Administrative Templates

Computer ConfigurationAdministrative Templates

Windows Components

Computer ConfigurationAdministrative TemplatesWindows Components

NetMeeting

Computer ConfigurationAdministrative TemplatesWindows ComponentsNetMeeting
Disable remote desktop sharing

If you enable this policy, users can’t set up the remote desktop sharing feature of NetMeeting. Thus, they also can’t use it to control their computers remotely.

Internet Explorer

Computer ConfigurationAdministrative TemplatesWindows ComponentsInternet Explorer
Security Zones: Use only machine settings

If you enable this policy, when a user makes changes to a security zone, those changes apply to all users of that computer. If this policy is disabled, each user can set up their own security zone settings. A group of web sites with the same security level is a security zone.

Security Zones: Do not allow users to change policies

If you enable this policy, users can’t change security zone settings the administrator has set up. A group of web sites with the same security level is a security zone.

Security Zones: Do not allow users to add/delete sites

If you enable this policy, users can’t add or remove sites from security zones. A group of web sites with the same security level is a security zone.

Make proxy settings per-machine (rather than per user)

If you enable this policy, all users on a single computer can use the same proxy settings. If this policy is disabled, users can set their own proxy settings.

Disable Automatic Install of Internet Explorer components

Enabling this policy ensures that Internet Explorer components aren’t automatically downloaded. This policy is recommended for administrators who wish to control the components that are downloaded onto their system.

Disable Periodic Check of Internet Explorer software updates

Enabling this policy ensures that users aren’t notified if Microsoft Software Distribution Channel installs new components on their computer. This policy allows administrators to utilize the Software Distribution Channels to update their users’ programs without user intervention.

Disable software update shell notifications on program launch

Enabling this policy ensures users can’t download new version of Internet Explorer components because they will not be automatically downloaded. This policy allows administrators to have version control across their system.

Disable showing the splash screen

Enabling this policy ensures that the splash screen doesn’t appear for users on your system. The splash screen displays the program name, licensing, and copyright information.

Task Scheduler

Computer ConfigurationAdministrative TemplatesWindows ComponentsTask Scheduler
Hide Property Pages

When this policy is enabled, users can’t view or change the properties of an existing task, which simplifies task creation for beginning users. These properties may include the program the task runs, details of its schedule, idle time and power management settings, and its security context. Note that this policy appears in both the Computer Configuration and User Configuration folders, but the Computer Configuration folder takes precedence.

Prevent Task Run or End

When this policy is enabled users can’t start or stop tasks manually. This means that users can’t force tasks to end before they are finished or start tasks manually. Note that this policy appears in both the Computer Configuration and User Configuration folders, but the Computer Configuration folder takes precedence.

Disable drag-and-drop

When you enable this policy users can’t use the drag-and-drop method to move or copy programs in the Scheduled Tasks folder. This policy removes Cut, Copy, Paste, and Paste shortcut items on the context menu and the Edit menu in Scheduled Tasks. Note that this policy appears in both the Computer Configuration and User Configuration folders, but the Computer Configuration folder takes precedence.

Disable New Task Creation

When you enable this policy, users can’t create new tasks. This policy also prevents the system from responding when users try to move, paste, or drag programs or documents into the Scheduled Tasks folder. Note that this policy appears in both the Computer Configuration and User Configuration folders but the Computer Configuration folder takes precedence.

Disable Task Deletion

When you enable this policy, users can’t delete tasks from the Scheduled Tasks folder. Additionally, the system doesn’t respond if users try to cut or drag a task from the Scheduled Tasks folder. Note that this policy appears in both the Computer Configuration and User Configuration folders, but the Computer Configuration folder takes precedence.

Disable Advanced Menu

When this policy is enabled, users can’t view or change the properties of newly created tasks, which simplifies task creation for beginning users. These properties may include the program the task runs, details of its schedule, idle time and power management settings, and its security context. Note that this policy appears in both the Computer Configuration and User Configuration folders, but the Computer Configuration folder takes precedence.

Prohibit Browse

When this policy is enabled, users’ newly scheduled tasks are limited to items on the user’s Start menu, and users can’t change the scheduled program for existing tasks. Note that this policy appears in both the Computer Configuration and User Configuration folders, but the Computer Configuration folder takes precedence.

Windows Installer

Computer ConfigurationAdministrative TemplatesWindows ComponentsWindows Installer
Disable Windows Installer

If you enable this policy, Windows Installer is disabled or restricted. You can use this policy to set up one of three installation policies: Never, For non-managed apps only, or Always.

Always install with elevated privileges

Enabling this program directs Windows Installer to use system permissions when it installs any program on the system. This allows a user to install programs that require access to directories the user might not have permission to view or change. Note that this policy appears in both the Computer Configuration and User Configuration folders; the policy must be enabled in both folders to make the policy effective.

Disable rollback

When this policy is enabled, Windows Installer doesn’t generate and save the files it needs to reverse an interrupted or unsuccessful installation; it is unable to record the original state of the computer. This policy reduces the amount of temporary disk space required to install programs.

Disable browse dialog box for new source

If you enable this policy, users can’t search for installation files when they add features or components to an installed program. Thus, users’ only option is to choose an installation file source from the Use features from list. This list is configured by the system administrator.

Disable patching

If you enable this policy, users can’t install patches by using Windows Installer. Patches are program updates or upgrades that replace specific files.

Disable IE security prompt for Windows Installer scripts

If you enable this policy, a user on your system isn’t notified when web-based programs install software the user’s computer. By default, when web-based programs install software, users are warned and asked to select or refuse the installation.

Enable user control over installs

Enabling this policy allows users to change installation options that are usually available only to system administrators. Note that this policy bypasses some Windows Installer security settings.

Enable user to browse for source while elevated

Enabling this policy allows users to search for installation files during privileged installations (installations with elevated privileges). System administrators usually perform this task because the default setting grants permission only to administrators.

Enable user to use media source while elevated

If you enable this policy, users can use removable media, such as floppy disks and CD-ROMs, to install programs during privileged installations. System administrators usually perform this task because the default setting grants permission only to administrators.

Enable user to patch elevated products

If you enable this policy, users can upgrade programs during privileged installations. System administrators usually perform this task because the default setting grants permission only to administrators.

Allow admin to install from Terminal Services session

If you enable this policy, Terminal Services administrators can install and configure programs remotely. This policy enhances only the capabilities of system administrators; users can’t install and configure programs remotely.

Cache transforms in secure location on workstation

Enabling this policy ensures that the transform file is saved in a secure location on the user’s computer. Usually transform files are saved into the user profile. This policy protects larger organizations that must safeguard transform files from unauthorized editing.

Logging

If you enable this policy, you can define which types of events the Windows Installer record. The list of events can be typed in any order and can include as many events as you choose.

System

Computer ConfigurationAdministrative TemplatesSystem
Remove security option from Start menu (Terminal Services only)

If you enable this policy, the Windows Security item is removed from the Settings menu on a Terminal Services client. This policy ensures that users don’t log on to Terminal Services inadvertently.

Remove Disconnect item from Start menu (Terminal Services only)

If you enable this policy, the Disconnect item is removed from the Shut Down Windows dialog box on Terminal Services clients. This prevents Terminal Services users from disconnecting their client from a Terminal Services server using this method.

Disable Boot/Shutdown/Logon/Logoff status messages

If you enable this policy, status messages -- such as the messages that remind users to wait while their system starts -- aren’t displayed.

Verbose vs normal status messages

If you enable this policy, highly detailed status messages -- messages that include each step in a process -- are displayed to users.

Disable Autoplay

Enabling this feature disables Autoplay. As a result, setup files for programs and the music on audio media don’t start immediately; users have to start the setup files themselves. Note that this policy appears in both the Computer Configuration and User Configuration folders, but the Computer Configuration folder takes precedence.

Don’t display welcome screen at logon

If you enable this policy, the Getting Started with Windows 2000 welcome screen is hidden from users. Users can access this screen from the Start menu. This policy appears in both the Computer Configuration and User Configuration folders, but the Computer Configuration folder takes precedence.

Run these programs at user logon

Enabling this policy allows you to specify additional programs or documents that Windows 2000 starts automatically when a user logs on to the system. You will have to specify the fully qualified path to each file you wish to use. This policy can be set in the Computer Configuration and User Configuration folders; the Computer Configuration folder overrides the User Configuration folder setting.

Disable the run once list

If you enable this policy, the computer ignores the customized run-once list, which details additional programs and documents that are started automatically the next time the system starts. The run once list isn’t started the next time the system runs. This policy can be set in the Computer Configuration and User Configuration folders; the Computer Configuration folder overrides the User Configuration folder setting.

Disable legacy run list

If you enable this policy, the computer ignores the legacy run list, a customized list of additional programs and documents that the system starts automatically on startup. This policy can be set in the Computer Configuration and User Configuration folders; the Computer Configuration folder overrides the User Configuration folder setting.

Do not automatically encrypt files moved to encrypted folders

If you enable this policy, Windows Explorer doesn’t encrypt files that are moved to an encrypted folder. Note that this policy applies only to files moved within a volume.

Download missing COM components

If you enable this policy, your system searches the Active Directory for the missing Component Object Model (COM) components a program requires. Enabling this policy might cause programs to start or run slower, but the programs don’t suffer from impaired functionality or stop functioning as a result of missing COM components.

Logon

Computer ConfigurationAdministrative TemplatesSystemLogon
Run logon scripts synchronously

Enabling this policy ensures that logon script processing is complete before the user starts working. If you enable this policy, the system waits for the logon scripts to finish running before it starts the Windows Explorer interface program and creates the desktop. Keep in mind that this policy can delay the appearance of the desktop.

Run startup scripts asynchronously

If you enable this policy, the startup scripts’ (which are batch files) run simultaneously before the user is invited to log on to the system.

Run startup scripts visible

If you enable this policy, the startup scripts’ (which are batch files) instructions appear in a command window so that users can view them. This setting is recommended for advanced users only.

Run shutdown scripts visible

If you enable this policy, the shutdown scripts’ (which are batch files) instructions appear in a command window so that users can view them. This setting is recommended for advanced users only.

Maximum wait time for Group Policy scripts

If you enable this policy, you can set the total time the system allows for all logon, startup, and shutdown scripts applied by Group Policy to finish running. The default setting lets scripts run for a total of 10 minutes.

Delete cached copies of roaming profiles

If you enable this policy, the system doesn’t save a copy of a user’s roaming profile on the local computer’s hard drive when the user logs off. Be aware that you don’t want to use this policy if you are using the slow link detection feature of Windows 2000; that feature requires local copies of users’ roaming profiles.

Do not detect slow network connections

If you enable this policy, the slow link detection feature is disabled. This feature measures the speed of the connection between a user’s computer and the remote server that stores the roaming user profile. Enabling this feature disables any system responses to a slow connection.

Slow network connection timeout for user profiles

Enabling this policy allows you to set a threshold for slow connections for roaming user profiles. Note that if the “Do not detect slow network connections” policy is enabled it, this policy has no effect.

Wait for remote user profile

If you enable this policy, the system waits for the remote copy of the roaming user profile to load, regardless of how long loading takes. If you don’t enable this policy, the system loads the local copy of the roaming user profile when loading is slow.

Prompt user when slow link is detected

Enabling this policy allows users to choose between two options when loading is slow: using a local copy of their user profile or waiting for the roaming user profile. If you don’t enable this policy, the local copy of the user profile is loaded automatically.

Timeout for dialog boxes

This policy allows you to specify how long the system should wait for a user response to a dialog box before the system uses a default value. The system’s default time is 30 seconds.

Log users off when roaming profile fails

If you enable this policy, users are automatically logged off if the system can’t load their roaming user profile. This policy goes into effect if the system can’t find the roaming user profile, or if the profile has errors.

Maximum retries to unload and update user profile

This policy allows you to specify how many times the system tries to unload and update the Registry portion of a user’s profile. The system’s default number of retries is 60. Setting the number to tells the system to try only once. This policy should be used with Terminal Services.

Disk Quotas

Computer ConfigurationAdministrative TemplatesSystemDisk Quotas
Enable disk quotas

Enabling this policy provides disk quota management on all NTFS volumes of the computer. Administrators can’t change this setting if you enable the Enable disk quotas policy.

Enforce disk quota limit

Enabling this policy ensures that users’ disk quota limits are enforced. The system responds as though the physical space on the volume were exhausted when a user reaches his or her disk quota limit. User settings that enable or disable quota enforcement on their volumes are superseded by this policy.

Default quota limit and warning level

Enabling this policy allows you to set the default disk quota limit and the warning level for new users of the volume. The disk space users have at their disposal isn’t limited if you don’t configure this policy, or if you disable it. User settings that enable or disable quota enforcement on their volumes are superseded by this policy.

Log event when quota limit exceeded

This policy ensures that when users reach their disk quota limit on a volume, an event is recorded in the Application log. If you don’t configure this policy, or if you disable it, the user’s disk quota status in the Quota Entries window changes, but an event isn’t recorded when the disk quota limit is met.

Log event when quota warning level exceeded

This policy ensures that when users reach their disk quota warning level on a volume, an event is recorded in the Application log. If you don’t configure this policy, or if you disable it, the user’s disk quota status in the Quota Entries window changes, but an event isn’t recorded when the disk quota warning level is met.

Apply policy to removable media

If you enable this policy, the disk quota policies in this folder also applies to NTFS filesystem volumes on removable media. The disk quota policies in this folder apply to fixed-media NTFS volumes only if you don’t configure this policy, or if you disable it.

DNS Client

Computer ConfigurationAdministrative TemplatesSystemDNS Client
Primary DNS Suffix

Enabling this policy allows you to define primary Domain Name System (DNS) suffix for all affected computers. This suffix is used in DNS name registration and name resolution. If you enable this policy, users and administrators can’t change the suffix you choose.

Group Policy

Computer ConfigurationAdministrative TemplatesSystemGroup Policy
Disable background refresh of Group Policy

If you enable this policy, Group Policy isn’t updated while the computer is in use. When the user logs off, the system updates the computer and user policies. If you disable it, updates can be applied while users are working.

Apply Group Policy for computers asynchronously during startup

If you enable this policy, the system can invite users to log on before Group Policy updates complete. Thus, the Windows interface could appear to be ready before computer Group Policy is applied.

Apply Group Policy for users asynchronously during logon

If you enable this policy, the system can display the Windows desktop before user Group Policy complete. Thus, the Windows interface can appear to be ready before computer Group Policy is updated.

Group Policy refresh interval for computers

Enabling this policy allows you to set how often the Group Policy is updated on domain controllers while the computer is in use (the update occurs in the background). This policy’s updates occur in addition to the updates that occur on system startup. The default rate for updates is every five minutes.

Group Policy refresh interval for domain controllers

Enabling this policy allows you to set how often the Group Policy for computers updates while the computer is in use (the update occurs in the background). This policy applies only to Group Policies in the Computer Configuration folder. The default rate for updates is every 90 minutes, with a random offset of to 30 minutes.

User Group Policy loopback processing mode

Enabling this policy allows you to direct the system to apply the set of Group Policy objects for the computer to any user who logs on to a computer affected by this policy. This policy is designed for computers used by many users, such as computers in libraries, classrooms, and so on.

Group Policy slow link detection

Enabling this policy allows you to define a slow connection for purposes of applying and updating Group Policy for your system. Connection speed is determined by the rate at which data is transferred from the domain controller providing a policy update to the computers in the group. After you define the slow connection speed, the system interprets a slow connection as one that exceeds your specification.

Registry policy processing

Enabling this policy allows you to define when the policies in the Administrative Templates folder and any other policies that store values in the Registry are updated. This policy lets you select or ignore two options: Do not apply during periodic background processing and Process even if the Group Policy objects have not changed.

Internet Explorer Maintenance policy processing

Enabling this policy allows you to define when disk quota policies are updated. This policy supersedes any customized settings the Internet Explorer Maintenance policy set when it was installed. This policy lets you select or ignore three options: Allow processing across a slow network connection, Do not apply during periodic background processing, and Process even if the Group Policy objects have not changed.

Software Installation policy processing

Enabling this policy allows you to define when software installation polices are updated. This policy supersedes any customized settings the program implementing the software installation policy set when it was installed. This policy lets you select or ignore two options: Allow processing across a slow network connection and Process even if the Group Policy objects have not changed.

Folder Redirection policy processing

Enabling this policy allows you to define when folder redirection policies are updated. This policy lets you select or ignore two options: Allow processing across a slow network connection and Process even if the Group Policy objects have not changed.

Scripts policy processing

Enabling this policy allows you to define when policies that assign shared scripts are updated. This policy lets you select or ignore three options: Allow processing across a slow network connection, Do not apply during periodic background processing, and Process even if the Group Policy objects have not changed.

Security policy processing

Enabling this policy allows you to define when security policies are updated. This policy lets you select or ignore three options: Allow processing across a slow network connection, Do not apply during periodic background processing, and Process even if the Group Policy objects have not changed.

IP Security policy processing

Enabling this policy allows you to define when IP security polices are updated. This policy lets you select or ignore three options: Allow processing across a slow network connection, Do not apply during periodic background processing, and Process even if the Group Policy objects have not changed.

EFS recovery policy processing

Enabling this policy allows you to define when encryption polices are updated. This policy lets you select or ignore three options: Allow processing across a slow network connection, Do not apply during periodic background processing, and Process even if the Group Policy objects have not changed.

Disk Quota policy processing

Enabling this policy allows you to define when disk quota policies are updated. This policy lets you select or ignore three options: Allow processing across a slow network connection, Do not apply during periodic background processing, and Process even if the Group Policy objects have not changed.

Windows File Protection

Computer ConfigurationAdministrative TemplatesSystemWindows File Protection
Set Windows File Protection scanning

Enabling this policy ensures that Windows File Protection enumerate and scan all system files for changes. This policy allows you to set up Windows File Protection to scan files more often. Files are scanned only during setup by default.

Hide the file scan progress window

Enabling this policy ensures that the file scan progress window is hidden to users. This policy is recommended for organizations with beginning users; they are sometimes confused by this window.

Limit Windows File Protection cache size

You can use this policy to define the maximum amount of disk space the Windows File Protection file cache uses. You can select 4294967295 as the maximum amount of disk space if you wish to have an unlimited cache size.

Specify Windows File Protection cache location

You can use this policy to set up a location for the Windows File Protection cache that is different than the default. The default location is in the SystemrootSystem32Dllcache directory.

Network

Computer ConfigurationAdministrative TemplatesNetwork

Offline Files

Computer ConfigurationAdministrative TemplatesNetworkOffline files
Enabled

Controls whether the Offline Files feature is enabled or disabled. Once the Offline Files feature is set, users can’t change whether the feature is enabled or disabled.

Disable user configuration of Offline Files

This feature locks down the configuration you establish because it prevents users from disabling, enabling, or changing the configuration of the offline files.

Synchronize all offline files before logging off

Controls whether offline files are fully synchronized or quickly synchronized each night. If you don’t configure this policy, the system performs a quick synchronization by default, and users can change this setting.

Default cache size

Allows you to set the percentage of disk space that can store automatically cached offline files. If you don’t set this policy, by default the system limits the space that automatically cached files occupy to 10%.

Action on server disconnect

Allows you to determine whether or not a network computer has access to network files if the computer is disconnected from the server. You can use the Action box to set the number of computers this policy applies to.

Non-default server disconnect actions

Controls how specific computers respond when they are disconnected from particular offline file servers. This policy supersedes the Action on server disconnect policy. Also, this policy can be set in the Computer Configuration and User Configuration folders; the Computer Configuration folder overrides the User Configuration folder setting.

Disable “Make Available Offline”

Enabling this policy ensures that users can’t make network files and folders available offline. Be aware that this policy doesn’t prevent the system from saving local copies of files that reside on network shares designated for automatic caching. This policy appears in both the Computer Configuration and User Configuration folders; the Computer Configuration folder takes precedence.

Prevent use of Offline Files folder

Enabling this policy disables the Offline Files folder, and users can’t view or open copies of network files stored on their computer via the Offline Files Folder. This policy appears in both the Computer Configuration and User Configuration folders; the Computer Configuration folder takes precedence.

Files not cached

Enabling this policy allows you to list the types of files that can’t be used offline and exclude certain types of files from automatic and manual caching for offline use. This policy ensures that files that can’t be separated, such as database components, are safe.

Administratively assigned offline files

Enabling this policy allows you to list the types of network files and folders that are always available for offline use. Also, users can access the specified files and folders offline. This policy appears in both the Computer Configuration and User Configuration folders; the Computer Configuration folder takes precedence.

Disable reminder balloons

Enabling this policy removes reminder balloons, which are enabled by default if offline files are enabled. This policy appears in both the Computer Configuration and User Configuration folders; the Computer Configuration folder takes precedence.

Reminder balloon frequency

Enabling this policy allows you to specify how often reminder balloon updates appear. This policy allows you to change the update interval for reminders. This policy appears in both the Computer Configuration and User Configuration folders; the Computer Configuration folder takes precedence.

Initial reminder balloon lifetime

Enabling this policy allows you to specify how long the first reminder balloon for a network status change is displayed. The first reminder is 30 seconds long by default. This policy appears in both the Computer Configuration and User Configuration folders; the Computer Configuration folder takes precedence.

Reminder balloon lifetime

Enabling this policy allows you to change the duration of the update reminder from the default of 30 seconds for the first reminder and 15 seconds thereafter. This policy appears in both the Computer Configuration and User Configuration folders; the Computer Configuration folder takes precedence.

At logoff, delete local copy of user’s offline files

If you enable this policy, local copies of the user’s offline files are deleted when the user logs off. Be aware that files aren’t synchronized before they’re deleted. Changes to local files since the last synchronization are lost as a result.

Event logging level

Enabling this policy allows you to specify which events are recorded in the event log by the Offline Files feature. This policy allows you to add events to those recorded by default. Offline Files records an event only when the offline files storage cache is corrupted by default. This policy appears in both the Computer Configuration and User Configuration folders; the Computer Configuration folder takes precedence.

Subfolders always available offline

Enabling this policy ensures that subfolders are always available offline when their parent folder is made available offline. When you make a folder available offline, this policy makes all folders within that folder available offline. New folders that you create within a folder that is available offline are available offline after the parent folder is synchronized.

Network & Dial-Up Connections

Computer ConfigurationAdministrative TemplatesNetworkNetwork & Dial-up Connections
Allow configuration of connection sharing

This policy determines whether administrators and power users can enable, disable, and configure the Internet Connection Sharing feature of a dial-up connection. Users can configure their system as an Internet gateway for a small network through Internet Connection Sharing. This policy appears in both the Computer Configuration and User Configuration folders; the Computer Configuration folder takes precedence.

Printers

Computer ConfigurationAdministrative TemplatesPrinters
Allow printers to be published

Controls whether or not the computer’s shared printers can be published in the Active Directory. Enabling or not configuring the policy ensures that users have this capability.

Automatically publish new printers in Active Directory

Controls whether or not the Add Printer wizard publishes the computer’s shared printers automatically in the Active Directory. Enabling or not configuring the policy ensures that users have this capability.

Allow pruning of published printers

Controls whether or not the domain controller can prune the printers published by this computer. Enabling or not configuring the policy ensures the domain controller prunes, or deletes, this computer’s printers if there is no response from the computer.

Printer browsing

Allows you to announce the presence of shared printers to print browse master servers for the domain. When you enable this policy, shared printers appear in the domain list in the Browse for Printer dialog box of the Add Printer wizard.

Prune printers that are not automatically republished

Controls whether or not printers that aren’t automatically republished are pruned (deleted from the Active Directory). Note that this policy doesn’t apply to printers published by using Printers in Control Panel. It does apply to printers that run operating systems other than Windows 2000 and to Windows 2000 printers that are published outside of their domain.

Directory pruning interval

Controls when the pruning service on a domain controller contacts computers to verify that their printers are operational. The domain controller contacts computers every eight hours by default. By enabling this policy, you can change the number of hours in between contacts.

Directory pruning retry

Allows you to choose how many times the domain controller contacts a computers to verify that their printers are operational before it prunes the computer.

Directory pruning priority

Controls the pruning thread’s priority. The pruning thread actually deletes printer objects from the Active Directory if the printer that published the object doesn’t respond to contact attempts. Adjusting the pruning thread priority can improve the performance of this service.

Check published state

Ensures that the system periodically verifies that the printers published by this computer still appear in the Active Directory. You can also determine how often the system repeats the verification through this policy.

Web-based printing

Controls Internet printing on the server. Internet printing lets you display printers on web pages. As a result, printers can be viewed, managed, and used across the Internet or an intranet. Internet printing is supported by default and remains supported if you enable or don’t configure this policy.

Custom support URL in the Printers folder’s left pane

Allows you to add a customized web page link to the Printers folder. The web link you include can be tailored to best suit your organization. Default links include a Microsoft web link and a link to the printer vendor.

Computer location

Controls the default location criteria the system uses when it’s searching for printers. You must enable Location Tracking to use this policy, as the Computer Location policy is a component of the Location Tracking feature of Windows 2000 printers.

Prepopulate printer search location text

Controls the Location Tracking feature of Windows 2000 printers. Enabling this policy ensures that the Location Tracking feature of Windows 2000 printers is enabled.

..................Content has been hidden....................

You can't read the all page of ebook, please click here login for view all page.
Reset
3.143.168.172