diff --git a/windows/client-management/mdm/bitlocker-csp.md b/windows/client-management/mdm/bitlocker-csp.md
index 96b516b939..4530da2896 100644
--- a/windows/client-management/mdm/bitlocker-csp.md
+++ b/windows/client-management/mdm/bitlocker-csp.md
@@ -142,7 +142,7 @@ Allows you to set the default encryption method for each of the different drive
ADMX Info:
-- GP English name: Choose drive encryption method and cipher strength (Windows 10 [Version 1511] and later)
+- GP Friendly name: Choose drive encryption method and cipher strength (Windows 10 [Version 1511] and later)
- GP name: EncryptionMethodWithXts_Name
- GP path: Windows Components/BitLocker Drive Encryption
- GP ADMX file name: VolumeEncryption.admx
@@ -216,7 +216,7 @@ Allows you to associate unique organizational identifiers to a new drive that is
ADMX Info:
-- GP English name: Provide the unique identifiers for your organization
+- GP Friendly name: Provide the unique identifiers for your organization
- GP name: IdentificationField_Name
- GP path: Windows Components/BitLocker Drive Encryption
- GP ADMX file name: VolumeEncryption.admx
@@ -276,7 +276,7 @@ Allows users on devices that are compliant with InstantGo or the Microsoft Hardw
ADMX Info:
-- GP English name: Allow devices compliant with InstantGo or HSTI to opt out of pre-boot PIN
+- GP Friendly name: Allow devices compliant with InstantGo or HSTI to opt out of pre-boot PIN
- GP name: EnablePreBootPinExceptionOnDECapableDevice_Name
- GP path: Windows Components/BitLocker Drive Encryption/Operating System Drives
- GP ADMX file name: VolumeEncryption.admx
@@ -318,7 +318,7 @@ Allows users to configure whether or not enhanced startup PINs are used with Bit
ADMX Info:
-- GP English name: Allow enhanced PINs for startup
+- GP Friendly name: Allow enhanced PINs for startup
- GP name: EnhancedPIN_Name
- GP path: Windows Components/BitLocker Drive Encryption/Operating System Drives
- GP ADMX file name: VolumeEncryption.admx
@@ -363,7 +363,7 @@ Allows you to configure whether standard users are allowed to change BitLocker P
ADMX Info:
-- GP English name: Disallow standard users from changing the PIN or password
+- GP Friendly name: Disallow standard users from changing the PIN or password
- GP name: DisallowStandardUsersCanChangePIN_Name
- GP path: Windows Components/BitLocker Drive Encryption/Operating System Drives
- GP ADMX file name: VolumeEncryption.admx
@@ -408,7 +408,7 @@ Allows users to enable authentication options that require user input from the p
ADMX Info:
-- GP English name: Enable use of BitLocker authentication requiring preboot keyboard input on slates
+- GP Friendly name: Enable use of BitLocker authentication requiring preboot keyboard input on slates
- GP name: EnablePrebootInputProtectorsOnSlates_Name
- GP path: Windows Components/BitLocker Drive Encryption/Operating System Drives
- GP ADMX file name: VolumeEncryption.admx
@@ -459,7 +459,7 @@ Allows you to configure the encryption type that is used by BitLocker.
ADMX Info:
-- GP English name: Enforce drive encryption type on operating system drives
+- GP Friendly name: Enforce drive encryption type on operating system drives
- GP name: OSEncryptionType_Name
- GP path: Windows Components/BitLocker Drive Encryption/Operating System Drives
- GP ADMX file name: VolumeEncryption.admx
@@ -507,7 +507,7 @@ This setting is a direct mapping to the BitLocker Group Policy "Require addition
ADMX Info:
-- GP English name: Require additional authentication at startup
+- GP Friendly name: Require additional authentication at startup
- GP name: ConfigureAdvancedStartup_Name
- GP path: Windows Components/BitLocker Drive Encryption/Operating System Drives
- GP ADMX file name: VolumeEncryption.admx
@@ -604,7 +604,7 @@ This setting is a direct mapping to the BitLocker Group Policy "Configure minimu
ADMX Info:
-- GP English name:Configure minimum PIN length for startup
+- GP Friendly name:Configure minimum PIN length for startup
- GP name: MinimumPINLength_Name
- GP path: Windows Components/BitLocker Drive Encryption/Operating System Drives
- GP ADMX file name: VolumeEncryption.admx
@@ -670,7 +670,7 @@ This setting is a direct mapping to the BitLocker Group Policy "Configure pre-bo
ADMX Info:
-- GP English name: Configure pre-boot recovery message and URL
+- GP Friendly name: Configure pre-boot recovery message and URL
- GP name: PrebootRecoveryInfo_Name
- GP path: Windows Components/BitLocker Drive Encryption/Operating System Drives
- GP ADMX file name: VolumeEncryption.admx
@@ -748,7 +748,7 @@ This setting is a direct mapping to the BitLocker Group Policy "Choose how BitLo
ADMX Info:
-- GP English name: Choose how BitLocker-protected operating system drives can be recovered
+- GP Friendly name: Choose how BitLocker-protected operating system drives can be recovered
- GP name: OSRecoveryUsage_Name
- GP path: Windows Components/BitLocker Drive Encryption/Operating System Drives
- GP ADMX file name: VolumeEncryption.admx
@@ -834,7 +834,7 @@ This setting is a direct mapping to the BitLocker Group Policy "Choose how BitLo
ADMX Info:
-- GP English name: Choose how BitLocker-protected fixed drives can be recovered
+- GP Friendly name: Choose how BitLocker-protected fixed drives can be recovered
- GP name: FDVRecoveryUsage_Name
- GP path: Windows Components/BitLocker Drive Encryption/Fixed Drives
- GP ADMX file name: VolumeEncryption.admx
@@ -929,7 +929,7 @@ This setting is a direct mapping to the BitLocker Group Policy "Deny write acces
ADMX Info:
-- GP English name: Deny write access to fixed drives not protected by BitLocker
+- GP Friendly name: Deny write access to fixed drives not protected by BitLocker
- GP name: FDVDenyWriteAccess_Name
- GP path: Windows Components/BitLocker Drive Encryption/Fixed Drives
- GP ADMX file name: VolumeEncryption.admx
@@ -987,7 +987,7 @@ Allows you to configure the encryption type on fixed data drives that is used by
ADMX Info:
-- GP English name: Enforce drive encryption type on fixed data drives
+- GP Friendly name: Enforce drive encryption type on fixed data drives
- GP name: FDVEncryptionType_Name
- GP path: Windows Components/BitLocker Drive Encryption/Fixed Data Drives
- GP ADMX file name: VolumeEncryption.admx
@@ -1037,7 +1037,7 @@ This setting is a direct mapping to the BitLocker Group Policy "Deny write acces
ADMX Info:
-- GP English name: Deny write access to removable drives not protected by BitLocker
+- GP Friendly name: Deny write access to removable drives not protected by BitLocker
- GP name: RDVDenyWriteAccess_Name
- GP path: Windows Components/BitLocker Drive Encryption/Removeable Drives
- GP ADMX file name: VolumeEncryption.admx
@@ -1106,7 +1106,7 @@ Allows you to configure the encryption type that is used by BitLocker.
ADMX Info:
-- GP English name: Enforce drive encryption type on removable data drives
+- GP Friendly name: Enforce drive encryption type on removable data drives
- GP name: RDVEncryptionType_Name
- GP path: Windows Components/BitLocker Drive Encryption/Removable Data Drives
- GP ADMX file name: VolumeEncryption.admx
@@ -1150,7 +1150,7 @@ Allows you to control the use of BitLocker on removable data drives.
ADMX Info:
-- GP English name: Control use of BitLocker on removable drives
+- GP Friendly name: Control use of BitLocker on removable drives
- GP name: RDVConfigureBDE_Name
- GP path: Windows Components/BitLocker Drive Encryption/Removable Data Drives
- GP ADMX file name: VolumeEncryption.admx
diff --git a/windows/client-management/mdm/enable-admx-backed-policies-in-mdm.md b/windows/client-management/mdm/enable-admx-backed-policies-in-mdm.md
index 2ab4830667..ee5936c3f4 100644
--- a/windows/client-management/mdm/enable-admx-backed-policies-in-mdm.md
+++ b/windows/client-management/mdm/enable-admx-backed-policies-in-mdm.md
@@ -36,7 +36,7 @@ See [Support Tip: Ingesting Office ADMX policies using Microsoft Intune](https:/
> See [Understanding ADMX policies in Policy CSP](./understanding-admx-backed-policies.md).
1. Find the policy from the list [ADMX policies](./policies-in-policy-csp-admx-backed.md). You need the following information listed in the policy description.
- - GP English name
+ - GP Friendly name
- GP name
- GP ADMX file name
- GP path
diff --git a/windows/client-management/mdm/policy-csp-admx-icm.md b/windows/client-management/mdm/policy-csp-admx-icm.md
index bdd9118d02..67493c8dbe 100644
--- a/windows/client-management/mdm/policy-csp-admx-icm.md
+++ b/windows/client-management/mdm/policy-csp-admx-icm.md
@@ -148,7 +148,7 @@ If you do not configure this policy setting, the administrator can use the Probl
ADMX Info:
-- GP English name: *Turn off Windows Customer Experience Improvement Program*
+- GP Friendly name: *Turn off Windows Customer Experience Improvement Program*
- GP name: *CEIPEnable*
- GP path: *System\Internet Communication Management\Internet Communication settings*
- GP ADMX file name: *ICM.admx*
@@ -196,7 +196,7 @@ If you disable or do not configure this policy setting, your computer will conta
ADMX Info:
-- GP English name: *Turn off Automatic Root Certificates Update*
+- GP Friendly name: *Turn off Automatic Root Certificates Update*
- GP name: *CertMgr_DisableAutoRootUpdates*
- GP path: *System\Internet Communication Management\Internet Communication settings*
- GP ADMX file name: *ICM.admx*
@@ -247,7 +247,7 @@ If you disable or do not configure this policy setting, users can choose to prin
ADMX Info:
-- GP English name: *Turn off printing over HTTP*
+- GP Friendly name: *Turn off printing over HTTP*
- GP name: *DisableHTTPPrinting_1*
- GP path: *System\Internet Communication Management\Internet Communication settings*
- GP ADMX file name: *ICM.admx*
@@ -300,7 +300,7 @@ If you disable or do not configure this policy setting, users can download print
ADMX Info:
-- GP English name: *Turn off downloading of print drivers over HTTP*
+- GP Friendly name: *Turn off downloading of print drivers over HTTP*
- GP name: *DisableWebPnPDownload_1*
- GP path: *System\Internet Communication Management\Internet Communication settings*
- GP ADMX file name: *ICM.admx*
@@ -353,7 +353,7 @@ Also see "Turn off Windows Update device driver search prompt" in "Administrativ
ADMX Info:
-- GP English name: *Turn off Windows Update device driver searching*
+- GP Friendly name: *Turn off Windows Update device driver searching*
- GP name: *DriverSearchPlaces_DontSearchWindowsUpdate*
- GP path: *System\Internet Communication Management\Internet Communication settings*
- GP ADMX file name: *ICM.admx*
@@ -403,7 +403,7 @@ Also, see "Events.asp URL", "Events.asp program", and "Events.asp Program Comman
ADMX Info:
-- GP English name: *Turn off Event Viewer "Events.asp" links*
+- GP Friendly name: *Turn off Event Viewer "Events.asp" links*
- GP name: *EventViewer_DisableLinks*
- GP path: *System\Internet Communication Management\Internet Communication settings*
- GP ADMX file name: *ICM.admx*
@@ -453,7 +453,7 @@ You might want to enable this policy setting for users who do not have Internet
ADMX Info:
-- GP English name: *Turn off Help and Support Center "Did you know?" content*
+- GP Friendly name: *Turn off Help and Support Center "Did you know?" content*
- GP name: *HSS_HeadlinesPolicy*
- GP path: *System\Internet Communication Management\Internet Communication settings*
- GP ADMX file name: *ICM.admx*
@@ -501,7 +501,7 @@ If you disable or do not configure this policy setting, the Knowledge Base is se
ADMX Info:
-- GP English name: *Turn off Help and Support Center Microsoft Knowledge Base search*
+- GP Friendly name: *Turn off Help and Support Center Microsoft Knowledge Base search*
- GP name: *HSS_KBSearchPolicy*
- GP path: *System\Internet Communication Management\Internet Communication settings*
- GP ADMX file name: *ICM.admx*
@@ -549,7 +549,7 @@ If you do not configure this policy setting, all of the the policy settings in t
ADMX Info:
-- GP English name: *Restrict Internet communication*
+- GP Friendly name: *Restrict Internet communication*
- GP name: *InternetManagement_RestrictCommunication_1*
- GP path: *System\Internet Communication Management*
- GP ADMX file name: *ICM.admx*
@@ -596,7 +596,7 @@ If you do not configure this policy setting, all of the the policy settings in t
ADMX Info:
-- GP English name: *Restrict Internet communication*
+- GP Friendly name: *Restrict Internet communication*
- GP name: *InternetManagement_RestrictCommunication_2*
- GP path: *System\Internet Communication Management*
- GP ADMX file name: *ICM.admx*
@@ -642,7 +642,7 @@ If you disable or do not configure this policy setting, users can connect to Mic
ADMX Info:
-- GP English name: *Turn off Internet Connection Wizard if URL connection is referring to Microsoft.com*
+- GP Friendly name: *Turn off Internet Connection Wizard if URL connection is referring to Microsoft.com*
- GP name: *NC_ExitOnISP*
- GP path: *System\Internet Communication Management\Internet Communication settings*
- GP ADMX file name: *ICM.admx*
@@ -690,7 +690,7 @@ Note that registration is optional and involves submitting some personal informa
ADMX Info:
-- GP English name: *Turn off Registration if URL connection is referring to Microsoft.com*
+- GP Friendly name: *Turn off Registration if URL connection is referring to Microsoft.com*
- GP name: *NC_NoRegistration*
- GP path: *System\Internet Communication Management\Internet Communication settings*
- GP ADMX file name: *ICM.admx*
@@ -742,7 +742,7 @@ Also see the "Configure Error Reporting", "Display Error Notification" and "Disa
ADMX Info:
-- GP English name: *Turn off Windows Error Reporting*
+- GP Friendly name: *Turn off Windows Error Reporting*
- GP name: *PCH_DoNotReport*
- GP path: *System\Internet Communication Management\Internet Communication settings*
- GP ADMX file name: *ICM.admx*
@@ -791,7 +791,7 @@ If you disable or do not configure this policy setting, users can access the Win
ADMX Info:
-- GP English name: *Turn off access to all Windows Update features*
+- GP Friendly name: *Turn off access to all Windows Update features*
- GP name: *RemoveWindowsUpdate_ICM*
- GP path: *System\Internet Communication Management\Internet Communication settings*
- GP ADMX file name: *ICM.admx*
@@ -842,7 +842,7 @@ If you disable or do not configure this policy setting, Search Companion downloa
ADMX Info:
-- GP English name: *Turn off Search Companion content file updates*
+- GP Friendly name: *Turn off Search Companion content file updates*
- GP name: *SearchCompanion_DisableFileUpdates*
- GP path: *System\Internet Communication Management\Internet Communication settings*
- GP ADMX file name: *ICM.admx*
@@ -890,7 +890,7 @@ If you disable or do not configure this policy setting, the user is allowed to u
ADMX Info:
-- GP English name: *Turn off Internet File Association service*
+- GP Friendly name: *Turn off Internet File Association service*
- GP name: *ShellNoUseInternetOpenWith_1*
- GP path: *System\Internet Communication Management\Internet Communication settings*
- GP ADMX file name: *ICM.admx*
@@ -938,7 +938,7 @@ If you disable or do not configure this policy setting, the user is allowed to u
ADMX Info:
-- GP English name: *Turn off Internet File Association service*
+- GP Friendly name: *Turn off Internet File Association service*
- GP name: *ShellNoUseInternetOpenWith_2*
- GP path: *System\Internet Communication Management\Internet Communication settings*
- GP ADMX file name: *ICM.admx*
@@ -986,7 +986,7 @@ If you disable or do not configure this policy setting, the user is allowed to u
ADMX Info:
-- GP English name: *Turn off access to the Store*
+- GP Friendly name: *Turn off access to the Store*
- GP name: *ShellNoUseStoreOpenWith_1*
- GP path: *System\Internet Communication Management\Internet Communication settings*
- GP ADMX file name: *ICM.admx*
@@ -1034,7 +1034,7 @@ If you disable or do not configure this policy setting, the user is allowed to u
ADMX Info:
-- GP English name: *Turn off access to the Store*
+- GP Friendly name: *Turn off access to the Store*
- GP name: *ShellNoUseStoreOpenWith_2*
- GP path: *System\Internet Communication Management\Internet Communication settings*
- GP ADMX file name: *ICM.admx*
@@ -1082,7 +1082,7 @@ See the documentation for the web publishing and online ordering wizards for mor
ADMX Info:
-- GP English name: *Turn off Internet download for Web publishing and online ordering wizards*
+- GP Friendly name: *Turn off Internet download for Web publishing and online ordering wizards*
- GP name: *ShellPreventWPWDownload_1*
- GP path: *System\Internet Communication Management\Internet Communication settings*
- GP ADMX file name: *ICM.admx*
@@ -1128,7 +1128,7 @@ If you disable or do not configure this policy setting, the task is displayed.
ADMX Info:
-- GP English name: *Turn off the "Order Prints" picture task*
+- GP Friendly name: *Turn off the "Order Prints" picture task*
- GP name: *ShellRemoveOrderPrints_1*
- GP path: *System\Internet Communication Management\Internet Communication settings*
- GP ADMX file name: *ICM.admx*
@@ -1176,7 +1176,7 @@ If you disable or do not configure this policy setting, the task is displayed.
ADMX Info:
-- GP English name: *Turn off the "Order Prints" picture task*
+- GP Friendly name: *Turn off the "Order Prints" picture task*
- GP name: *ShellRemoveOrderPrints_2*
- GP path: *System\Internet Communication Management\Internet Communication settings*
- GP ADMX file name: *ICM.admx*
@@ -1222,7 +1222,7 @@ If you enable this policy setting, these tasks are removed from the File and Fol
ADMX Info:
-- GP English name: *Turn off the "Publish to Web" task for files and folders*
+- GP Friendly name: *Turn off the "Publish to Web" task for files and folders*
- GP name: *ShellRemovePublishToWeb_1*
- GP path: *System\Internet Communication Management\Internet Communication settings*
- GP ADMX file name: *ICM.admx*
@@ -1270,7 +1270,7 @@ If you disable or do not configure this policy setting, the tasks are shown.
ADMX Info:
-- GP English name: *Turn off the "Publish to Web" task for files and folders*
+- GP Friendly name: *Turn off the "Publish to Web" task for files and folders*
- GP name: *ShellRemovePublishToWeb_2*
- GP path: *System\Internet Communication Management\Internet Communication settings*
- GP ADMX file name: *ICM.admx*
@@ -1320,7 +1320,7 @@ If you disable this policy setting, Windows Messenger collects anonymous usage i
ADMX Info:
-- GP English name: *Turn off the Windows Messenger Customer Experience Improvement Program*
+- GP Friendly name: *Turn off the Windows Messenger Customer Experience Improvement Program*
- GP name: *WinMSG_NoInstrumentation_1*
- GP path: *System\Internet Communication Management\Internet Communication settings*
- GP ADMX file name: *ICM.admx*
@@ -1372,7 +1372,7 @@ If you do not configure this policy setting, users have the choice to opt in and
ADMX Info:
-- GP English name: *Turn off the Windows Messenger Customer Experience Improvement Program*
+- GP Friendly name: *Turn off the Windows Messenger Customer Experience Improvement Program*
- GP name: *WinMSG_NoInstrumentation_2*
- GP path: *System\Internet Communication Management\Internet Communication settings*
- GP ADMX file name: *ICM.admx*
diff --git a/windows/client-management/mdm/policy-csp-admx-iscsi.md b/windows/client-management/mdm/policy-csp-admx-iscsi.md
index 68a7623db7..b15ce97b66 100644
--- a/windows/client-management/mdm/policy-csp-admx-iscsi.md
+++ b/windows/client-management/mdm/policy-csp-admx-iscsi.md
@@ -76,7 +76,7 @@ If disabled then new iSNS servers may be added and thus new targets discovered v
ADMX Info:
-- GP English name: *Do not allow manual configuration of iSNS servers*
+- GP Friendly name: *Do not allow manual configuration of iSNS servers*
- GP name: *iSCSIGeneral_RestrictAdditionalLogins*
- GP path: *System\iSCSI\iSCSI Target Discovery*
- GP ADMX file name: *iSCSI.admx*
@@ -119,7 +119,7 @@ If disabled then new target portals may be added and thus new targets discovered
ADMX Info:
-- GP English name: *Do not allow manual configuration of target portals*
+- GP Friendly name: *Do not allow manual configuration of target portals*
- GP name: *iSCSIGeneral_ChangeIQNName*
- GP path: *System\iSCSI\iSCSI Target Discovery*
- GP ADMX file name: *iSCSI.admx*
@@ -163,7 +163,7 @@ If disabled then the initiator CHAP secret may be changed.
ADMX Info:
-- GP English name: *Do not allow changes to initiator CHAP secret*
+- GP Friendly name: *Do not allow changes to initiator CHAP secret*
- GP name: *iSCSISecurity_ChangeCHAPSecret*
- GP path: *System\iSCSI\iSCSI Security*
- GP ADMX file name: *iSCSI.admx*
diff --git a/windows/client-management/mdm/policy-csp-admx-kdc.md b/windows/client-management/mdm/policy-csp-admx-kdc.md
index e2de14a58e..f1bcc844ef 100644
--- a/windows/client-management/mdm/policy-csp-admx-kdc.md
+++ b/windows/client-management/mdm/policy-csp-admx-kdc.md
@@ -113,7 +113,7 @@ Impact on domain controller performance when this policy setting is enabled:
ADMX Info:
-- GP English name: *KDC support for claims, compound authentication and Kerberos armoring*
+- GP Friendly name: *KDC support for claims, compound authentication and Kerberos armoring*
- GP name: *CbacAndArmor*
- GP path: *System/KDC*
- GP ADMX file name: *kdc.admx*
@@ -161,7 +161,7 @@ To ensure consistent behavior, this policy setting must be supported and set ide
ADMX Info:
-- GP English name: *Use forest search order*
+- GP Friendly name: *Use forest search order*
- GP name: *ForestSearch*
- GP path: *System/KDC*
- GP ADMX file name: *kdc.admx*
@@ -213,7 +213,7 @@ If you disable or not configure this policy setting, then the DC will never offe
ADMX Info:
-- GP English name: *KDC support for PKInit Freshness Extension*
+- GP Friendly name: *KDC support for PKInit Freshness Extension*
- GP name: *PKINITFreshness*
- GP path: *System/KDC*
- GP ADMX file name: *kdc.admx*
@@ -262,7 +262,7 @@ If you disable or do not configure this policy setting, domain controllers will
ADMX Info:
-- GP English name: *Request compound authentication*
+- GP Friendly name: *Request compound authentication*
- GP name: *RequestCompoundId*
- GP path: *System/KDC*
- GP ADMX file name: *kdc.admx*
@@ -308,7 +308,7 @@ If you disable or do not configure this policy setting, the threshold value defa
ADMX Info:
-- GP English name: *Warning for large Kerberos tickets*
+- GP Friendly name: *Warning for large Kerberos tickets*
- GP name: *TicketSizeThreshold*
- GP path: *System/KDC*
- GP ADMX file name: *kdc.admx*
@@ -359,7 +359,7 @@ If you disable or do not configure this policy setting, the domain controller do
ADMX Info:
-- GP English name: *Provide information about previous logons to client computers*
+- GP Friendly name: *Provide information about previous logons to client computers*
- GP name: *emitlili*
- GP path: *System/KDC*
- GP ADMX file name: *kdc.admx*
diff --git a/windows/client-management/mdm/policy-csp-admx-kerberos.md b/windows/client-management/mdm/policy-csp-admx-kerberos.md
index 10bb3a7bdc..f87e1c15d3 100644
--- a/windows/client-management/mdm/policy-csp-admx-kerberos.md
+++ b/windows/client-management/mdm/policy-csp-admx-kerberos.md
@@ -95,7 +95,7 @@ If you disable or do not configure this policy setting and the resource domain r
ADMX Info:
-- GP English name: *Always send compound authentication first*
+- GP Friendly name: *Always send compound authentication first*
- GP name: *AlwaysSendCompoundId*
- GP path: *System\Kerberos*
- GP ADMX file name: *Kerberos.admx*
@@ -148,7 +148,7 @@ If you do not configure this policy setting, Automatic will be used.
ADMX Info:
-- GP English name: *Support device authentication using certificate*
+- GP Friendly name: *Support device authentication using certificate*
- GP name: *DevicePKInitEnabled*
- GP path: *System\Kerberos*
- GP ADMX file name: *Kerberos.admx*
@@ -196,7 +196,7 @@ If you do not configure this policy setting, the system uses the host name-to-Ke
ADMX Info:
-- GP English name: *Define host name-to-Kerberos realm mappings*
+- GP Friendly name: *Define host name-to-Kerberos realm mappings*
- GP name: *HostToRealm*
- GP path: *System\Kerberos*
- GP ADMX file name: *Kerberos.admx*
@@ -243,7 +243,7 @@ If you disable or do not configure this policy setting, the Kerberos client enfo
ADMX Info:
-- GP English name: *Disable revocation checking for the SSL certificate of KDC proxy servers*
+- GP Friendly name: *Disable revocation checking for the SSL certificate of KDC proxy servers*
- GP name: *KdcProxyDisableServerRevocationCheck*
- GP path: *System\Kerberos*
- GP ADMX file name: *Kerberos.admx*
@@ -289,7 +289,7 @@ If you disable or do not configure this policy setting, the Kerberos client does
ADMX Info:
-- GP English name: *Specify KDC proxy servers for Kerberos clients*
+- GP Friendly name: *Specify KDC proxy servers for Kerberos clients*
- GP name: *KdcProxyServer*
- GP path: *System\Kerberos*
- GP ADMX file name: *Kerberos.admx*
@@ -337,7 +337,7 @@ If you do not configure this policy setting, the system uses the interoperable K
ADMX Info:
-- GP English name: *Define interoperable Kerberos V5 realm settings*
+- GP Friendly name: *Define interoperable Kerberos V5 realm settings*
- GP name: *MitRealms*
- GP path: *System\Kerberos*
- GP ADMX file name: *Kerberos.admx*
@@ -391,7 +391,7 @@ If you do not configure this policy setting, Automatic will be used.
ADMX Info:
-- GP English name: *Support compound authentication*
+- GP Friendly name: *Support compound authentication*
- GP name: *ServerAcceptsCompound*
- GP path: *System\Kerberos*
- GP ADMX file name: *Kerberos.admx*
@@ -437,7 +437,7 @@ If you disable or do not configure this policy setting, any service is allowed t
ADMX Info:
-- GP English name: *Require strict target SPN match on remote procedure calls*
+- GP Friendly name: *Require strict target SPN match on remote procedure calls*
- GP name: *StrictTarget*
- GP path: *System\Kerberos*
- GP ADMX file name: *Kerberos.admx*
diff --git a/windows/client-management/mdm/policy-csp-admx-lanmanserver.md b/windows/client-management/mdm/policy-csp-admx-lanmanserver.md
index a8b463fca0..92155a01ef 100644
--- a/windows/client-management/mdm/policy-csp-admx-lanmanserver.md
+++ b/windows/client-management/mdm/policy-csp-admx-lanmanserver.md
@@ -96,7 +96,7 @@ Arrange the desired cipher suites in the edit box, one cipher suite per line, in
ADMX Info:
-- GP English name: *Cipher suite order*
+- GP Friendly name: *Cipher suite order*
- GP name: *Pol_CipherSuiteOrder*
- GP path: *Network/Lanman Server*
- GP ADMX file name: *LanmanServer.admx*
@@ -156,7 +156,7 @@ In circumstances where this policy setting is enabled, you can also select the f
ADMX Info:
-- GP English name: *Hash Publication for BranchCache*
+- GP Friendly name: *Hash Publication for BranchCache*
- GP name: *Pol_HashPublication*
- GP path: *Network/Lanman Server*
- GP ADMX file name: *LanmanServer.admx*
@@ -220,7 +220,7 @@ Hash version supported:
ADMX Info:
-- GP English name: *Hash Version support for BranchCache*
+- GP Friendly name: *Hash Version support for BranchCache*
- GP name: *Pol_HashSupportVersion*
- GP path: *Network/Lanman Server*
- GP ADMX file name: *LanmanServer.admx*
@@ -269,7 +269,7 @@ If you disable or do not configure this policy setting, the SMB server will sele
ADMX Info:
-- GP English name: *Honor cipher suite order*
+- GP Friendly name: *Honor cipher suite order*
- GP name: *Pol_HonorCipherSuiteOrder*
- GP path: *Network/Lanman Server*
- GP ADMX file name: *LanmanServer.admx*
diff --git a/windows/client-management/mdm/policy-csp-admx-lanmanworkstation.md b/windows/client-management/mdm/policy-csp-admx-lanmanworkstation.md
index 8fe3f8ec35..c85abbdff3 100644
--- a/windows/client-management/mdm/policy-csp-admx-lanmanworkstation.md
+++ b/windows/client-management/mdm/policy-csp-admx-lanmanworkstation.md
@@ -98,7 +98,7 @@ Arrange the desired cipher suites in the edit box, one cipher suite per line, in
ADMX Info:
-- GP English name: *Cipher suite order*
+- GP Friendly name: *Cipher suite order*
- GP name: *Pol_CipherSuiteOrder*
- GP path: *Network\Lanman Workstation*
- GP ADMX file name: *LanmanWorkstation.admx*
@@ -147,7 +147,7 @@ If you disable or do not configure this policy setting, Windows will prevent use
ADMX Info:
-- GP English name: *Handle Caching on Continuous Availability Shares*
+- GP Friendly name: *Handle Caching on Continuous Availability Shares*
- GP name: *Pol_EnableHandleCachingForCAFiles*
- GP path: *Network\Lanman Workstation*
- GP ADMX file name: *LanmanWorkstation.admx*
@@ -196,7 +196,7 @@ If you disable or do not configure this policy setting, Windows will prevent use
ADMX Info:
-- GP English name: *Offline Files Availability on Continuous Availability Shares*
+- GP Friendly name: *Offline Files Availability on Continuous Availability Shares*
- GP name: *Pol_EnableOfflineFilesforCAShares*
- GP path: *Network\Lanman Workstation*
- GP ADMX file name: *LanmanWorkstation.admx*
diff --git a/windows/client-management/mdm/policy-csp-admx-leakdiagnostic.md b/windows/client-management/mdm/policy-csp-admx-leakdiagnostic.md
index bfa3ffa66e..a362e05ab9 100644
--- a/windows/client-management/mdm/policy-csp-admx-leakdiagnostic.md
+++ b/windows/client-management/mdm/policy-csp-admx-leakdiagnostic.md
@@ -80,7 +80,7 @@ The DPS can be configured with the Services snap-in to the Microsoft Management
ADMX Info:
-- GP English name: *Configure custom alert text*
+- GP Friendly name: *Configure custom alert text*
- GP name: *WdiScenarioExecutionPolicy*
- GP path: *System\Troubleshooting and Diagnostics\Disk Diagnostic*
- GP ADMX file name: *LeakDiagnostic.admx*
diff --git a/windows/client-management/mdm/policy-csp-admx-linklayertopologydiscovery.md b/windows/client-management/mdm/policy-csp-admx-linklayertopologydiscovery.md
index 1b54964f3c..0f473f45a4 100644
--- a/windows/client-management/mdm/policy-csp-admx-linklayertopologydiscovery.md
+++ b/windows/client-management/mdm/policy-csp-admx-linklayertopologydiscovery.md
@@ -76,7 +76,7 @@ If you disable or do not configure this policy setting, the default behavior of
ADMX Info:
-- GP English name: *Turn on Mapper I/O (LLTDIO) driver*
+- GP Friendly name: *Turn on Mapper I/O (LLTDIO) driver*
- GP name: *LLTD_EnableLLTDIO*
- GP path: *Network/Link-Layer Topology Discovery*
- GP ADMX file name: *LinkLayerTopologyDiscovery.admx*
@@ -124,7 +124,7 @@ If you disable or do not configure this policy setting, the default behavior for
ADMX Info:
-- GP English name: *Turn on Responder (RSPNDR) driver*
+- GP Friendly name: *Turn on Responder (RSPNDR) driver*
- GP name: *LLTD_EnableRspndr*
- GP path: *Network/Link-Layer Topology Discovery*
- GP ADMX file name: *LinkLayerTopologyDiscovery.admx*
diff --git a/windows/client-management/mdm/policy-csp-admx-logon.md b/windows/client-management/mdm/policy-csp-admx-logon.md
index 8072aab286..224ceae595 100644
--- a/windows/client-management/mdm/policy-csp-admx-logon.md
+++ b/windows/client-management/mdm/policy-csp-admx-logon.md
@@ -113,7 +113,7 @@ If you disable or do not configure this policy setting, the user may choose to s
ADMX Info:
-- GP English name: *Block user from showing account details on sign-in*
+- GP Friendly name: *Block user from showing account details on sign-in*
- GP name: *BlockUserFromShowingAccountDetailsOnSignin*
- GP path: *System\Logon*
- GP ADMX file name: *Logon.admx*
@@ -159,7 +159,7 @@ If you disable or do not configure this policy, the logon background image adopt
ADMX Info:
-- GP English name: *Show clear logon background*
+- GP Friendly name: *Show clear logon background*
- GP name: *DisableAcrylicBackgroundOnLogon*
- GP path: *System\Logon*
- GP ADMX file name: *Logon.admx*
@@ -208,7 +208,7 @@ This policy setting appears in the Computer Configuration and User Configuration
ADMX Info:
-- GP English name: *Do not process the legacy run list*
+- GP Friendly name: *Do not process the legacy run list*
- GP name: *DisableExplorerRunLegacy_1*
- GP path: *System\Logon*
- GP ADMX file name: *Logon.admx*
@@ -257,7 +257,7 @@ This policy setting appears in the Computer Configuration and User Configuration
ADMX Info:
-- GP English name: *Do not process the legacy run list*
+- GP Friendly name: *Do not process the legacy run list*
- GP name: *DisableExplorerRunLegacy_2*
- GP path: *System\Logon*
- GP ADMX file name: *Logon.admx*
@@ -310,7 +310,7 @@ This policy setting appears in the Computer Configuration and User Configuration
ADMX Info:
-- GP English name: *Do not process the run once list*
+- GP Friendly name: *Do not process the run once list*
- GP name: *DisableExplorerRunOnceLegacy_1*
- GP path: *System\Logon*
- GP ADMX file name: *Logon.admx*
@@ -363,7 +363,7 @@ This policy setting appears in the Computer Configuration and User Configuration
ADMX Info:
-- GP English name: *Do not process the run once list*
+- GP Friendly name: *Do not process the run once list*
- GP name: *DisableExplorerRunOnceLegacy_2*
- GP path: *System\Logon*
- GP ADMX file name: *Logon.admx*
@@ -409,7 +409,7 @@ If you disable or do not configure this policy setting, the system displays the
ADMX Info:
-- GP English name: *Remove Boot / Shutdown / Logon / Logoff status messages*
+- GP Friendly name: *Remove Boot / Shutdown / Logon / Logoff status messages*
- GP name: *DisableStatusMessages*
- GP path: *System*
- GP ADMX file name: *Logon.admx*
@@ -455,7 +455,7 @@ If you disable or do not configure this policy setting, connected users will be
ADMX Info:
-- GP English name: *Do not enumerate connected users on domain-joined computers*
+- GP Friendly name: *Do not enumerate connected users on domain-joined computers*
- GP name: *DontEnumerateConnectedUsers*
- GP path: *System\Logon*
- GP ADMX file name: *Logon.admx*
@@ -511,7 +511,7 @@ This setting applies only to Windows. It does not affect the "Configure Your Ser
ADMX Info:
-- GP English name: *Do not display the Getting Started welcome screen at logon*
+- GP Friendly name: *Do not display the Getting Started welcome screen at logon*
- GP name: *NoWelcomeTips_1*
- GP path: *System*
- GP ADMX file name: *Logon.admx*
@@ -566,7 +566,7 @@ If you disable or do not configure this policy, the welcome screen is displayed
ADMX Info:
-- GP English name: *Do not display the Getting Started welcome screen at logon*
+- GP Friendly name: *Do not display the Getting Started welcome screen at logon*
- GP name: *NoWelcomeTips_2*
- GP path: *System\Logon*
- GP ADMX file name: *Logon.admx*
@@ -619,7 +619,7 @@ Also, see the "Do not process the legacy run list" and the "Do not process the r
ADMX Info:
-- GP English name: *Run these programs at user logon*
+- GP Friendly name: *Run these programs at user logon*
- GP name: *Run_1*
- GP path: *System\Logon*
- GP ADMX file name: *Logon.admx*
@@ -673,7 +673,7 @@ Also, see the "Do not process the legacy run list" and the "Do not process the r
ADMX Info:
-- GP English name: *Run these programs at user logon*
+- GP Friendly name: *Run these programs at user logon*
- GP name: *Run_2*
- GP path: *System\Logon*
- GP ADMX file name: *Logon.admx*
@@ -737,7 +737,7 @@ If you disable or do not configure this policy setting and users log on to a cli
ADMX Info:
-- GP English name: *Always wait for the network at computer startup and logon*
+- GP Friendly name: *Always wait for the network at computer startup and logon*
- GP name: *SyncForegroundPolicy*
- GP path: *System\Logon*
- GP ADMX file name: *Logon.admx*
@@ -783,7 +783,7 @@ If you disable or do not configure this policy setting, Windows uses the default
ADMX Info:
-- GP English name: *Always use custom logon background*
+- GP Friendly name: *Always use custom logon background*
- GP name: *UseOEMBackground*
- GP path: *System\Logon*
- GP ADMX file name: *Logon.admx*
@@ -834,7 +834,7 @@ If you disable or do not configure this policy setting, only the default status
ADMX Info:
-- GP English name: *Display highly detailed status messages*
+- GP Friendly name: *Display highly detailed status messages*
- GP name: *VerboseStatus*
- GP path: *System*
- GP ADMX file name: *Logon.admx*
diff --git a/windows/client-management/mdm/policy-csp-admx-microsoftdefenderantivirus.md b/windows/client-management/mdm/policy-csp-admx-microsoftdefenderantivirus.md
index f115057a2b..551efcc569 100644
--- a/windows/client-management/mdm/policy-csp-admx-microsoftdefenderantivirus.md
+++ b/windows/client-management/mdm/policy-csp-admx-microsoftdefenderantivirus.md
@@ -347,7 +347,7 @@ If you disable this setting, the antimalware service will load as a low priority
ADMX Info:
-- GP English name: *Allow antimalware service to startup with normal priority*
+- GP Friendly name: *Allow antimalware service to startup with normal priority*
- GP name: *AllowFastServiceStartup*
- GP path: *Windows Components\Microsoft Defender Antivirus*
- GP ADMX file name: *WindowsDefender.admx*
@@ -397,7 +397,7 @@ Enabling or disabling this policy may lead to unexpected or unsupported behavior
ADMX Info:
-- GP English name: *Turn off Microsoft Defender Antivirus*
+- GP Friendly name: *Turn off Microsoft Defender Antivirus*
- GP name: *DisableAntiSpywareDefender*
- GP path: *Windows Components\Microsoft Defender Antivirus*
- GP ADMX file name: *WindowsDefender.admx*
@@ -448,7 +448,7 @@ Same as Disabled.
ADMX Info:
-- GP English name: *Turn off Auto Exclusions*
+- GP Friendly name: *Turn off Auto Exclusions*
- GP name: *DisableAutoExclusions*
- GP path: *Windows Components\Microsoft Defender Antivirus\Exclusions*
- GP ADMX file name: *WindowsDefender.admx*
@@ -500,7 +500,7 @@ This feature requires these Policy settings to be set as follows:
ADMX Info:
-- GP English name: *Configure the 'Block at First Sight' feature*
+- GP Friendly name: *Configure the 'Block at First Sight' feature*
- GP name: *DisableBlockAtFirstSeen*
- GP path: *Windows Components\Microsoft Defender Antivirus\MAPS*
- GP ADMX file name: *WindowsDefender.admx*
@@ -546,7 +546,7 @@ If you disable this setting, only items defined by Policy will be used in the re
ADMX Info:
-- GP English name: *Configure local administrator merge behavior for lists*
+- GP Friendly name: *Configure local administrator merge behavior for lists*
- GP name: *DisableLocalAdminMerge*
- GP path: *Windows Components\Microsoft Defender Antivirus*
- GP ADMX file name: *WindowsDefender.admx*
@@ -594,7 +594,7 @@ If you disable or do not configure this policy setting, Microsoft Defender Antiv
ADMX Info:
-- GP English name: *Turn off real-time protection*
+- GP Friendly name: *Turn off real-time protection*
- GP name: *DisableRealtimeMonitoring*
- GP path: *Windows Components\Microsoft Defender Antivirus\Real-time Protection*
- GP ADMX file name: *WindowsDefender.admx*
@@ -640,7 +640,7 @@ If you disable or do not configure this policy setting, Microsoft Defender Antiv
ADMX Info:
-- GP English name: *Turn off routine remediation*
+- GP Friendly name: *Turn off routine remediation*
- GP name: *DisableRoutinelyTakingAction*
- GP path: *Windows Components\Microsoft Defender Antivirus*
- GP ADMX file name: *WindowsDefender.admx*
@@ -682,7 +682,7 @@ This policy setting allows you specify a list of file types that should be exclu
ADMX Info:
-- GP English name: *Extension Exclusions*
+- GP Friendly name: *Extension Exclusions*
- GP name: *Exclusions_Extensions*
- GP path: *Windows Components\Microsoft Defender Antivirus\Exclusions*
- GP ADMX file name: *WindowsDefender.admx*
@@ -726,7 +726,7 @@ As an example, a path might be defined as: "c:\Windows" to exclude all files in
ADMX Info:
-- GP English name: *Path Exclusions*
+- GP Friendly name: *Path Exclusions*
- GP name: *Exclusions_Paths*
- GP path: *Windows Components\Microsoft Defender Antivirus\Exclusions*
- GP ADMX file name: *WindowsDefender.admx*
@@ -768,7 +768,7 @@ This policy setting allows you to disable scheduled and real-time scanning for a
ADMX Info:
-- GP English name: *Process Exclusions*
+- GP Friendly name: *Process Exclusions*
- GP name: *Exclusions_Processes*
- GP path: *Windows Components\Microsoft Defender Antivirus\Exclusions*
- GP ADMX file name: *WindowsDefender.admx*
@@ -825,7 +825,7 @@ You can configure ASR rules in the Configure Attack Surface Reduction rules GP s
ADMX Info:
-- GP English name: *Exclude files and paths from Attack Surface Reduction Rules*
+- GP Friendly name: *Exclude files and paths from Attack Surface Reduction Rules*
- GP name: *ExploitGuard_ASR_ASROnlyExclusions*
- GP path: *Windows Components\Microsoft Defender Antivirus\Microsoft Defender Exploit Guard\Attack Surface Reduction*
- GP ADMX file name: *WindowsDefender.admx*
@@ -898,7 +898,7 @@ You can exclude folders or files in the "Exclude files and paths from Attack Sur
ADMX Info:
-- GP English name: *Configure Attack Surface Reduction rules*
+- GP Friendly name: *Configure Attack Surface Reduction rules*
- GP name: *ExploitGuard_ASR_Rules*
- GP path: *Windows Components\Microsoft Defender Antivirus\Microsoft Defender Exploit Guard\Attack Surface Reduction*
- GP ADMX file name: *WindowsDefender.admx*
@@ -957,7 +957,7 @@ Default system folders are automatically guarded, but you can add folders in the
ADMX Info:
-- GP English name: *Configure allowed applications*
+- GP Friendly name: *Configure allowed applications*
- GP name: *ExploitGuard_ControlledFolderAccess_AllowedApplications*
- GP path: *Windows Components\Microsoft Defender Antivirus\Microsoft Defender Exploit Guard\Controlled Folder Access*
- GP ADMX file name: *WindowsDefender.admx*
@@ -1017,7 +1017,7 @@ Microsoft Defender Antivirus automatically determines which applications can be
ADMX Info:
-- GP English name: *Configure protected folders*
+- GP Friendly name: *Configure protected folders*
- GP name: *ExploitGuard_ControlledFolderAccess_ProtectedFolders*
- GP path: *Windows Components\Microsoft Defender Antivirus\Microsoft Defender Exploit Guard\Controlled Folder Access*
- GP ADMX file name: *WindowsDefender.admx*
@@ -1068,7 +1068,7 @@ Same as Disabled.
ADMX Info:
-- GP English name: *Enable file hash computation feature*
+- GP Friendly name: *Enable file hash computation feature*
- GP name: *MpEngine_EnableFileHashComputation*
- GP path: *Windows Components\Microsoft Defender Antivirus\MpEngine*
- GP ADMX file name: *WindowsDefender.admx*
@@ -1114,7 +1114,7 @@ If you disable this setting, definition retirement will be disabled.
ADMX Info:
-- GP English name: *Turn on definition retirement*
+- GP Friendly name: *Turn on definition retirement*
- GP name: *Nis_Consumers_IPS_DisableSignatureRetirement*
- GP path: *Windows Components\Microsoft Defender Antivirus\Network Inspection System*
- GP ADMX file name: *WindowsDefender.admx*
@@ -1156,7 +1156,7 @@ This policy setting defines additional definition sets to enable for network tra
ADMX Info:
-- GP English name: *Specify additional definition sets for network traffic inspection*
+- GP Friendly name: *Specify additional definition sets for network traffic inspection*
- GP name: *Nis_Consumers_IPS_sku_differentiation_Signature_Set_Guid*
- GP path: *Windows Components\Microsoft Defender Antivirus\Network Inspection System*
- GP ADMX file name: *WindowsDefender.admx*
@@ -1202,7 +1202,7 @@ If you disable this setting, protocol recognition will be disabled.
ADMX Info:
-- GP English name: *Turn on protocol recognition*
+- GP Friendly name: *Turn on protocol recognition*
- GP name: *Nis_DisableProtocolRecognition*
- GP path: *Windows Components\Microsoft Defender Antivirus\Network Inspection System*
- GP ADMX file name: *WindowsDefender.admx*
@@ -1248,7 +1248,7 @@ If you disable or do not configure this setting, the proxy server will not be by
ADMX Info:
-- GP English name: *Define addresses to bypass proxy server*
+- GP Friendly name: *Define addresses to bypass proxy server*
- GP name: *ProxyBypass*
- GP path: *Windows Components\Microsoft Defender Antivirus*
- GP ADMX file name: *WindowsDefender.admx*
@@ -1300,7 +1300,7 @@ If you disable or do not configure this setting, the proxy will skip over this f
ADMX Info:
-- GP English name: *Define proxy auto-config (.pac) for connecting to the network*
+- GP Friendly name: *Define proxy auto-config (.pac) for connecting to the network*
- GP name: *ProxyPacUrl*
- GP path: *Windows Components\Microsoft Defender Antivirus*
- GP ADMX file name: *WindowsDefender.admx*
@@ -1352,7 +1352,7 @@ If you disable or do not configure this setting, the proxy will skip over this f
ADMX Info:
-- GP English name: *Define proxy server for connecting to the network*
+- GP Friendly name: *Define proxy server for connecting to the network*
- GP name: *ProxyServer*
- GP path: *Windows Components\Microsoft Defender Antivirus*
- GP ADMX file name: *WindowsDefender.admx*
@@ -1398,7 +1398,7 @@ If you disable or do not configure this setting, Policy will take priority over
ADMX Info:
-- GP English name: *Configure local setting override for the removal of items from Quarantine folder*
+- GP Friendly name: *Configure local setting override for the removal of items from Quarantine folder*
- GP name: *Quarantine_LocalSettingOverridePurgeItemsAfterDelay*
- GP path: *Windows Components\Microsoft Defender Antivirus\Quarantine*
- GP ADMX file name: *WindowsDefender.admx*
@@ -1444,7 +1444,7 @@ If you disable or do not configure this setting, items will be kept in the quara
ADMX Info:
-- GP English name: *Configure removal of items from Quarantine folder*
+- GP Friendly name: *Configure removal of items from Quarantine folder*
- GP name: *Quarantine_PurgeItemsAfterDelay*
- GP path: *Windows Components\Microsoft Defender Antivirus\Quarantine*
- GP ADMX file name: *WindowsDefender.admx*
@@ -1490,7 +1490,7 @@ If you disable this setting, scheduled tasks will begin at the specified start t
ADMX Info:
-- GP English name: *Randomize scheduled task times*
+- GP Friendly name: *Randomize scheduled task times*
- GP name: *RandomizeScheduleTaskTimes*
- GP path: *Windows Components\Microsoft Defender Antivirus*
- GP ADMX file name: *WindowsDefender.admx*
@@ -1536,7 +1536,7 @@ If you disable this setting, behavior monitoring will be disabled.
ADMX Info:
-- GP English name: *Turn on behavior monitoring*
+- GP Friendly name: *Turn on behavior monitoring*
- GP name: *RealtimeProtection_DisableBehaviorMonitoring*
- GP path: *Windows Components\Microsoft Defender Antivirus\Real-time Protection*
- GP ADMX file name: *WindowsDefender.admx*
@@ -1582,7 +1582,7 @@ If you disable this setting, scanning for all downloaded files and attachments w
ADMX Info:
-- GP English name: *Scan all downloaded files and attachments*
+- GP Friendly name: *Scan all downloaded files and attachments*
- GP name: *RealtimeProtection_DisableIOAVProtection*
- GP path: *Windows Components\Microsoft Defender Antivirus\Real-time Protection*
- GP ADMX file name: *WindowsDefender.admx*
@@ -1628,7 +1628,7 @@ If you disable this setting, monitoring for file and program activity will be di
ADMX Info:
-- GP English name: *Monitor file and program activity on your computer*
+- GP Friendly name: *Monitor file and program activity on your computer*
- GP name: *RealtimeProtection_DisableOnAccessProtection*
- GP path: *Windows Components\Microsoft Defender Antivirus\Real-time Protection*
- GP ADMX file name: *WindowsDefender.admx*
@@ -1674,7 +1674,7 @@ If you disable this setting, raw write notifications be disabled.
ADMX Info:
-- GP English name: *Turn on raw volume write notifications*
+- GP Friendly name: *Turn on raw volume write notifications*
- GP name: *RealtimeProtection_DisableRawWriteNotification*
- GP path: *Windows Components\Microsoft Defender Antivirus\Real-time Protection*
- GP ADMX file name: *WindowsDefender.admx*
@@ -1720,7 +1720,7 @@ If you disable this setting, a process scan will not be initiated when real-time
ADMX Info:
-- GP English name: *Turn on process scanning whenever real-time protection is enabled*
+- GP Friendly name: *Turn on process scanning whenever real-time protection is enabled*
- GP name: *RealtimeProtection_DisableScanOnRealtimeEnable*
- GP path: *Windows Components\Microsoft Defender Antivirus\Real-time Protection*
- GP ADMX file name: *WindowsDefender.admx*
@@ -1766,7 +1766,7 @@ If you disable or do not configure this setting, a default size will be applied.
ADMX Info:
-- GP English name: *Define the maximum size of downloaded files and attachments to be scanned*
+- GP Friendly name: *Define the maximum size of downloaded files and attachments to be scanned*
- GP name: *RealtimeProtection_IOAVMaxSize*
- GP path: *Windows Components\Microsoft Defender Antivirus\Real-time Protection*
- GP ADMX file name: *WindowsDefender.admx*
@@ -1812,7 +1812,7 @@ If you disable or do not configure this setting, Policy will take priority over
ADMX Info:
-- GP English name: *Configure local setting override for turn on behavior monitoring*
+- GP Friendly name: *Configure local setting override for turn on behavior monitoring*
- GP name: *RealtimeProtection_LocalSettingOverrideDisableBehaviorMonitoring*
- GP path: *Windows Components\Microsoft Defender Antivirus\Real-time Protection*
- GP ADMX file name: *WindowsDefender.admx*
@@ -1858,7 +1858,7 @@ If you disable or do not configure this setting, Policy will take priority over
ADMX Info:
-- GP English name: *Configure local setting override for scanning all downloaded files and attachments*
+- GP Friendly name: *Configure local setting override for scanning all downloaded files and attachments*
- GP name: *RealtimeProtection_LocalSettingOverrideDisableIOAVProtection*
- GP path: *Windows Components\Microsoft Defender Antivirus\Real-time Protection*
- GP ADMX file name: *WindowsDefender.admx*
@@ -1904,7 +1904,7 @@ If you disable or do not configure this setting, Policy will take priority over
ADMX Info:
-- GP English name: *Configure local setting override for monitoring file and program activity on your computer*
+- GP Friendly name: *Configure local setting override for monitoring file and program activity on your computer*
- GP name: *RealtimeProtection_LocalSettingOverrideDisableOnAccessProtection*
- GP path: *Windows Components\Microsoft Defender Antivirus\Real-time Protection*
- GP ADMX file name: *WindowsDefender.admx*
@@ -1950,7 +1950,7 @@ If you disable or do not configure this setting, Policy will take priority over
ADMX Info:
-- GP English name: *Configure local setting override to turn on real-time protection*
+- GP Friendly name: *Configure local setting override to turn on real-time protection*
- GP name: *RealtimeProtection_LocalSettingOverrideDisableRealtimeMonitoring*
- GP path: *Windows Components\Microsoft Defender Antivirus\Real-time Protection*
- GP ADMX file name: *WindowsDefender.admx*
@@ -1996,7 +1996,7 @@ If you disable or do not configure this setting, Policy will take priority over
ADMX Info:
-- GP English name: *Configure local setting override for monitoring for incoming and outgoing file activity*
+- GP Friendly name: *Configure local setting override for monitoring for incoming and outgoing file activity*
- GP name: *RealtimeProtection_LocalSettingOverrideRealtimeScanDirection*
- GP path: *Windows Components\Microsoft Defender Antivirus\Real-time Protection*
- GP ADMX file name: *WindowsDefender.admx*
@@ -2042,7 +2042,7 @@ If you disable or do not configure this setting, Policy will take priority over
ADMX Info:
-- GP English name: *Configure local setting override for the time of day to run a scheduled full scan to complete remediation*
+- GP Friendly name: *Configure local setting override for the time of day to run a scheduled full scan to complete remediation*
- GP name: *Remediation_LocalSettingOverrideScan_ScheduleTime*
- GP path: *Windows Components\Microsoft Defender Antivirus\Remediation*
- GP ADMX file name: *WindowsDefender.admx*
@@ -2100,7 +2100,7 @@ If you disable or do not configure this setting, a scheduled full scan to comple
ADMX Info:
-- GP English name: *Specify the day of the week to run a scheduled full scan to complete remediation*
+- GP Friendly name: *Specify the day of the week to run a scheduled full scan to complete remediation*
- GP name: *Remediation_Scan_ScheduleDay*
- GP path: *Windows Components\Microsoft Defender Antivirus\Remediation*
- GP ADMX file name: *WindowsDefender.admx*
@@ -2146,7 +2146,7 @@ If you disable or do not configure this setting, a scheduled full scan to comple
ADMX Info:
-- GP English name: *Specify the time of day to run a scheduled full scan to complete remediation*
+- GP Friendly name: *Specify the time of day to run a scheduled full scan to complete remediation*
- GP name: *Remediation_Scan_ScheduleTime*
- GP path: *Windows Components\Microsoft Defender Antivirus\Remediation*
- GP ADMX file name: *WindowsDefender.admx*
@@ -2188,7 +2188,7 @@ This policy setting configures the time in minutes before a detection in the "ad
ADMX Info:
-- GP English name: *Configure time out for detections requiring additional action*
+- GP Friendly name: *Configure time out for detections requiring additional action*
- GP name: *Reporting_AdditionalActionTimeout*
- GP path: *Windows Components\Microsoft Defender Antivirus\Reporting*
- GP ADMX file name: *WindowsDefender.admx*
@@ -2230,7 +2230,7 @@ This policy setting configures the time in minutes before a detection in the “
ADMX Info:
-- GP English name: *Configure time out for detections in critically failed state*
+- GP Friendly name: *Configure time out for detections in critically failed state*
- GP name: *Reporting_CriticalFailureTimeout*
- GP path: *Windows Components\Microsoft Defender Antivirus\Reporting*
- GP ADMX file name: *WindowsDefender.admx*
@@ -2276,7 +2276,7 @@ If you enable this setting, Microsoft Defender Antivirus enhanced notifications
ADMX Info:
-- GP English name: *Turn off enhanced notifications*
+- GP Friendly name: *Turn off enhanced notifications*
- GP name: *Reporting_DisableEnhancedNotifications*
- GP path: *Windows Components\Microsoft Defender Antivirus\Reporting*
- GP ADMX file name: *WindowsDefender.admx*
@@ -2321,7 +2321,7 @@ If you disable this setting, Watson events will not be sent.
ADMX Info:
-- GP English name: *Configure Watson events*
+- GP Friendly name: *Configure Watson events*
- GP name: *Reporting_Disablegenericreports*
- GP path: *Windows Components\Microsoft Defender Antivirus\Reporting*
- GP ADMX file name: *WindowsDefender.admx*
@@ -2363,7 +2363,7 @@ This policy setting configures the time in minutes before a detection in the "no
ADMX Info:
-- GP English name: *Configure time out for detections in non-critical failed state*
+- GP Friendly name: *Configure time out for detections in non-critical failed state*
- GP name: *Reporting_NonCriticalTimeout*
- GP path: *Windows Components\Microsoft Defender Antivirus\Reporting*
- GP ADMX file name: *WindowsDefender.admx*
@@ -2403,7 +2403,7 @@ This policy setting configures the time in minutes before a detection in the "co
ADMX Info:
-- GP English name: *Configure time out for detections in recently remediated state*
+- GP Friendly name: *Configure time out for detections in recently remediated state*
- GP name: *Reporting_RecentlyCleanedTimeout*
- GP path: *Windows Components\Microsoft Defender Antivirus\Reporting*
- GP ADMX file name: *WindowsDefender.admx*
@@ -2445,7 +2445,7 @@ This policy configures Windows software trace preprocessor (WPP Software Tracing
ADMX Info:
-- GP English name: *Configure Windows software trace preprocessor components*
+- GP Friendly name: *Configure Windows software trace preprocessor components*
- GP name: *Reporting_WppTracingComponents*
- GP path: *Windows Components\Microsoft Defender Antivirus\Reporting*
- GP ADMX file name: *WindowsDefender.admx*
@@ -2494,7 +2494,7 @@ Tracing levels are defined as:
ADMX Info:
-- GP English name: *Configure WPP tracing level*
+- GP Friendly name: *Configure WPP tracing level*
- GP name: *Reporting_WppTracingLevel*
- GP path: *Windows Components\Microsoft Defender Antivirus\Reporting*
- GP ADMX file name: *WindowsDefender.admx*
@@ -2540,7 +2540,7 @@ If you disable this setting, users will not be able to pause scans.
ADMX Info:
-- GP English name: *Allow users to pause scan*
+- GP Friendly name: *Allow users to pause scan*
- GP name: *Scan_AllowPause*
- GP path: *Windows Components\Microsoft Defender Antivirus\Scan*
- GP ADMX file name: *WindowsDefender.admx*
@@ -2586,7 +2586,7 @@ If you disable or do not configure this setting, archive files will be scanned t
ADMX Info:
-- GP English name: *Specify the maximum depth to scan archive files*
+- GP Friendly name: *Specify the maximum depth to scan archive files*
- GP name: *Scan_ArchiveMaxDepth*
- GP path: *Windows Components\Microsoft Defender Antivirus\Scan*
- GP ADMX file name: *WindowsDefender.admx*
@@ -2632,7 +2632,7 @@ If you disable or do not configure this setting, archive files will be scanned a
ADMX Info:
-- GP English name: *Specify the maximum size of archive files to be scanned*
+- GP Friendly name: *Specify the maximum size of archive files to be scanned*
- GP name: *Scan_ArchiveMaxSize*
- GP path: *Windows Components\Microsoft Defender Antivirus\Scan*
- GP ADMX file name: *WindowsDefender.admx*
@@ -2679,7 +2679,7 @@ If you disable this setting, archive files will not be scanned.
ADMX Info:
-- GP English name: *Scan archive files*
+- GP Friendly name: *Scan archive files*
- GP name: *Scan_DisableArchiveScanning*
- GP path: *Windows Components\Microsoft Defender Antivirus\Scan*
- GP ADMX file name: *WindowsDefender.admx*
@@ -2725,7 +2725,7 @@ If you disable or do not configure this setting, e-mail scanning will be disable
ADMX Info:
-- GP English name: *Turn on e-mail scanning*
+- GP Friendly name: *Turn on e-mail scanning*
- GP name: *Scan_DisableEmailScanning*
- GP path: *Windows Components\Microsoft Defender Antivirus\Scan*
- GP ADMX file name: *WindowsDefender.admx*
@@ -2771,7 +2771,7 @@ If you disable this setting, heuristics will be disabled.
ADMX Info:
-- GP English name: *Turn on heuristics*
+- GP Friendly name: *Turn on heuristics*
- GP name: *Scan_DisableHeuristics*
- GP path: *Windows Components\Microsoft Defender Antivirus\Scan*
- GP ADMX file name: *WindowsDefender.admx*
@@ -2817,7 +2817,7 @@ If you disable this setting, packed executables will not be scanned.
ADMX Info:
-- GP English name: *Scan packed executables*
+- GP Friendly name: *Scan packed executables*
- GP name: *Scan_DisablePackedExeScanning*
- GP path: *Windows Components\Microsoft Defender Antivirus\Scan*
- GP ADMX file name: *WindowsDefender.admx*
@@ -2863,7 +2863,7 @@ If you disable or do not configure this setting, removable drives will not be sc
ADMX Info:
-- GP English name: *Scan removable drives*
+- GP Friendly name: *Scan removable drives*
- GP name: *Scan_DisableRemovableDriveScanning*
- GP path: *Windows Components\Microsoft Defender Antivirus\Scan*
- GP ADMX file name: *WindowsDefender.admx*
@@ -2909,7 +2909,7 @@ If you disable or do not configure this setting, reparse point scanning will be
ADMX Info:
-- GP English name: *Turn on reparse point scanning*
+- GP Friendly name: *Turn on reparse point scanning*
- GP name: *Scan_DisableReparsePointScanning*
- GP path: *Windows Components\Microsoft Defender Antivirus\Scan*
- GP ADMX file name: *WindowsDefender.admx*
@@ -2955,7 +2955,7 @@ If you disable or do not configure this setting, a system restore point will not
ADMX Info:
-- GP English name: *Create a system restore point*
+- GP Friendly name: *Create a system restore point*
- GP name: *Scan_DisableRestorePoint*
- GP path: *Windows Components\Microsoft Defender Antivirus\Scan*
- GP ADMX file name: *WindowsDefender.admx*
@@ -3000,7 +3000,7 @@ If you disable or do not configure this setting, mapped network drives will not
ADMX Info:
-- GP English name: *Run full scan on mapped network drives*
+- GP Friendly name: *Run full scan on mapped network drives*
- GP name: *Scan_DisableScanningMappedNetworkDrivesForFullScan*
- GP path: *Windows Components\Microsoft Defender Antivirus\Scan*
- GP ADMX file name: *WindowsDefender.admx*
@@ -3046,7 +3046,7 @@ If you disable or do not configure this setting, network files will not be scann
ADMX Info:
-- GP English name: *Scan network files*
+- GP Friendly name: *Scan network files*
- GP name: *Scan_DisableScanningNetworkFiles*
- GP path: *Windows Components\Microsoft Defender Antivirus\Scan*
- GP ADMX file name: *WindowsDefender.admx*
@@ -3092,7 +3092,7 @@ If you disable or do not configure this setting, Policy will take priority over
ADMX Info:
-- GP English name: *Configure local setting override for maximum percentage of CPU utilization*
+- GP Friendly name: *Configure local setting override for maximum percentage of CPU utilization*
- GP name: *Scan_LocalSettingOverrideAvgCPULoadFactor*
- GP path: *Windows Components\Microsoft Defender Antivirus\Scan*
- GP ADMX file name: *WindowsDefender.admx*
@@ -3138,7 +3138,7 @@ If you disable or do not configure this setting, Policy will take priority over
ADMX Info:
-- GP English name: *Configure local setting override for the scan type to use for a scheduled scan*
+- GP Friendly name: *Configure local setting override for the scan type to use for a scheduled scan*
- GP name: *Scan_LocalSettingOverrideScanParameters*
- GP path: *Windows Components\Microsoft Defender Antivirus\Scan*
- GP ADMX file name: *WindowsDefender.admx*
@@ -3184,7 +3184,7 @@ If you disable or do not configure this setting, Policy will take priority over
ADMX Info:
-- GP English name: *Configure local setting override for schedule scan day*
+- GP Friendly name: *Configure local setting override for schedule scan day*
- GP name: *Scan_LocalSettingOverrideScheduleDay*
- GP path: *Windows Components\Microsoft Defender Antivirus\Scan*
- GP ADMX file name: *WindowsDefender.admx*
@@ -3230,7 +3230,7 @@ If you disable or do not configure this setting, Policy will take priority over
ADMX Info:
-- GP English name: *Configure local setting override for scheduled quick scan time*
+- GP Friendly name: *Configure local setting override for scheduled quick scan time*
- GP name: *Scan_LocalSettingOverrideScheduleQuickScantime*
- GP path: *Windows Components\Microsoft Defender Antivirus\Scan*
- GP ADMX file name: *WindowsDefender.admx*
@@ -3276,7 +3276,7 @@ If you disable or do not configure this setting, Policy will take priority over
ADMX Info:
-- GP English name: *Configure local setting override for scheduled scan time*
+- GP Friendly name: *Configure local setting override for scheduled scan time*
- GP name: *Scan_LocalSettingOverrideScheduleTime*
- GP path: *Windows Components\Microsoft Defender Antivirus\Scan*
- GP ADMX file name: *WindowsDefender.admx*
@@ -3322,7 +3322,7 @@ If you disable or do not configure this setting, not changes will be made to CPU
ADMX Info:
-- GP English name: *Configure low CPU priority for scheduled scans*
+- GP Friendly name: *Configure low CPU priority for scheduled scans*
- GP name: *Scan_LowCpuPriority*
- GP path: *Windows Components\Microsoft Defender Antivirus\Scan*
- GP ADMX file name: *WindowsDefender.admx*
@@ -3368,7 +3368,7 @@ If you disable or do not configure this setting, a catch-up scan will occur afte
ADMX Info:
-- GP English name: *Define the number of days after which a catch-up scan is forced*
+- GP Friendly name: *Define the number of days after which a catch-up scan is forced*
- GP name: *Scan_MissedScheduledScanCountBeforeCatchup*
- GP path: *Windows Components\Microsoft Defender Antivirus\Scan*
- GP ADMX file name: *WindowsDefender.admx*
@@ -3414,7 +3414,7 @@ If you disable or do not configure this setting, items will be kept in the scan
ADMX Info:
-- GP English name: *Turn on removal of items from scan history folder*
+- GP Friendly name: *Turn on removal of items from scan history folder*
- GP name: *Scan_PurgeItemsAfterDelay*
- GP path: *Windows Components\Microsoft Defender Antivirus\Scan*
- GP ADMX file name: *WindowsDefender.admx*
@@ -3460,7 +3460,7 @@ If you disable or do not configure this setting, a quick scan will run at a defa
ADMX Info:
-- GP English name: *Specify the interval to run quick scans per day*
+- GP Friendly name: *Specify the interval to run quick scans per day*
- GP name: *Scan_QuickScanInterval*
- GP path: *Windows Components\Microsoft Defender Antivirus\Scan*
- GP ADMX file name: *WindowsDefender.admx*
@@ -3506,7 +3506,7 @@ If you disable this setting, scheduled scans will run at the scheduled time.
ADMX Info:
-- GP English name: *Start the scheduled scan only when computer is on but not in use*
+- GP Friendly name: *Start the scheduled scan only when computer is on but not in use*
- GP name: *Scan_ScanOnlyIfIdle*
- GP path: *Windows Components\Microsoft Defender Antivirus\Scan*
- GP ADMX file name: *WindowsDefender.admx*
@@ -3564,7 +3564,7 @@ If you disable or do not configure this setting, a scheduled scan will run at a
ADMX Info:
-- GP English name: *Specify the day of the week to run a scheduled scan*
+- GP Friendly name: *Specify the day of the week to run a scheduled scan*
- GP name: *Scan_ScheduleDay*
- GP path: *Windows Components\Microsoft Defender Antivirus\Scan*
- GP ADMX file name: *WindowsDefender.admx*
@@ -3610,7 +3610,7 @@ If you disable or do not configure this setting, a scheduled scan will run at a
ADMX Info:
-- GP English name: *Specify the time of day to run a scheduled scan*
+- GP Friendly name: *Specify the time of day to run a scheduled scan*
- GP name: *Scan_ScheduleTime*
- GP path: *Windows Components\Microsoft Defender Antivirus\Scan*
- GP ADMX file name: *WindowsDefender.admx*
@@ -3656,7 +3656,7 @@ If you disable or do not configure this setting, the antimalware service will be
ADMX Info:
-- GP English name: *Allow antimalware service to remain running always*
+- GP Friendly name: *Allow antimalware service to remain running always*
- GP name: *ServiceKeepAlive*
- GP path: *Windows Components\Microsoft Defender Antivirus*
- GP ADMX file name: *WindowsDefender.admx*
@@ -3704,7 +3704,7 @@ If you disable or do not configure this setting, spyware security intelligence w
ADMX Info:
-- GP English name: *Define the number of days before spyware security intelligence is considered out of date*
+- GP Friendly name: *Define the number of days before spyware security intelligence is considered out of date*
- GP name: *SignatureUpdate_ASSignatureDue*
- GP path: *Windows Components\Microsoft Defender Antivirus\Security Intelligence Updates*
- GP ADMX file name: *WindowsDefender.admx*
@@ -3750,7 +3750,7 @@ If you disable or do not configure this setting, virus security intelligence wil
ADMX Info:
-- GP English name: *Define the number of days before virus security intelligence is considered out of date*
+- GP Friendly name: *Define the number of days before virus security intelligence is considered out of date*
- GP name: *SignatureUpdate_AVSignatureDue*
- GP path: *Windows Components\Microsoft Defender Antivirus\Security Intelligence Updates*
- GP ADMX file name: *WindowsDefender.admx*
@@ -3796,7 +3796,7 @@ If you disable or do not configure this setting, the list will remain empty by d
ADMX Info:
-- GP English name: *Define file shares for downloading security intelligence updates*
+- GP Friendly name: *Define file shares for downloading security intelligence updates*
- GP name: *SignatureUpdate_DefinitionUpdateFileSharesSources*
- GP path: *Windows Components\Microsoft Defender Antivirus\Security Intelligence Updates*
- GP ADMX file name: *WindowsDefender.admx*
@@ -3842,7 +3842,7 @@ If you disable this setting, a scan will not start following a security intellig
ADMX Info:
-- GP English name: *Turn on scan after security intelligence update*
+- GP Friendly name: *Turn on scan after security intelligence update*
- GP name: *SignatureUpdate_DisableScanOnUpdate*
- GP path: *Windows Components\Microsoft Defender Antivirus\Security Intelligence Updates*
- GP ADMX file name: *WindowsDefender.admx*
@@ -3888,7 +3888,7 @@ If you disable this setting, security intelligence updates will be turned off wh
ADMX Info:
-- GP English name: *Allow security intelligence updates when running on battery power*
+- GP Friendly name: *Allow security intelligence updates when running on battery power*
- GP name: *SignatureUpdate_DisableScheduledSignatureUpdateonBattery*
- GP path: *Windows Components\Microsoft Defender Antivirus\Security Intelligence Updates*
- GP ADMX file name: *WindowsDefender.admx*
@@ -3934,7 +3934,7 @@ If you disable this setting, security intelligence updates will not be initiated
ADMX Info:
-- GP English name: *Initiate security intelligence update on startup*
+- GP Friendly name: *Initiate security intelligence update on startup*
- GP name: *SignatureUpdate_DisableUpdateOnStartupWithoutEngine*
- GP path: *Windows Components\Microsoft Defender Antivirus\Security Intelligence Updates*
- GP ADMX file name: *WindowsDefender.admx*
@@ -3982,7 +3982,7 @@ If you disable or do not configure this setting, security intelligence update so
ADMX Info:
-- GP English name: *Define the order of sources for downloading security intelligence updates*
+- GP Friendly name: *Define the order of sources for downloading security intelligence updates*
- GP name: *SignatureUpdate_FallbackOrder*
- GP path: *Windows Components\Microsoft Defender Antivirus\Security Intelligence Updates*
- GP ADMX file name: *WindowsDefender.admx*
@@ -4028,7 +4028,7 @@ If you disable or do not configure this setting, security intelligence updates w
ADMX Info:
-- GP English name: *Allow security intelligence updates from Microsoft Update*
+- GP Friendly name: *Allow security intelligence updates from Microsoft Update*
- GP name: *SignatureUpdate_ForceUpdateFromMU*
- GP path: *Windows Components\Microsoft Defender Antivirus\Security Intelligence Updates*
- GP ADMX file name: *WindowsDefender.admx*
@@ -4074,7 +4074,7 @@ If you disable this setting, real-time security intelligence updates will disabl
ADMX Info:
-- GP English name: *Allow real-time security intelligence updates based on reports to Microsoft MAPS*
+- GP Friendly name: *Allow real-time security intelligence updates based on reports to Microsoft MAPS*
- GP name: *SignatureUpdate_RealtimeSignatureDelivery*
- GP path: *Windows Components\Microsoft Defender Antivirus\Security Intelligence Updates*
- GP ADMX file name: *WindowsDefender.admx*
@@ -4132,7 +4132,7 @@ If you disable or do not configure this setting, the check for security intellig
ADMX Info:
-- GP English name: *Specify the day of the week to check for security intelligence updates*
+- GP Friendly name: *Specify the day of the week to check for security intelligence updates*
- GP name: *SignatureUpdate_ScheduleDay*
- GP path: *Windows Components\Microsoft Defender Antivirus\Security Intelligence Updates*
- GP ADMX file name: *WindowsDefender.admx*
@@ -4178,7 +4178,7 @@ If you disable or do not configure this setting, the check for security intelli
ADMX Info:
-- GP English name: *Specify the time to check for security intelligence updates*
+- GP Friendly name: *Specify the time to check for security intelligence updates*
- GP name: *SignatureUpdate_ScheduleTime*
- GP path: *Windows Components\Microsoft Defender Antivirus\Security Intelligence Updates*
- GP ADMX file name: *WindowsDefender.admx*
@@ -4222,7 +4222,7 @@ If you disable or do not configure this setting, security intelligence will be r
ADMX Info:
-- GP English name: *Define security intelligence location for VDI clients.*
+- GP Friendly name: *Define security intelligence location for VDI clients.*
- GP name: *SignatureUpdate_SharedSignaturesLocation*
- GP path: *Windows Components\Microsoft Defender Antivirus\Security Intelligence Updates*
- GP ADMX file name: *WindowsDefender.admx*
@@ -4268,7 +4268,7 @@ If you disable this setting, the antimalware service will not receive notificati
ADMX Info:
-- GP English name: *Allow notifications to disable security intelligence based reports to Microsoft MAPS*
+- GP Friendly name: *Allow notifications to disable security intelligence based reports to Microsoft MAPS*
- GP name: *SignatureUpdate_SignatureDisableNotification*
- GP path: *Windows Components\Microsoft Defender Antivirus\Security Intelligence Updates*
- GP ADMX file name: *WindowsDefender.admx*
@@ -4314,7 +4314,7 @@ If you disable or do not configure this setting, a catch-up security intelligenc
ADMX Info:
-- GP English name: *Define the number of days after which a catch-up security intelligence update is required*
+- GP Friendly name: *Define the number of days after which a catch-up security intelligence update is required*
- GP name: *SignatureUpdate_SignatureUpdateCatchupInterval*
- GP path: *Windows Components\Microsoft Defender Antivirus\Security Intelligence Updates*
- GP ADMX file name: *WindowsDefender.admx*
@@ -4360,7 +4360,7 @@ If you disable this setting or do not configure this setting, a check for new se
ADMX Info:
-- GP English name: *Check for the latest virus and spyware security intelligence on startup*
+- GP Friendly name: *Check for the latest virus and spyware security intelligence on startup*
- GP name: *SignatureUpdate_UpdateOnStartup*
- GP path: *Windows Components\Microsoft Defender Antivirus\Security Intelligence Updates*
- GP ADMX file name: *WindowsDefender.admx*
@@ -4420,7 +4420,7 @@ In Windows 10, Basic membership is no longer available, so setting the value to
ADMX Info:
-- GP English name: *Join Microsoft MAPS*
+- GP Friendly name: *Join Microsoft MAPS*
- GP name: *SpynetReporting*
- GP path: *Windows Components\Microsoft Defender Antivirus\MAPS*
- GP ADMX file name: *WindowsDefender.admx*
@@ -4466,7 +4466,7 @@ If you disable or do not configure this setting, Policy will take priority over
ADMX Info:
-- GP English name: *Configure local setting override for reporting to Microsoft MAPS*
+- GP Friendly name: *Configure local setting override for reporting to Microsoft MAPS*
- GP name: *Spynet_LocalSettingOverrideSpynetReporting*
- GP path: *Windows Components\Microsoft Defender Antivirus\MAPS*
- GP ADMX file name: *WindowsDefender.admx*
@@ -4515,7 +4515,7 @@ Valid remediation action values are:
ADMX Info:
-- GP English name: *Specify threats upon which default action should not be taken when detected*
+- GP Friendly name: *Specify threats upon which default action should not be taken when detected*
- GP name: *Threats_ThreatIdDefaultAction*
- GP path: *Windows Components\Microsoft Defender Antivirus\Threats*
- GP ADMX file name: *WindowsDefender.admx*
@@ -4561,7 +4561,7 @@ If you disable or do not configure this setting, there will be no additional tex
ADMX Info:
-- GP English name: *Display additional text to clients when they need to perform an action*
+- GP Friendly name: *Display additional text to clients when they need to perform an action*
- GP name: *UX_Configuration_CustomDefaultActionToastString*
- GP path: *Windows Components\Microsoft Defender Antivirus\Client Interface*
- GP ADMX file name: *WindowsDefender.admx*
@@ -4607,7 +4607,7 @@ If you enable this setting, Microsoft Defender Antivirus notifications will not
ADMX Info:
-- GP English name: *Suppress all notifications*
+- GP Friendly name: *Suppress all notifications*
- GP name: *UX_Configuration_Notification_Suppress*
- GP path: *Windows Components\Microsoft Defender Antivirus\Client Interface*
- GP ADMX file name: *WindowsDefender.admx*
@@ -4651,7 +4651,7 @@ If you enable this setting AM UI won't show reboot notifications.
ADMX Info:
-- GP English name: *Suppresses reboot notifications*
+- GP Friendly name: *Suppresses reboot notifications*
- GP name: *UX_Configuration_SuppressRebootNotification*
- GP path: *Windows Components\Microsoft Defender Antivirus\Client Interface*
- GP ADMX file name: *WindowsDefender.admx*
@@ -4695,7 +4695,7 @@ If you enable this setting AM UI won't be available to users.
ADMX Info:
-- GP English name: *Enable headless UI mode*
+- GP Friendly name: *Enable headless UI mode*
- GP name: *UX_Configuration_UILockdown*
- GP path: *Windows Components\Microsoft Defender Antivirus\Client Interface*
- GP ADMX file name: *WindowsDefender.admx*
diff --git a/windows/client-management/mdm/policy-csp-admx-mmc.md b/windows/client-management/mdm/policy-csp-admx-mmc.md
index b7a4eabb21..d7bfdd79d3 100644
--- a/windows/client-management/mdm/policy-csp-admx-mmc.md
+++ b/windows/client-management/mdm/policy-csp-admx-mmc.md
@@ -93,7 +93,7 @@ When a snap-in is prohibited, it does not appear in the Add/Remove Snap-in windo
ADMX Info:
-- GP English name: *ActiveX Control*
+- GP Friendly name: *ActiveX Control*
- GP name: *MMC_ActiveXControl*
- GP path: *Windows Components\Microsoft Management Console\Restricted/Permitted snap-ins*
- GP ADMX file name: *MMC.admx*
@@ -149,7 +149,7 @@ When a snap-in is prohibited, it does not appear in the Add/Remove Snap-in windo
ADMX Info:
-- GP English name: *Extended View (Web View)*
+- GP Friendly name: *Extended View (Web View)*
- GP name: *MMC_ExtendView*
- GP path: *Windows Components\Microsoft Management Console\Restricted/Permitted snap-ins\Extension snap-ins*
- GP ADMX file name: *MMC.admx*
@@ -205,7 +205,7 @@ When a snap-in is prohibited, it does not appear in the Add/Remove Snap-in windo
ADMX Info:
-- GP English name: *Link to Web Address*
+- GP Friendly name: *Link to Web Address*
- GP name: *MMC_LinkToWeb*
- GP path: *Windows Components\Microsoft Management Console\Restricted/Permitted snap-ins*
- GP ADMX file name: *MMC.admx*
@@ -255,7 +255,7 @@ If you disable this setting or do not configure it, users can enter author mode
ADMX Info:
-- GP English name: *Restrict the user from entering author mode*
+- GP Friendly name: *Restrict the user from entering author mode*
- GP name: *MMC_Restrict_Author*
- GP path: *Windows Components\Microsoft Management Console*
- GP ADMX file name: *MMC.admx*
@@ -310,7 +310,7 @@ When a snap-in is prohibited, it does not appear in the Add/Remove Snap-in windo
ADMX Info:
-- GP English name: *Restrict users to the explicitly permitted list of snap-ins*
+- GP Friendly name: *Restrict users to the explicitly permitted list of snap-ins*
- GP name: *MMC_Restrict_To_Permitted_Snapins*
- GP path: *Windows Components\Microsoft Management Console*
- GP ADMX file name: *MMC.admx*
diff --git a/windows/client-management/mdm/policy-csp-admx-mmcsnapins.md b/windows/client-management/mdm/policy-csp-admx-mmcsnapins.md
index c1dbb2d4d9..1514a912be 100644
--- a/windows/client-management/mdm/policy-csp-admx-mmcsnapins.md
+++ b/windows/client-management/mdm/policy-csp-admx-mmcsnapins.md
@@ -4774,7 +4774,7 @@ When a snap-in is prohibited, it does not appear in the Add/Remove Snap-in windo
ADMX Info:
-- GP English name: *Security Settings*
+- GP Friendly name: *Security Settings*
- GP name: *MMC_SecuritySettings_1*
- GP path: *Windows Components\Microsoft Management Console\Restricted/Permitted snap-ins\Group Policy\Group Policy snap-in extensions*
- GP ADMX file name: *MMCSnapins.admx*
@@ -4828,7 +4828,7 @@ When a snap-in is prohibited, it does not appear in the Add/Remove Snap-in windo
ADMX Info:
-- GP English name: *Security Settings*
+- GP Friendly name: *Security Settings*
- GP name: *MMC_SecuritySettings_2*
- GP path: *Windows Components\Microsoft Management Console\Restricted/Permitted snap-ins\Group Policy\Resultant Set of Policy snap-in extensions*
- GP ADMX file name: *MMCSnapins.admx*
@@ -4882,7 +4882,7 @@ When a snap-in is prohibited, it does not appear in the Add/Remove Snap-in windo
ADMX Info:
-- GP English name: *Security Templates*
+- GP Friendly name: *Security Templates*
- GP name: *MMC_SecurityTemplates*
- GP path: *Windows Components\Microsoft Management Console\Restricted/Permitted snap-ins*
- GP ADMX file name: *MMCSnapins.admx*
@@ -4936,7 +4936,7 @@ When a snap-in is prohibited, it does not appear in the Add/Remove Snap-in windo
ADMX Info:
-- GP English name: *Send Console Message*
+- GP Friendly name: *Send Console Message*
- GP name: *MMC_SendConsoleMessage*
- GP path: *Windows Components\Microsoft Management Console\Restricted/Permitted snap-ins\Extension snap-ins*
- GP ADMX file name: *MMCSnapins.admx*
@@ -4990,7 +4990,7 @@ When a snap-in is prohibited, it does not appear in the Add/Remove Snap-in windo
ADMX Info:
-- GP English name: *Server Manager*
+- GP Friendly name: *Server Manager*
- GP name: *MMC_ServerManager*
- GP path: *Windows Components\Microsoft Management Console\Restricted/Permitted snap-ins*
- GP ADMX file name: *MMCSnapins.admx*
@@ -5044,7 +5044,7 @@ When a snap-in is prohibited, it does not appear in the Add/Remove Snap-in windo
ADMX Info:
-- GP English name: *Service Dependencies*
+- GP Friendly name: *Service Dependencies*
- GP name: *MMC_ServiceDependencies*
- GP path: *Windows Components\Microsoft Management Console\Restricted/Permitted snap-ins\Extension snap-ins*
- GP ADMX file name: *MMCSnapins.admx*
@@ -5098,7 +5098,7 @@ When a snap-in is prohibited, it does not appear in the Add/Remove Snap-in windo
ADMX Info:
-- GP English name: *Services*
+- GP Friendly name: *Services*
- GP name: *MMC_Services*
- GP path: *Windows Components\Microsoft Management Console\Restricted/Permitted snap-ins*
- GP ADMX file name: *MMCSnapins.admx*
@@ -5152,7 +5152,7 @@ When a snap-in is prohibited, it does not appear in the Add/Remove Snap-in windo
ADMX Info:
-- GP English name: *Shared Folders*
+- GP Friendly name: *Shared Folders*
- GP name: *MMC_SharedFolders*
- GP path: *Windows Components\Microsoft Management Console\Restricted/Permitted snap-ins*
- GP ADMX file name: *MMCSnapins.admx*
@@ -5206,7 +5206,7 @@ When a snap-in is prohibited, it does not appear in the Add/Remove Snap-in windo
ADMX Info:
-- GP English name: *Shared Folders Ext*
+- GP Friendly name: *Shared Folders Ext*
- GP name: *MMC_SharedFolders_Ext*
- GP path: *Windows Components\Microsoft Management Console\Restricted/Permitted snap-ins\Extension snap-ins*
- GP ADMX file name: *MMCSnapins.admx*
@@ -5260,7 +5260,7 @@ When a snap-in is prohibited, it does not appear in the Add/Remove Snap-in windo
ADMX Info:
-- GP English name: *Software Installation (Computers)*
+- GP Friendly name: *Software Installation (Computers)*
- GP name: *MMC_SoftwareInstalationComputers_1*
- GP path: *Windows Components\Microsoft Management Console\Restricted/Permitted snap-ins\Group Policy\Group Policy snap-in extensions*
- GP ADMX file name: *MMCSnapins.admx*
@@ -5314,7 +5314,7 @@ When a snap-in is prohibited, it does not appear in the Add/Remove Snap-in windo
ADMX Info:
-- GP English name: *Software Installation (Computers)*
+- GP Friendly name: *Software Installation (Computers)*
- GP name: *MMC_SoftwareInstalationComputers_2*
- GP path: *Windows Components\Microsoft Management Console\Restricted/Permitted snap-ins\Group Policy\Resultant Set of Policy snap-in extensions*
- GP ADMX file name: *MMCSnapins.admx*
@@ -5368,7 +5368,7 @@ When a snap-in is prohibited, it does not appear in the Add/Remove Snap-in windo
ADMX Info:
-- GP English name: *Software Installation (Users)*
+- GP Friendly name: *Software Installation (Users)*
- GP name: *MMC_SoftwareInstallationUsers_1*
- GP path: *Windows Components\Microsoft Management Console\Restricted/Permitted snap-ins\Group Policy\Group Policy snap-in extensions*
- GP ADMX file name: *MMCSnapins.admx*
@@ -5422,7 +5422,7 @@ When a snap-in is prohibited, it does not appear in the Add/Remove Snap-in windo
ADMX Info:
-- GP English name: *Software Installation (Users)*
+- GP Friendly name: *Software Installation (Users)*
- GP name: *MMC_SoftwareInstallationUsers_2*
- GP path: *Windows Components\Microsoft Management Console\Restricted/Permitted snap-ins\Group Policy\Resultant Set of Policy snap-in extensions*
- GP ADMX file name: *MMCSnapins.admx*
@@ -5476,7 +5476,7 @@ When a snap-in is prohibited, it does not appear in the Add/Remove Snap-in windo
ADMX Info:
-- GP English name: *System Information*
+- GP Friendly name: *System Information*
- GP name: *MMC_SysInfo*
- GP path: *Windows Components\Microsoft Management Console\Restricted/Permitted snap-ins*
- GP ADMX file name: *MMCSnapins.admx*
@@ -5530,7 +5530,7 @@ When a snap-in is prohibited, it does not appear in the Add/Remove Snap-in windo
ADMX Info:
-- GP English name: *System Properties*
+- GP Friendly name: *System Properties*
- GP name: *MMC_SysProp*
- GP path: *Windows Components\Microsoft Management Console\Restricted/Permitted snap-ins\Extension snap-ins*
- GP ADMX file name: *MMCSnapins.admx*
@@ -5584,7 +5584,7 @@ When a snap-in is prohibited, it does not appear in the Add/Remove Snap-in windo
ADMX Info:
-- GP English name: *TPM Management*
+- GP Friendly name: *TPM Management*
- GP name: *MMC_TPMManagement*
- GP path: *Windows Components\Microsoft Management Console\Restricted/Permitted snap-ins*
- GP ADMX file name: *MMCSnapins.admx*
@@ -5638,7 +5638,7 @@ When a snap-in is prohibited, it does not appear in the Add/Remove Snap-in windo
ADMX Info:
-- GP English name: *Telephony*
+- GP Friendly name: *Telephony*
- GP name: *MMC_Telephony*
- GP path: *Windows Components\Microsoft Management Console\Restricted/Permitted snap-ins*
- GP ADMX file name: *MMCSnapins.admx*
@@ -5692,7 +5692,7 @@ When a snap-in is prohibited, it does not appear in the Add/Remove Snap-in windo
ADMX Info:
-- GP English name: *Remote Desktop Services Configuration*
+- GP Friendly name: *Remote Desktop Services Configuration*
- GP name: *MMC_TerminalServices*
- GP path: *Windows Components\Microsoft Management Console\Restricted/Permitted snap-ins*
- GP ADMX file name: *MMCSnapins.admx*
@@ -5746,7 +5746,7 @@ When a snap-in is prohibited, it does not appear in the Add/Remove Snap-in windo
ADMX Info:
-- GP English name: *WMI Control*
+- GP Friendly name: *WMI Control*
- GP name: *MMC_WMI*
- GP path: *Windows Components\Microsoft Management Console\Restricted/Permitted snap-ins*
- GP ADMX file name: *MMCSnapins.admx*
@@ -5800,7 +5800,7 @@ When a snap-in is prohibited, it does not appear in the Add/Remove Snap-in windo
ADMX Info:
-- GP English name: *Windows Firewall with Advanced Security*
+- GP Friendly name: *Windows Firewall with Advanced Security*
- GP name: *MMC_WindowsFirewall*
- GP path: *Windows Components\Microsoft Management Console\Restricted/Permitted snap-ins*
- GP ADMX file name: *MMCSnapins.admx*
@@ -5854,7 +5854,7 @@ When a snap-in is prohibited, it does not appear in the Add/Remove Snap-in windo
ADMX Info:
-- GP English name: *Windows Firewall with Advanced Security*
+- GP Friendly name: *Windows Firewall with Advanced Security*
- GP name: *MMC_WindowsFirewall_GP*
- GP path: *Windows Components\Microsoft Management Console\Restricted/Permitted snap-ins\Group Policy\Group Policy snap-in extensions*
- GP ADMX file name: *MMCSnapins.admx*
@@ -5908,7 +5908,7 @@ When a snap-in is prohibited, it does not appear in the Add/Remove Snap-in windo
ADMX Info:
-- GP English name: *Wired Network (IEEE 802.3) Policies*
+- GP Friendly name: *Wired Network (IEEE 802.3) Policies*
- GP name: *MMC_WiredNetworkPolicy*
- GP path: *Windows Components\Microsoft Management Console\Restricted/Permitted snap-ins\Group Policy\Group Policy snap-in extensions*
- GP ADMX file name: *MMCSnapins.admx*
@@ -5962,7 +5962,7 @@ When a snap-in is prohibited, it does not appear in the Add/Remove Snap-in windo
ADMX Info:
-- GP English name: *Wireless Monitor*
+- GP Friendly name: *Wireless Monitor*
- GP name: *MMC_WirelessMon*
- GP path: *Windows Components\Microsoft Management Console\Restricted/Permitted snap-ins*
- GP ADMX file name: *MMCSnapins.admx*
@@ -6016,7 +6016,7 @@ When a snap-in is prohibited, it does not appear in the Add/Remove Snap-in windo
ADMX Info:
-- GP English name: *Wireless Network (IEEE 802.11) Policies*
+- GP Friendly name: *Wireless Network (IEEE 802.11) Policies*
- GP name: *MMC_WirelessNetworkPolicy*
- GP path: *Windows Components\Microsoft Management Console\Restricted/Permitted snap-ins\Group Policy\Group Policy snap-in extensions*
- GP ADMX file name: *MMCSnapins.admx*
diff --git a/windows/client-management/mdm/policy-csp-attachmentmanager.md b/windows/client-management/mdm/policy-csp-attachmentmanager.md
index 3be1f15988..b839ee8d78 100644
--- a/windows/client-management/mdm/policy-csp-attachmentmanager.md
+++ b/windows/client-management/mdm/policy-csp-attachmentmanager.md
@@ -183,7 +183,7 @@ If you do not configure this policy setting, Windows does not call the registere
ADMX Info:
-- GP English name: *Notify antivirus programs when opening attachments*
+- GP Friendly name: *Notify antivirus programs when opening attachments*
- GP name: *AM_CallIOfficeAntiVirus*
- GP path: *Windows Components/Attachment Manager*
- GP ADMX file name: *AttachmentManager.admx*
diff --git a/windows/client-management/mdm/policy-csp-remotedesktopservices.md b/windows/client-management/mdm/policy-csp-remotedesktopservices.md
index 902ead52a3..31f36b4007 100644
--- a/windows/client-management/mdm/policy-csp-remotedesktopservices.md
+++ b/windows/client-management/mdm/policy-csp-remotedesktopservices.md
@@ -93,7 +93,7 @@ You can limit the number of users who can connect simultaneously by configuring
ADMX Info:
-- GP English name: *Allow users to connect remotely by using Remote Desktop Services*
+- GP Friendly name: *Allow users to connect remotely by using Remote Desktop Services*
- GP name: *TS_DISABLE_CONNECTIONS*
- GP path: *Windows Components/Remote Desktop Services/Remote Desktop Session Host/Connections*
- GP ADMX file name: *terminalserver.admx*
@@ -149,7 +149,7 @@ FIPS compliance can be configured through the System cryptography. Use FIPS comp
ADMX Info:
-- GP English name: *Set client connection encryption level*
+- GP Friendly name: *Set client connection encryption level*
- GP name: *TS_ENCRYPTION_POLICY*
- GP path: *Windows Components/Remote Desktop Services/Remote Desktop Session Host/Security*
- GP ADMX file name: *terminalserver.admx*
@@ -199,7 +199,7 @@ If you do not configure this policy setting, client drive redirection and Clipbo
ADMX Info:
-- GP English name: *Do not allow drive redirection*
+- GP Friendly name: *Do not allow drive redirection*
- GP name: *TS_CLIENT_DRIVE_M*
- GP path: *Windows Components/Remote Desktop Services/Remote Desktop Session Host/Device and Resource Redirection*
- GP ADMX file name: *terminalserver.admx*
@@ -245,7 +245,7 @@ If you disable this setting or leave it not configured, the user will be able to
ADMX Info:
-- GP English name: *Do not allow passwords to be saved*
+- GP Friendly name: *Do not allow passwords to be saved*
- GP name: *TS_CLIENT_DISABLE_PASSWORD_SAVING_2*
- GP path: *Windows Components/Remote Desktop Services/Remote Desktop Connection Client*
- GP ADMX file name: *terminalserver.admx*
@@ -297,7 +297,7 @@ If you do not configure this policy setting, automatic logon is not specified at
ADMX Info:
-- GP English name: *Always prompt for password upon connection*
+- GP Friendly name: *Always prompt for password upon connection*
- GP name: *TS_PASSWORD*
- GP path: *Windows Components/Remote Desktop Services/Remote Desktop Session Host/Security*
- GP ADMX file name: *terminalserver.admx*
@@ -349,7 +349,7 @@ Note: The RPC interface is used for administering and configuring Remote Desktop
ADMX Info:
-- GP English name: *Require secure RPC communication*
+- GP Friendly name: *Require secure RPC communication*
- GP name: *TS_RPC_ENCRYPTION*
- GP path: *Windows Components/Remote Desktop Services/Remote Desktop Session Host/Security*
- GP ADMX file name: *terminalserver.admx*
diff --git a/windows/client-management/mdm/policy-csp-remotemanagement.md b/windows/client-management/mdm/policy-csp-remotemanagement.md
index 88f1e02ee3..7062b9695c 100644
--- a/windows/client-management/mdm/policy-csp-remotemanagement.md
+++ b/windows/client-management/mdm/policy-csp-remotemanagement.md
@@ -114,7 +114,7 @@ If you disable or do not configure this policy setting, the WinRM client does no
ADMX Info:
-- GP English name: *Allow Basic authentication*
+- GP Friendly name: *Allow Basic authentication*
- GP name: *AllowBasic_2*
- GP path: *Windows Components/Windows Remote Management (WinRM)/WinRM Client*
- GP ADMX file name: *WindowsRemoteManagement.admx*
@@ -160,7 +160,7 @@ If you disable or do not configure this policy setting, the WinRM service does n
ADMX Info:
-- GP English name: *Allow Basic authentication*
+- GP Friendly name: *Allow Basic authentication*
- GP name: *AllowBasic_1*
- GP path: *Windows Components/Windows Remote Management (WinRM)/WinRM Service*
- GP ADMX file name: *WindowsRemoteManagement.admx*
@@ -206,7 +206,7 @@ If you disable or do not configure this policy setting, the WinRM client does no
ADMX Info:
-- GP English name: *Allow CredSSP authentication*
+- GP Friendly name: *Allow CredSSP authentication*
- GP name: *AllowCredSSP_2*
- GP path: *Windows Components/Windows Remote Management (WinRM)/WinRM Client*
- GP ADMX file name: *WindowsRemoteManagement.admx*
@@ -252,7 +252,7 @@ If you disable or do not configure this policy setting, the WinRM service does n
ADMX Info:
-- GP English name: *Allow CredSSP authentication*
+- GP Friendly name: *Allow CredSSP authentication*
- GP name: *AllowCredSSP_1*
- GP path: *Windows Components/Windows Remote Management (WinRM)/WinRM Service*
- GP ADMX file name: *WindowsRemoteManagement.admx*
@@ -311,7 +311,7 @@ Example IPv6 filters:\n3FFE:FFFF:7654:FEDA:1245:BA98:0000:0000-3FFE:FFFF:7654:FE
ADMX Info:
-- GP English name: *Allow remote server management through WinRM*
+- GP Friendly name: *Allow remote server management through WinRM*
- GP name: *AllowAutoConfig*
- GP path: *Windows Components/Windows Remote Management (WinRM)/WinRM Service*
- GP ADMX file name: *WindowsRemoteManagement.admx*
@@ -357,7 +357,7 @@ If you disable or do not configure this policy setting, the WinRM client sends o
ADMX Info:
-- GP English name: *Allow unencrypted traffic*
+- GP Friendly name: *Allow unencrypted traffic*
- GP name: *AllowUnencrypted_2*
- GP path: *Windows Components/Windows Remote Management (WinRM)/WinRM Client*
- GP ADMX file name: *WindowsRemoteManagement.admx*
@@ -403,7 +403,7 @@ If you disable or do not configure this policy setting, the WinRM client sends o
ADMX Info:
-- GP English name: *Allow unencrypted traffic*
+- GP Friendly name: *Allow unencrypted traffic*
- GP name: *AllowUnencrypted_1*
- GP path: *Windows Components/Windows Remote Management (WinRM)/WinRM Service*
- GP ADMX file name: *WindowsRemoteManagement.admx*
@@ -449,7 +449,7 @@ If you disable or do not configure this policy setting, the WinRM client uses Di
ADMX Info:
-- GP English name: *Disallow Digest authentication*
+- GP Friendly name: *Disallow Digest authentication*
- GP name: *DisallowDigest*
- GP path: *Windows Components/Windows Remote Management (WinRM)/WinRM Client*
- GP ADMX file name: *WindowsRemoteManagement.admx*
@@ -495,7 +495,7 @@ If you disable or do not configure this policy setting, the WinRM client uses Ne
ADMX Info:
-- GP English name: *Disallow Negotiate authentication*
+- GP Friendly name: *Disallow Negotiate authentication*
- GP name: *DisallowNegotiate_2*
- GP path: *Windows Components/Windows Remote Management (WinRM)/WinRM Client*
- GP ADMX file name: *WindowsRemoteManagement.admx*
@@ -541,7 +541,7 @@ If you disable or do not configure this policy setting, the WinRM service accept
ADMX Info:
-- GP English name: *Disallow Negotiate authentication*
+- GP Friendly name: *Disallow Negotiate authentication*
- GP name: *DisallowNegotiate_1*
- GP path: *Windows Components/Windows Remote Management (WinRM)/WinRM Service*
- GP ADMX file name: *WindowsRemoteManagement.admx*
@@ -589,7 +589,7 @@ If you enable and then disable this policy setting,any values that were previous
ADMX Info:
-- GP English name: *Disallow WinRM from storing RunAs credentials*
+- GP Friendly name: *Disallow WinRM from storing RunAs credentials*
- GP name: *DisableRunAs*
- GP path: *Windows Components/Windows Remote Management (WinRM)/WinRM Service*
- GP ADMX file name: *WindowsRemoteManagement.admx*
@@ -641,7 +641,7 @@ If HardeningLevel is set to None, all requests are accepted (though they are not
ADMX Info:
-- GP English name: *Specify channel binding token hardening level*
+- GP Friendly name: *Specify channel binding token hardening level*
- GP name: *CBTHardeningLevel_1*
- GP path: *Windows Components/Windows Remote Management (WinRM)/WinRM Service*
- GP ADMX file name: *WindowsRemoteManagement.admx*
@@ -687,7 +687,7 @@ If you disable or do not configure this policy setting and the WinRM client need
ADMX Info:
-- GP English name: *Trusted Hosts*
+- GP Friendly name: *Trusted Hosts*
- GP name: *TrustedHosts*
- GP path: *Windows Components/Windows Remote Management (WinRM)/WinRM Client*
- GP ADMX file name: *WindowsRemoteManagement.admx*
@@ -737,7 +737,7 @@ A listener might be automatically created on port 80 to ensure backward compatib
ADMX Info:
-- GP English name: *Turn On Compatibility HTTP Listener*
+- GP Friendly name: *Turn On Compatibility HTTP Listener*
- GP name: *HttpCompatibilityListener*
- GP path: *Windows Components/Windows Remote Management (WinRM)/WinRM Service*
- GP ADMX file name: *WindowsRemoteManagement.admx*
@@ -787,7 +787,7 @@ A listener might be automatically created on port 443 to ensure backward compati
ADMX Info:
-- GP English name: *Turn On Compatibility HTTPS Listener*
+- GP Friendly name: *Turn On Compatibility HTTPS Listener*
- GP name: *HttpsCompatibilityListener*
- GP path: *Windows Components/Windows Remote Management (WinRM)/WinRM Service*
- GP ADMX file name: *WindowsRemoteManagement.admx*
diff --git a/windows/client-management/mdm/policy-csp-remoteprocedurecall.md b/windows/client-management/mdm/policy-csp-remoteprocedurecall.md
index 9832eb9c61..a750b0adde 100644
--- a/windows/client-management/mdm/policy-csp-remoteprocedurecall.md
+++ b/windows/client-management/mdm/policy-csp-remoteprocedurecall.md
@@ -78,7 +78,7 @@ Note: This policy will not be applied until the system is rebooted.
ADMX Info:
-- GP English name: *Enable RPC Endpoint Mapper Client Authentication*
+- GP Friendly name: *Enable RPC Endpoint Mapper Client Authentication*
- GP name: *RpcEnableAuthEpResolution*
- GP path: *System/Remote Procedure Call*
- GP ADMX file name: *rpc.admx*
@@ -137,7 +137,7 @@ If you enable this policy setting, it directs the RPC server runtime to restrict
ADMX Info:
-- GP English name: *Restrict Unauthenticated RPC clients*
+- GP Friendly name: *Restrict Unauthenticated RPC clients*
- GP name: *RpcRestrictRemoteClients*
- GP path: *System/Remote Procedure Call*
- GP ADMX file name: *rpc.admx*
diff --git a/windows/client-management/mdm/policy-csp-remoteshell.md b/windows/client-management/mdm/policy-csp-remoteshell.md
index a9f428a5a9..25abffed2e 100644
--- a/windows/client-management/mdm/policy-csp-remoteshell.md
+++ b/windows/client-management/mdm/policy-csp-remoteshell.md
@@ -89,7 +89,7 @@ If you set this policy to ‘disabled’, new remote shell connections are rejec
ADMX Info:
-- GP English name: *Allow Remote Shell Access*
+- GP Friendly name: *Allow Remote Shell Access*
- GP name: *AllowRemoteShellAccess*
- GP path: *Windows Components/Windows Remote Shell*
- GP ADMX file name: *WindowsRemoteShell.admx*
@@ -137,7 +137,7 @@ If you disable or do not configure this policy setting, the default number is fi
ADMX Info:
-- GP English name: *MaxConcurrentUsers*
+- GP Friendly name: *MaxConcurrentUsers*
- GP name: *MaxConcurrentUsers*
- GP path: *Windows Components/Windows Remote Shell*
- GP ADMX file name: *WindowsRemoteShell.admx*
@@ -185,7 +185,7 @@ If you do not configure or disable this policy setting, the default value of 900
ADMX Info:
-- GP English name: *Specify idle Timeout*
+- GP Friendly name: *Specify idle Timeout*
- GP name: *IdleTimeout*
- GP path: *Windows Components/Windows Remote Shell*
- GP ADMX file name: *WindowsRemoteShell.admx*
@@ -233,7 +233,7 @@ If you disable or do not configure this policy setting, the value 150 is used by
ADMX Info:
-- GP English name: *Specify maximum amount of memory in MB per Shell*
+- GP Friendly name: *Specify maximum amount of memory in MB per Shell*
- GP name: *MaxMemoryPerShellMB*
- GP path: *Windows Components/Windows Remote Shell*
- GP ADMX file name: *WindowsRemoteShell.admx*
@@ -279,7 +279,7 @@ If you disable or do not configure this policy setting, the limit is five proce
ADMX Info:
-- GP English name: *Specify maximum number of processes per Shell*
+- GP Friendly name: *Specify maximum number of processes per Shell*
- GP name: *MaxProcessesPerShell*
- GP path: *Windows Components/Windows Remote Shell*
- GP ADMX file name: *WindowsRemoteShell.admx*
@@ -327,7 +327,7 @@ If you disable or do not configure this policy setting, by default the limit is
ADMX Info:
-- GP English name: *Specify maximum number of remote shells per user*
+- GP Friendly name: *Specify maximum number of remote shells per user*
- GP name: *MaxShellsPerUser*
- GP path: *Windows Components/Windows Remote Shell*
- GP ADMX file name: *WindowsRemoteShell.admx*
@@ -369,7 +369,7 @@ This policy setting is deprecated and has no effect when set to any state: Enabl
ADMX Info:
-- GP English name: *Specify Shell Timeout*
+- GP Friendly name: *Specify Shell Timeout*
- GP name: *ShellTimeOut*
- GP path: *Windows Components/Windows Remote Shell*
- GP ADMX file name: *WindowsRemoteShell.admx*
diff --git a/windows/client-management/mdm/policy-csp-search.md b/windows/client-management/mdm/policy-csp-search.md
index 4c50234b0c..5028411604 100644
--- a/windows/client-management/mdm/policy-csp-search.md
+++ b/windows/client-management/mdm/policy-csp-search.md
@@ -99,7 +99,7 @@ Allow search and Cortana to search cloud sources like OneDrive and SharePoint. T
ADMX Info:
-- GP English name: *Allow Cloud Search*
+- GP Friendly name: *Allow Cloud Search*
- GP name: *AllowCloudSearch*
- GP element: *AllowCloudSearch_Dropdown*
- GP path: *Windows Components/Search*
@@ -148,7 +148,7 @@ This policy allows the cortana opt-in page during windows setup out of the box e
ADMX Info:
-- GP English name: *Allow Cloud Search*
+- GP Friendly name: *Allow Cloud Search*
- GP name: *AllowCortanaInAAD*
- GP element: *AllowCloudSearch_Dropdown*
- GP path: *Windows Components/Search*
@@ -196,7 +196,7 @@ Controls if the user can configure search to Find My Files mode, which searches
ADMX Info:
-- GP English name: *Allow Find My Files*
+- GP Friendly name: *Allow Find My Files*
- GP name: *AllowFindMyFiles*
- GP path: *Computer Configuration/Administrative Templates/Windows Components/Search*
- GP ADMX file name: *Search.admx*
@@ -256,7 +256,7 @@ Most restricted value is 0.
ADMX Info:
-- GP English name: *Allow indexing of encrypted files*
+- GP Friendly name: *Allow indexing of encrypted files*
- GP name: *AllowIndexingEncryptedStoresOrItems*
- GP path: *Windows Components/Search*
- GP ADMX file name: *Search.admx*
@@ -306,7 +306,7 @@ Most restricted value is 0.
ADMX Info:
-- GP English name: *Allow search and Cortana to use location*
+- GP Friendly name: *Allow search and Cortana to use location*
- GP name: *AllowSearchToUseLocation*
- GP path: *Windows Components/Search*
- GP ADMX file name: *Search.admx*
@@ -368,7 +368,7 @@ Most restricted value is 0.
ADMX Info:
-- GP English name: *Allow use of diacritics*
+- GP Friendly name: *Allow use of diacritics*
- GP name: *AllowUsingDiacritics*
- GP path: *Windows Components/Search*
- GP ADMX file name: *Search.admx*
@@ -452,7 +452,7 @@ Most restricted value is 0.
ADMX Info:
-- GP English name: *Always use automatic language detection when indexing content and properties*
+- GP Friendly name: *Always use automatic language detection when indexing content and properties*
- GP name: *AlwaysUseAutoLangDetection*
- GP path: *Windows Components/Search*
- GP ADMX file name: *Search.admx*
@@ -500,7 +500,7 @@ If enabled, the search indexer backoff feature will be disabled. Indexing will c
ADMX Info:
-- GP English name: *Disable indexer backoff*
+- GP Friendly name: *Disable indexer backoff*
- GP name: *DisableBackoff*
- GP path: *Windows Components/Search*
- GP ADMX file name: *Search.admx*
@@ -552,7 +552,7 @@ If you disable or do not configure this policy setting, locations on removable d
ADMX Info:
-- GP English name: *Do not allow locations on removable drives to be added to libraries*
+- GP Friendly name: *Do not allow locations on removable drives to be added to libraries*
- GP name: *DisableRemovableDriveIndexing*
- GP path: *Windows Components/Search*
- GP ADMX file name: *Search.admx*
@@ -605,7 +605,7 @@ If you disable this policy setting, queries will be performed on the web and web
ADMX Info:
-- GP English name: *Don't search the web or display web results in Search*
+- GP Friendly name: *Don't search the web or display web results in Search*
- GP name: *DoNotUseWebResults*
- GP path: *Windows Components/Search*
- GP ADMX file name: *Search.admx*
@@ -657,7 +657,7 @@ When this policy is disabled or not configured, Windows Desktop Search automatic
ADMX Info:
-- GP English name: *Stop indexing in the event of limited hard drive space*
+- GP Friendly name: *Stop indexing in the event of limited hard drive space*
- GP name: *StopIndexingOnLimitedHardDriveSpace*
- GP path: *Windows Components/Search*
- GP ADMX file name: *Search.admx*
@@ -705,7 +705,7 @@ If enabled, clients will be unable to query this computer's index remotely. Thus
ADMX Info:
-- GP English name: *Prevent clients from querying the index remotely*
+- GP Friendly name: *Prevent clients from querying the index remotely*
- GP name: *PreventRemoteQueries*
- GP path: *Windows Components/Search*
- GP ADMX file name: *Search.admx*
diff --git a/windows/client-management/mdm/policy-csp-security.md b/windows/client-management/mdm/policy-csp-security.md
index 136a6f1772..dc3da9ca62 100644
--- a/windows/client-management/mdm/policy-csp-security.md
+++ b/windows/client-management/mdm/policy-csp-security.md
@@ -190,7 +190,7 @@ Admin access is required. The prompt will appear on first admin logon after a re
ADMX Info:
-- GP English name: *Configure the system to clear the TPM if it is not in a ready state.*
+- GP Friendly name: *Configure the system to clear the TPM if it is not in a ready state.*
- GP name: *ClearTPMIfNotReady_Name*
- GP path: *System/Trusted Platform Module Services*
- GP ADMX file name: *TPM.admx*
diff --git a/windows/client-management/mdm/policy-csp-servicecontrolmanager.md b/windows/client-management/mdm/policy-csp-servicecontrolmanager.md
index f8b22ff8c3..6dd30d5940 100644
--- a/windows/client-management/mdm/policy-csp-servicecontrolmanager.md
+++ b/windows/client-management/mdm/policy-csp-servicecontrolmanager.md
@@ -75,7 +75,7 @@ If you disable or do not configure this policy setting, the stricter security se
ADMX Info:
-- GP English name: *Enable svchost.exe mitigation options*
+- GP Friendly name: *Enable svchost.exe mitigation options*
- GP name: *SvchostProcessMitigationEnable*
- GP path: *System/Service Control Manager Settings/Security Settings*
- GP ADMX file name: *ServiceControlManager.admx*