mirror of
https://github.com/MicrosoftDocs/windows-itpro-docs.git
synced 2025-05-12 05:17:22 +00:00
Acrolinx
This commit is contained in:
parent
59c3a02216
commit
efb4a1b11d
@ -7,12 +7,12 @@ ms.topic: include
|
||||
|
||||
### Clear history of recently opened documents on exit
|
||||
|
||||
If you enable this policy setting, shortcuts to recently used files are deleted when the user logs off:
|
||||
If you enable this policy setting, shortcuts to recently used files are deleted when the user signs out:
|
||||
|
||||
- The **Recent Items** section on the Start menu is cleared
|
||||
- Recently and frequently used items in the jump lists of programs in the Start menu and Taskbar are cleared
|
||||
|
||||
If you disable or don't configure this policy setting, the system retains document shortcuts. When a signs in, the **Recent Items** menu and the jump lists appear as when the user logged off.
|
||||
If you disable or don't configure this policy setting, the system retains document shortcuts. When a user signs in, the **Recent Items** menu and the jump lists appear as when the user logged off.
|
||||
|
||||
> [!NOTE]
|
||||
> The system saves document shortcuts in the user profile in the System-drive\Users\User-name\Recent folder.
|
||||
|
@ -7,7 +7,7 @@ ms.topic: include
|
||||
|
||||
### Clear the recent programs list for new users
|
||||
|
||||
If you enable this policy setting, the recent programs list in the start menu is empty for each new user. If you disable or don't configure this policy setting, the start menu *recent programs list* is pre-populated with programs for each new user.
|
||||
If you enable this policy setting, the recent programs list in the start menu is empty for each new user. If you disable or don't configure this policy setting, the start menu *recent programs list* is prepopulated with programs for each new user.
|
||||
|
||||
| | Path |
|
||||
|--|--|
|
||||
|
@ -7,7 +7,7 @@ ms.topic: include
|
||||
|
||||
### Clear tile notifications during log on
|
||||
|
||||
If you enable this setting, the system deletes tile notifications when the user logs on. As a result, the Tiles in the start view will always show their default content when the user logs on. In addition, any cached versions of these notifications will be cleared when the user logs on. If you disable or do not configure this setting, the system retains notifications, and when a user logs on, the tiles appear just as they did when the user logged off, including the history of previous notifications for each tile. This setting does not prevent new notifications from appearing. See the "Turn off Application Notifications" setting to prevent new notifications.
|
||||
If you enable this policy setting, the system deletes tile notifications when the user signs on. As a result, the tiles in the Start menu always show their default content when a user signs in. Any cached versions of the notifications are cleared when the user signs in. If you disable or don't configure this setting, the system retains notifications, and when a user signs in, the tiles appear just as they did when the user signed out, including the history of previous notifications for each tile. This policy setting doesn't prevent new notifications from appearing.
|
||||
|
||||
| | Path |
|
||||
|--|--|
|
||||
|
@ -7,7 +7,7 @@ ms.topic: include
|
||||
|
||||
### Configure Start layout
|
||||
|
||||
Specifies the Start layout for users. This setting lets you specify the Start layout for users and prevents them from changing its configuration. The Start layout you specify must be stored in an XML file that was generated by the Export-StartLayout PowerShell cmdlet. To use this setting, you must first manually configure a device's Start layout to the desired look and feel. Once you are done, run the Export-StartLayout PowerShell cmdlet on that same device. The cmdlet will generate an XML file representing the layout you configured. Once the XML file is generated and moved to the desired file path, type the fully qualified path and name of the XML file. You can type a local path, such as C:\StartLayouts\myLayout.xml or a UNC path, such as \\Server\Share\Layout.xml. If the specified file is not available when the user logs on, the layout won't be changed. Users cannot customize their Start screen while this setting is enabled. If you disable this setting or do not configure it, the Start screen layout won't be changed and users will be able to customize it.
|
||||
This policy setting lets you specify the Start layout for users, preventing them from changing its configuration. The Start layout you specify must be stored in an XML file that was generated by the `Export-StartLayout` PowerShell cmdlet. To use this setting, you must first manually configure a device's Start layout to the desired look and feel. Then, run the `Export-StartLayout` PowerShell cmdlet on that same device. The cmdlet generates an XML file representing the layout you configured. Once the XML file is generated and moved to the desired file path, use the fully qualified path and name of the XML file. You can use a local path, or a UNC path. If the specified file isn't available when the user signs in, the layout isn't changed. Users can't customize the Start layout while this setting is enabled. If you disable this setting or don't configure it, the Start screen layout isn't changed and users can customize it.
|
||||
|
||||
| | Path |
|
||||
|--|--|
|
||||
|
@ -7,7 +7,7 @@ ms.topic: include
|
||||
|
||||
### Disable context menus
|
||||
|
||||
This policy allows you to prevent users from being able to open context menus in the Start menu. If you enable this policy, then invocations of context menus within the Start menu is ignored.
|
||||
With this policy setting you can prevent users from opening the context menus in the Start menu. If you enable this policy, then invocations of context menus within the Start menu is ignored.
|
||||
|
||||
| | Path |
|
||||
|--|--|
|
||||
|
@ -7,7 +7,7 @@ ms.topic: include
|
||||
|
||||
### Disable editing quick settings
|
||||
|
||||
When you this policy setting, users can't modify quick settings. If you disable or don't configure this policy setting, the user can edit quick settings, such as pinning or unpinning buttons.
|
||||
When you enable this policy setting, users can't modify quick settings. If you disable or don't configure this policy setting, users can edit quick settings, like pinning or unpinning buttons.
|
||||
|
||||
| | Path |
|
||||
|--|--|
|
||||
|
@ -7,7 +7,7 @@ ms.topic: include
|
||||
|
||||
### Disable search
|
||||
|
||||
When you enable this policy setting, the Search UI is disabled along with all its entry points, such as keyboard shortcuts, touchpad gestures, and type-to-search in the Start menu. The Start menu's search box and Search Taskbar button are hidden. If you disable or don't configure this policy setting, the user can open the Search UI and its different entry points are available.
|
||||
When you enable this policy setting, the Search UI and all its entry points are disabled, such as keyboard shortcuts, touchpad gestures, and type-to-search in the Start menu. The Start menu's search box and Search Taskbar buttons are hidden. If you disable or don't configure this policy setting, users can open the Search UI and its different entry points are available.
|
||||
|
||||
|
||||
| | Path |
|
||||
|
@ -5,9 +5,18 @@ ms.date: 03/18/2024
|
||||
ms.topic: include
|
||||
---
|
||||
|
||||
### Do not keep history of recently opened documents
|
||||
### Don't keep history of recently opened documents
|
||||
|
||||
Prevents the operating system and installed programs from creating and displaying shortcuts to recently opened documents. If you enable this setting, the system and Windows programs do not create shortcuts to documents opened while the setting is in effect. Also, they retain but do not display existing document shortcuts. The system empties the Recent Items menu on the Start menu, and Windows programs do not display shortcuts at the bottom of the File menu. In addition, the Jump Lists off of programs in the Start Menu and Taskbar do not show lists of recently or frequently used files, folders, or websites. If you disable or do not configure this setting, the system will store and display shortcuts to recently and frequently used files, folders, and websites. Note: The system saves document shortcuts in the user profile in the System-drive\Users\User-name\Recent folder. Also, see the "Remove Recent Items menu from Start Menu" and "Clear history of recently opened documents on exit" policies in this folder. If you enable this setting but do not enable the "Remove Recent Items menu from Start Menu" setting, the Recent Items menu appears on the Start menu, but it is empty. If you enable this setting, but then later disable it or set it to Not Configured, the document shortcuts saved before the setting was enabled reappear in the Recent Items menu and program File menus, and Jump Lists. This setting does not hide or prevent the user from pinning files, folders, or websites to the Jump Lists. See the "Do not allow pinning items in Jump Lists" setting. This policy also does not hide Tasks that the application has provided for their Jump List. This setting does not hide document shortcuts displayed in the Open dialog box. See the "Hide the dropdown list of recent files" setting. Note: It is a requirement for third-party applications with Windows 2000 or later certification to adhere to this setting.
|
||||
Prevents the operating system and installed programs from creating and displaying shortcuts to recently opened documents.
|
||||
|
||||
- If you enable this setting:
|
||||
- The system and apps don't create shortcuts to documents opened
|
||||
- The system empties the Recent Items menu on the Start menu, and apps don't display shortcuts at the bottom of the File menu
|
||||
- The Jump Lists in the Start Menu and Taskbar don't show lists of recently or frequently used files, folders, or websites
|
||||
If you disable or don't configure this setting
|
||||
- The system stores and displays shortcuts to recently and frequently used files, folders, and websites
|
||||
|
||||
If you enable this setting but don't enable the "Remove Recent Items menu from Start Menu" setting, the Recent Items menu appears on the Start menu, but it's empty. If you enable this setting, but then later disable it or set it to *Not Configured*, the document shortcuts saved before the setting was enabled reappear in the Recent Items menu and program File menus, and Jump Lists. This setting doesn't hide or prevent the user from pinning files, folders, or websites to the Jump Lists. This setting doesn't hide document shortcuts displayed in the Open dialog box.
|
||||
|
||||
| | Path |
|
||||
|--|--|
|
||||
|
@ -5,9 +5,9 @@ ms.date: 03/18/2024
|
||||
ms.topic: include
|
||||
---
|
||||
|
||||
### Do not use the search-based method when resolving shell shortcuts
|
||||
### Don't use the search-based method when resolving shell shortcuts
|
||||
|
||||
This policy setting prevents the system from conducting a comprehensive search of the target drive to resolve a shortcut. If you enable this policy setting, the system does not conduct the final drive search. It just displays a message explaining that the file is not found. If you disable or do not configure this policy setting, by default, when the system cannot find the target file for a shortcut (.lnk), it searches all paths associated with the shortcut. If the target file is located on an NTFS partition, the system then uses the target's file ID to find a path. If the resulting path is not correct, it conducts a comprehensive search of the target drive in an attempt to find the file. Note: This policy setting only applies to target files on NTFS partitions. FAT partitions do not have this ID tracking and search capability. Also, see the "Do not track Shell shortcuts during roaming" and the "Do not use the tracking-based method when resolving shell shortcuts" policy settings.
|
||||
This policy setting prevents the system from conducting a comprehensive search of the target drive to resolve a shortcut. If you enable this policy setting, the system doesn't conduct the final drive search. It just displays a message explaining that the file isn't found. If you disable or don't configure this policy setting, by default, when the system can't find the target file for a shortcut (.lnk), it searches all paths associated with the shortcut. If the target file is located on an NTFS partition, the system then uses the target's file ID to find a path. If the resulting path isn't correct, it conducts a comprehensive search of the target drive in an attempt to find the file. Note: This policy setting only applies to target files on NTFS partitions. FAT partitions don't have this ID tracking and search capability.
|
||||
|
||||
| | Path |
|
||||
|--|--|
|
||||
|
@ -5,9 +5,9 @@ ms.date: 03/18/2024
|
||||
ms.topic: include
|
||||
---
|
||||
|
||||
### Do not use the tracking-based method when resolving shell shortcuts
|
||||
### Don't use the tracking-based method when resolving shell shortcuts
|
||||
|
||||
This policy setting prevents the system from using NTFS tracking features to resolve a shortcut. If you enable this policy setting, the system does not try to locate the file by using its file ID. It skips this step and begins a comprehensive search of the drive specified in the target path. If you disable or do not configure this policy setting, by default, when the system cannot find the target file for a shortcut (.lnk), it searches all paths associated with the shortcut. If the target file is located on an NTFS partition, the system then uses the target's file ID to find a path. If the resulting path is not correct, it conducts a comprehensive search of the target drive in an attempt to find the file. Note: This policy setting only applies to target files on NTFS partitions. FAT partitions do not have this ID tracking and search capability. Also, see the "Do not track Shell shortcuts during roaming" and the "Do not use the search-based method when resolving shell shortcuts" policy settings.
|
||||
This policy setting prevents the system from using NTFS tracking features to resolve a shortcut. If you enable this policy setting, the system doesn't try to locate the file by using its file ID. It skips this step and begins a comprehensive search of the drive specified in the target path. If you disable or don't configure this policy setting, by default, when the system can't find the target file for a shortcut (.lnk), it searches all paths associated with the shortcut. If the target file is located on an NTFS partition, the system then uses the target's file ID to find a path. If the resulting path isn't correct, it conducts a comprehensive search of the target drive in an attempt to find the file. Note: This policy setting only applies to target files on NTFS partitions. FAT partitions don't have this ID tracking and search capability.
|
||||
|
||||
| | Path |
|
||||
|--|--|
|
||||
|
@ -12,7 +12,7 @@ If you enable this setting, the Start Menu will either collapse or remove the al
|
||||
- **Collapse** doesn't display the app list next to the pinned tiles in Start. An **All apps** button is displayed on Start to open the all apps list. This is equivalent to setting the **Show app list in Start** in Settings to **Off**
|
||||
- **Collapse and disable setting** is the same as the collapse option and disable the **Show app list in Start menu** in Settings, so users can't turn it to On
|
||||
- **Remove and disable setting** removes the all apps list from Start and disable the **Show app list in Start menu** in Settings, so users can't turn it to On
|
||||
- If you disable or do not configure this setting, the all apps list is visible by default, and the user can change **Show app list in Start** in Settings
|
||||
- If you disable or don't configure this setting, the all apps list is visible by default, and the user can change **Show app list in Start** in Settings
|
||||
|
||||
| | Path |
|
||||
|--|--|
|
||||
|
@ -9,7 +9,7 @@ ms.topic: include
|
||||
|
||||
If you enable this setting, the frequently used programs list is removed from the Start menu.
|
||||
|
||||
If you disable this setting or do not configure it, the frequently used programs list remains on the simple Start menu.
|
||||
If you disable this setting or don't configure it, the frequently used programs list remains on the simple Start menu.
|
||||
|
||||
| | Path |
|
||||
|--|--|
|
||||
|
@ -7,7 +7,9 @@ ms.topic: include
|
||||
|
||||
### Hide recently added apps
|
||||
|
||||
With this policy setting you can prevent the Start menu from displaying a list of recently installed applications. If you enable this policy, the Start menu will doesn't display the **Recently added** list. The corresponding setting will also be disabled in Settings.
|
||||
With this policy setting, you can prevent the Start menu from displaying a list of recently installed applications.
|
||||
|
||||
If you enable this policy, the Start menu doesn't display the **Recently added** list. The corresponding setting is also disabled in Settings.
|
||||
|
||||
| | Path |
|
||||
|--|--|
|
||||
|
@ -7,7 +7,7 @@ ms.topic: include
|
||||
|
||||
### Hide recommended section
|
||||
|
||||
This policy setting allows you to prevent the Start menu from displaying a list of recommended applications and files. If you enable this policy setting, the Start menu doesn't show the section containing a list of recommended files and apps.
|
||||
This policy setting prevents the Start menu from displaying a list of recommended applications and files. If you enable this policy setting, the Start menu doesn't show the section containing a list of recommended files and apps.
|
||||
|
||||
| | Path |
|
||||
|--|--|
|
||||
|
@ -9,7 +9,7 @@ ms.topic: include
|
||||
|
||||
With this policy setting you can remove the **Sign out** item from the Start menu and prevents users from restoring it:
|
||||
|
||||
- If you enable this policy setting, the **Sign out** item does not appear in the Start menu
|
||||
- If you enable this policy setting, the **Sign out** item doesn't appear in the Start menu
|
||||
- If you disable or don't configure this policy setting, users can use the **Sign out** item in the Start menu
|
||||
|
||||
> [!NOTE]
|
||||
|
@ -9,8 +9,8 @@ ms.topic: include
|
||||
|
||||
With this policy setting you can prevent changes to Taskbar and Start menu settings:
|
||||
|
||||
- If you enable this policy setting, users can't open the Taskbar or Start properties dialog box. If a user right-clicks the Taskbar or Start and then selects Properties, a message appears explaining that a setting prevents the action.
|
||||
- If you disable or don'o't configure this policy setting, the Taskbar and Start Menu items are available from Settings on the Start menu
|
||||
- If you enable this policy setting, users can't open the Taskbar or Start properties dialog box. If a user right-clicks the Taskbar or Start and then selects Properties, a message appears explaining that a setting prevents the action
|
||||
- If you disable or don't configure this policy setting, the Taskbar and Start Menu items are available from Settings on the Start menu
|
||||
|
||||
| | Path |
|
||||
|--|--|
|
||||
|
@ -9,8 +9,8 @@ ms.topic: include
|
||||
|
||||
With this policy setting you can prevent users from changing their Start menu layout:
|
||||
|
||||
- If you enable this setting, you prevent users from pinning/unpinning a Start menu element, entering the customize mode and rearranging elements within Start
|
||||
- If you disable or don't configure this setting, users can pin/unpin elements, enter the customize mode and rearrange elements within Start
|
||||
- If you enable this setting, users can't pin/unpin a Start menu element, and rearrange elements
|
||||
- If you disable or don't configure this setting, users can pin/unpin elements, and rearrange elements
|
||||
|
||||
| | Path |
|
||||
|--|--|
|
||||
|
@ -7,7 +7,7 @@ ms.topic: include
|
||||
|
||||
### Remove and prevent access to the Shut Down, Restart, Sleep, and Hibernate commands
|
||||
|
||||
With this policy setting you can prevent users from performing the following commands from the Windows security screen, the sign in screen, and the Start menu: Shut Down, Restart, Sleep, and Hibernate. This policy setting doesn't prevent users from running Windows-based programs that perform these functions:
|
||||
With this policy setting, you can prevent users from performing the following commands from the Windows security screen, the sign in screen, and the Start menu: Shut Down, Restart, Sleep, and Hibernate. This policy setting doesn't prevent users from running Windows-based programs that perform these functions:
|
||||
|
||||
- If you enable this policy setting, the shutdown, restart, sleep, and hibernate commands are removed from the Start menu. The Power button is also removed from the Windows Security screen, which appears when you press <kbd>CTRL</kbd>+<kbd>ALT</kbd>+<kbd>DELETE</kbd>, and from the sign in screen
|
||||
- If you disable or don't configure this policy setting, the Power button and the Shut Down, Restart, Sleep, and Hibernate commands are available on the Start menu. The Power button on the Windows Security and sign in screens is also available
|
||||
|
@ -7,7 +7,7 @@ ms.topic: include
|
||||
|
||||
### Remove common program groups
|
||||
|
||||
Removes items in the All Users profile from the Programs menu on the Start menu. By default, the Programs menu contains items from the All Users profile and items from the user's profile. If you enable this setting, only items in the user's profile appear in the Programs menu. Tip: To see the Program menu items in the All Users profile, on the system drive, go to ProgramData\Microsoft\Windows\Start Menu\Programs.
|
||||
This policy setting removes items in the *All Users* profile from the Programs menu on the Start menu. By default, the Programs menu contains items from the *All Users* profile and items from the user's profile. If you enable this setting, only items in the user's profile appear in the Programs menu.
|
||||
|
||||
| | Path |
|
||||
|--|--|
|
||||
|
@ -7,7 +7,7 @@ ms.topic: include
|
||||
|
||||
### Show *Run as different user* command
|
||||
|
||||
With this policy setting you can hide the *Run as different user* command on the Start application bar. If you enable this setting, users can access the "Run as different user" command from Start for applications which support this functionality. If you disable or don't configure this setting, users can't access the *Run as different user* command from Start for any applications.
|
||||
With this policy setting, you can hide the *Run as different user* command on the Start application bar. If you enable it, users can access the **Run as different user** command from Start. If you disable or don't configure this setting, users can't access the **Run as different user** command from Start for any applications.
|
||||
|
||||
> [!NOTE]
|
||||
> This setting doesn't prevent users from using other methods, such as the <kbd>SHIFT</kbd> right-click menu on application's jumplists in the taskbar to issue the *Run as different user* command.
|
||||
|
Loading…
x
Reference in New Issue
Block a user