Discussion:
Windows config options put Linux crapware to shame - thousands of settings available in built-in Win7 tools
(too old to reply)
DFS
2010-04-03 01:12:17 UTC
Permalink
Just enter gpedit.msc or secpol.msc in the Start-search box

Below are the 900 settings found just in the Local Group Policy | User
Config | Admin Templates. There are an additional 1050 settings found
in the Computer Config | Admin Templates. Hundreds more in various
other categories. All easily discoverable, understandable, and editable.

The primitive and clownish Linux "operating system" amateurish hobbyware
requires the victim to use dozens of (cr)apps spread all over the place,
yet still has only a subset of these settings available.

So when they say Linux is more configurable, they mean if you literally
have years to learn how, and days and days to download little (cr)apps
and figure out where.



1. .Net Framework Configuration
2. Ability to change properties of an all user remote access connection
3. Ability to delete all user remote access connections
4. Ability to Enable/Disable a LAN connection
5. Ability to rename all user remote access connections
6. Ability to rename LAN connections
7. Ability to rename LAN connections or remote access connections
available to all users
8. Access data sources across domains
9. Action on server disconnect
10. Active Directory Domains and Trusts
11. Active Directory Sites and Services
12. Active Directory Users and Computers
13. ActiveX Control
14. Add ""Run in Separate Memory Space"" check box to Run dialog box"
15. Add a specific list of search providers to the user's search
provider list
16. Add Logoff to the Start Menu
17. Add Search Internet link to Start Menu
18. Add the Run command to the Start Menu
19. Add/Delete items
20. Add-on List
21. Admin-approved behaviors
22. Administrative Templates (Computers)
23. Administrative Templates (Users)
24. Administratively assigned offline files
25. ADSI Edit
26. All Processes
27. All Removable Storage classes: Deny all access
28. Allow .rdp files from unknown publishers
29. Allow .rdp files from valid publishers and user's default .rdp settings
30. Allow active content from CDs to run on user machines
31. Allow active content over restricted protocols to access my computer
32. Allow active scripting
33. Allow binary and script behaviors
34. Allow cut
35. Allow DFS roots to be published
36. Allow drag and drop or copy and paste files
37. Allow file downloads
38. Allow font downloads
39. Allow Install On Demand (except Internet Explorer)
40. Allow Install On Demand (Internet Explorer)
41. Allow installation of desktop items
42. Allow META REFRESH
43. Allow only bitmapped wallpaper
44. Allow only per user or approved shell extensions
45. Allow OpenSearch queries in Windows Explorer
46. Allow persisting automatic acceptance of Calls
47. Allow previewing and custom thumbnails of OpenSearch query results
in Windows Explorer
48. Allow Screen Saver
49. Allow scripting of Internet Explorer web browser control
50. Allow script-initiated windows without size or position constraints
51. Allow Scriptlets
52. Allow shared folders to be published
53. Allow software to run or install even if the signature is invalid
54. Allow status bar updates via script
55. Allow the display of image download placeholders
56. Allow the printing of background colors and images
57. Allow third-party browser extensions
58. Allow video and animation on a Web page that uses a legacy media player
59. Allow websites to open windows without address or status bars
60. Allow websites to prompt for information using scripted windows
61. Always install with elevated privileges
62. Always open All Control Panel Items when opening Control Panel
63. AppleTalk Routing
64. Audio/Video Player
65. Authorization Manager
66. Auto-hide the Toolbars
67. Automatic prompting for ActiveX controls
68. Automatic prompting for file downloads
69. Automatically check for Internet Explorer updates
70. Browse a common web site to find printers
71. Browse the network to find printers
72. Carpoint
73. CD and DVD: Deny read access
74. CD and DVD: Deny write access
75. Century interpretation for Year 2000
76. Certificate Templates
77. Certificates
78. Certification Authority
79. Certification Authority Policy Settings
80. Change Start Menu power button
81. Check for server certificate revocation
82. Check for signatures on downloaded programs
83. Clear history of recently opened documents on exit
84. Clear the recent programs list for new users
85. Code signing for device drivers
86. Component Services
87. Computer Management
88. Configure Default consent
89. Configure Delete Browsing History on exit
90. Configure driver search locations
91. Configure HTTP Proxy
92. Configure Media Explorer Bar
93. Configure MMS Proxy
94. Configure Network Buffering
95. Configure new tab page default behavior
96. Configure Outlook Express
97. Configure Report Archive
98. Configure Report Queue
99. Configure RTSP Proxy
100. Configure Toolbar Buttons
101. Connect home directory to root of the share
102. Connection Sharing (NAT)
103. Create new Group Policy object links disabled by default
104. Custom Classes: Deny read access
105. Custom Classes: Deny write access
106. Custom Instant Search Internet search provider
107. Custom User Interface
108. Customize Command Labels
109. Customize consent settings
110. Customize User Agent String
111. DCOM Configuration Extension
112. Default Active Directory path when searching for printers
113. Default behavior for AutoRun
114. Default excluded paths
115. Default indexed paths
116. Default name for new Group Policy objects
117. Default risk level for file attachments
118. Delete data from devices running Microsoft firmware when a user
logs off from the computer.
119. Deny all add-ons unless specifically allowed in the Add-on List
120. Deploy default Accelerators
121. Deploy non-default Accelerators
122. Desktop Wallpaper
123. Device Manager
124. DHCP Relay Management
125. DHTML Edit Control
126. Disable ""Configuring History"""
127. Disable .NET Framework Setup
128. Disable Active Desktop
129. Disable adding channels
130. Disable adding schedules for offline pages
131. Disable all items
132. Disable all scheduled offline pages
133. Disable application Sharing
134. Disable Audio
135. Disable AutoComplete for forms
136. Disable binding directly to IPropertySetStorage without
intermediate layers.
137. Disable caching of Auto-Proxy scripts
138. Disable changing accessibility settings
139. Disable changing Advanced page settings
140. Disable changing Automatic Configuration settings
141. Disable changing Calendar and Contact settings
142. Disable changing certificate settings
143. Disable changing color settings
144. Disable changing connection settings
145. Disable changing default browser check
146. Disable changing font settings
147. Disable changing home page settings
148. Disable changing language settings
149. Disable changing link color settings
150. Disable changing Messaging settings
151. Disable changing Profile Assistant settings
152. Disable changing proxy settings
153. Disable changing ratings settings
154. Disable changing secondary home page settings
155. Disable changing Temporary Internet files settings
156. Disable channel user interface completely
157. Disable Chat
158. Disable Context menu
159. Disable customizing browser toolbar buttons
160. Disable customizing browser toolbars
161. Disable Directory services
162. Disable downloading of site subscription content
163. Disable editing and creating of schedule groups
164. Disable editing schedules for offline pages
165. Disable external branding of Internet Explorer
166. Disable full duplex Audio
167. Disable Import/Export Settings wizard
168. Disable Internet Connection wizard
169. Disable Known Folders
170. Disable Logging
171. Disable NetMeeting 2.x Whiteboard
172. Disable offline page hit logging
173. Disable Open in New Window menu option
174. Disable Per-User Installation of ActiveX Controls
175. Disable removing channels
176. Disable removing schedules for offline pages
177. Disable Save this program to disk option
178. Disable text prediction
179. Disable the Advanced Calling button
180. Disable the Advanced page
181. Disable the Connections page
182. Disable the Content page
183. Disable the Display Control Panel
184. Disable the General page
185. Disable the Privacy page
186. Disable the Programs page
187. Disable the Reset Web Settings feature
188. Disable the Security page
189. Disable toolbars and extensions when InPrivate Browsing starts
190. Disable Whiteboard
191. Disable Windows Error Reporting
192. Disallow changing of geographic location
193. Disallow Interactive Users from generating Resultant Set of Policy data
194. Disallow selection of Custom Locales
195. Disallow user override of locale settings
196. Disk Defragmenter
197. Disk Management
198. Display confirmation dialog when deleting files
199. Display error message on proxy script download failure
200. Display mixed content
201. Display the menu bar in Windows Explorer
202. Distributed File System
203. Do not add shares of recently opened documents to Network Locations
204. Do not adjust default option to 'Install Updates and Shut Down' in
Shut Down Windows dialog box
205. Do not allow color changes
206. Do not allow desktop composition
207. Do not allow Digital Locker to run
208. Do not allow Flip3D invocation
209. Do not allow Inkball to run
210. Do not allow passwords to be saved
211. Do not allow pinning items in Jump Lists
212. Do not allow pinning programs to the Taskbar
213. Do not allow printing to Journal Note Writer
214. Do not allow resetting Internet Explorer settings
215. Do not allow Snipping Tool to run
216. Do not allow Sound Recorder to run
217. Do not allow users to enable or disable add-ons
218. Do not allow window animations
219. Do not allow Windows Journal to be run
220. Do not allow Windows Media Center to run
221. Do not allow Windows Messenger to be run
222. Do not automatically make redirected folders available offline
223. Do not automatically start Windows Messenger initially
224. Do not collect InPrivate Filtering data
225. Do not display any custom toolbars in the taskbar
226. Do not display 'Install Updates and Shut Down' option in Shut Down
Windows dialog box
227. Do not display or track items in Jump Lists from remote locations
228. Do not display the Welcome Center at user logon
229. Do not keep history of recently opened documents
230. Do not move deleted files to the Recycle Bin
231. Do not preserve zone information in file attachments
232. Do not process the legacy run list
233. Do not process the run once list
234. Do not prompt for client certificate selection when no certificates
or only one certificate exists.
235. Do not request alternate credentials
236. Switch to the Simplified Chinese (PRC) gestures
237. Synchronize all offline files before logging off
238. Synchronize all offline files when logging on
239. Synchronize offline files before suspend
240. System Information
241. System Properties
242. Tape Drives: Deny read access
243. Tape Drives: Deny write access
244. Telephony
245. Terminate session when time limits are reached
246. Time (in seconds) to force reboot
247. Tools menu: Disable Internet Options... menu option
248. TPM Management
249. Trust logic for file attachments
250. Trusted Sites Zone Restricted Protocols
251. Trusted Sites Zone Template
252. Turn off ""Delete Browsing History"" functionality"
253. Turn off Accelerators
254. Turn off access to the OEM and Microsoft branding section
255. Turn off access to the performance center core section
256. Turn off access to the solutions to performance problems section
257. Turn off ActiveX opt-in prompt
258. Turn off addition and removal of feeds and Web Slices
259. Turn off Aero Shake window minimizing mouse gesture
260. Turn off all balloon notifications
261. Turn off AutoComplete integration with Input Panel
262. Turn off Automatic Crash Recovery Prompt
263. Turn off automatic image resizing
264. Turn off automatic learning
265. Turn off automatic promotion of notification icons to the taskbar
266. Turn off automatic update of ADM files
267. Turn off automatic wake
268. Turn off Autoplay
269. Turn off Autoplay for non-volume devices
270. Turn off background sync for feeds and Web Slices
271. Turn off caching of thumbnail pictures
272. Turn off ClearType
273. Turn off common control and window animations
274. Turn off Compatibility View
275. Turn off Compatibility View button
276. Turn off configuration of default behavior of new tab creation
277. Turn off configuration of tabbed browsing pop-up behavior
278. Turn off configuration of window reuse
279. Turn off configuring underline links
280. Turn off Connect to a Network Projector
281. Turn off Crash Detection
282. Turn off Cross Document Messaging
283. Turn off Data URI Support
284. Turn off desktop gadgets
285. Turn off Details Pane
286. Turn off Developer Tools
287. Turn off display of recent search entries in the Windows Explorer
search box
288. Turn off displaying the Internet Explorer Help Menu
289. Turn off downloading of enclosures
290. Turn off downloading of print drivers over HTTP
291. Turn off Encryption Support
292. Turn off Favorites bar
293. Turn off feature advertisement balloon notifications
294. Turn off feed and Web Slices discovery
295. Turn Off First-Run Opt-In
296. Turn off friendly http error messages
297. Turn off handwriting personalization data sharing
298. Turn off handwriting recognition error reporting
299. Turn off hardware buttons
300. Turn off Help Experience Improvement Program
301. Turn off Help Ratings
302. Turn off inline AutoComplete in Windows Explorer
303. Turn off InPrivate Browsing
304. Turn off InPrivate Filtering
305. Turn off Internet download for Web publishing and online ordering
wizards
306. Turn off Internet File Association service
307. Turn off location
308. Turn off location scripting
309. Turn off Managing Phishing filter
310. Turn off Managing Pop-up Allow list
311. Turn off managing Pop-up filter level
312. Turn off Managing SmartScreen Filter
313. Turn off notification area cleanup
314. Turn off notifications when a connection has only limited or no
connectivity
315. Turn off numerical sorting in Windows Explorer
316. Turn off page transitions
317. Turn off page zooming functionality
318. Turn off password security in Input Panel
319. Turn off pen feedback
320. Turn off personalized menus
321. Turn off picture display
322. Turn off pop-up management
323. Turn off Preview Pane
324. Turn off Print Menu
325. Turn off printing over HTTP
326. Turn off Profile Assistant
327. Turn off Program Compatibility Assistant
328. Turn off Quick Tabs functionality
329. Turn off reminder balloons
330. Turn off Reopen Last Browsing Session
331. Turn off restore functionality
332. Turn off sending URLs as UTF-8 (requires restart)
333. Turn off sensors
334. Turn off shell protocol protected mode
335. Turn off smart image dithering
336. Turn off smooth scrolling
337. Turn off suggestions for all user-installed providers
338. Turn off Tab Grouping
339. Turn off tabbed browsing
340. Turn off Tablet PC Pen Training
341. Turn off Tablet PC touch input
342. Turn off taskbar thumbnails
343. Turn off the ""Order Prints"" picture task"
344. Turn off the ""Publish to Web"" task for files and folders"
345. Turn off the ability to back up data files
346. Turn off the ability to create a system image
347. Turn off the activation of the quick pick menu
348. Turn off the auto-complete feature for web addresses
349. Turn off the caching of thumbnails in hidden thumbs.db files
350. Turn off the communities features
351. Turn off the display of snippets in Content view mode
352. Turn off the display of thumbnails and only display icons on
network folders
353. Turn off the display of thumbnails and only display icons.
354. Turn off the feed list
355. Turn off the Security Settings Check feature
356. Turn off the Windows Messenger Customer Experience Improvement Program
357. Turn off the XDomainRequest Object
358. Turn off tolerant and Z-shaped scratch-out gestures
359. Turn off toolbar upgrade tool
360. Turn off Touch Panning
361. Turn off user tracking
362. Turn Off user-installed desktop gadgets
363. Turn off Windows Calendar
364. Turn off Windows HotStart
365. Turn off Windows Libraries features that rely on indexed file data
366. Turn off Windows Mail application
367. Turn off Windows Mobility Center
368. Turn off Windows Online
369. Turn off Windows presentation settings
370. Turn off Windows Search AutoComplete
371. Turn off Windows SideShow
372. Turn off Windows Update device driver search prompt
373. Turn off Windows+X hotkeys
374. Turn on automatic detection of the intranet
375. Turn on Automatic Signup
376. Turn on Basic feed authentication over HTTP
377. Turn on Caret Browsing support
378. Turn on Classic Shell
379. Turn on Compatibility Logging
380. Turn on Cross-Site Scripting (XSS) Filter
381. Turn on Information bar notification for intranet content
382. Turn on inline AutoComplete for Web addresses
383. Turn on Internet Explorer 7 Standards Mode
384. Turn on Internet Explorer Standards Mode for Local Intranet
385. Turn on menu bar by default
386. Turn on Protected Mode
387. Turn on script debugging
388. Turn on Suggested Sites
389. Turn on the auto-complete feature for user names and passwords on forms
390. Turn on the display of a notification about every script error
391. Turn on the hover color option
392. Turn on the Internet Connection Wizard Auto Detect
393. Turn on Warn about Certificate Address Mismatch
394. Use Automatic Detection for dial-up connections
395. Use HTTP 1.1
396. Use HTTP 1.1 through proxy connections
397. Use large Icons for Command Buttons
398. Use localized subfolder names when redirecting Start Menu and My
Documents
399. Use Policy Accelerators
400. Use Policy List of Internet Explorer 7 sites
401. Use Pop-up Blocker
402. Use Remote Desktop Easy Print printer driver first
403. Use SmartScreen Filter
404. Use UTF-8 for mailto links
405. Userdata persistence
406. View menu: Disable Full Screen menu option
407. View menu: Disable Source menu option
408. Web sites in less privileged Web content zones can navigate into
this zone
409. Windows Automatic Updates
410. Windows Firewall with Advanced Security
411. Wired Network (IEEE 802.3) Policies
412. Wireless Monitor
413. Wireless Network (IEEE 802.11) Policies
414. WMI Control
415. WPD Devices: Deny read access
416. WPD Devices: Deny write access
417. XAML browser applications
418. XPS documents
419. Do not save encrypted pages to disk
420. Do not search communications
421. Do not search for files
422. Do not search Internet
423. Do not search programs and Control Panel items
424. Do not send additional data
425. Do Not Show Anchor
426. Do not track Shell shortcuts during roaming
427. Do not use the search-based method when resolving shell shortcuts
428. Do not use the tracking-based method when resolving shell shortcuts
429. Don't display the Getting Started welcome screen at logon
430. Don't run specified Windows applications
431. Don't save settings at exit
432. Don't set the always do this checkbox
433. Download missing COM components
434. Download signed ActiveX controls
435. Download unsigned ActiveX controls
436. Empty Temporary Internet Files folder when browser is closed
437. Enable Active Desktop
438. Enable Automatic Configuration
439. Enable connection through RD Gateway
440. Enable filter in Find dialog box
441. Enable Native XMLHttpRequest Support
442. Enable screen saver
443. Enable Windows 2000 Network Connections settings for Administrators
444. Enforce Full Screen Mode
445. Enforce Show Policies Only
446. Enterprise PKI
447. Event logging level
448. Event Viewer
449. Event Viewer (Windows Vista)
450. Exclude directories in roaming profile
451. Extended View (Web View)
452. Failover Clusters Manager
453. FAX Service
454. File menu: Disable closing the browser and Explorer windows
455. File menu: Disable New menu option
456. File menu: Disable Open menu option
457. File menu: Disable Save As Web Page Complete
458. File menu: Disable Save As... menu option
459. File size limits for Internet zone
460. File size limits for Intranet zone
461. File size limits for Local Machine zone
462. File size limits for Restricted Sites zone
463. File size limits for Trusted Sites zone
464. Floppy Drives: Deny read access
465. Floppy Drives: Deny write access
466. Folder Redirection
467. For tablet pen input
468. For touch input
469. Force a specific visual style file or force Windows Classic
470. Force classic Start Menu
471. Force specific screen saver
472. FrontPage Server Extensions
473. Go directly to Components Wizard
474. Gray unavailable Windows Installer programs Start Menu shortcuts
475. Group Policy domain controller selection
476. Group Policy Management
477. Group Policy Object Editor
478. Group Policy refresh interval for users
479. Group Policy slow link detection
480. Group Policy tab for Active Directory Tools
481. Health Registration Authority (HRA)
482. Help menu: Remove 'For Netscape Users' menu option
483. Help menu: Remove 'Send Feedback' menu option
484. Help menu: Remove 'Tip of the Day' menu option
485. Help menu: Remove 'Tour' menu option
486. Hide ""Get Programs"" page"
487. Hide ""Installed Updates"" page"
488. Hide ""Programs and Features"" page"
489. Hide ""Set Program Access and Computer Defaults"" page"
490. Hide ""Windows Features"""
491. Hide ""Windows Marketplace"""
492. Hide Active Directory folder
493. Hide Add New Programs page
494. Hide Add/Remove Windows Components page
495. Hide Advanced Properties Checkbox in Add Scheduled Task Wizard
496. Hide and disable all items on the desktop
497. Hide Change or Remove Programs page
498. Hide Favorites menu
499. Hide Internet Explorer icon on desktop
500. Hide mechanisms to remove zone information
501. Hide Network Locations icon on desktop
502. Hide Network Tab
503. Hide previous versions list for local files
504. Hide previous versions list for remote files
505. Hide previous versions of files on backup location
506. Hide Privacy Tab
507. Hide Property Pages
508. Hide Regional and Language Options administrative options
509. Hide Security Tab
510. Hide Settings tab
511. Hide specified Control Panel items
512. Hide the ""Add a program from CD-ROM or floppy disk"" option"
513. Hide the ""Add programs from Microsoft"" option"
514. Hide the ""Add programs from your network"" option"
515. Hide the Audio page
516. Hide the Command Bar
517. Hide the common dialog back button
518. Hide the common dialog places bar
519. Hide the dropdown list of recent files
520. Hide the General page
521. Hide the geographic location option
522. Hide the notification area
523. Hide the Programs Control Panel
524. Hide the Security page
525. Hide the select language group options
526. Hide the Set Program Access and Defaults page
527. Hide the Status Bar
528. Hide the Video page
529. Hide these specified drives in My Computer
530. Hide user locale selection and customization options
531. Hides the Manage item on the Windows Explorer context menu
532. IAS Logging
533. Identity Manager: Prevent users from using Identities
534. IGMP Routing
535. Ignore custom consent settings
536. Include local directory path when uploading files to a server
537. Include rarely used Chinese
538. Include updated Web site lists from Microsoft
539. Inclusion list for high risk file types
540. Inclusion list for low file types
541. Inclusion list for moderate risk file types
542. Indexing Service
543. Initial reminder balloon lifetime
544. Initialize and script ActiveX controls not marked as safe
545. InPrivate Filtering Threshold
546. Internet Authentication Service (IAS)
547. Internet Explorer Maintenance
548. Internet Explorer Processes
549. Internet Information Services
550. Internet Zone Restricted Protocols
551. Internet Zone Template
552. Intranet Sites: Include all local (intranet) sites not listed in
other zones
553. Intranet Sites: Include all network paths (UNCs)
554. Intranet Sites: Include all sites that bypass the proxy server
555. Intranet Zone Restricted Protocols
556. Intranet Zone Template
557. Investor
558. IP Routing
559. IP Security Monitor
560. IP Security Policy Management
561. IPX RIP Routing
562. IPX Routing
563. IPX SAP Routing
564. Items displayed in Places Bar
565. Java permissions
566. Launching applications and files in an IFRAME
567. Launching programs and unsafe files
568. Limit profile size
569. Limit the bandwidth of Audio and Video
570. Limit the size of sent files
571. Link to Web Address
572. List of applications to be excluded
573. Load a specific theme
574. Local Machine Zone Restricted Protocols
575. Local Machine Zone Template
576. Local Users and Groups
577. Lock all taskbar settings
578. Lock all Toolbars
579. Lock the Taskbar
580. Locked-Down Internet Zone Template
581. Locked-Down Intranet Zone Template
582. Locked-Down Local Machine Zone Template
583. Locked-Down Restricted Sites Zone Template
584. Locked-Down Trusted Sites Zone Template
585. Logical and Mapped Drives
586. Logon options
587. Loose XAML files
588. Maximum allowed Recycle Bin size
589. Maximum number of connections per server (HTTP 1.0)
590. Maximum number of connections per server (HTTP 1.1)
591. Maximum number of recent documents
592. Maximum size of Active Directory searches
593. Menu Controls
594. Microsoft Agent
595. Microsoft Chat
596. Microsoft Scriptlet Component
597. Microsoft Survey Control
598. Moving the menu bar above the navigation bar
599. MSNBC
600. NAP Client Configuration
601. Navigate windows and frames across different domains
602. NetShow File Transfer Control
603. Network directories to sync at Logon/Logoff time only
604. Network Policy Server (NPS)
605. No Computers Near Me in Network Locations
606. No Entire Network in Network Locations
607. Non-default server disconnect actions
608. Notify antivirus programs when opening attachments
609. Online Responder
610. Only allow approved domains to use ActiveX controls without prompt
611. Only use Package Point and print
612. Only use the ActiveX Installer Service for installation of ActiveX
Controls
613. Open files based on content
614. OSPF Routing
615. Override the More Gadgets link
616. Package Point and print - Approved servers
617. Password protect the screen saver
618. Performance Logs and Alerts
619. Pin Internet search sites to the ""Search again"" links and the
Start menu"
620. Pin Libraries or Search Connectors to the ""Search again"" links
and the Start menu"
621. Play animations in web pages
622. Play sounds in web pages
623. Play videos in web pages
624. Point and Print Restrictions
625. Pop-up allow list
626. Prevent ""Fix settings"" functionality"
627. Prevent access to 16-bit applications
628. Prevent access to drives from My Computer
629. Prevent access to registry editing tools
630. Prevent access to the command prompt
631. Prevent adding Directory servers
632. Prevent adding UNC locations to index from Control Panel
633. Prevent adding
634. Prevent addition of printers
635. Prevent Application Sharing in true color
636. Prevent automatic acceptance of Calls
637. Prevent Back-ESC mapping
638. Prevent backing up to local disks
639. Prevent backing up to network location
640. Prevent backing up to optical media (CD/DVD)
641. Prevent Bypassing SmartScreen Filter Warnings
642. Prevent CD and DVD Media Information Retrieval
643. Prevent changes to Taskbar and Start Menu Settings
644. Prevent changing Call placement method
645. Prevent changing color scheme
646. Prevent changing desktop background
647. Prevent changing desktop icons
648. Prevent changing DirectSound Audio setting
649. Prevent changing mouse pointers
650. Prevent changing screen saver
651. Prevent changing sounds
652. Prevent changing theme
653. Prevent changing visual style for windows and buttons
654. Prevent changing window color and appearance
655. Prevent Codec Download
656. Prevent configuration of search from the Address bar
657. Prevent Control
658. Prevent customization of indexed locations in Control Panel
659. Prevent Deleting Cookies
660. Prevent Deleting Favorites Site Data
661. Prevent Deleting Form Data
662. Prevent Deleting InPrivate Filtering data
663. Prevent Deleting Passwords
664. Prevent Deleting Temporary Internet Files
665. Prevent Deleting Web sites that the User has Visited
666. Prevent deletion of printers
667. Prevent Desktop Sharing
668. Prevent flicks
669. Prevent Flicks Learning Mode
670. Prevent grouping of taskbar items
671. Prevent ignoring certificate errors
672. Prevent indexing certain paths
673. Prevent Input Panel tab from appearing
674. Prevent Internet Explorer Search box from displaying
675. Prevent launch an application
676. Prevent Music File Media Information Retrieval
677. Prevent participation in the Customer Experience Improvement Program
678. Prevent performance of First Run Customize settings
679. Prevent press and hold
680. Prevent Radio Station Preset Retrieval
681. Prevent receiving files
682. Prevent receiving Video
683. Prevent removable media source for any install
684. Prevent restoring local previous versions
685. Prevent restoring previous versions from backups
686. Prevent restoring remote previous versions
687. Prevent sending files
688. Prevent sending Video
689. Prevent Sharing
690. Prevent Sharing Command Prompts
691. Prevent Sharing Explorer windows
692. Prevent Task Run or End
693. Prevent the deletion of temporary Internet files and cookies
694. Prevent the use of Windows colors
695. Prevent the user from running the Backup Status and Configuration
program
696. Prevent use of Offline Files folder
697. Prevent users from adding files to the root of their Users Files
folder.
698. Prevent users from adding or removing toolbars
699. Prevent users from choosing default text size
700. Prevent users from configuring background color
701. Prevent users from configuring text color
702. Prevent users from configuring the color of links that have already
been clicked
703. Prevent users from configuring the color of links that have not yet
been clicked
704. Prevent users from configuring the hover color
705. Prevent users from moving taskbar to another screen dock location
706. Prevent users from rearranging toolbars
707. Prevent users from resizing the taskbar
708. Prevent users from sharing files within their profile.
709. Prevent viewing Web directory
710. Prevent Windows Anytime Upgrade from running.
711. Process List
712. Prohibit Access of the Windows Connect Now wizards
713. Prohibit access to properties of a LAN connection
714. Prohibit access to properties of components of a LAN connection
715. Prohibit access to properties of components of a remote access
connection
716. Prohibit access to the Advanced Settings item on the Advanced menu
717. Prohibit access to the Control Panel
718. Prohibit access to the New Connection Wizard
719. Prohibit access to the Remote Access Preferences item on the
Advanced menu
720. Prohibit adding and removing components for a LAN or remote access
connection
721. Prohibit adding items
722. Prohibit adjusting desktop toolbars
723. Prohibit Browse
724. Prohibit changes
725. Prohibit changing properties of a private remote access connection
726. Prohibit closing items
727. Prohibit connecting and disconnecting a remote access connection
728. Prohibit deleting items
729. Prohibit deletion of remote access connections
730. Prohibit Drag-and-Drop
731. Prohibit editing items
732. Prohibit Enabling/Disabling components of a LAN connection
733. Prohibit installing or uninstalling color profiles
734. Prohibit 'Make Available Offline' for these file and folders
735. Prohibit New Task Creation
736. Prohibit renaming private remote access connections
737. Prohibit rollback
738. Prohibit selection of visual style font size
739. Prohibit Task Deletion
740. Prohibit TCP/IP advanced configuration
741. Prohibit user configuration of Offline Files
742. Prohibit User from manually redirecting Profile Folders
743. Prohibit viewing of status for an active connection
744. Prompt for password on resume from hibernate / suspend
745. Public Key Policies
746. QoS Admission Control
747. RAS Dialin - User Node
748. Reminder balloon frequency
749. Reminder balloon lifetime
750. Remote Access
751. Remote Desktop Services Configuration
752. Remote Desktops
753. Remote Installation Services
754. Removable Disks: Deny read access
755. Removable Disks: Deny write access
756. Removable Storage
757. Removable Storage Management
758. Remove ""Map Network Drive"" and ""Disconnect Network Drive"""
759. Remove access to the context menus for the taskbar
760. Remove access to use all Windows Update features
761. Remove Add or Remove Programs
762. Remove All Programs list from the Start menu
763. Remove and prevent access to the Shut Down
764. Remove Balloon Tips on Start Menu items
765. Remove CD Burning features
766. Remove Change Password
767. Remove Clock from the system notification area
768. Remove common program groups from Start Menu
769. Remove Computer icon on the desktop
770. Remove Default Programs link from the Start menu.
771. Remove DFS tab
772. Remove Documents icon from Start Menu
773. Remove Downloads link from Start Menu
774. Remove drag-and-drop and context menus on the Start Menu
775. Remove Favorites menu from Start Menu
776. Remove File menu from Windows Explorer
777. Remove frequent programs list from the Start Menu
778. Remove Games link from Start Menu
779. Remove Hardware tab
780. Remove Help menu from Start Menu
781. Remove Homegroup link from Start Menu
782. Remove links and access to Windows Update
783. Remove Lock Computer
784. Remove Logoff
785. Remove Logoff on the Start Menu
786. Remove logon hours expiration warnings
787. Remove 'Make Available Offline'
788. Remove Music icon from Start Menu
789. Remove My Documents icon on the desktop
790. Remove Network Connections from Start Menu
791. Remove Network icon from Start Menu
792. Remove Pictures icon from Start Menu
793. Remove pinned programs from the Taskbar
794. Remove pinned programs list from the Start Menu
795. Remove programs on Settings menu
796. Remove Properties from the Computer icon context menu
797. Remove Properties from the Documents icon context menu
798. Remove Properties from the Recycle Bin context menu
799. Remove Recent Items menu from Start Menu
800. Remove Recorded TV link from Start Menu
801. Remove Recycle Bin icon from desktop
802. Remove Run menu from Start Menu
803. Remove Search button from Windows Explorer
804. Remove Search Computer link
805. Remove Search link from Start Menu
806. Remove Security tab
807. Remove See More Results / Search Everywhere link
808. Remove Shared Documents from My Computer
809. Remove Support Information
810. Remove Task Manager
811. Remove the ""Undock PC"" button from the Start Menu"
812. Remove the Action Center icon
813. Remove the battery meter
814. Remove the Desktop Cleanup Wizard
815. Remove the networking icon
816. Remove the Search the Internet ""Search again"" link"
817. Remove the volume control icon
818. Remove UI to change keyboard navigation indicator setting
819. Remove UI to change menu animation setting
820. Remove user folder link from Start Menu
821. Remove user name from Start Menu
822. Remove user's folders from the Start Menu
823. Remove Videos link from Start Menu
824. Remove Windows Explorer's default context menu
825. Removes the Folder Options menu item from the Tools menu
826. Report when logon server was not available during user logon
827. Request credentials for network installations
828. Require a PIN to access data on devices running Microsoft firmware
829. Restrict changing the default search provider
830. Restrict Internet communication
831. Restrict search providers to a specific list of providers
832. Restrict selection of Windows menus and dialogs language
833. Restrict the user from entering author mode
834. Restrict these programs from being launched from Help
835. Restrict unpacking and installation of gadgets that are not
digitally signed.
836. Restrict user locales
837. Restrict users to the explicitly permitted list of snap-ins
838. Restricted Sites Zone Restricted Protocols
839. Restricted Sites Zone Template
840. Restricts the UI languages Windows should use for the selected user
841. Resultant Set of Policy snap-in
842. RIP Routing
843. Routing
844. Routing and Remote Access
845. Run .NET Framework-reliant components not signed with Authenticode
846. Run .NET Framework-reliant components signed with Authenticode
847. Run ActiveX controls and plugins
848. Run legacy logon scripts hidden
849. Run logoff scripts visible
850. Run logon scripts synchronously
851. Run logon scripts visible
852. Run only specified Windows applications
853. Run these programs at user logon
854. Run Windows PowerShell scripts first at user logon
855. Screen saver timeout
856. Script ActiveX controls marked safe for scripting
857. Scripting of Java applets
858. Scripts (Logon/Logoff)
859. Scripts (Startup/Shutdown)
860. Search order
861. Search: Disable Find Files via F3 within the browser
862. Search: Disable Search Customization
863. Security Configuration and Analysis
864. Security Settings
865. Security Templates
866. Send Console Message
867. Send internationalized domain names
868. Server Manager
869. Service Dependencies
870. Services
871. Set action to take when logon hours expire
872. Set and Lock Skin
873. Set Call Security options
874. Set location of Stop and Refresh buttons
875. Set RD Gateway authentication method
876. Set RD Gateway server address
877. Set rules for remote control of Remote Desktop Services user sessions
878. Set tab process growth
879. Set the intranet support Web page
880. Set time limit for active but idle Remote Desktop Services sessions
881. Set time limit for active Remote Desktop Services sessions
882. Set time limit for disconnected sessions
883. Shared Folders
884. Shared Folders Ext
885. Shockwave Flash
886. Show only specified Control Panel items
887. Show QuickLaunch on Taskbar
888. Site to Zone Assignment List
889. SMTP Protocol
890. SNMP
891. Software channel permissions
892. Software Installation (Computers)
893. Software Installation (Users)
894. Specify a default color
895. Specify default category for Add New Programs
896. Specify SHA1 thumbprints of certificates representing trusted .rdp
publishers
897. Start a program on connection
898. Streaming Media Protocols
899. Submit non-encrypted form data
900. Subscription Limits


MS is doomed.
bird
2010-04-03 02:04:13 UTC
Permalink
Post by DFS
So when they say Linux is more configurable, they mean if you literally
have years to learn how, and days and days to download little (cr)apps
and figure out where.
You could do better man. 2/10
DFS
2010-04-03 03:16:48 UTC
Permalink
Post by bird
Post by DFS
So when they say Linux is more configurable, they mean if you literally
have years to learn how, and days and days to download little (cr)apps
and figure out where.
You could do better man. 2/10
Too bad Linux can't.

How long and how many crappy little manpages and apps and screens would
you have to fumble through to accomplish the same thing in Linux that's
all on one screen in Windows, and neatly categorized and sorted and
presented?


Win 7 | Local Group Policy | Computer Config | Admin Templates | All
Settings

1. 6to4 Relay Name
2. 6to4 Relay Name Resolution Interval
3. 6to4 State
4. Access data sources across domains
5. Action on server disconnect
6. Activate Shutdown Event Tracker System State Data feature
7. ActiveX installation policy for sites in Trusted zones
8. Add a specific list of search providers to the user's search provider
list
9. Add primary intranet search location
10. Add Printer wizard - Network scan page (Managed network)
11. Add Printer wizard - Network scan page (Unmanaged network)
12. Add secondary intranet search locations
13. Add the Administrators security group to roaming user profiles
14. Add-on List
15. Admin-approved behaviors
16. Administratively assigned offline files
17. All Processes
18. All Removable Storage classes: Deny all access
19. All Removable Storage: Allow direct access in remote sessions
20. Allow .rdp files from unknown publishers
21. Allow .rdp files from valid publishers and user's default .rdp settings
22. Allow access to BitLocker-protected fixed data drives from earlier
versions of Windows
23. Allow access to BitLocker-protected removable data drives from
earlier versions of Windows
24. Allow active content from CDs to run on user machines
25. Allow active content over restricted protocols to access my computer
26. Allow active scripting
27. Allow admin to install from Remote Desktop Services session
28. Allow administrators to override Device Installation Restriction
policies
29. Allow Applications to Prevent Automatic Sleep (On Battery)
30. Allow Applications to Prevent Automatic Sleep (Plugged In)
31. Allow audio and video playback redirection
32. Allow audio recording redirection
33. Allow automatic configuration of listeners
34. Allow Automatic Sleep with Open Network Files (On Battery)
35. Allow Automatic Sleep with Open Network Files (Plugged In)
36. Allow Automatic Updates immediate installation
37. Allow Basic authentication
38. Allow binary and script behaviors
39. Allow BITS Peercaching
40. Allow certificates with no extended key usage certificate attribute
41. Allow Corporate redirection of Customer Experience Improvement uploads
42. Allow CredSSP authentication
43. Allow Cross-Forest User Policy and Roaming User Profiles
44. Allow cryptography algorithms compatible with Windows NT 4.0
45. Allow cut
46. Allow Delegating Default Credentials
47. Allow Delegating Default Credentials with NTLM-only Server
Authentication
48. Allow Delegating Fresh Credentials
49. Allow Delegating Fresh Credentials with NTLM-only Server Authentication
50. Allow Delegating Saved Credentials
51. Allow Delegating Saved Credentials with NTLM-only Server Authentication
52. Allow Distributed Link Tracking clients to use domain resources
53. Allow DNS Suffix Appending to Unqualified Multi-Label Name Queries
54. Allow domain users to log on using biometrics
55. Allow drag and drop or copy and paste files
56. Allow ECC certificates to be used for logon and authentication
57. Allow enhanced PINs for startup
58. Allow Enhanced Storage certificate provisioning
59. Allow file downloads
60. Allow font downloads
61. Allow indexing of encrypted files
62. Allow Install On Demand (except Internet Explorer)
63. Allow Install On Demand (Internet Explorer)
64. Allow installation of desktop items
65. Allow installation of devices that match any of these device IDs
66. Allow installation of devices using drivers that match these device
setup classes
67. Allow Integrated Unblock screen to be displayed at the time of logon
68. Allow local activation security check exemptions
69. Allow logon scripts when NetBIOS or WINS is disabled
70. Allow META REFRESH
71. Allow non-administrators to install drivers for these device setup
classes
72. Allow non-administrators to receive update notifications
73. Allow only system backup
74. Allow only USB root hub connected Enhanced Storage devices
75. Allow only Vista or later connections
76. Allow OpenSearch queries in Windows Explorer
77. Allow or Disallow use of the Offline Files feature
78. Allow previewing and custom thumbnails of OpenSearch query results
in Windows Explorer
79. Allow Print Spooler to accept client connections
80. Allow printers to be published
81. Allow pruning of published printers
82. Allow remote access to the Plug and Play interface
83. Allow Remote Shell Access
84. Allow restore of system to default state
85. Allow scripting of Internet Explorer web browser control
86. Allow script-initiated windows without size or position constraints
87. Allow Scriptlets
88. Allow signature keys valid for Logon
89. Allow signed updates from an intranet Microsoft update service location
90. Allow software to run or install even if the signature is invalid
91. Allow Standby States (S1-S3) When Sleeping (On Battery)
92. Allow Standby States (S1-S3) When Sleeping (Plugged In)
93. Allow status bar updates via script
94. Allow the use of biometrics
95. Allow third-party browser extensions
96. Allow time invalid certificates
97. Allow time zone redirection
98. Allow unencrypted traffic
99. Allow use of diacritics
100. Allow user name hint
101. Allow users to connect remotely using Remote Desktop Services
102. Allow users to log on using biometrics
103. Allow video and animation on a Web page that uses a legacy media player
104. Allow websites to open windows without address or status bars
105. Allow websites to prompt for information using scripted windows
106. Always install with elevated privileges
107. Always prompt for password upon connection
108. Always render print jobs on the server
109. Always show desktop on connection
110. Always use classic logon
111. Always use custom logon background
112. Always use local ADM files for Group Policy Object Editor
113. Always wait for the network at computer startup and logon
114. Apply policy to removable media
115. Apply the default user logon picture to all users
116. Approved Installation Sites for ActiveX Controls
117. Assign a default domain for logon
118. At logoff
119. Auto-hide the Toolbars
120. Automated Site Coverage by the DC Locator DNS SRV Records
121. Automatic prompting for ActiveX controls
122. Automatic prompting for file downloads
123. Automatic reconnection
124. Automatic Updates detection frequency
125. Automatically check for Internet Explorer updates
126. Automatically publish new printers in Active Directory
127. Background upload of a roaming user profile's registry file while
user is logged on
128. Backup log automatically when full
129. Baseline file cache maximum size
130. Best effort service type
131. Cache transforms in secure location on workstation
132. CD and DVD: Deny execute access
133. CD and DVD: Deny read access
134. CD and DVD: Deny write access
135. Check for New Signatures Before Scheduled Scans
136. Check for server certificate revocation
137. Check for signatures on downloaded programs
138. Check published state
139. Choose default folder for recovery password
140. Choose drive encryption method and cipher strength
141. Choose how BitLocker-protected fixed drives can be recovered
142. Choose how BitLocker-protected operating system drives can be recovered
143. Choose how BitLocker-protected removable drives can be recovered
144. Choose how users can recover BitLocker-protected drives (Windows
Server 2008 and Windows Vista)
145. Communities
146. Computer location
147. Configuration of wireless settings using Windows Connect Now
148. Configure Automatic Updates
149. Configure Background Sync
150. Configure BranchCache for network files
151. Configure Corporate Windows Error Reporting
152. Configure Corrupted File Recovery Behavior
153. Configure Default consent
154. Configure Delete Browsing History on exit
155. Configure device installation time-out
156. Configure Error Reporting
157. Configure keep-alive connection interval
158. Configure list of Enhanced Storage devices usable on your computer
159. Configure list of IEEE 1667 silos usable on your computer
160. Configure Microsoft SpyNet Reporting
161. Configure minimum PIN length for startup
162. Configure MSI Corrupted File Recovery Behavior
163. Configure new tab page default behavior
164. Configure RD Connection Broker farm name
165. Configure RD Connection Broker server name
166. Configure Reliability WMI Providers
167. Configure Report Archive
168. Configure Report Queue
169. Configure root certificate clean up
170. Configure Scenario Execution Level
171. Configure Scheduled Maintenance Behavior
172. Configure Security Policy for Scripted Diagnostics
173. Configure server authentication for client
174. Configure Slow link speed
175. Configure slow-link mode
176. Configure the list of blocked TPM commands
177. Configure the server address
178. Configure TPM platform validation profile
179. Configure use of passwords for fixed data drives
180. Configure use of passwords for removable data drives
181. Configure use of smart cards on fixed data drives
182. Configure use of smart cards on removable data drives
183. Configure Windows NTP Client
184. Connection-Specific DNS Suffix
185. Contact PDC on logon failure
186. Control rich previews for attachments
187. Control use of BitLocker on removable drives
188. Controlled load service type
189. Corporate DNS Probe Host Address
190. Corporate DNS Probe Host Name
191. Corporate Site Prefix List
192. Corporate Website Probe URL
193. Critical Battery Notification Action
194. Critical Battery Notification Level
195. Custom Classes: Deny read access
196. Custom Classes: Deny write access
197. Custom support URL in the Printers folder's left pane
198. Customize Command Labels
199. Customize consent settings
200. Customize User Agent String
201. Customize Warning Messages
202. DC Locator DNS records not registered by the DCs
203. Default application reporting settings
204. Default behavior for AutoRun
205. Default cache size
206. Default excluded paths
207. Default indexed paths
208. Default quota limit and warning level
209. Define Activation Security Check exemptions
210. Define host name-to-Kerberos realm mappings
211. Define interoperable Kerberos V5 realm settings
212. Delay Restart for scheduled installations
213. Delete cached copies of roaming profiles
214. Delete data from devices running Microsoft firmware when a user
logs off from the computer.
215. Delete user profiles older than a specified number of days on
system restart
216. Deny all add-ons unless specifically allowed in the Add-on List
217. Deny Delegating Default Credentials
218. Deny Delegating Fresh Credentials
219. Deny Delegating Saved Credentials
220. Deny logoff of an administrator logged in to the console session
221. Deny write access to fixed drives not protected by BitLocker
222. Deny write access to removable drives not protected by BitLocker
223. Deploy default Accelerators
224. Deploy non-default Accelerators
225. Detect application failures caused by deprecated COM objects
226. Detect application failures caused by deprecated Windows DLLs
227. Detect application install failures
228. Detect application installers that need to be run as administrator
229. Detect applications unable to launch installers under UAC
230. Diagnostics: Configure scenario execution level
231. Diagnostics: Configure scenario retention
232. Directory pruning interval
233. Directory pruning priority
234. Directory pruning retry
"235. Disable ""Configuring History"""
236. Disable .NET Framework Setup
237. Disable Automatic Install of Internet Explorer components
238. Disable binding directly to IPropertySetStorage without
intermediate layers.
239. Disable changing Automatic Configuration settings
240. Disable changing connection settings
241. Disable changing proxy settings
242. Disable delete notifications on all volumes
243. Disable IE security prompt for Windows Installer scripts
244. Disable indexer backoff
245. Disable Logging
246. Disable logging via package settings
247. Disable or enable software Secure Attention Sequence
248. Disable password strength validation for Peer Grouping
249. Disable Periodic Check for Internet Explorer software updates
250. Disable Per-User Installation of ActiveX Controls
251. Disable remote Desktop Sharing
252. Disable showing the splash screen
253. Disable software update shell notifications on program launch
254. Disable text prediction
255. Disable the Advanced page
256. Disable the Connections page
257. Disable the Content page
258. Disable the General page
259. Disable the Privacy page
260. Disable the Programs page
261. Disable the Security page
262. Disable toolbars and extensions when InPrivate Browsing starts
263. Disable Windows Error Reporting
264. Disable Windows Installer
265. Disallow changing of geographic location
266. Disallow Digest authentication
267. Disallow installation of printers using kernel-mode drivers
268. Disallow Interactive Users from generating Resultant Set of Policy data
269. Disallow Kerberos authentication
270. Disallow locally attached storage as backup target
271. Disallow Negotiate authentication
272. Disallow network as backup target
273. Disallow optical media as backup target
274. Disallow run-once backups
275. Disallow selection of Custom Locales
276. Disallow user override of locale settings
277. Disk Diagnostic: Configure custom alert text
278. Disk Diagnostic: Configure execution level
279. Disk Quota policy processing
280. Display a custom message title when device installation is
prevented by a policy setting
281. Display a custom message when installation is prevented by a policy
setting
282. Display Error Notification
283. Display information about previous logons during user logon
284. Display mixed content
285. Display Shutdown Event Tracker
286. Display string when smart card is blocked
287. DNS Servers
288. DNS Suffix Search List
289. Do not adjust default option to 'Install Updates and Shut Down' in
Shut Down Windows dialog box
290. Do not allow adding new targets via manual configuration
291. Do not allow additional session logins
292. Do not allow changes to initiator CHAP secret
293. Do not allow changes to initiator iqn name
294. Do not allow client printer redirection
295. Do not allow clipboard redirection
296. Do not allow color changes
297. Do not allow COM port redirection
298. Do not allow compression on all NTFS volumes
299. Do not allow connections without IPSec
300. Do not allow desktop composition
301. Do not allow Digital Locker to run
302. Do not allow drive redirection
303. Do not allow encryption on all NTFS volumes
304. Do not allow Flip3D invocation
305. Do not allow Inkball to run
306. Do not allow local administrators to customize permissions
307. Do not allow LPT port redirection
308. Do not allow manual configuration of discovered targets
309. Do not allow manual configuration of iSNS servers
310. Do not allow manual configuration of target portals
311. Do not allow non-Enhanced Storage removable devices
312. Do not allow password authentication of Enhanced Storage devices
313. Do not allow passwords to be saved
314. Do not allow printing to Journal Note Writer
315. Do not allow resetting Internet Explorer settings
316. Do not allow sessions without mutual CHAP
317. Do not allow sessions without one way CHAP
318. Do not allow smart card device redirection
319. Do not allow Snipping Tool to run
320. Do not allow Sound Recorder to run
321. Do not allow supported Plug and Play device redirection
322. Do not allow the BITS client to use Windows Branch Cache
323. Do not allow the computer to act as a BITS Peercaching client
324. Do not allow the computer to act as a BITS Peercaching server
325. Do not allow users to enable or disable add-ons
326. Do not allow web search
327. Do not allow window animations
328. Do not allow Windows Journal to be run
329. Do not allow Windows Media Center to run
330. Do not allow Windows Messenger to be run
331. Do not automatically encrypt files moved to encrypted folders
332. Do not automatically start Windows Messenger initially
333. Do not check for user ownership of Roaming Profile Folders
334. Do not collect InPrivate Filtering data
335. Do not delete temp folder upon exit
336. Do not detect slow network connections
337. Do not display 'Install Updates and Shut Down' option in Shut Down
Windows dialog box
338. Do not forcefully unload the users registry at user logoff
339. Do not log users on with temporary profiles
340. Do not process incoming mailslot messages used for domain
controller location based on NetBIOS domain names
341. Do not process the legacy run list
342. Do not process the run once list
343. Do not prompt for client certificate selection when no certificates
or only one certificate exists.
344. Do not save encrypted pages to disk
345. Do not send a Windows error report when a generic driver is
installed on a device
346. Do not send additional data
347. Do not set default client printer to be default printer in a session
348. Do Not Show First Use Dialog Boxes
"349. Do not show the ""local access only"" network icon"
350. Do not turn off system power after a Windows system shutdown has
occurred.
351. Do not use temporary folders per session
352. Domain Controller Address Type Returned
353. Domain Location Determination URL
354. Don't display the Getting Started welcome screen at logon
355. Don't set the always do this checkbox
356. Download missing COM components
357. Download signed ActiveX controls
358. Download unsigned ActiveX controls
359. Dynamic Registration of the DC Locator DNS Records
360. Dynamic Update
361. EFS recovery policy processing
362. Empty Temporary Internet Files folder when browser is closed
363. Enable client-side targeting
364. Enable disk quotas
365. Enable indexing of online delegate mailboxes
366. Enable indexing uncached Exchange folders
367. Enable Native XMLHttpRequest Support
368. Enable NTFS pagefile encryption
369. Enable Persistent Time Stamp
370. Enable throttling for online mail indexing
371. Enable Transparent Caching
372. Enable user control over installs
373. Enable user to browse for source while elevated
374. Enable user to patch elevated products
375. Enable user to use media source while elevated
376. Enable Windows NTP Client
377. Enable Windows NTP Server
378. Enable/Disable PerfTrack
379. Enabling Windows Update Power Management to automatically wake up
the system to install scheduled updates
380. Encrypt the Offline Files cache
381. Enforce disk quota limit
382. Enforce Full Screen Mode
383. Enforce Removal of Remote Desktop Wallpaper
384. Enforce upgrade component rules
385. Enumerate administrator accounts on elevation
386. Event logging level
387. Events.asp program
388. Events.asp program command line parameters
389. Events.asp URL
390. Exclude credential providers
391. Exclude files from being cached
392. Execute print drivers in isolated processes
393. Expected dial-up delay on logon
394. Extend Point and Print connection to search Windows Update
395. Files not cached
396. Filter duplicate logon certificates
397. Final DC Discovery Retry Setting for Background Callers
398. Floppy Drives: Deny execute access
399. Floppy Drives: Deny read access
400. Floppy Drives: Deny write access
401. Folder Redirection policy processing
402. For tablet pen input
403. For touch input
404. Force Rediscovery Interval
405. Force selected system UI language to overwrite the user UI language
406. Force the reading of all certificates from the smart card
407. ForwarderResourceUsage
408. Global Configuration Settings
409. Group Policy refresh interval for computers
410. Group Policy refresh interval for domain controllers
411. Group Policy slow link detection
412. Guaranteed service type
413. Hash Publication for BranchCache
414. Hide Advanced Properties Checkbox in Add Scheduled Task Wizard
415. Hide entry points for Fast User Switching
416. Hide notifications about RD Licensing problems that affect the RD
Session Host server
417. Hide previous versions list for local files
418. Hide previous versions list for remote files
419. Hide previous versions of files on backup location
420. Hide Property Pages
421. Hide the Command Bar
422. Hide the file scan progress window
423. Hide the Status Bar
424. Ignore custom consent settings
425. Ignore Delegation Failure
426. Ignore the default list of blocked TPM commands
427. Ignore the local list of blocked TPM commands
428. Include local directory path when uploading files to a server
429. Include rarely used Chinese
430. Include updated Web site lists from Microsoft
431. Indexer data location
432. Initial DC Discovery Retry Setting for Background Callers
433. Initial reminder balloon lifetime
434. Initialize and script ActiveX controls not marked as safe
435. InPrivate Filtering Threshold
436. Internet Explorer Maintenance policy processing
437. Internet Explorer Processes
438. Internet Zone Restricted Protocols
439. Internet Zone Template
440. Intranet Sites: Include all local (intranet) sites not listed in
other zones
441. Intranet Sites: Include all network paths (UNCs)
442. Intranet Sites: Include all sites that bypass the proxy server
443. Intranet Zone Restricted Protocols
444. Intranet Zone Template
445. IP Security policy processing
446. IP-HTTPS State
447. ISATAP Router Name
448. ISATAP State
449. Java permissions
450. Join RD Connection Broker
451. Launching applications and files in an IFRAME
452. Launching programs and unsafe files
453. Leave Windows Installer and Group Policy Software Installation Data
454. License server security group
455. Limit audio playback quality
456. Limit disk space used by offline files
457. Limit maximum color depth
458. Limit maximum display resolution
459. Limit maximum number of monitors
460. Limit number of connections
461. Limit outstanding packets
462. Limit reservable bandwidth
463. Limit the age of files in the BITS Peercache
464. Limit the BITS Peercache size
465. Limit the maximum BITS job download time
466. Limit the maximum network bandwidth for BITS background transfers
467. Limit the maximum network bandwidth used for Peercaching
468. Limit the maximum number of BITS jobs for each user
469. Limit the maximum number of BITS jobs for this computer
470. Limit the maximum number of files allowed in a BITS job
471. Limit the maximum number of ranges that can be added to the file in
a BITS job
472. Limit the size of the entire roaming user profile cache
473. Limit Windows File Protection cache size
474. List of applications to always report errors for
475. List of applications to be excluded
476. List of applications to never report errors for
477. Local Machine Zone Restricted Protocols
478. Local Machine Zone Template
479. Location of the DCs hosting a domain with single label DNS name
480. Lock all Toolbars
481. Lock Enhanced Storage when the computer is locked
482. Locked-Down Internet Zone Template
483. Locked-Down Intranet Zone Template
484. Locked-Down Local Machine Zone Template
485. Locked-Down Restricted Sites Zone Template
486. Locked-Down Trusted Sites Zone Template
487. Log Access
488. Log directory pruning retry events
489. Log event when quota limit exceeded
490. Log event when quota warning level exceeded
491. Log File Debug Output Level
492. Log File Path
493. Logging
494. Logon options
495. Loose XAML files
496. Low Battery Notification Action
497. Low Battery Notification Level
498. Make Parental Controls control panel visible on a Domain
499. Make proxy settings per-machine (rather than per-user)
500. MaxConcurrentUsers
501. Maximum DC Discovery Retry Interval Setting for Background Callers
502. Maximum Log File Size
503. Maximum Log Size (KB)
504. Maximum number of connections per server (HTTP 1.0)
505. Maximum number of connections per server (HTTP 1.1)
506. Maximum retries to unload and update user profile
507. Maximum wait time for Group Policy scripts
508. Microsoft Support Diagnostic Tool: Configure execution level
509. Microsoft Support Diagnostic Tool: Restrict tool download
510. Microsoft Support Diagnostic Tool: Turn on MSDT interactive
communication with Support Provider
511. Minimum Idle Connection Timeout for RPC/HTTP connections
512. Navigate windows and frames across different domains
513. Negative DC Discovery Cache Setting
514. Netlogon share compatibility
515. Network control service type
516. Network Projector Port Setting
517. No auto-restart with logged on users for scheduled automatic
updates installations
518. Non-conforming packets
519. Non-default server disconnect actions
520. Notify blocked drivers
521. Notify user of successful smart card driver installation
522. Offer Remote Assistance
523. Only allow approved domains to use ActiveX controls without prompt
524. Only allow local user profiles
525. Only use Package Point and print
526. Only use the ActiveX Installer Service for installation of ActiveX
Controls
527. Open files based on content
528. Optimize visual experience for Remote Desktop Services sessions
529. Override print driver execution compatibility setting reported by
print driver
530. Override the More Gadgets link
531. Package Point and print - Approved servers
532. Permitted Managers
533. Play animations in web pages
534. Play sounds in web pages
535. Play videos in web pages
536. Point and Print Restrictions
537. Pop-up allow list
538. Positive Periodic DC Cache Refresh for Background Callers
539. Positive Periodic DC Cache Refresh for Non-Background Callers
540. Pre-populate printer search location text
"541. Prevent ""Fix settings"" functionality"
542. Prevent access to 16-bit applications
543. Prevent adding UNC locations to index from Control Panel
544. Prevent adding user-specified locations to the All Locations menu
545. Prevent Automatic Updates
546. Prevent automatically adding shared folders to the index
547. Prevent Back-ESC mapping
548. Prevent backing up to local disks
549. Prevent backing up to network location
550. Prevent backing up to optical media (CD/DVD)
551. Prevent Bypassing SmartScreen Filter Warnings
552. Prevent clients from querying the index remotely
553. Prevent creation of a system restore point during device activity
that would normally prompt creation of a restore point
554. Prevent customization of indexed locations in Control Panel
555. Prevent Deleting Cookies
556. Prevent Deleting Favorites Site Data
557. Prevent Deleting Form Data
558. Prevent Deleting InPrivate Filtering data
559. Prevent Deleting Passwords
560. Prevent Deleting Temporary Internet Files
561. Prevent Deleting Web sites that the User has Visited
562. Prevent Desktop Shortcut Creation
563. Prevent device metadata retrieval from the Internet
564. Prevent display of the user interface for critical errors
565. Prevent displaying advanced indexing options in Control Panel
566. Prevent flicks
567. Prevent Flicks Learning Mode
568. Prevent ignoring certificate errors
569. Prevent IIS installation
570. Prevent indexing certain paths
571. Prevent indexing e-mail attachments
572. Prevent indexing files in offline files cache
573. Prevent indexing Microsoft Office Outlook
574. Prevent indexing of certain file types
575. Prevent indexing public folders
576. Prevent indexing when running on battery power to conserve energy
577. Prevent Input Panel tab from appearing
578. Prevent installation of devices not described by other policy settings
579. Prevent installation of devices that match any of these device IDs
580. Prevent installation of devices using drivers that match these
device setup classes
581. Prevent installation of removable devices
582. Prevent Internet Explorer Search box from displaying
583. Prevent launch an application
584. Prevent license upgrade
585. Prevent Media Sharing
586. Prevent memory overwrite on restart
587. Prevent participation in the Customer Experience Improvement Program
588. Prevent performance of First Run Customize settings
589. Prevent plaintext PINs from being returned by Credential Manager
590. Prevent press and hold
591. Prevent Quick Launch Toolbar Shortcut Creation
592. Prevent redirection of devices that match any of these device Ids
593. Prevent redirection of USB devices
594. Prevent restoring local previous versions
595. Prevent restoring previous versions from backups
596. Prevent restoring remote previous versions
597. Prevent Roaming Profile changes from propagating to the server
598. Prevent setting of the code download path for each machine
599. Prevent Task Run or End
600. Prevent the computer from joining a homegroup
601. Prevent the configuration of cipher strength update information URLs
602. Prevent the deletion of temporary Internet files and cookies
603. Prevent the user from running the Backup Status and Configuration
program
604. Prevent unwanted iFilters and protocol handlers
605. Prevent use of Offline Files folder
606. Prevent Video Smoothing
607. Prevent Windows Anytime Upgrade from running.
608. Prevent Windows from sending an error report when a device driver
requests additional software during installation
609. Prevent Windows Media DRM Internet Access
610. Preview pane location
611. Primary DNS Suffix
612. Primary DNS Suffix Devolution
613. Primary DNS Suffix Devolution Level
614. Printer browsing
615. Prioritize all digitally signed drivers equally during the driver
ranking and selection process
616. Priority Set in the DC Locator DNS SRV Records
617. Process List
618. Prohibit Access of the Windows Connect Now wizards
619. Prohibit Browse
620. Prohibit Drag-and-Drop
621. Prohibit Flyweight Patching
622. Prohibit installation and configuration of Network Bridge on your
DNS domain network
623. Prohibit installing or uninstalling color profiles
624. Prohibit 'Make Available Offline' for these file and folders
625. Prohibit New Task Creation
626. Prohibit non-administrators from applying vendor signed updates
627. Prohibit patching
628. Prohibit removal of updates
629. Prohibit rollback
630. Prohibit Task Deletion
631. Prohibit use of Internet Connection Firewall on your DNS domain network
632. Prohibit use of Internet Connection Sharing on your DNS domain network
633. Prohibit Use of Restart Manager
634. Prohibit user configuration of Offline Files
635. Prohibit User Installs
636. Prompt for credentials on the client computer
637. Prompt user when a slow network connection is detected
638. Propagation of extended error information
639. Provide the unique identifiers for your organization
640. Prune printers that are not automatically republished
641. Qualitative service type
642. Reduce Display Brightness (On Battery)
643. Reduce Display Brightness (Plugged In)
644. Refresh Interval of the DC Locator DNS Records
645. Register DNS records with connection-specific DNS suffix
646. Register PTR Records
647. Registration Refresh Interval
648. Registry policy processing
649. Reminder balloon frequency
650. Reminder balloon lifetime
651. Removable Disks: Deny execute access
652. Removable Disks: Deny read access
653. Removable Disks: Deny write access
"654. Remove ""Disconnect"" option from Shut Down dialog"
655. Remove Boot / Shutdown / Logon / Logoff status messages
656. Remove browse dialog box for new source
657. Remove 'Make Available Offline'
658. Remove Program Compatibility Property Page
659. Remove users ability to invoke machine policy refresh
660. Remove Windows Security item from Start menu
661. Replace Addresses In Conflicts
662. Report operating system errors
663. Report unplanned shutdown events
664. Report when logon server was not available during user logon
665. Re-prompt for restart with scheduled installations
666. Require a Password When a Computer Wakes (On Battery)
667. Require a Password When a Computer Wakes (Plugged In)
668. Require a PIN to access data on devices running Microsoft firmware
669. Require additional authentication at startup
670. Require additional authentication at startup (Windows Server 2008
and Windows Vista)
671. Require domain users to elevate when setting a network's location
672. Require secure RPC communication
673. Require strict KDC validation
674. Require strict target SPN match on remote procedure calls
675. Require trusted path for credential entry.
676. Require use of specific security layer for remote (RDP) connections
677. Require user authentication for remote connections by using Network
Level Authentication
678. Reschedule Automatic Updates scheduled installations
679. Reserve Battery Notification Level
680. Restrict changing the default search provider
681. Restrict Internet communication
682. Restrict potentially unsafe HTML Help functions to specified folders
683. Restrict Remote Desktop Services users to a single Remote Desktop
Services session
684. Restrict search providers to a specific list of providers
685. Restrict system locales
686. Restrict these programs from being launched from Help
687. Restrict unpacking and installation of gadgets that are not
digitally signed.
688. Restrict user locales
689. Restricted Sites Zone Restricted Protocols
690. Restricted Sites Zone Template
691. Restrictions for Unauthenticated RPC clients
692. Restricts the UI language Windows uses for all logged users
693. Retain old events
694. Reverse the subject name stored in a certificate when displaying
695. Route all traffic through the internal network
696. RPC Endpoint Mapper Client Authentication
697. RPC Troubleshooting State Information
698. Run .NET Framework-reliant components not signed with Authenticode
699. Run .NET Framework-reliant components signed with Authenticode
700. Run ActiveX controls and plugins
701. Run logon scripts synchronously
702. Run shutdown scripts visible
703. Run startup scripts asynchronously
704. Run startup scripts visible
705. Run these programs at user logon
706. Run Windows PowerShell scripts first at computer startup
707. Run Windows PowerShell scripts first at user logon
708. Scavenge Interval
709. Script ActiveX controls marked safe for scripting
710. Scripting of Java applets
711. Scripts policy processing
712. Security policy processing
713. Security Zones: Do not allow users to add/delete sites
714. Security Zones: Do not allow users to change policies
715. Security Zones: Use only machine settings
716. Select an Active Power Plan
717. Select the Lid Switch Action (On Battery)
718. Select the Lid Switch Action (Plugged In)
719. Select the Power Button Action (On Battery)
720. Select the Power Button Action (Plugged In)
721. Select the Sleep Button Action (On Battery)
722. Select the Sleep Button Action (Plugged In)
723. Select the Start Menu Power Button Action (On Battery)
724. Select the Start Menu Power Button Action (Plugged In)
725. Selectively allow the evaluation of a symbolic link
726. Send internationalized domain names
727. Server Authentication Certificate Template
728. Set a support web page link
729. Set BranchCache Distributed Cache mode
730. Set BranchCache Hosted Cache mode
731. Set client connection encryption level
732. Set compression algorithm for RDP data
733. Set large or small icon view in desktop search results
734. Set location of Stop and Refresh buttons
735. Set maximum wait time for the network if a user has a roaming user
profile or remote home directory
736. Set path for Remote Desktop Services Roaming User Profile
737. Set percentage of disk space used for client computer cache
738. Set PNRP cloud to resolve only
739. Set Remote Desktop Services User Home Directory
740. Set roaming profile path for all users logging onto this computer
741. Set rules for remote control of Remote Desktop Services user sessions
742. Set tab process growth
743. Set the Email IDs to which notifications are to be sent
744. Set the Remote Desktop licensing mode
745. Set the Seed Server
746. Set the SMTP Server used to send notifications
747. Set the Time interval in minutes for logging accounting data
748. Set time limit for active but idle Remote Desktop Services sessions
749. Set time limit for active Remote Desktop Services sessions
750. Set time limit for disconnected sessions
751. Set timer resolution
752. Set up a maintenance schedule to limit the maximum network
bandwidth used for BITS background transfers
753. Set up a work schedule to limit the maximum network bandwidth used
for BITS background transfers
754. Set Windows File Protection scanning
755. Sets how often a DFS Client discovers DC's
756. Short name creation options
757. Site Name
758. Site to Zone Assignment List
759. Sites Covered by the Application Directory Partition Locator DNS
SRV Records
760. Sites Covered by the DC Locator DNS SRV Records
761. Sites Covered by the GC Locator DNS SRV Records
762. Slow network connection timeout for user profiles
763. Software channel permissions
764. Software Installation policy processing
765. Solicited Remote Assistance
766. Specify a Custom Active Power Plan
767. Specify a default color
768. Specify channel binding token hardening level
769. Specify idle Timeout
770. Specify intranet Microsoft update service location
771. Specify maximum amount of memory in MB per Shell
772. Specify maximum number of processes per Shell
773. Specify maximum number of remote shells per user
774. Specify RD Session Host server fallback printer driver behavior
775. Specify search order for device driver source locations
776. Specify SHA1 thumbprints of certificates representing trusted .rdp
publishers
777. Specify Shell Timeout
778. Specify the Display Dim Brightness (On Battery)
779. Specify the Display Dim Brightness (Plugged In)
780. Specify the System Hibernate Timeout (On Battery)
781. Specify the System Hibernate Timeout (Plugged In)
782. Specify the System Sleep Timeout (On Battery)
783. Specify the System Sleep Timeout (Plugged In)
784. Specify the Unattended Sleep Timeout (On Battery)
785. Specify the Unattended Sleep Timeout (Plugged In)
786. Specify Windows File Protection cache location
787. Specify Windows installation file location
788. Specify Windows Service Pack installation file location
789. SSL Cipher Suite Order
790. Start a program on connection
791. Startup policy processing wait time
792. Stop indexing in the event of limited hard drive space
793. Store BitLocker recovery information in Active Directory Domain
Services(Windows Server 2008 and Windows Vista)
794. Subfolders always available offline
795. Submit non-encrypted form data
796. Switch to the Simplified Chinese (PRC) gestures
797. Synchronize all offline files before logging off
798. Synchronize all offline files when logging on
799. Synchronize offline files before suspend
800. Sysvol share compatibility
801. Tag Windows Customer Experience Improvement data with Study Identifier
802. Tape Drives: Deny execute access
803. Tape Drives: Deny read access
804. Tape Drives: Deny write access
805. Teredo Client Port
806. Teredo Default Qualified
807. Teredo Refresh Rate
808. Teredo Server Name
809. Teredo State
810. Terminate session when time limits are reached
811. Time (in seconds) to force reboot
812. Time (in seconds) to force reboot when required for policy changes
to take effect
813. Timeout for dialog boxes
814. Timeout for fast user switching events
815. Timeout for hung logon sessions during shutdown
816. Timeout for inactive BITS jobs
817. Traps for public community
818. Troubleshooting: Allow users to access and run Troubleshooting Wizards
819. Troubleshooting: Allow users to access online troubleshooting
content on Microsoft servers from the Troubleshooting Control Panel (via
the Windows Online Troubleshooting Service - WOTS)
820. Trusted Hosts
821. Trusted Sites Zone Restricted Protocols
822. Trusted Sites Zone Template
823. Try Next Closest Site
824. TTL Set in the A and PTR records
825. TTL Set in the DC Locator DNS Records
"826. Turn off ""Delete Browsing History"" functionality"
"827. Turn off ""Found New Hardware"" balloons during device installation"
828. Turn off Accelerators
829. Turn off access to all Windows Update features
830. Turn off access to the OEM and Microsoft branding section
831. Turn off access to the performance center core section
832. Turn off access to the solutions to performance problems section
833. Turn off Active Help
834. Turn off ActiveX opt-in prompt
835. Turn Off Adaptive Display Timeout (On Battery)
836. Turn Off Adaptive Display Timeout (Plugged In)
837. Turn off addition and removal of feeds and Web Slices
838. Turn off Application Compatibility Engine
839. Turn off Application Telemetry
840. Turn off AutoComplete integration with Input Panel
841. Turn off Automatic Crash Recovery Prompt
842. Turn off automatic learning
843. Turn off Automatic Root Certificates Update
844. Turn off automatic termination of applications that block or cancel
shutdown
845. Turn off automatic wake
846. Turn off Autoplay
847. Turn off Autoplay for non-volume devices
848. Turn off background refresh of Group Policy
849. Turn off background sync for feeds and Web Slices
850. Turn Off Boot and Resume Optimizations
851. Turn Off Cache Power Mode
852. Turn off changing the URL to be displayed for checking updates to
Internet Explorer and Internet Tools
853. Turn off ClearType
854. Turn off Compatibility View
855. Turn off Compatibility View button
856. Turn off Configuration
857. Turn off configuration of default behavior of new tab creation
858. Turn off configuration of tabbed browsing pop-up behavior
859. Turn off configuration of window reuse
860. Turn off configuring the update check interval (in days)
861. Turn off Connect to a Network Projector
862. Turn off Crash Detection
863. Turn off creation of System Restore Checkpoints
864. Turn off Cross Document Messaging
865. Turn off Data Execution Prevention
866. Turn off Data Execution Prevention for Explorer
867. Turn off Data Execution Prevention for HTML Help Executible
868. Turn off Data URI Support
869. Turn off desktop gadgets
870. Turn off Developer Tools
871. Turn off displaying the Internet Explorer Help Menu
872. Turn off downloading of enclosures
873. Turn off downloading of game information
874. Turn off downloading of print drivers over HTTP
875. Turn off Encryption Support
"876. Turn off Event Viewer ""Events.asp"" links"
877. Turn off Favorites bar
878. Turn off feed and Web Slices discovery
879. Turn Off First-Run Opt-In
880. Turn off game updates
881. Turn off handwriting personalization data sharing
882. Turn off handwriting recognition error reporting
883. Turn off hardware buttons
884. Turn off heap termination on corruption
"885. Turn off Help and Support Center ""Did you know?"" content"
886. Turn off Help and Support Center Microsoft Knowledge Base search
887. Turn Off Hybrid Sleep (On Battery)
888. Turn Off Hybrid Sleep (Plugged In)
889. Turn off InPrivate Browsing
890. Turn off InPrivate Filtering
891. Turn off Internet Connection Wizard if URL connection is referring
to Microsoft.com
892. Turn off Internet download for Web publishing and online ordering
wizards
893. Turn off Internet File Association service
894. Turn off legacy remote shutdown interface
895. Turn off Local Group Policy objects processing
896. Turn off location
897. Turn off location scripting
898. Turn Off Low Battery User Notification
899. Turn off Managing Phishing filter
900. Turn off Managing Pop-up Allow list
901. Turn off managing Pop-up filter level
902. Turn off Managing SmartScreen Filter
903. Turn off Microsoft Peer-to-Peer Networking Services
904. Turn off Multicast Bootstrap
905. Turn off Multicast Name Resolution
906. Turn Off Non Volatile Cache Feature
907. Turn off numerical sorting in Windows Explorer
908. Turn off page zooming functionality
909. Turn off password security in Input Panel
910. Turn off pen feedback
911. Turn off PNRP cloud creation
912. Turn off pop-up management
913. Turn off printing over HTTP
914. Turn off Problem Steps Recorder
915. Turn off Profile Assistant
916. Turn off Program Compatibility Assistant
917. Turn off Program Inventory
918. Turn off Quick Tabs functionality
919. Turn off Real-Time Monitoring
920. Turn off Registration if URL connection is referring to Microsoft.com
921. Turn off reminder balloons
922. Turn off Reopen Last Browsing Session
923. Turn off restore functionality
924. Turn off Resultant Set of Policy logging
925. Turn off Routinely Taking Action
926. Turn off Search Companion content file updates
927. Turn off sensors
928. Turn off shell protocol protected mode
929. Turn Off Solid State Mode
930. Turn off suggestions for all user-installed providers
931. Turn off SwitchBack Compatibility Engine
932. Turn off System Restore
933. Turn off tabbed browsing
934. Turn off Tablet PC Pen Training
935. Turn off Tablet PC touch input
"936. Turn off the ""Order Prints"" picture task"
"937. Turn off the ""Publish to Web"" task for files and folders"
938. Turn off the ability to back up data files
939. Turn off the ability to create a system image
940. Turn off the activation of the quick pick menu
941. Turn off the auto-complete feature for web addresses
942. Turn off the communities features
943. Turn Off the Display (On Battery)
944. Turn Off the Display (Plugged In)
945. Turn off the feed list
946. Turn Off the Hard Disk (On Battery)
947. Turn Off the Hard Disk (Plugged In)
948. Turn off the Security Settings Check feature
949. Turn off the Windows Messenger Customer Experience Improvement Program
950. Turn off the XDomainRequest Object
951. Turn off tolerant and Z-shaped scratch-out gestures
952. Turn off toolbar upgrade tool
953. Turn off Touch Panning
954. Turn off tracking of last play time of games in the Games folder
955. Turn Off user-installed desktop gadgets
956. Turn off Windows Calendar
957. Turn off Windows Customer Experience Improvement Program
958. Turn off Windows Defender
959. Turn off Windows Error Reporting
960. Turn off Windows HotStart
961. Turn off Windows Mail application
962. Turn off Windows Mobility Center
963. Turn off Windows Network Connectivity Status Indicator active tests
964. Turn off Windows presentation settings
965. Turn off Windows Search AutoComplete
966. Turn off Windows SideShow
967. Turn off Windows Startup Sound
968. Turn off Windows Update device driver search prompt
969. Turn off Windows Update device driver searching
970. Turn on Accounting for WSRM
971. Turn on automatic detection of the intranet
972. Turn on bandwidth optimization
973. Turn on Basic feed authentication over HTTP
974. Turn on BranchCache
975. Turn on Caret Browsing support
976. Turn on certificate propagation from smart card
977. Turn On Compatibility HTTP Listener
978. Turn On Compatibility HTTPS Listener
979. Turn on Compatibility Logging
980. Turn on Cross-Site Scripting (XSS) Filter
981. Turn on definition updates through both WSUS and the Microsoft
Malware Protection Center
982. Turn on definition updates through both WSUS and Windows Update
983. Turn On Desktop Background Slideshow (On Battery)
984. Turn On Desktop Background Slideshow (Plugged In)
985. Turn on economical application of administratively assigned Offline
Files
986. Turn on Information bar notification for intranet content
987. Turn on Internet Explorer 7 Standards Mode
988. Turn on Internet Explorer Standards Mode for Local Intranet
989. Turn on logging
990. Turn on Mapper I/O (LLTDIO) driver
991. Turn on menu bar by default
992. Turn on Protected Mode
993. Turn on recommended updates via Automatic Updates
994. Turn on Responder (RSPNDR) driver
995. Turn on root certificate propagation from smart card
996. Turn on Security Center (Domain PCs only)
997. Turn on session logging
998. Turn on Smart Card Plug and Play service
999. Turn on Software Notifications
1000. Turn on the Ability for Applications to Prevent Sleep Transitions
(On Battery)
1001. Turn on the Ability for Applications to Prevent Sleep Transitions
(Plugged In)
1002. Turn on TPM backup to Active Directory Domain Services
1003. Turn on Warn about Certificate Address Mismatch
1004. Update Security Level
1005. Update Top Level Domain Zones
1006. Use forest search order
1007. Use HTTP 1.1
1008. Use HTTP 1.1 through proxy connections
1009. Use IP Address Redirection
1010. Use large Icons for Command Buttons
1011. Use localized subfolder names when redirecting Start Menu and My
Documents
1012. Use mandatory profiles on the RD Session Host server
1013. Use Policy Accelerators
1014. Use Policy List of Internet Explorer 7 sites
1015. Use Pop-up Blocker
1016. Use Remote Desktop Easy Print printer driver first
1017. Use SmartScreen Filter
1018. Use the specified Remote Desktop license servers
1019. Use UTF-8 for mailto links
1020. User Group Policy loopback processing mode
1021. Userdata persistence
1022. Validate smart card certificate usage rule compliance
1023. Verbose vs normal status messages
1024. Verify old and new Folder Redirection targets point to the same
share before redirecting
1025. Wait for remote user profile
1026. Web sites in less privileged Web content zones can navigate into
this zone
1027. Web-based printing
1028. Weight Set in the DC Locator DNS SRV Records
1029. Windows Firewall: Allow authenticated IPsec bypass
1030. Windows Firewall: Allow ICMP exceptions
1031. Windows Firewall: Allow inbound file and printer sharing exception
1032. Windows Firewall: Allow inbound remote administration exception
1033. Windows Firewall: Allow inbound Remote Desktop exceptions
1034. Windows Firewall: Allow inbound UPnP framework exceptions
1035. Windows Firewall: Allow local port exceptions
1036. Windows Firewall: Allow local program exceptions
1037. Windows Firewall: Allow logging
1038. Windows Firewall: Define inbound port exceptions
1039. Windows Firewall: Define inbound program exceptions
1040. Windows Firewall: Do not allow exceptions
1041. Windows Firewall: Prohibit notifications
1042. Windows Firewall: Prohibit unicast response to multicast or
broadcast requests
1043. Windows Firewall: Protect all network connections
1044. Windows Scaling Heuristics State
1045. Wired policy processing
1046. Wireless policy processing
1047. WPD Devices: Deny read access
1048. WPD Devices: Deny write access
1049. XAML browser applications
1050. XPS documents



And great rebuttal, by the way, bird. You must be an "advocate": snip
and run and change the topic.

Don't forget: MS is doomed.
owl
2010-04-03 04:13:22 UTC
Permalink
Post by DFS
363. Enable client-side targeting
Stop. I think we found the problem.
DFS
2010-04-03 04:31:29 UTC
Permalink
Post by owl
Post by DFS
363. Enable client-side targeting
Stop. I think we found the problem.
Run owl! Run!
owl
2010-04-03 15:22:54 UTC
Permalink
Post by DFS
Post by owl
Post by DFS
363. Enable client-side targeting
Stop. I think we found the problem.
Run owl! Run!
Agreed. Everybody should run from a system whose "Default ..." configuration
settings are in a "Not configured" state by default.
Chris Ahlstrom
2010-04-03 16:18:31 UTC
Permalink
Post by owl
Post by DFS
Post by owl
Post by DFS
363. Enable client-side targeting
Stop. I think we found the problem.
Run owl! Run!
Agreed. Everybody should run from a system whose "Default ..." configuration
settings are in a "Not configured" state by default.
Yeah. That way you have no idea what the default behavior is, unless you
Googoo for it.
--
You have the power to influence all with whom you come in contact.
Chris Ahlstrom
2010-04-03 13:33:39 UTC
Permalink
Post by owl
Post by DFS
363. Enable client-side targeting
Stop. I think we found the problem.
The funny thing is DFS thinks that lengthy run-on list settings somehow
makes Windows configuration easy.

I wonder if he realizes just how permutations of settings there are that
need to be tested, and how many of them Microsoft is able to test.
--
All generalizations are false, including this one.
-- Mark Twain
owl
2010-04-03 15:33:36 UTC
Permalink
Post by Chris Ahlstrom
Post by owl
Post by DFS
363. Enable client-side targeting
Stop. I think we found the problem.
The funny thing is DFS thinks that lengthy run-on list settings somehow
makes Windows configuration easy.
I wonder if he realizes just how permutations of settings there are that
need to be tested, and how many of them Microsoft is able to test.
Just *setting* all combinations would be a challenge, much less testing
them.
Chris Ahlstrom
2010-04-03 16:21:04 UTC
Permalink
Post by owl
Post by Chris Ahlstrom
Post by owl
Post by DFS
363. Enable client-side targeting
Stop. I think we found the problem.
The funny thing is DFS thinks that lengthy run-on list settings somehow
makes Windows configuration easy.
I wonder if he realizes just how permutations of settings there are that
need to be tested, and how many of them Microsoft is able to test.
Just *setting* all combinations would be a challenge, much less testing
them.
One has to choose between a certain kind of convenience (all your settings
in one GUI) and a certain kind of safety (each subsystem cares only about
its settings).

When I first started with Linux, I used Red Hat's linuxconf app, a GUI which
provided a grab-bag of setting in much the same manner as DFS's policy
editors.

It was a very convenient way to get started and get familiar with Linux.

But it was not a very good way to make changes in general, and I migrated to
the actual config files as soon as possible.
--
Q: How do you shoot a blue elephant?
A: With a blue-elephant gun.

Q: How do you shoot a pink elephant?
A: Twist its trunk until it turns blue, then shoot it with
a blue-elephant gun.
GreyCloud
2010-04-03 02:39:40 UTC
Permalink
Post by DFS
Just enter gpedit.msc or secpol.msc in the Start-search box
Below are the 900 settings found just in the Local Group Policy | User
Config | Admin Templates. There are an additional 1050 settings found
in the Computer Config | Admin Templates. Hundreds more in various
other categories. All easily discoverable, understandable, and editable.
The primitive and clownish Linux "operating system" amateurish hobbyware
requires the victim to use dozens of (cr)apps spread all over the place,
yet still has only a subset of these settings available.
So when they say Linux is more configurable, they mean if you literally
have years to learn how, and days and days to download little (cr)apps
and figure out where.
1. .Net Framework Configuration
2. Ability to change properties of an all user remote access connection
3. Ability to delete all user remote access connections
4. Ability to Enable/Disable a LAN connection
5. Ability to rename all user remote access connections
6. Ability to rename LAN connections
7. Ability to rename LAN connections or remote access connections
available to all users
8. Access data sources across domains
<etc>

I wonder if this is the same thing that Cnet.news reported as the 'God
Mode'?
DFS
2010-04-03 02:59:30 UTC
Permalink
Post by GreyCloud
Post by DFS
Just enter gpedit.msc or secpol.msc in the Start-search box
Below are the 900 settings found just in the Local Group Policy | User
Config | Admin Templates. There are an additional 1050 settings found
in the Computer Config | Admin Templates. Hundreds more in various
other categories. All easily discoverable, understandable, and editable.
The primitive and clownish Linux "operating system" amateurish
hobbyware requires the victim to use dozens of (cr)apps spread all
over the place, yet still has only a subset of these settings available.
So when they say Linux is more configurable, they mean if you
literally have years to learn how, and days and days to download
little (cr)apps and figure out where.
1. .Net Framework Configuration
2. Ability to change properties of an all user remote access connection
3. Ability to delete all user remote access connections
4. Ability to Enable/Disable a LAN connection
5. Ability to rename all user remote access connections
6. Ability to rename LAN connections
7. Ability to rename LAN connections or remote access connections
available to all users
8. Access data sources across domains
<etc>
I wonder if this is the same thing that Cnet.news reported as the 'God
Mode'?
It's not. God Mode is initiated by creating a special folder, which
then shows you all the Control Panel items in a list format. It's
handy, but doesn't give you anything more than what's already available
in the Control Panel.

Some settings are 2-way (available in the Control Panel as well as in
the Local Group and Security settings).

For the most part, Win7 offers far more fine-grained control over the
operating environment than Linux, but Linux lets you do useful things
like boot headless (available in WinServer 08), and it scales very low
and high.
ray
2010-04-03 03:25:03 UTC
Permalink
Post by DFS
Just enter gpedit.msc or secpol.msc in the Start-search box
Below are the 900 settings found just in the Local Group Policy | User
Config | Admin Templates. There are an additional 1050 settings found
in the Computer Config | Admin Templates. Hundreds more in various
other categories. All easily discoverable, understandable, and editable.
The primitive and clownish Linux "operating system" amateurish hobbyware
requires the victim to use dozens of (cr)apps spread all over the place,
yet still has only a subset of these settings available.
So when they say Linux is more configurable, they mean if you literally
have years to learn how, and days and days to download little (cr)apps
and figure out where.
1. .Net Framework Configuration
2. Ability to change properties of an all user remote access connection
. . .
899. Submit non-encrypted form data
900. Subscription Limits
MS is doomed.
Sure as hell is - who wants to wade through all that bullshit to find
what he's looking for to change? With Linux, you simply change it.
DFS
2010-04-03 04:23:09 UTC
Permalink
Post by ray
Post by DFS
Just enter gpedit.msc or secpol.msc in the Start-search box
Below are the 900 settings found just in the Local Group Policy | User
Config | Admin Templates. There are an additional 1050 settings found
in the Computer Config | Admin Templates. Hundreds more in various
other categories. All easily discoverable, understandable, and editable.
The primitive and clownish Linux "operating system" amateurish hobbyware
requires the victim to use dozens of (cr)apps spread all over the place,
yet still has only a subset of these settings available.
So when they say Linux is more configurable, they mean if you literally
have years to learn how, and days and days to download little (cr)apps
and figure out where.
1. .Net Framework Configuration
2. Ability to change properties of an all user remote access connection
. . .
899. Submit non-encrypted form data
900. Subscription Limits
MS is doomed.
Sure as hell is
Yeah, you'll be putting your money on that bet real soon now...
Post by ray
- who wants to wade through all that bullshit to find
what he's looking for to change? With Linux, you simply change it.
Spoken like a true Linux cult member.

Where do I go in Linux to change the unit of time (milliseconds) the
packet scheduler uses when scheduling packets for tranmission?

Where do I go in Linux to allow/disallow encryption on an ext3 partition?

Where do I enable or disable the network publishing of shared printers
connected to the machine?

In Windows, those settings are all neatly packaged and made in the Group
Policy editor, along with a cogent explanation of each item.

In Linux it's a fiasco to find such settings in the first place, and
it's most likely done differently in each major distribution.

Don't run away, raytard. Answer each question.
Moshe
2010-04-03 12:05:37 UTC
Permalink
Post by DFS
Post by ray
Post by DFS
Just enter gpedit.msc or secpol.msc in the Start-search box
Below are the 900 settings found just in the Local Group Policy | User
Config | Admin Templates. There are an additional 1050 settings found
in the Computer Config | Admin Templates. Hundreds more in various
other categories. All easily discoverable, understandable, and editable.
The primitive and clownish Linux "operating system" amateurish hobbyware
requires the victim to use dozens of (cr)apps spread all over the place,
yet still has only a subset of these settings available.
So when they say Linux is more configurable, they mean if you literally
have years to learn how, and days and days to download little (cr)apps
and figure out where.
1. .Net Framework Configuration
2. Ability to change properties of an all user remote access connection
. . .
899. Submit non-encrypted form data
900. Subscription Limits
MS is doomed.
Sure as hell is
Yeah, you'll be putting your money on that bet real soon now...
Post by ray
- who wants to wade through all that bullshit to find
what he's looking for to change? With Linux, you simply change it.
Spoken like a true Linux cult member.
Where do I go in Linux to change the unit of time (milliseconds) the
packet scheduler uses when scheduling packets for tranmission?
Where do I go in Linux to allow/disallow encryption on an ext3 partition?
Where do I enable or disable the network publishing of shared printers
connected to the machine?
In Windows, those settings are all neatly packaged and made in the Group
Policy editor, along with a cogent explanation of each item.
In Linux it's a fiasco to find such settings in the first place, and
it's most likely done differently in each major distribution.
Don't run away, raytard. Answer each question.
He should be having fun looking them up in google now.
Hadron
2010-04-03 12:18:45 UTC
Permalink
Post by Moshe
Post by DFS
Don't run away, raytard. Answer each question.
He should be having fun looking them up in google now.
Nah, he's probably doing some complicated Fourier analysis for non MOD
related sciences for the civil service while knocking up Guis quicker
"in X" than people can with the oodles of classes and libraries
available for Windows. That or reinstalling down at the local library
....

Actually Ray is a fair enough advocate most times. He only recently
started telling lies about Windows to ingratiate himself with other
"advocates".
ray
2010-04-03 14:24:55 UTC
Permalink
Post by DFS
Post by ray
Post by DFS
Just enter gpedit.msc or secpol.msc in the Start-search box
Below are the 900 settings found just in the Local Group Policy | User
Config | Admin Templates. There are an additional 1050 settings found
in the Computer Config | Admin Templates. Hundreds more in various
other categories. All easily discoverable, understandable, and editable.
The primitive and clownish Linux "operating system" amateurish
hobbyware requires the victim to use dozens of (cr)apps spread all
over the place, yet still has only a subset of these settings
available.
So when they say Linux is more configurable, they mean if you
literally have years to learn how, and days and days to download
little (cr)apps and figure out where.
1. .Net Framework Configuration
2. Ability to change properties of an all user remote access
connection . . .
899. Submit non-encrypted form data
900. Subscription Limits
MS is doomed.
Sure as hell is
Yeah, you'll be putting your money on that bet real soon now...
Post by ray
- who wants to wade through all that bullshit to find what he's looking
for to change? With Linux, you simply change it.
Spoken like a true Linux cult member.
Where do I go in Linux to change the unit of time (milliseconds) the
packet scheduler uses when scheduling packets for tranmission?
Where do I go in Linux to allow/disallow encryption on an ext3
partition?
Where do I enable or disable the network publishing of shared printers
connected to the machine?
In Windows, those settings are all neatly packaged and made in the Group
Policy editor, along with a cogent explanation of each item.
In Linux it's a fiasco to find such settings in the first place, and
it's most likely done differently in each major distribution.
Don't run away, raytard. Answer each question.
Same question - please give the number for each item you specify out of
your list of 900.
DFS
2010-04-03 16:12:38 UTC
Permalink
Post by ray
Post by DFS
Post by ray
- who wants to wade through all that bullshit to find what he's looking
for to change? With Linux, you simply change it.
Spoken like a true Linux cult member.
Where do I go in Linux to change the unit of time (milliseconds) the
packet scheduler uses when scheduling packets for tranmission?
Where do I go in Linux to allow/disallow encryption on an ext3 partition?
Where do I enable or disable the network publishing of shared printers
connected to the machine?
In Windows, those settings are all neatly packaged and made in the Group
Policy editor, along with a cogent explanation of each item.
In Linux it's a fiasco to find such settings in the first place, and
it's most likely done differently in each major distribution.
Don't run away, raytard. Answer each question.
Same question - please give the number for each item you specify out of
your list of 900.
I ask a very reasonable 3 items of you, and instead of answering
(because you can't - even though you said it was simple) you ignore the
reasonable request and come back shrieking hysterically and ask me to
investigate 900 settings.

Good job, raytard. The believe anything, lie at any costs, Linux
"advocate" cult members thank you for your efforts.
ray
2010-04-03 16:39:27 UTC
Permalink
Post by DFS
Post by ray
Post by DFS
Post by ray
- who wants to wade through all that bullshit to find what he's
looking for to change? With Linux, you simply change it.
Spoken like a true Linux cult member.
Where do I go in Linux to change the unit of time (milliseconds) the
packet scheduler uses when scheduling packets for tranmission?
Where do I go in Linux to allow/disallow encryption on an ext3 partition?
Where do I enable or disable the network publishing of shared printers
connected to the machine?
In Windows, those settings are all neatly packaged and made in the
Group Policy editor, along with a cogent explanation of each item.
In Linux it's a fiasco to find such settings in the first place, and
it's most likely done differently in each major distribution.
Don't run away, raytard. Answer each question.
Same question - please give the number for each item you specify out of
your list of 900.
I ask a very reasonable 3 items of you, and instead of answering
(because you can't - even though you said it was simple) you ignore the
reasonable request and come back shrieking hysterically and ask me to
investigate 900 settings.
Good job, raytard. The believe anything, lie at any costs, Linux
"advocate" cult members thank you for your efforts.
I'm not asking you to 'investigate 900 settings'. I'm simply asking you
to answer your own questions in your favored environment. In order for
your 'questions' to have any validity - you must be able to answer them
yourself - but I see you can't. If you you can't do what you're asking
with your superior interface, then what, exactly, is your point???
DFS
2010-04-03 16:43:10 UTC
Permalink
Post by ray
Post by DFS
Post by ray
Post by DFS
Post by ray
- who wants to wade through all that bullshit to find what he's
looking for to change? With Linux, you simply change it.
Spoken like a true Linux cult member.
Where do I go in Linux to change the unit of time (milliseconds) the
packet scheduler uses when scheduling packets for tranmission?
Where do I go in Linux to allow/disallow encryption on an ext3 partition?
Where do I enable or disable the network publishing of shared printers
connected to the machine?
In Windows, those settings are all neatly packaged and made in the
Group Policy editor, along with a cogent explanation of each item.
In Linux it's a fiasco to find such settings in the first place, and
it's most likely done differently in each major distribution.
Don't run away, raytard. Answer each question.
Same question - please give the number for each item you specify out of
your list of 900.
I ask a very reasonable 3 items of you, and instead of answering
(because you can't - even though you said it was simple) you ignore the
reasonable request and come back shrieking hysterically and ask me to
investigate 900 settings.
Good job, raytard. The believe anything, lie at any costs, Linux
"advocate" cult members thank you for your efforts.
I'm not asking you to 'investigate 900 settings'. I'm simply asking you
to answer your own questions in your favored environment. In order for
your 'questions' to have any validity - you must be able to answer them
yourself - but I see you can't. If you you can't do what you're asking
with your superior interface, then what, exactly, is your point???
Quit running and whining and answer the questions that you claim are
"simple" in Linux.

1. Where do I go in Linux to change the unit of time (milliseconds) the
packet scheduler uses when scheduling packets for tranmission?

2. Where do I go in Linux to allow/disallow encryption on an ext3
partition?

3. Where do I enable or disable the network publishing of shared
printers connected to the machine?
Hadron
2010-04-04 04:44:12 UTC
Permalink
Post by ray
Post by DFS
Post by ray
Post by DFS
Post by ray
- who wants to wade through all that bullshit to find what he's
looking for to change? With Linux, you simply change it.
Spoken like a true Linux cult member.
Where do I go in Linux to change the unit of time (milliseconds) the
packet scheduler uses when scheduling packets for tranmission?
Where do I go in Linux to allow/disallow encryption on an ext3 partition?
Where do I enable or disable the network publishing of shared printers
connected to the machine?
In Windows, those settings are all neatly packaged and made in the
Group Policy editor, along with a cogent explanation of each item.
In Linux it's a fiasco to find such settings in the first place, and
it's most likely done differently in each major distribution.
Don't run away, raytard. Answer each question.
Same question - please give the number for each item you specify out of
your list of 900.
I ask a very reasonable 3 items of you, and instead of answering
(because you can't - even though you said it was simple) you ignore the
reasonable request and come back shrieking hysterically and ask me to
investigate 900 settings.
Good job, raytard. The believe anything, lie at any costs, Linux
"advocate" cult members thank you for your efforts.
I'm not asking you to 'investigate 900 settings'. I'm simply asking you
to answer your own questions in your favored environment. In order for
your 'questions' to have any validity - you must be able to answer them
yourself - but I see you can't. If you you can't do what you're asking
with your superior interface, then what, exactly, is your point???
Ray, if it's not strikingly obvious to you then you really should take a
deep breath and go back and reread the thread.

Hint : unified interface compared to , err, the kind of skills Terry
"telnet" Porter reckons takes a minimum of ten years to learn.

No one said any UI would stop you having to think. But if the difference
isnt clear then you really need to stay off the mogodon.
Chris Ahlstrom
2010-04-03 16:17:52 UTC
Permalink
Post by ray
Post by DFS
Where do I go in Linux to change the unit of time (milliseconds) the
packet scheduler uses when scheduling packets for tranmission?
Why would you want to change that in an asynchronous TCP/IP stack?

That would seem to me to cause unacceptable latency when dealing with an
extremely large number of simultaneous connections, like you find in those
super-computer Linux clusters that kick Windows' ass.
Post by ray
Post by DFS
Where do I go in Linux to allow/disallow encryption on an ext3 partition?
There are so many options (choice). What do you want to do?
What are the use cases?
Post by ray
Post by DFS
Where do I enable or disable the network publishing of shared printers
connected to the machine?
That's an easy CUPS option.
Post by ray
Post by DFS
In Windows, those settings are all neatly packaged and made in the Group
Policy editor, along with a cogent explanation of each item.
In Linux it's a fiasco to find such settings in the first place, and
it's most likely done differently in each major distribution.
Nope. In Linux it is a function of each subsystem, and part of the normal
configuration files for that subsystem.

The only fiasco here is thinking that there's only one true way to manage
the complexity of a server operating system.
Post by ray
Same question - please give the number for each item you specify out of
your list of 900.
The very modularity that DFS seems to detest is actually the great strength
of the UNIXen.

Maybe DFS can explain why interactions between Active Directory and DNS
cause so many problems in a Windows network.

Let's face it. Microsoft Windows integrates too many facilities together,
so that doing some action can have surprising effects in a subsystem
you'd think would be totally unaffected by the change.
--
Good day to let down old friends who need help.
owl
2010-04-03 19:18:42 UTC
Permalink
Post by Chris Ahlstrom
Let's face it. Microsoft Windows integrates too many facilities together,
so that doing some action can have surprising effects in a subsystem
you'd think would be totally unaffected by the change.
I especially like how static routes added with the route command don't
show up in the RRAS static routes list.
Chris Ahlstrom
2010-04-03 20:28:47 UTC
Permalink
Post by owl
Post by Chris Ahlstrom
Let's face it. Microsoft Windows integrates too many facilities together,
so that doing some action can have surprising effects in a subsystem
you'd think would be totally unaffected by the change.
I especially like how static routes added with the route command don't
show up in the RRAS static routes list.
What a kick in the head. I thought DFS said Windows was integrated.

Got an MS KB article number?

support.microsoft.com not responding.
--
Q: Why did the chicken cross the road?
A: He was giving it last rites.
owl
2010-04-03 22:42:36 UTC
Permalink
Post by Chris Ahlstrom
Post by owl
Post by Chris Ahlstrom
Let's face it. Microsoft Windows integrates too many facilities together,
so that doing some action can have surprising effects in a subsystem
you'd think would be totally unaffected by the change.
I especially like how static routes added with the route command don't
show up in the RRAS static routes list.
What a kick in the head. I thought DFS said Windows was integrated.
Got an MS KB article number?
No, I came across that info in two different MS Press Minesweeper Consultant
books (both 2nd Ed.), for exams 70-291 (p. 9-24) and 70-293 (p. 5-48).
Post by Chris Ahlstrom
support.microsoft.com not responding.
You should subscribe to the weekly hardcopy magazine, "Byzantium After
Dark".
RayLopez99
2010-04-03 12:21:09 UTC
Permalink
Post by DFS
Just enter gpedit.msc or secpol.msc in the Start-search box
Below are the 900 settings found just in the Local Group Policy | User
Config | Admin Templates.  There are an additional 1050 settings found
in the Computer Config | Admin Templates.  Hundreds more in various
other categories.  All easily discoverable, understandable, and editable.
The primitive and clownish Linux "operating system" amateurish hobbyware
requires the victim to use dozens of (cr)apps spread all over the place,
yet still has only a subset of these settings available.
So when they say Linux is more configurable, they mean if you literally
have years to learn how, and days and days to download little (cr)apps
and figure out where.
1. .Net Framework Configuration
2. Ability to change properties of an all user remote access connection
900. Subscription Limits
MS is doomed.
Hopefully MS has default settings for these, as there are way too many
for most users, even rocket sciencery power users like myself.

MS is doomed only in the minds of Linux cultards. ;-)

RL
Lusotec
2010-04-03 23:53:56 UTC
Permalink
Post by DFS
Just enter gpedit.msc or secpol.msc in the Start-search box
Below are the 900 settings found just in the Local Group Policy | User
Config | Admin Templates. There are an additional 1050 settings found
in the Computer Config | Admin Templates. Hundreds more in various
other categories. All easily discoverable, understandable, and editable.
You may be happy with what Windows offers but others want something better,
something like a modular, easily editable, human readable, configuration
system.

Configuration in GNU/Linux is far better organized than it is in Windows.
There is a clear separation between applications/services, along with a
separation of system wide and user configurations.

Also, in GNU/Linux the configuration is more uniformly handled then in
Windows, where some applications/services configurations are integrated in
to the systems you described while some Microsoft applications and most
(all?) non Microsoft applications are not.

By the way, if you think those 900 plus 1050 plus hundreds more options are
a lot, just take a look at the bash man page. It contains hundreds of
configuration options, and that is just the shell.
Post by DFS
The primitive and clownish Linux "operating system" amateurish hobbyware
requires the victim to use dozens of (cr)apps spread all over the place,
The applications, and file in general, are better organized in GNU/Linux
than in Windows. Microsoft has been improving on this but it is still behind
GNU/Linux, and *nix in general.
Post by DFS
yet still has only a subset of these settings available.
You are right. There is no ActiveX related options in GNU/Linux.
Post by DFS
So when they say Linux is more configurable,
By large margin, when compared to Windows.
Post by DFS
they mean if you literally have years to learn how,
God forbid that an administrator actually knows the system he is using, and
managing.
Post by DFS
and days and days to download little (cr)apps and figure out where.
It is trivial to determine what configuration files a application uses. For
those GUI inclined the package manager shows a list of the configuration
files, but I'm more of a CLI type.

Lets see one example:

# $ rpm -q --configfiles $(rpm -q -a | grep -i mysql)
/etc/my.cnf
/etc/mysqlmanager.passwd
/etc/sysconfig/mysqld
/etc/php.d/36_mysql.ini

And there is the list of all configuration files for MySQl (related)
packages. The configuration files are extensively commented. One does not
even have to look in the man pages to know what configuration options are
available, and what they do.
Post by DFS
1. .Net Framework Configuration
(...)
373. Turn off Windows+X hotkeys
374. Turn on automatic detection of the intranet
(...)
900. Subscription Limits
One thing I have noticed in the list, that I don't like, is the presence of
lots of "Turn on ..." or "Turn off ...". For example, it should just be
"Windows+X hotkeys" and then the user chooses ON or OFF. This avoid the
reverse result where a "Turn off Windows+X hotkeys" set to "ON" actually
means that it is OFF.
Post by DFS
MS is doomed.
Sooner or later every company ends so, yes, Microsoft is doomed.

Regards.
JEDIDIAH
2010-04-05 15:41:20 UTC
Permalink
Post by DFS
Just enter gpedit.msc or secpol.msc in the Start-search box
...yes. And you were born knowing what those files were.
Post by DFS
Below are the 900 settings found just in the Local Group Policy | User
Config | Admin Templates. There are an additional 1050 settings found
[deletia]
Post by DFS
MS is doomed.
This kind of puts Apple's approach into perspective.

It seems less absurd in light of your mindless bragging here.
--
Sophocles wants his cut. |||
/ | \
Loading...