Access Credential Manager as a trusted caller | ACCESS CONTROL |
Access data sources across domains - Internet Zone | SYSTEM AND COMMUNICATIONS PROTECTION |
Access data sources across domains - Restricted Sites Zone | SYSTEM AND COMMUNICATIONS PROTECTION |
Access this computer from the network | ACCESS CONTROL |
Account lockout duration | ACCESS CONTROL |
Account lockout threshold | ACCESS CONTROL |
Accounts: Administrator account status | ACCESS CONTROL |
Accounts: Guest account status | ACCESS CONTROL |
Accounts: Limit local account use of blank passwords to console logon only | IDENTIFICATION AND AUTHENTICATION |
Act as part of the operating system | ACCESS CONTROL |
Allow active scripting | SYSTEM AND COMMUNICATIONS PROTECTION |
Allow Basic authentication - Client - AllowBasic | ACCESS CONTROL |
Allow Basic authentication - Service - AllowBasic | ACCESS CONTROL |
Allow binary and script behaviors | SYSTEM AND INFORMATION INTEGRITY |
Allow cut copy or paste operations from the clipboard via script - Internet Zone | CONFIGURATION MANAGEMENT |
Allow cut copy or paste operations from the clipboard via script - Restricted Sites Zone | CONFIGURATION MANAGEMENT |
Allow drag and drop or copy and paste files - Internet Zone | CONFIGURATION MANAGEMENT |
Allow drag and drop or copy and paste files - Restricted Sites Zone | CONFIGURATION MANAGEMENT |
Allow enhanced PINs for startup | CONFIGURATION MANAGEMENT, SYSTEM AND COMMUNICATIONS PROTECTION |
Allow fallback to SSL 3.0 (Internet Explorer) | SYSTEM AND COMMUNICATIONS PROTECTION |
Allow file downloads | SYSTEM AND COMMUNICATIONS PROTECTION |
Allow indexing of encrypted files | CONFIGURATION MANAGEMENT |
Allow loading of XAML files - Internet Zone | CONFIGURATION MANAGEMENT |
Allow loading of XAML files - Restricted Sites Zone | CONFIGURATION MANAGEMENT |
Allow log on locally | ACCESS CONTROL |
Allow META REFRESH | SYSTEM AND COMMUNICATIONS PROTECTION |
Allow Microsoft accounts to be optional | IDENTIFICATION AND AUTHENTICATION |
Allow only approved domains to use ActiveX controls without prompt - Internet Zone | SYSTEM AND COMMUNICATIONS PROTECTION |
Allow only approved domains to use ActiveX controls without prompt - Restricted Sites Zone | SYSTEM AND COMMUNICATIONS PROTECTION |
Allow only approved domains to use the TDC ActiveX control - Internet Zone | SYSTEM AND COMMUNICATIONS PROTECTION |
Allow only approved domains to use the TDC ActiveX control - Restricted Sites Zone | SYSTEM AND COMMUNICATIONS PROTECTION |
Allow script-initiated windows without size or position constraints - Internet Zone | CONFIGURATION MANAGEMENT |
Allow script-initiated windows without size or position constraints - Restricted Sites Zone | CONFIGURATION MANAGEMENT |
Allow scripting of Internet Explorer WebBrowser controls - Internet Zone | SYSTEM AND COMMUNICATIONS PROTECTION |
Allow scripting of Internet Explorer WebBrowser controls - Restricted Sites Zone | SYSTEM AND COMMUNICATIONS PROTECTION |
Allow scriptlets - Internet Zone | SYSTEM AND COMMUNICATIONS PROTECTION |
Allow scriptlets - Restricted Sites Zone | SYSTEM AND COMMUNICATIONS PROTECTION |
Allow Secure Boot for integrity validation | SYSTEM AND COMMUNICATIONS PROTECTION, SYSTEM AND INFORMATION INTEGRITY |
Allow software to run or install even if the signature is invalid | CONFIGURATION MANAGEMENT |
Allow standby states (S1-S3) when sleeping (on battery) | CONFIGURATION MANAGEMENT |
Allow standby states (S1-S3) when sleeping (plugged in) | CONFIGURATION MANAGEMENT |
Allow unencrypted traffic - Client - AllowUnencryptedTraffic | ACCESS CONTROL |
Allow unencrypted traffic - Service - AllowUnencryptedTraffic | ACCESS CONTROL |
Allow updates to status bar via script - Internet Zone | CONFIGURATION MANAGEMENT |
Allow updates to status bar via script - Restricted Sites Zone | CONFIGURATION MANAGEMENT |
Allow user control over installs | ACCESS CONTROL |
Allow VBScript to run in Internet Explorer - Internet Zone | SYSTEM AND COMMUNICATIONS PROTECTION |
Allow VBScript to run in Internet Explorer - Restricted Sites Zone | SYSTEM AND COMMUNICATIONS PROTECTION |
Allow Windows Ink Workspace | CONFIGURATION MANAGEMENT |
Allow Windows to automatically connect to suggested open hotspots to networks shared by contacts and to hotspots offering paid services | ACCESS CONTROL |