Network security: LAN Manager authentication level
|
Send NTLMv2 response only
|
Send NTLMv2 response only. Refuse LM & NTLM
|
Network Security: Restrict NTLM: Audit NTLM authentication in this domain
|
Not defined
|
Not Defined
|
Network Security: Restrict NTLM: Incoming NTLM traffic
|
Not defined
|
Not Defined
|
Interactive logon: Require smart card
|
Not Defined
|
Not Defined
|
Network Security: Restrict NTLM: Add remote server exceptions for NTLM authentication
|
Not defined
|
Not Defined
|
Network security: Allow LocalSystem NULL session fallback
|
Not defined
|
Disabled
|
Microsoft network client: Send unencrypted password to third-party SMB servers
|
Disabled
|
Disabled
|
Network security: Allow Local System to use computer identity for NTLM
|
Disabled
|
Enabled
|
Network security: Do not store LAN Manager hash value on next password change
|
Enabled
|
Enabled
|
Network Security: Allow PKU2U authentication requests to this computer to use online identities
|
Not Defined
|
Not Defined
|
Network security: Minimum session security for NTLM SSP based (including secure RPC) servers
|
Require 128-bit encryption
|
Require NTLMv2 session security,Require 128-bit encryption
|
Microsoft network server: Server SPN target name validation level
|
Not Defined
|
Not Defined
|
Interactive logon: Smart card removal behavior
|
No Action
|
Lock Workstation
|
Network security: Minimum session security for NTLM SSP based (including secure RPC) clients
|
Require 128-bit encryption
|
Require NTLMv2 session security,Require 128-bit encryption
|
Interactive logon: Number of previous logons to cache (in case domain controller is not available)
|
10 logons
|
4 logon(s)
|
Network Security: Restrict NTLM: NTLM authentication in this domain
|
Not defined
|
Not Defined
|
Network Security: Restrict NTLM: Outgoing NTLM traffic to remote servers
|
Not defined
|
Not Defined
|
Network access: Let Everyone permissions apply to anonymous users
|
Disabled
|
Disabled
|
Network Security: Restrict NTLM: Add server exceptions in this domain
|
Not defined
|
Not Defined
|
Network Security: Restrict NTLM: Audit Incoming NTLM Traffic
|
Not defined
|
Not Defined
|
Network access: Do not allow anonymous enumeration of SAM accounts and shares
|
Disabled
|
Enabled
|
Network access: Do not allow anonymous enumeration of SAM accounts
|
Enabled
|
Enabled
|
Shutdown: Clear virtual memory pagefile
|
Disabled
|
Disabled
|
Network access: Remotely accessible registry paths
|
System\CurrentControlSet\Control\ ProductOptionsSystem\ CurrentControlSet\Control\ Server Applications Software\Microsoft\ WindowsNT\CurrentVersion
|
System\CurrentControlSet\Control\ ProductOptionsSystem\ CurrentControlSet\Control\ Server Applications Software\Microsoft\ WindowsNT\CurrentVersion
|
Network access: Shares that can be accessed anonymously
|
Not defined
|
Not Defined
|
Turn off the "Publish to Web" task for files and folders
|
Not configured
|
Not Configured
|
Shutdown: Allow system to be shut down without having to log on
|
Disabled
|
Disabled
|
System objects: Require case insensitivity for non-Windows subsystems
|
Enabled
|
Enabled
|
Network access: Sharing and security model for local accounts
|
Classic - local users authenticate as themselves
|
Classic - local users authenticate as themselves
|
Interactive logon: Do not require CTRL+ALT+DEL
|
Enabled
|
Disabled
|
Devices: Allowed to format and eject removable media
|
Administrators
|
Administrators
|
Turn off the Windows Messenger Customer Experience Improvement Program
|
Not configured
|
Not Configured
|
System settings: Use Certificate Rules on Windows Executables for Software Restriction Policies
|
Disabled
|
Disabled
|
Turn off Search Companion content file updates
|
Not configured
|
Not Configured
|
Network access: Allow anonymous SID/Name translation
|
Disabled
|
Disabled
|
Network access: Remotely accessible registry paths and sub-paths
|
System\CurrentControlSet\Control\Print\ PrintersSystem\CurrentControlSet\Services\ Eventlog, Software\Microsoft\OLAP ServerSoftware\ Microsoft\Windows NT\CurrentVersion\Print Software\ Microsoft\WindowsNT\CurrentVersion\ Windows System\CurrentControlSet\Control\ ContentIndexSystem\CurrentControlSet\ Control\Terminal ServerSystem\ CurrentControlSet\Control\Terminal Server\ UserConfigSystem\CurrentControlSet\ Control\Terminal Server\ DefaultUserConfigurationSoftware\ Microsoft\Windows NT\CurrentVersion\PerflibSystem\ CurrentControlSet\Services\SysmonLog
|
System\CurrentControlSet\Control\Print\ PrintersSystem\CurrentControlSet\Services\ Eventlog, Software\Microsoft\OLAP ServerSoftware\ Microsoft\Windows NT\CurrentVersion\Print Software\ Microsoft\WindowsNT\CurrentVersion\ Windows System\CurrentControlSet\Control\ ContentIndexSystem\CurrentControlSet\ Control\Terminal ServerSystem\ CurrentControlSet\Control\Terminal Server\ UserConfigSystem\CurrentControlSet\ Control\Terminal Server\ DefaultUserConfigurationSoftware\ Microsoft\Windows NT\CurrentVersion\PerflibSystem\ CurrentControlSet\Services\SysmonLog
|
Recovery console: Allow automatic administrative logon
|
Disabled
|
Disabled
|
Turn off Autoplay
|
Disabled
|
Enabled
|
Turn off Windows Update device driver searching
|
Not configured
|
Not Configured
|
Network access: Restrict anonymous access to Named Pipes and Shares
|
Enabled
|
Enabled
|
Recovery console: Allow floppy copy and access to all drives and all folders
|
Disabled
|
Disabled
|
Network access: Named Pipes that can be accessed anonymously
|
Not defined
|
Not Defined
|
Audit Policy: System: IPsec Driver
|
No auditing
|
Success and Failure
|
Audit Policy: System: Security System Extension
|
No auditing
|
Success and Failure
|
Audit Policy: Account Management: Security Group Management
|
Success
|
Success and Failure
|
Audit: Force audit policy subcategory settings (Windows Vista or later) to override audit policy category settings
|
None
|
Enabled
|
Audit Policy: Account Management: Other Account Management Events
|
No auditing
|
Success and Failure
|
Audit Policy: System: Security State Change
|
Success
|
Success and Failure
|
Audit Policy: Detailed Tracking: Process Creation
|
No auditing
|
Success
|
Audit Policy: System: Other System Events
|
Success and Failure
|
Success and Failure
|
Audit Policy: Logon-Logoff: Account Lockout
|
Success
|
Success
|
Audit Policy: Policy Change: Audit Policy Change
|
Success
|
Success and Failure
|
Audit: Audit the access of global system objects
|
Not defined
|
Not Defined
|
Audit Policy: Logon-Logoff: Special Logon
|
Success
|
Success
|
Audit Policy: Account Management: User Account Management
|
Success
|
Success and Failure
|
Audit Policy: Account Logon: Credential Validation
|
Success
|
Success and Failure
|
Audit Policy: Logon-Logoff: Logon
|
Success
|
Success and Failure
|
Audit Policy: Account Management: Computer Account Management
|
Success
|
Success
|
Audit Policy: Privilege Use: Sensitive Privilege Use
|
Success
|
Success and Failure
|
Audit Policy: Logon-Logoff: Logoff
|
Success
|
Success
|
Audit Policy: Policy Change: Authentication Policy Change
|
Success
|
Success
|
Audit: Audit the use of Backup and Restore privilege
|
Not defined
|
Not Defined
|
Audit Policy: System: System Integrity
|
Success and Failure
|
Success and Failure
|
Turn off toast notifications on the lock screen
|
Disabled
|
Enabled
|
Microsoft network server: Amount of idle time required before suspending session
|
15 minutes
|
15 minute(s)
|
Interactive logon: Message text for users attempting to log on
|
Not defined
|
Not Defined
|
Interactive logon: Machine inactivity limit
|
0 seconds
|
900 seconds
|
Microsoft network server: Disconnect clients when logon hours expire
|
Enabled
|
Enabled
|
Interactive logon: Message title for users attempting to log on
|
Not defined
|
Not Defined
|
Network security: Force logoff when logon hours expire
|
Enabled
|
Enabled
|
Sign-in last interactive user automatically after a system-initiated restart
|
Enabled
|
Disabled
|
Interactive logon: Display user information when the session is locked
|
Not defined
|
Not Defined
|
Interactive logon: Do not display last user name
|
Disabled
|
Enabled
|
Interactive logon: Machine account lockout threshold
|
Not defined
|
10 invalid logon attempts
|
Allow Remote Shell Access
|
Not configured
|
Not Configured
|
Devices: Prevent users from installing printer drivers
|
Enabled
|
Enabled
|
Create global objects
|
Administrators, Service, Local Service, Network Service
|
Administrators, Service, Local Service, Network Service
|
Access this computer from the network
|
Everyone, Administrators, Users, Backup Operators
|
Administrators, Authenticated Users
|
Domain controller: Allow server operators to schedule tasks
|
Not defined
|
Not Defined
|
Modify an object label
|
No one
|
No One
|
Generate security audits
|
Local Service, Network Service
|
Local Service, Network Service
|
Increase scheduling priority
|
Windows Server 2016: Administrators
|
Windows Server 2016: Administrators
|
Force shutdown from a remote system
|
Administrators
|
Administrators
|
Allow log on through Remote Desktop Services
|
Administrators, Remote Desktop Users
|
Administrators
|
Change the system time
|
Local Service, Administrators
|
Local Service, Administrators
|
Add workstations to domain
|
Not defined (Authenticated Users for domain controllers)
|
Not Defined
|
Create a pagefile
|
Administrators
|
Administrators
|
Profile single process
|
Administrators
|
Administrators
|
Deny log on as a batch job
|
No one
|
Guests
|
Act as part of the operating system
|
No one
|
No One
|
Change the time zone
|
Local Service, Administrators
|
Local Service, Administrators
|
Synchronize directory service data
|
Not defined
|
Not Defined
|
Lock pages in memory
|
No one
|
No One
|
Access Credential Manager as a trusted caller
|
No one
|
No One
|
Create a token object
|
No one
|
No One
|
Debug programs
|
Administrators
|
Administrators
|
Deny log on as a service
|
No one
|
Guests
|
Deny access to this computer from the network
|
Guests
|
Guests, NT AUTHORITY\Local account and member of Administrators group
|
Back up files and directories
|
Administrators, Backup Operators
|
Administrators
|
Shut down the system
|
Administrators, Backup Operators, Users
|
Administrators
|
Deny log on locally
|
Guests
|
Guests
|
Replace a process level token
|
Local Service, Network Service
|
Local Service, Network Service
|
Modify firmware environment values
|
Administrators
|
Administrators
|
Allow log on locally
|
Guest, Administrators, Power Users, Users, Backup Operators
|
Administrators, Users
|
Restore files and directories
|
Administrators, Backup Operators
|
Administrators
|
Profile system performance
|
Administrators,NT Service\WdiServiceHost
|
Administrators,NT Service\WdiServiceHost
|
Log on as a batch job
|
Not defined
|
Not Defined
|
Perform volume maintenance tasks
|
Administrators
|
Administrators
|
Manage auditing and security log
|
Administrators
|
Administrators
|
Enable computer and user accounts to be trusted for delegation
|
No one
|
No One
|
Impersonate a client after authentication
|
Administrators, Service, Local Service, Network Service
|
Administrators, Service, Local Service, Network Service
|
Load and unload device drivers
|
Administrators
|
Administrators
|
Take ownership of files or other objects
|
Administrators
|
Administrators
|
Adjust memory quotas for a process
|
Local Service, Network Service, Administrators
|
Administrators, Local Service, Network Service
|
Log on as a service
|
Not defined
|
Not Defined
|
Create symbolic links
|
Administrators
|
Administrators
|
Create permanent shared objects
|
No one
|
No One
|
System cryptography: Force strong key protection for user keys stored on the computer
|
Not defined
|
Not Defined
|
Domain member: Require strong (Windows 2000 or later) session key
|
Enabled
|
Enabled
|
Windows Firewall: Domain: Allow unicast response
|
Yes
|
No
|
Windows Firewall: Domain: Apply local firewall rules
|
Yes
|
Yes (default)
|
Windows Firewall: Domain: Inbound connections
|
Block
|
Enabled
|
Windows Firewall: Private: Firewall state
|
On
|
On
|
Windows Firewall: Private: Apply local connection security rules
|
Yes
|
Yes (default)
|
Windows Firewall: Private: Allow unicast response
|
Yes
|
No
|
Windows Firewall: Public: Apply local firewall rules
|
Yes
|
Yes (default)
|
Windows Firewall: Public: Apply local connection security rules
|
Yes
|
Yes
|
Windows Firewall: Public: Firewall state
|
On
|
On
|
Windows Firewall: Private: Outbound connections
|
Allow
|
Allow (default)
|
Windows Firewall: Domain: Outbound connections
|
Allow
|
Allow (default)
|
Windows Firewall: Domain: Firewall state
|
On
|
On
|
Windows Firewall: Public: Allow unicast response
|
No
|
No
|
Windows Firewall: Public: Inbound connections
|
Block
|
Enabled
|
Windows Firewall: Domain: Apply local connection security rules
|
Yes
|
Yes (default)
|
Windows Firewall: Private: Display a notification
|
Yes
|
Yes (default)
|
Windows Firewall: Domain: Display a notification
|
Yes
|
Yes (default)
|
Windows Firewall: Public: Display a notification
|
Yes
|
Yes
|
Windows Firewall: Public: Outbound connections
|
Allow
|
Allow (default)
|
Windows Firewall: Private: Inbound connections
|
Block
|
Enabled
|
Windows Firewall: Private: Apply local firewall rules
|
Not defined
|
Yes (default)
|
Default Protections for Internet Explorer
|
Enabled
|
Enabled
|
Password protect the screen saver
|
Not Configured
|
Enabled
|
Local Poilcy User Account Control: Admin Approval Mode for the Built-in Administrator account |
Disabled
|
Disabled
|
Default Protections for Software
|
None
|
Enabled
|
User Account Control: Only elevate UIAccess applications that are installed in secure locations
|
Enabled
|
Enabled
|
Apply UAC restrictions to local accounts on network logons
|
None
|
Enabled
|
User Account Control: Behavior of the elevation prompt for administrators in Admin Approval Mode
|
Prompt for consent for non-Windows binaries
|
Prompt for consent on the secure desktop
|
User Account Control: Allow UIAccess applications to prompt for elevation without using the secure desktop
|
Disabled
|
Disabled
|
Local Policy User Account Control: Virtualize file and registry write failures to per-user locations |
None
|
Disabled
|
User Account Control: Switch to the secure desktop when prompting for elevation
|
Enabled
|
Enabled
|
User Account Control: Run all administrators in Admin Approval Mode
|
Enabled
|
Enabled
|
WDigest Authentication
|
Disabled
|
Disabled
|
User Account Control: Behavior of the elevation prompt for standard users
|
Prompt for credentials
|
Automatically deny elevation requests
|
System ASLR
|
None
|
Enabled
|
System DEP
|
Enabled
|
Enabled
|
System objects: Strengthen default permissions of internal system objects (e.g. Symbolic Links)
|
Enabled
|
Enabled
|
Enable screen saver
|
Enabling/disabling the screen saver is managed locally by the user.
|
Enabled
|
Force specific screen saver
|
Disabled
|
Enabled
|
Increase a process working set
|
Not Defined
|
Not Defined
|
User Account Control: Detect application installations and prompt for elevation
|
Disabled
|
Enabled
|
System SEHOP
|
Enabled: Application Opt-Out
|
Enabled
|
Network Security: Configure encryption types allowed for Kerberos
|
Not defined
|
Not Defined
|
Set client connection encryption level
|
Not configured
|
Not Configured
|
Microsoft network client: Digitally sign communications (if server agrees)
|
Enabled
|
Enabled
|
Domain controller: LDAP server signing requirements
|
Not defined
|
Not Defined
|
Network security: LDAP client signing requirements
|
Negotiate signing
|
Negotiate signing
|
Microsoft network client: Digitally sign communications (always)
|
Disabled
|
Enabled
|
Microsoft network server: Digitally sign communications (always)
|
Disabled
|
Enabled
|
Domain member: Digitally sign secure channel data (when possible)
|
Enabled
|
Enabled
|
Domain member: Digitally encrypt or sign secure channel data (always)
|
Enabled
|
Enabled
|
Microsoft network server: Digitally sign communications (if client agrees)
|
Disabled
|
Enabled
|
Domain member: Digitally encrypt secure channel data (when possible)
|
Enabled
|
Enabled
|
Application: Specify the maximum log file size (KB)
|
20480 KB
|
Enabled
|
Security: Specify the maximum log file size (KB)
|
20480 KB
|
Enabled
|
Setup: Specify the maximum log file size (KB)
|
20480 KB
|
Enabled
|
Audit: Shut down system immediately if unable to log security audits
|
Disabled
|
Disabled
|
Accounts: Limit local account use of blank passwords to console logon only
|
Enabled
|
Enabled
|
Domain controller: Refuse machine account password changes
|
Not defined
|
Not Defined
|
Domain member: Disable machine account password changes
|
Disabled
|
Disabled
|
Domain member: Maximum machine account password age
|
30 days
|
30 day(s)
|
Network access: Do not allow storage of passwords and credentials for network authentication
|
Not Defined
|
Not Defined
|
Interactive logon: Prompt user to change password before expiration
|
5 days
|
14 day(s)
|
Allow indexing of encrypted files
|
Disabled
|
Disabled
|
Accounts: Rename administrator account
|
Not Defined
|
Not Defined
|
Do not display network selection UI
|
Disabled
|
Enabled
|
Allow Microsoft accounts to be optional
|
Disabled
|
Enabled
|
Accounts: Administrator account status
|
Disabled
|
Not Defined
|
Accounts: Guest account status
|
Disabled
|
Disabled
|
Accounts: Rename guest account
|
Guest
|
Not Defined
|
Prevent enabling lock screen slide show
|
Disabled
|
Enabled
|
Prevent enabling lock screen camera
|
Disabled
|
Enabled
|
IRC Ports
|
Disabled
|
Disabled
|
Outgoing Email Port 25
|
Disabled
|
Disabled
|
Advanced Audit Policy Configuration - Account Logon: Audit Credential Validation
|
Success
|
Success and Failure
|
Administrative Templates (Computer): Always install with elevated privileges |
Disabled
|
Disabled
|
Advanced Audit Policy Configuration - Object Access: Audit Other Object Access Events |
No Auditing |
Success and Failure |
Administrative Templates (User) - Cloud Content: Do not suggest third-party content in Windows spotlight |
Disabled |
Enabled |
Administrative Templates (User) Cloud Content: Do not use diagnostic data for tailored experiences
|
Disabled |
Enabled |
Administrative Templates (User) Cloud Content: Turn off all Windows spotlight features
|
Disabled |
Enabled |
Administrative Templates (Computer): Allow input personalization
|
Enabled |
Disabled |
Administrative Templates (Computer): Allow Online Tips
|
Enabled |
Disabled |
Administrative Templates (Computer): Enable Structured Exception Handling Overwrite Protection (SEHOP)
|
Disabled for 32-bit processes |
Enabled |
Administrative Templates (Computer): Turn off multicast name resolution
|
Disabled |
Enabled |
Administrative Templates (Computer): Enable Font Providers
|
Enabled
Note
|
You can download the fonts that are included in Windows but not stored on your local, on demand, from an online font provider.
|
|
Disabled |
Administrative Templates (Computer): Enable insecure guest logons
|
Enabled
Note
|
The SMB client allows insecure guest logons.
|
|
Disabled |
Administrative Templates (Computer): Prohibit use of Internet Connection Sharing on your DNS domain network
|
Disabled
Note
|
All users can access the Mobile Hotspot.
|
|
Enabled |
Administrative Templates (Computer): Remote host allows delegation of non-exportable credentials
|
Disabled
|
Enabled |
Administrative Templates (Computer): Continue experiences on this device
|
The default behavior depends on the Windows edition.
|
Disabled |
Administrative Templates (Computer): Block user from showing account details on signin
|
Disabled
Note
|
You can choose to show the account details on the sign-in screen.
|
|
Enabled |
Administrative Templates (Computer): Turn off picture password sign-in
|
Disabled
Note
|
You can set up and use a picture password.
|
|
Enabled |
Administrative Templates (Computer): Untrusted Font Blocking
|
Windows Server 2016: Off
|
Windows Server 2016: Enabled
Note
|
Untrusted fonts and log events are blocked.
|
|
Administrative Templates (Computer): Allow network connectivity during connected standby (plugged in)
|
Enabled
Note
|
When plugged in, the network connectivity will be in standby mode.
|
|
Disabled
|
Administrative Templates (Computer): Turn off the advertising ID
|
Disabled
Note
|
You can choose whether the applications can use the advertising ID for experiences across all the applications.
|
|
Enabled
|
Administrative Templates (Computer): Allow a Windows app to share application data between users
|
Disabled
|
Disabled
|
Administrative Templates (Computer): Configure enhanced anti-spoofing
|
You can enable or disable enhanced anti-spoofing on supported devices.
|
Enabled
|
Administrative Templates (Computer): Allow Use of Camera
|
Enabled
Note
|
Camera devices are enabled.
|
|
Disabled
|
Administrative Templates (Computer): Turn off Microsoft consumer experiences
|
Disabled
Note
|
You will see suggestions from Microsoft, and notifications about your Microsoft account.
|
|
Enabled |
Administrative Templates (Computer): Require pin for pairing |
Disabled
Note
|
Personal Identification Number (PIN) is not required to pair with a wireless display device.
|
|
Enabled
|
Administrative Templates (Computer): Allow Telemetry |
Disabled
Note
|
You can configure the Telemetry level in settings.
|
|
Enabled: 0 - Security [Enterprise Only]
|
Administrative Templates (Computer): Configure Authenticated Proxy usage for the Connected User Experience and Telemetry service |
Disabled
Note
|
The Connected User Experience and Telemetry service sends data back to Microsoft, automatically, using an authenticated proxy.
|
|
Enabled
Note
|
Authenticated proxy is disabled.
|
|
Administrative Templates (Computer): Disable pre-release features or settings |
You can configure the Let Microsoft try features on this build option in Settings.
|
Disabled
|
Administrative Templates (Computer): Do not show feedback notifications |
Disabled
Note
|
In the Windows Feedback application, you will see notifications for feedback. You can configure the time duration to receive
feedback questions.
|
|
Enabled |
Administrative Templates (Computer): Toggle user control over Insider builds |
Enabled
Note
|
You can download and install Windows Preview software on your devices.
|
|
Disabled
|
Administrative Templates (Computer): System: Specify the maximum log file size (KB)
|
Disabled
Note
|
The default log size is 20,480 KB, the
local administrator can change this value using the
Log Properties dialog.
|
|
Enabled - 32,768 or greater
|
Administrative Templates (Computer): Allow Message Service Cloud Sync |
Enabled
|
Disabled
|
Administrative Templates (Computer): Block all consumer Microsoft account user authentication |
Disabled
|
Enabled
|
Administrative Templates (Computer): Prevent the usage of OneDrive for file storage |
Disabled
|
Enabled
|
Administrative Templates (Computer): Allow Cloud Search |
Enabled
Note
|
Cloud Search is enabled - it allows search and Cortana to search cloud sources like OneDrive and SharePoint.
|
|
Enabled
Note
|
Cloud Search is disabled.
|
|
Administrative Templates (Computer): Configure Watson events |
Enabled
Note
|
When a program or service crashes or fails, Watson events are sent to Microsoft, automatically.
|
|
Disabled
|
Administrative Templates (Computer): Scan removable drives |
Disabled
Note
|
Removable drives are not scanned during a full scan, but they can be scanned during the quick or custom scan.
|
|
Enabled
|
Administrative Templates (Computer):
Turn on e-mail scanning |
Disabled
Note
|
E-mail scanning by Windows Defender Antivirus is disabled.
|
|
Enabled
|
Administrative Templates (Computer): Configure Attack Surface Reduction rules |
Disabled
Note
|
ASR rules are not configured.
|
|
Enabled
|
Administrative Templates (Computer): Configure Attack Surface Reduction rules: Set the state for each ASR rule |
Disabled
Note
|
ASR rules are not configured.
|
|
Blocked
|
Administrative Templates (Computer) Prevent users and apps from accessing dangerous websites |
Disabled
Important
|
Users and applications are not blocked from connecting to dangerous domains.
|
|
Enabled: Block
|
Administrative Templates (Computer): Allow suggested apps in Windows Ink Workspace |
Enabled
Note
|
The suggested applicationss in the Windows Ink Workspace are allowed.
|
|
Disabled
|
Administrative Templates (Computer):
Allow Windows Ink Workspace |
Enabled
Note
|
The Windows Ink Workspace is permitted above the lock screen.
|
|
Enabled
Note
|
The access above lock is disabled.
|
|
Administrative Templates (Computer): Allow remote server management through WinRM |
Disabled
Note
|
The WinRM service does not respond to requests from a remote computer, regardless of the WinRM listeners configuration.
|
|
Disabled
|
Administrative Templates (Computer): Manage preview builds |
Disabled
Note
|
Preview builds are not installed on the device, until you configure it in: .
|
|
Enabled
Note
|
Preview builds are disabled.
|
|
Administrative Templates (Computer): Select when Preview Builds and Feature Updates are received |
Disabled
Note
|
Feature Updates will not be delayed when released by Microsoft.
|
|
Enabled - Semi-Annual Channel, 180 or more days. :
|
Advanced Audit Policy Configuration Audit Directory Service Access |
Success
|
Success and Failure
|
Administrative Templates (User) Turn off Help Experience Improvement Program |
Disabled
|
Enabled
|
Administrative Templates (User) Prevent users from sharing files within their profile |
Disabled
|
Enabled
|
Local Policy - Accounts: Block Microsoft accounts |
You can use Microsoft accounts with Windows. |
You cannot add or login with Microsoft accounts. |
Local Policy Network access: Do not allow storage of passwords and credentials for network authentication |
Disabled
|
Enabled
|
Local Policy Network access: Shares that can be accessed anonymously |
None
|
Blank
|
Local Policy Network security: Configure encryption types allowed for Kerberos |
-
RC4_HMAC_MD5
-
AES128_HMAC_SHA1
-
AES256_HMAC_SHA1
-
Future encryption types
References: 1
|
-
AES128_HMAC_SHA1
-
AES256_HMAC_SHA1
-
Future encryption types
|
Local Policy User Account Control: Admin Approval Mode for the Built-in Administrator account |
Disabled
|
Enabled
|
Local Policy
User Account Control: Behavior of the elevation prompt for standard users |
Prompt for credentials.
Note
|
When a functionality requires an elevation to higher level privilege, the system prompts you to enter the administrator credentials.
The higher level privilege is permitted if the credentials are valid.
|
|
The system denies the elevation to higher level privilege, automatically.
|
Local Policy
User Account Control: Detect application installations and prompt for elevation |
Disabled
|
Enabled
|
Local Policy User Account Control: Only elevate UIAccess applications that are installed in secure locations |
Enabled
|
Enabled
|
Local Policy User Account Control: Virtualize file and registry write failures to per-user locations |
Enabled.
Note
|
The system redirects the application write failures at run time to defined user locations, for both the file system and registry.
|
|
Enabled
|