Access Credential Manager as a trusted caller | ACCESS CONTROL |
Access this computer from the network | ACCESS CONTROL |
Account lockout duration | ACCESS CONTROL |
Account lockout threshold | ACCESS CONTROL |
Accounts: Guest account status | ACCESS CONTROL |
Accounts: Limit local account use of blank passwords to console logon only | IDENTIFICATION AND AUTHENTICATION |
Act as part of the operating system | ACCESS CONTROL |
Adjust memory quotas for a process | ACCESS CONTROL |
Allow indexing of encrypted files | CONFIGURATION MANAGEMENT |
Allow log on locally | ACCESS CONTROL |
Allow log on through Remote Desktop Services | ACCESS CONTROL |
Allow Microsoft accounts to be optional | IDENTIFICATION AND AUTHENTICATION |
Allow unicast response - Private Profile | SYSTEM AND COMMUNICATIONS PROTECTION |
Allow unicast response - Public Profile | SYSTEM AND COMMUNICATIONS PROTECTION |
Always install with elevated privileges | ACCESS CONTROL |
Apply local connection security rules - Domain Profile | SYSTEM AND COMMUNICATIONS PROTECTION |
Apply local connection security rules - Private Profile | SYSTEM AND COMMUNICATIONS PROTECTION |
Apply local connection security rules - Public Profile | SYSTEM AND COMMUNICATIONS PROTECTION |
Apply local firewall rules - Domain Profile | SYSTEM AND COMMUNICATIONS PROTECTION |
Apply local firewall rules - Private Profile | SYSTEM AND COMMUNICATIONS PROTECTION |
Apply local firewall rules - Public Profile | SYSTEM AND COMMUNICATIONS PROTECTION |
Apply UAC restrictions to local accounts on network logon | ACCESS CONTROL |
Audit Account Lockout | AUDIT AND ACCOUNTABILITY |
Audit Audit Policy Change | AUDIT AND ACCOUNTABILITY |
Audit Authentication Policy Change | AUDIT AND ACCOUNTABILITY |
Audit Computer Account Management | AUDIT AND ACCOUNTABILITY |
Audit Credential Validation | AUDIT AND ACCOUNTABILITY |
Audit IPSec Driver | AUDIT AND ACCOUNTABILITY |
Audit Logoff | AUDIT AND ACCOUNTABILITY |
Audit Logon | AUDIT AND ACCOUNTABILITY |
Audit Other Account Management Events | AUDIT AND ACCOUNTABILITY |
Audit Other System Events | AUDIT AND ACCOUNTABILITY |
Audit Process Creation | AUDIT AND ACCOUNTABILITY |
Audit Security Group Management | AUDIT AND ACCOUNTABILITY |
Audit Security State Change | AUDIT AND ACCOUNTABILITY |
Audit Security System Extension | AUDIT AND ACCOUNTABILITY |
Audit Sensitive Privilege Use | AUDIT AND ACCOUNTABILITY |
Audit Special Logon | AUDIT AND ACCOUNTABILITY |
Audit System Integrity | AUDIT AND ACCOUNTABILITY |
Audit User Account Management | AUDIT AND ACCOUNTABILITY |
Audit: Force audit policy subcategory settings (Windows Vista or later) to override audit policy category settings | AUDIT AND ACCOUNTABILITY |
Audit: Shut down system immediately if unable to log security audits | AUDIT AND ACCOUNTABILITY |
Backup files and directories | ACCESS CONTROL |
Change the system time | ACCESS CONTROL |
Change the time zone | ACCESS CONTROL |
Create a pagefile | ACCESS CONTROL |
Create a token object | ACCESS CONTROL |
Create global objects | ACCESS CONTROL |
Create permanent shared objects | ACCESS CONTROL |
Create Symbolic Links | ACCESS CONTROL |