| Access Credential Manager as a trusted caller | ACCESS CONTROL |
| Access this computer from the network | ACCESS CONTROL |
| Account lockout duration | ACCESS CONTROL |
| Account lockout threshold | ACCESS CONTROL |
| Accounts: Limit local account use of blank passwords to console logon only | IDENTIFICATION AND AUTHENTICATION |
| Act as part of the operating system | ACCESS CONTROL |
| Add workstations to a domain | ACCESS CONTROL |
| Adjust memory quotas for a process | ACCESS CONTROL |
| Allow indexing of encrypted files | CONFIGURATION MANAGEMENT |
| Allow log on locally | ACCESS CONTROL |
| Allow log on through Remote Desktop Services | ACCESS CONTROL |
| Allow Microsoft accounts to be optional | IDENTIFICATION AND AUTHENTICATION |
| Allow unicast response - Private Profile | SYSTEM AND COMMUNICATIONS PROTECTION |
| Allow unicast response - Public Profile | SYSTEM AND COMMUNICATIONS PROTECTION |
| Always install with elevated privileges | ACCESS CONTROL |
| Application Identity | CONFIGURATION MANAGEMENT |
| Apply local connection security rules - Domain Profile | SYSTEM AND COMMUNICATIONS PROTECTION |
| Apply local connection security rules - Private Profile | SYSTEM AND COMMUNICATIONS PROTECTION |
| Apply local connection security rules - Public Profile | SYSTEM AND COMMUNICATIONS PROTECTION |
| Apply local firewall rules - Domain Profile | SYSTEM AND COMMUNICATIONS PROTECTION |
| Apply local firewall rules - Private Profile | SYSTEM AND COMMUNICATIONS PROTECTION |
| Apply local firewall rules - Public Profile | SYSTEM AND COMMUNICATIONS PROTECTION |
| Audit Account Lockout | AUDIT AND ACCOUNTABILITY |
| Audit Audit Policy Change | AUDIT AND ACCOUNTABILITY |
| Audit Authentication Policy Change | AUDIT AND ACCOUNTABILITY |
| Audit Computer Account Management | AUDIT AND ACCOUNTABILITY |
| Audit Credential Validation | AUDIT AND ACCOUNTABILITY |
| Audit directory service access | AUDIT AND ACCOUNTABILITY |
| Audit Directory Service Changes | AUDIT AND ACCOUNTABILITY |
| Audit IPSec Driver | AUDIT AND ACCOUNTABILITY |
| Audit Logoff | AUDIT AND ACCOUNTABILITY |
| Audit Logon | AUDIT AND ACCOUNTABILITY |
| Audit Other Account Management Events | AUDIT AND ACCOUNTABILITY |
| Audit Other System Events | AUDIT AND ACCOUNTABILITY |
| Audit Process Creation | AUDIT AND ACCOUNTABILITY |
| Audit Security Group Management | AUDIT AND ACCOUNTABILITY |
| Audit Security State Change | AUDIT AND ACCOUNTABILITY |
| Audit Security System Extension | AUDIT AND ACCOUNTABILITY |
| Audit Sensitive Privilege Use | AUDIT AND ACCOUNTABILITY |
| Audit Special Logon | AUDIT AND ACCOUNTABILITY |
| Audit System Integrity | AUDIT AND ACCOUNTABILITY |
| Audit User Account Management | AUDIT AND ACCOUNTABILITY |
| Audit: Force audit policy subcategory settings (Windows Vista or later) to override audit policy category settings | AUDIT AND ACCOUNTABILITY |
| Audit: Shut down system immediately if unable to log security audits | AUDIT AND ACCOUNTABILITY |
| Backup files and directories | ACCESS CONTROL |
| Change the system time | ACCESS CONTROL |
| Change the time zone | ACCESS CONTROL |
| Configured | CONFIGURATION MANAGEMENT |
| Create a pagefile | ACCESS CONTROL |
| Create a token object | ACCESS CONTROL |