mirror of
https://github.com/MicrosoftDocs/windows-itpro-docs.git
synced 2025-05-12 13:27:23 +00:00
Fixed typos and removed en-us
This commit is contained in:
parent
6608919e0c
commit
71de449f39
@ -497,7 +497,7 @@ ADMX Info:
|
||||
<!--Description-->
|
||||
This policy setting configures the maximum number of concurrent shells any user can remotely open on the same system.
|
||||
|
||||
Any number from 0 to 0x7FFFFFFF cand be set, where 0 means unlimited number of shells.
|
||||
Any number from 0 to 0x7FFFFFFF can be set, where 0 means unlimited number of shells.
|
||||
|
||||
If you enable this policy setting, the user cannot open new remote shells if the count exceeds the specified limit.
|
||||
|
||||
|
@ -1059,7 +1059,7 @@ ADMX Info:
|
||||
<!--Validation-->
|
||||
To validate on Desktop, do the following:
|
||||
|
||||
1. Open System Settings and verfiy that the About page is visible and accessible.
|
||||
1. Open System Settings and verify that the About page is visible and accessible.
|
||||
2. Configure the policy with the following string: "hide:about".
|
||||
3. Open System Settings again and verify that the About page is no longer accessible.
|
||||
|
||||
|
@ -792,7 +792,7 @@ ADMX Info:
|
||||
Example for setting the device custom OMA-URI setting to enable this policy:
|
||||
To deny write access to removable storage within Intune’s custom profile, set OMA-URI to ```.\[device|user]\vendor\msft\policy\[config|result]\Storage/RemovableDiskDenyWriteAccess```, Data type to Integer, and Value to 1.
|
||||
|
||||
See [Use custom settings for Windows 10 devices in Intune](https://docs.microsoft.com/en-us/intune/custom-settings-windows-10) for information on how to create custom profiles.
|
||||
See [Use custom settings for Windows 10 devices in Intune](https://docs.microsoft.com/intune/custom-settings-windows-10) for information on how to create custom profiles.
|
||||
<!--/Example-->
|
||||
<!--Validation-->
|
||||
|
||||
|
@ -234,7 +234,7 @@ This user right is used by Credential Manager during Backup/Restore. No accounts
|
||||
<!--/Description-->
|
||||
<!--DbMapped-->
|
||||
GP Info:
|
||||
- GP English name: *Access Credential Manager ase a trusted caller*
|
||||
- GP English name: *Access Credential Manager as a trusted caller*
|
||||
- GP path: *Windows Settings/Security Settings/Local Policies/User Rights Assignment*
|
||||
|
||||
<!--/DbMapped-->
|
||||
|
@ -471,7 +471,7 @@ ADMX Info:
|
||||
Valid values:
|
||||
|
||||
- 0 - (Disable) The users can see the display of the Device security area in Windows Defender Security Center.
|
||||
- 1 - (Enable) The users cannot see the display of the Device secuirty area in Windows Defender Security Center.
|
||||
- 1 - (Enable) The users cannot see the display of the Device security area in Windows Defender Security Center.
|
||||
|
||||
<!--/SupportedValues-->
|
||||
<!--/Policy-->
|
||||
|
Loading…
x
Reference in New Issue
Block a user