this policy, the system
waits for the logon scripts to finish running before it starts the
Windows Explorer interface program and creates the desktop. Keep in
mind that this policy can delay the appearance of the desktop.
- Run startup scripts asynchronously
If you enable this policy, the startup scripts' (which are
batch files) run simultaneously before the user is invited to log on
to the system.
- Run startup scripts visible
If you enable this policy, the startup scripts' (which are
batch files) instructions appear in a command window so that users
can view them. This setting is recommended for advanced users only.
- Run shutdown scripts visible
If you enable this policy, the shutdown scripts' (which are
batch files) instructions appear in a command window so that users
can view them. This setting is recommended for advanced users only.
- Maximum wait time for Group Policy scripts
If you enable this policy, you can set the total time the system
allows for all logon, startup, and shutdown scripts applied by Group
Policy to finish running. The default setting lets scripts run for a
total of 10 minutes.
- Delete cached copies of roaming profiles
If you enable this policy, the system doesn't save a copy of a
user's roaming profile on the local computer's hard drive
when the user logs off. Be aware that you don't want to use
this policy if you are using the slow link detection feature of
Windows 2000; that feature requires local copies of users'
roaming profiles.
- Do not detect slow network connections
If you enable this policy, the slow link detection feature is
disabled. This feature measures the speed of the connection between a
user's computer and the remote server that stores the roaming
user profile. Enabling this feature disables any system responses to
a slow connection.
- Slow network connection timeout for user profiles
Enabling this policy allows you to set a threshold for slow
connections for roaming user profiles. Note that if the "Do not
detect slow network connections" policy is enabled it, this
policy has no effect.
- Wait for remote user profile
If you enable this policy, the system waits for the remote copy of
the roaming user profile to load, regardless of how long loading
takes. If you don't enable this policy, the system loads the
local copy of the roaming user profile when loading is slow.
- Prompt user when slow link is detected
Enabling this policy allows users to choose between two options when
loading is slow: using a local copy of their user profile or waiting
for the roaming user profile. If you don't enable this policy,
the local copy of the user profile is loaded automatically.
- Timeout for dialog boxes
This policy allows you to specify how long the system should wait for
a user response to a dialog box before the system uses a default
value. The system's default time is 30 seconds.
- Log users off when roaming profile fails
If you enable this policy, users are automatically logged off if the
system can't load their roaming user profile. This policy goes
into effect if the system can't find the roaming user profile,
or if the profile has errors.
- Maximum retries to unload and update user profile
This policy allows you to specify how many times the system tries to
unload and update the Registry portion of a user's profile. The
system's default number of retries is 60. Setting the number to
tells the system to try only once. This policy should be used with
Terminal Services.
B.2.2.2 Disk Quotas
Computer Configuration\Administrative Templates\System\Disk Quotas
- Enable disk quotas
Enabling this policy provides disk quota management on all NTFS
volumes of the computer. Administrators can't change this
setting if you enable the Enable disk quotas policy.
- Enforce disk quota limit
Enabling this policy ensures that users' disk quota limits are
enforced. The system responds as though the physical space on the
volume were exhausted when a user reaches his or her disk quota
limit. User settings that enable or disable quota enforcement on
their volumes are superseded by this policy.
- Default quota limit and warning level
Enabling this policy allows you to set the default disk quota limit
and the warning level for new users of the volume. The disk space
users have at their disposal isn't limited if you don't
configure this policy, or if you disable it. User settings that
enable or disable quota enforcement on their volumes are superseded
by this policy.
- Log event when quota limit exceeded
This policy ensures that when users reach their disk quota limit on a
volume, an event is recorded in the Application log. If you
don't configure this policy, or if you disable it, the
user's disk quota status in the Quota Entries window changes,
but an event isn't recorded when the disk quota limit is met.
- Log event when quota warning level exceeded
This policy ensures that when users reach their disk quota warning
level on a volume, an event is recorded in the Application log. If
you don't configure this policy, or if you disable it, the
user's disk quota status in the Quota Entries window changes,
but an event isn't recorded when the disk quota warning level
is met.
- Apply policy to removable media
If you enable this policy, the disk quota policies in this folder
also applies to NTFS filesystem volumes on removable media. The disk
quota policies in this folder apply to fixed-media NTFS volumes only
if you don't configure this policy, or if you disable it.
B.2.2.3 DNS Client
Computer Configuration\Administrative Templates\System\DNS Client
- Primary DNS Suffix
Enabling this policy allows you to define primary Domain Name System
(DNS) suffix for all affected computers. This suffix is used in DNS
name registration and name resolution. If you enable this policy,
users and administrators can't change the suffix you choose.
B.2.2.4 Group Policy
Computer Configuration\Administrative Templates\System\Group Policy
- Disable background refresh of Group Policy
If you enable this policy, Group Policy isn't updated while the
computer is in use. When the user logs off, the system updates the
computer and user policies. If you disable it, updates can be applied
while users are working.
- Apply Group Policy for computers asynchronously during startup
If you enable this policy, the system can invite users to log on
before Group Policy updates complete. Thus, the Windows interface
could appear to be ready before computer Group Policy is applied.
- Apply Group Policy for users asynchronously during logon
If you enable this policy, the system can display the Windows desktop
before user Group Policy complete. Thus, the Windows interface can
appear to be ready before computer Group Policy is updated.
- Group Policy refresh interval for computers
Enabling this policy allows you to set how often the Group Policy is
updated on domain controllers while the computer is in use (the
update occurs in the background). This policy's updates occur
in addition to the updates that occur on system startup. The default
rate for updates is every five minutes.
- Group Policy refresh interval for domain controllers
Enabling this policy allows you to set how often the Group Policy for
computers updates while the computer is in use (the update occurs in
the background). This policy applies only to Group Policies in the
Computer Configuration folder. The default rate for updates is every
90 minutes, with a random offset of
to 30 minutes.
- User Group Policy loopback processing mode
Enabling this policy allows you to direct the system to apply the set
of Group Policy objects for the computer to any user who logs on to a
computer affected by this policy. This policy is designed for
computers used by many users, such as computers in libraries,
classrooms, and so on.
- Group Policy slow link detection
Enabling this policy allows you to define a slow connection for
purposes of applying and updating Group Policy for your system.
Connection speed is determined by the rate at which data is
transferred from the domain controller providing a policy update to
the computers in the group. After you define the slow connection
speed, the system interprets a slow connection as one that exceeds
your specification.
- Registry policy processing
Enabling this policy allows you to define when the policies in the
Administrative Templates folder and any other policies that store
values in the Registry are updated. This policy lets you select or
ignore two options: Do not apply during periodic background
processing and Process even if the Group Policy objects have not
changed.
- Internet Explorer Maintenance policy processing
Enabling this policy allows you to define when disk quota policies
are updated. This policy supersedes any customized settings the
Internet Explorer Maintenance policy set when it was installed. This
policy lets you select or ignore three options: Allow processing
across a slow network connection, Do not apply during periodic
background processing, and Process even if the Group Policy objects
have not changed.
- Software Installation policy processing
Enabling this policy allows you to define when software installation
polices are updated. This policy supersedes any customized settings
the program implementing the software installation policy set when it
was installed. This policy lets you select or ignore two options:
Allow processing across a slow network connection and Process even if
the Group Policy objects have not changed.
- Folder Redirection policy processing
Enabling this policy allows you to define when folder redirection
policies are updated. This policy lets you select or ignore two
options: Allow processing across a slow network connection and
Process even if the Group Policy objects have not changed.
- Scripts policy processing
Enabling this policy allows you to define when policies that assign
shared scripts are updated. This policy lets you select or ignore
three options: Allow processing across a slow network connection, Do
not apply during periodic background processing, and Process even if
the Group Policy objects have not changed.
- Security policy processing
Enabling this policy allows you to define when security policies are
updated. This policy lets you select or ignore three options: Allow
processing across a slow network connection, Do not apply during
periodic background processing, and Process even if the Group Policy
objects have not changed.
- IP Security policy processing
Enabling this policy allows you to define when IP security polices
are updated. This policy lets you select or ignore three options:
Allow processing across a slow network connection, Do not apply
during periodic background processing, and Process even if the Group
Policy objects have not changed.
- EFS recovery policy processing
Enabling this policy allows you to define when encryption polices are
updated. This policy lets you select or ignore three options: Allow
processing across a slow network connection, Do not apply during
periodic background processing, and Process even if the Group Policy
objects have not changed.
- Disk Quota policy processing
Enabling this policy allows you to define when disk quota policies
are updated. This policy lets you select or ignore three options:
Allow processing across a slow network connection, Do not apply
during periodic background processing, and Process even if the Group
Policy objects have not changed.
B.2.2.5 Windows File Protection
Computer Configuration\Administrative Templates\System\Windows File Protection
- Set Windows File Protection scanning
Enabling this policy ensures that Windows File Protection enumerate
and scan all system files for changes. This policy allows you to set
up Windows File Protection to scan files more often. Files are
scanned only during setup by default.
- Hide the file scan progress window
Enabling this policy ensures that the file scan progress window is
hidden to users. This policy is recommended for organizations with
beginning users; they are sometimes confused by this window.
- Limit Windows File Protection cache size
You can use this policy to define the maximum amount of disk space
the Windows File Protection file cache uses. You can select
4294967295 as the maximum amount of disk space if you wish to have an
unlimited cache size.
- Specify Windows File Protection cache location
You can use this policy to set up a location for the Windows File
Protection cache that is different than the default. The default
location is in the Systemroot\System32\Dllcache directory.
B.2.3 Network
Computer Configuration\Administrative Templates\Network
B.2.3.1 Offline Files
Computer Configuration\Administrative Templates\Network\Offline files
- Enabled
Controls whether the Offline Files feature is enabled or disabled.
Once the Offline Files feature is set, users can't change
whether the feature is enabled or disabled.
- Disable user configuration of Offline Files
This feature locks down the configuration you establish because it
prevents users from disabling, enabling, or changing the
configuration of the offline files.
- Synchronize all offline files before logging off
Controls whether offline files are fully synchronized or quickly
synchronized each night. If you don't configure this policy,
the system performs a quick synchronization by default, and users can
change this setting.
- Default cache size
Allows you to set the percentage of disk space that can store
automatically cached offline files. If you don't set this
policy, by default the system limits the space that automatically
cached files occupy to 10%.
- Action on server disconnect
Allows you to determine whether or not a network computer has access
to network files if the computer is disconnected from the server. You
can use the Action box to set the number of computers this policy
applies to.
- Non-default server disconnect actions
Controls how specific computers respond when they are disconnected
from particular offline file servers. This policy supersedes the
Action on server disconnect policy. Also, this policy can be set in
the Computer Configuration and User Configuration folders; the
Computer Configuration folder overrides the User Configuration folder
setting.
- Disable "Make Available Offline"
Enabling this policy ensures that users can't make network
files and folders available offline. Be aware that this policy
doesn't prevent the system from saving local copies of files
that reside on network shares designated for automatic caching. This
policy appears in both the Computer Configuration and User
Configuration folders; the Computer Configuration folder takes
precedence.
- Prevent use of Offline Files folder
Enabling this policy disables the Offline Files folder, and users
can't view or open copies of network files stored on their
computer via the Offline Files Folder. This policy appears in both
the Computer Configuration and User Configuration folders; the
Computer Configuration folder takes precedence.
- Files not cached
Enabling this policy allows you to list the types of files that
can't be used offline and exclude certain types of files from
automatic and manual caching for offline use. This policy ensures
that files that can't be separated, such as database
components, are safe.
- Administratively assigned offline files
Enabling this policy allows you to list the types of network files
and folders that are always available for offline use. Also, users
can access the specified files and folders offline. This policy
appears in both the Computer Configuration and User Configuration
folders; the Computer Configuration folder takes precedence.
- Disable reminder balloons
Enabling this policy removes reminder balloons, which are enabled by
default if offline files are enabled. This policy appears in both the
Computer Configuration and User Configuration folders; the Computer
Configuration folder takes precedence.
- Reminder balloon frequency
Enabling this policy allows you to specify how often reminder balloon
updates appear. This policy allows you to change the update interval
for reminders. This policy appears in both the Computer Configuration
and User Configuration folders; the Computer Configuration folder
takes precedence.
- Initial reminder balloon lifetime
Enabling this policy allows you to specify how long the first
reminder balloon for a network status change is displayed. The first
reminder is 30 seconds long by default. This policy appears in both
the Computer Configuration and User Configuration folders; the
Computer Configuration folder takes precedence.
- Reminder balloon lifetime
Enabling this policy allows you to change the duration of the update
reminder from the default of 30 seconds for the first reminder and 15
seconds thereafter. This policy appears in both the Computer
Configuration and User Configuration folders; the Computer
Configuration folder takes precedence.
- At logoff, delete local copy of user's offline files
If you enable this policy, local copies of the user's offline
files are deleted when the user logs off. Be aware that files
aren't synchronized before they're deleted. Changes to
local files since the last synchronization are lost as a result.
- Event logging level
Enabling this policy allows you to specify which events are recorded
in the event log by the Offline Files feature. This policy allows you
to add events to those recorded by default. Offline Files records an
event only when the offline files storage cache is corrupted by
default. This policy appears in both the Computer Configuration and
User Configuration folders; the Computer Configuration folder takes
precedence.
- Subfolders always available offline
Enabling this policy ensures that subfolders are always available
offline when their parent folder is made available offline. When you
make a folder available offline, this policy makes all folders within
that folder available offline. New folders that you create within a
folder that is available offline are available offline after the
parent folder is synchronized.
B.2.3.2 Network & Dial-Up Connections
Computer Configuration\Administrative Templates\Network\Network & Dial-up Connections
- Allow configuration of connection sharing
This policy determines whether administrators and power users can
enable, disable, and configure the Internet Connection Sharing
feature of a dial-up connection. Users can configure their system as
an Internet gateway for a small network through Internet Connection
Sharing. This policy appears in both the Computer Configuration and
User Configuration folders; the Computer Configuration folder takes
precedence.
B.2.4 Printers
Computer Configuration\Administrative Templates\Printers
- Allow printers to be published
Controls whether or not the computer's shared printers can be
published in the Active Directory. Enabling or not configuring the
policy ensures that users have this capability.
- Automatically publish new printers in Active Directory
Controls whether or not the Add Printer wizard publishes the
computer's shared printers automatically in the Active
Directory. Enabling or not configuring the policy ensures that users
have this capability.
- Allow pruning of published printers
Controls whether or not the domain controller can prune the printers
published by this computer. Enabling or not configuring the policy
ensures the domain controller prunes, or deletes, this
computer's printers if there is no response from the computer.
- Printer browsing
Allows you to announce the presence of shared printers to print
browse master servers for the domain. When you enable this policy,
shared printers appear in the domain list in the Browse for Printer
dialog box of the Add Printer wizard.
- Prune printers that are not automatically republished
Controls whether or not printers that aren't automatically
republished are pruned (deleted from the Active Directory). Note that
this policy doesn't apply to printers published by using
Printers in Control Panel. It does apply to printers that run
operating systems other than Windows 2000 and to Windows 2000
printers that are published outside of their domain.
- Directory pruning interval
Controls when the pruning service on a domain controller contacts
computers to verify that their printers are operational. The domain
controller contacts computers every eight hours by default. By
enabling this policy, you can change the number of hours in between
contacts.
- Directory pruning retry
Allows you to choose how many times the domain controller contacts a
computers to verify that their printers are operational before it
prunes the computer.
- Directory pruning priority
Controls the pruning thread's priority. The pruning thread
actually deletes printer objects from the Active Directory if the
printer that published the object doesn't respond to contact
attempts. Adjusting the pruning thread priority can improve the
performance of this service.
- Check published state
Ensures that the system periodically verifies that the printers
published by this computer still appear in the Active Directory. You
can also determine how often the system repeats the verification
through this policy.
- Web-based printing
Controls Internet printing on the server. Internet printing lets you
display printers on web pages. As a result, printers can be viewed,
managed, and used across the Internet or an intranet. Internet
printing is supported by default and remains supported if you enable
or don't configure this policy.
- Custom support URL in the Printers folder's left pane
Allows you to add a customized web page link to the Printers folder.
The web link you include can be tailored to best suit your
organization. Default links include a Microsoft web link and a link
to the printer vendor.
- Computer location
Controls the default location criteria the system uses when
it's searching for printers. You must enable Location Tracking
to use this policy, as the Computer Location policy is a component of
the Location Tracking feature of Windows 2000 printers.
- Prepopulate printer search location text
Controls the Location Tracking feature of Windows 2000 printers.
Enabling this policy ensures that the Location Tracking feature of
Windows 2000 printers is enabled.
|