diff --git a/windows/configuration/start/includes/clear-history-of-recently-opened-documents-on-exit.md b/windows/configuration/start/includes/clear-history-of-recently-opened-documents-on-exit.md index 0736c09eb2..dbeb6e06c4 100644 --- a/windows/configuration/start/includes/clear-history-of-recently-opened-documents-on-exit.md +++ b/windows/configuration/start/includes/clear-history-of-recently-opened-documents-on-exit.md @@ -7,12 +7,12 @@ ms.topic: include ### Clear history of recently opened documents on exit -If you enable this policy setting, shortcuts to recently used files are deleted when the user logs off: +If you enable this policy setting, shortcuts to recently used files are deleted when the user signs out: - The **Recent Items** section on the Start menu is cleared - Recently and frequently used items in the jump lists of programs in the Start menu and Taskbar are cleared -If you disable or don't configure this policy setting, the system retains document shortcuts. When a signs in, the **Recent Items** menu and the jump lists appear as when the user logged off. +If you disable or don't configure this policy setting, the system retains document shortcuts. When a user signs in, the **Recent Items** menu and the jump lists appear as when the user logged off. > [!NOTE] > The system saves document shortcuts in the user profile in the System-drive\Users\User-name\Recent folder. diff --git a/windows/configuration/start/includes/clear-the-recent-programs-list-for-new-users.md b/windows/configuration/start/includes/clear-the-recent-programs-list-for-new-users.md index 8d8d6481a8..a1ef117757 100644 --- a/windows/configuration/start/includes/clear-the-recent-programs-list-for-new-users.md +++ b/windows/configuration/start/includes/clear-the-recent-programs-list-for-new-users.md @@ -7,7 +7,7 @@ ms.topic: include ### Clear the recent programs list for new users -If you enable this policy setting, the recent programs list in the start menu is empty for each new user. If you disable or don't configure this policy setting, the start menu *recent programs list* is pre-populated with programs for each new user. +If you enable this policy setting, the recent programs list in the start menu is empty for each new user. If you disable or don't configure this policy setting, the start menu *recent programs list* is prepopulated with programs for each new user. | | Path | |--|--| diff --git a/windows/configuration/start/includes/clear-tile-notifications-during-log-on.md b/windows/configuration/start/includes/clear-tile-notifications-during-log-on.md index 3835857e8d..d098c62239 100644 --- a/windows/configuration/start/includes/clear-tile-notifications-during-log-on.md +++ b/windows/configuration/start/includes/clear-tile-notifications-during-log-on.md @@ -7,7 +7,7 @@ ms.topic: include ### Clear tile notifications during log on -If you enable this setting, the system deletes tile notifications when the user logs on. As a result, the Tiles in the start view will always show their default content when the user logs on. In addition, any cached versions of these notifications will be cleared when the user logs on. If you disable or do not configure this setting, the system retains notifications, and when a user logs on, the tiles appear just as they did when the user logged off, including the history of previous notifications for each tile. This setting does not prevent new notifications from appearing. See the "Turn off Application Notifications" setting to prevent new notifications. +If you enable this policy setting, the system deletes tile notifications when the user signs on. As a result, the tiles in the Start menu always show their default content when a user signs in. Any cached versions of the notifications are cleared when the user signs in. If you disable or don't configure this setting, the system retains notifications, and when a user signs in, the tiles appear just as they did when the user signed out, including the history of previous notifications for each tile. This policy setting doesn't prevent new notifications from appearing. | | Path | |--|--| diff --git a/windows/configuration/start/includes/configure-start-layout.md b/windows/configuration/start/includes/configure-start-layout.md index 5c382244fd..4f34586a11 100644 --- a/windows/configuration/start/includes/configure-start-layout.md +++ b/windows/configuration/start/includes/configure-start-layout.md @@ -7,7 +7,7 @@ ms.topic: include ### Configure Start layout -Specifies the Start layout for users. This setting lets you specify the Start layout for users and prevents them from changing its configuration. The Start layout you specify must be stored in an XML file that was generated by the Export-StartLayout PowerShell cmdlet. To use this setting, you must first manually configure a device's Start layout to the desired look and feel. Once you are done, run the Export-StartLayout PowerShell cmdlet on that same device. The cmdlet will generate an XML file representing the layout you configured. Once the XML file is generated and moved to the desired file path, type the fully qualified path and name of the XML file. You can type a local path, such as C:\StartLayouts\myLayout.xml or a UNC path, such as \\Server\Share\Layout.xml. If the specified file is not available when the user logs on, the layout won't be changed. Users cannot customize their Start screen while this setting is enabled. If you disable this setting or do not configure it, the Start screen layout won't be changed and users will be able to customize it. +This policy setting lets you specify the Start layout for users, preventing them from changing its configuration. The Start layout you specify must be stored in an XML file that was generated by the `Export-StartLayout` PowerShell cmdlet. To use this setting, you must first manually configure a device's Start layout to the desired look and feel. Then, run the `Export-StartLayout` PowerShell cmdlet on that same device. The cmdlet generates an XML file representing the layout you configured. Once the XML file is generated and moved to the desired file path, use the fully qualified path and name of the XML file. You can use a local path, or a UNC path. If the specified file isn't available when the user signs in, the layout isn't changed. Users can't customize the Start layout while this setting is enabled. If you disable this setting or don't configure it, the Start screen layout isn't changed and users can customize it. | | Path | |--|--| diff --git a/windows/configuration/start/includes/disable-context-menus.md b/windows/configuration/start/includes/disable-context-menus.md index 390814b733..4ec733aaf3 100644 --- a/windows/configuration/start/includes/disable-context-menus.md +++ b/windows/configuration/start/includes/disable-context-menus.md @@ -7,7 +7,7 @@ ms.topic: include ### Disable context menus -This policy allows you to prevent users from being able to open context menus in the Start menu. If you enable this policy, then invocations of context menus within the Start menu is ignored. +With this policy setting you can prevent users from opening the context menus in the Start menu. If you enable this policy, then invocations of context menus within the Start menu is ignored. | | Path | |--|--| diff --git a/windows/configuration/start/includes/disable-editing-quick-settings.md b/windows/configuration/start/includes/disable-editing-quick-settings.md index 45b90b0364..b9dea0f3a5 100644 --- a/windows/configuration/start/includes/disable-editing-quick-settings.md +++ b/windows/configuration/start/includes/disable-editing-quick-settings.md @@ -7,7 +7,7 @@ ms.topic: include ### Disable editing quick settings -When you this policy setting, users can't modify quick settings. If you disable or don't configure this policy setting, the user can edit quick settings, such as pinning or unpinning buttons. +When you enable this policy setting, users can't modify quick settings. If you disable or don't configure this policy setting, users can edit quick settings, like pinning or unpinning buttons. | | Path | |--|--| diff --git a/windows/configuration/start/includes/disable-search.md b/windows/configuration/start/includes/disable-search.md index 4eaecc519a..c6c3e67604 100644 --- a/windows/configuration/start/includes/disable-search.md +++ b/windows/configuration/start/includes/disable-search.md @@ -7,7 +7,7 @@ ms.topic: include ### Disable search -When you enable this policy setting, the Search UI is disabled along with all its entry points, such as keyboard shortcuts, touchpad gestures, and type-to-search in the Start menu. The Start menu's search box and Search Taskbar button are hidden. If you disable or don't configure this policy setting, the user can open the Search UI and its different entry points are available. +When you enable this policy setting, the Search UI and all its entry points are disabled, such as keyboard shortcuts, touchpad gestures, and type-to-search in the Start menu. The Start menu's search box and Search Taskbar buttons are hidden. If you disable or don't configure this policy setting, users can open the Search UI and its different entry points are available. | | Path | diff --git a/windows/configuration/start/includes/do-not-keep-history-of-recently-opened-documents.md b/windows/configuration/start/includes/do-not-keep-history-of-recently-opened-documents.md index ececf08180..30ec1ff865 100644 --- a/windows/configuration/start/includes/do-not-keep-history-of-recently-opened-documents.md +++ b/windows/configuration/start/includes/do-not-keep-history-of-recently-opened-documents.md @@ -5,9 +5,18 @@ ms.date: 03/18/2024 ms.topic: include --- -### Do not keep history of recently opened documents +### Don't keep history of recently opened documents -Prevents the operating system and installed programs from creating and displaying shortcuts to recently opened documents. If you enable this setting, the system and Windows programs do not create shortcuts to documents opened while the setting is in effect. Also, they retain but do not display existing document shortcuts. The system empties the Recent Items menu on the Start menu, and Windows programs do not display shortcuts at the bottom of the File menu. In addition, the Jump Lists off of programs in the Start Menu and Taskbar do not show lists of recently or frequently used files, folders, or websites. If you disable or do not configure this setting, the system will store and display shortcuts to recently and frequently used files, folders, and websites. Note: The system saves document shortcuts in the user profile in the System-drive\Users\User-name\Recent folder. Also, see the "Remove Recent Items menu from Start Menu" and "Clear history of recently opened documents on exit" policies in this folder. If you enable this setting but do not enable the "Remove Recent Items menu from Start Menu" setting, the Recent Items menu appears on the Start menu, but it is empty. If you enable this setting, but then later disable it or set it to Not Configured, the document shortcuts saved before the setting was enabled reappear in the Recent Items menu and program File menus, and Jump Lists. This setting does not hide or prevent the user from pinning files, folders, or websites to the Jump Lists. See the "Do not allow pinning items in Jump Lists" setting. This policy also does not hide Tasks that the application has provided for their Jump List. This setting does not hide document shortcuts displayed in the Open dialog box. See the "Hide the dropdown list of recent files" setting. Note: It is a requirement for third-party applications with Windows 2000 or later certification to adhere to this setting. +Prevents the operating system and installed programs from creating and displaying shortcuts to recently opened documents. + +- If you enable this setting: + - The system and apps don't create shortcuts to documents opened + - The system empties the Recent Items menu on the Start menu, and apps don't display shortcuts at the bottom of the File menu + - The Jump Lists in the Start Menu and Taskbar don't show lists of recently or frequently used files, folders, or websites +If you disable or don't configure this setting + - The system stores and displays shortcuts to recently and frequently used files, folders, and websites + +If you enable this setting but don't enable the "Remove Recent Items menu from Start Menu" setting, the Recent Items menu appears on the Start menu, but it's empty. If you enable this setting, but then later disable it or set it to *Not Configured*, the document shortcuts saved before the setting was enabled reappear in the Recent Items menu and program File menus, and Jump Lists. This setting doesn't hide or prevent the user from pinning files, folders, or websites to the Jump Lists. This setting doesn't hide document shortcuts displayed in the Open dialog box. | | Path | |--|--| diff --git a/windows/configuration/start/includes/do-not-use-the-search-based-method-when-resolving-shell-shortcuts.md b/windows/configuration/start/includes/do-not-use-the-search-based-method-when-resolving-shell-shortcuts.md index ab7e4e0a67..6247b394be 100644 --- a/windows/configuration/start/includes/do-not-use-the-search-based-method-when-resolving-shell-shortcuts.md +++ b/windows/configuration/start/includes/do-not-use-the-search-based-method-when-resolving-shell-shortcuts.md @@ -5,9 +5,9 @@ ms.date: 03/18/2024 ms.topic: include --- -### Do not use the search-based method when resolving shell shortcuts +### Don't use the search-based method when resolving shell shortcuts -This policy setting prevents the system from conducting a comprehensive search of the target drive to resolve a shortcut. If you enable this policy setting, the system does not conduct the final drive search. It just displays a message explaining that the file is not found. If you disable or do not configure this policy setting, by default, when the system cannot find the target file for a shortcut (.lnk), it searches all paths associated with the shortcut. If the target file is located on an NTFS partition, the system then uses the target's file ID to find a path. If the resulting path is not correct, it conducts a comprehensive search of the target drive in an attempt to find the file. Note: This policy setting only applies to target files on NTFS partitions. FAT partitions do not have this ID tracking and search capability. Also, see the "Do not track Shell shortcuts during roaming" and the "Do not use the tracking-based method when resolving shell shortcuts" policy settings. +This policy setting prevents the system from conducting a comprehensive search of the target drive to resolve a shortcut. If you enable this policy setting, the system doesn't conduct the final drive search. It just displays a message explaining that the file isn't found. If you disable or don't configure this policy setting, by default, when the system can't find the target file for a shortcut (.lnk), it searches all paths associated with the shortcut. If the target file is located on an NTFS partition, the system then uses the target's file ID to find a path. If the resulting path isn't correct, it conducts a comprehensive search of the target drive in an attempt to find the file. Note: This policy setting only applies to target files on NTFS partitions. FAT partitions don't have this ID tracking and search capability. | | Path | |--|--| diff --git a/windows/configuration/start/includes/do-not-use-the-tracking-based-method-when-resolving-shell-shortcuts.md b/windows/configuration/start/includes/do-not-use-the-tracking-based-method-when-resolving-shell-shortcuts.md index cd2ce01532..101cf627f1 100644 --- a/windows/configuration/start/includes/do-not-use-the-tracking-based-method-when-resolving-shell-shortcuts.md +++ b/windows/configuration/start/includes/do-not-use-the-tracking-based-method-when-resolving-shell-shortcuts.md @@ -5,9 +5,9 @@ ms.date: 03/18/2024 ms.topic: include --- -### Do not use the tracking-based method when resolving shell shortcuts +### Don't use the tracking-based method when resolving shell shortcuts -This policy setting prevents the system from using NTFS tracking features to resolve a shortcut. If you enable this policy setting, the system does not try to locate the file by using its file ID. It skips this step and begins a comprehensive search of the drive specified in the target path. If you disable or do not configure this policy setting, by default, when the system cannot find the target file for a shortcut (.lnk), it searches all paths associated with the shortcut. If the target file is located on an NTFS partition, the system then uses the target's file ID to find a path. If the resulting path is not correct, it conducts a comprehensive search of the target drive in an attempt to find the file. Note: This policy setting only applies to target files on NTFS partitions. FAT partitions do not have this ID tracking and search capability. Also, see the "Do not track Shell shortcuts during roaming" and the "Do not use the search-based method when resolving shell shortcuts" policy settings. +This policy setting prevents the system from using NTFS tracking features to resolve a shortcut. If you enable this policy setting, the system doesn't try to locate the file by using its file ID. It skips this step and begins a comprehensive search of the drive specified in the target path. If you disable or don't configure this policy setting, by default, when the system can't find the target file for a shortcut (.lnk), it searches all paths associated with the shortcut. If the target file is located on an NTFS partition, the system then uses the target's file ID to find a path. If the resulting path isn't correct, it conducts a comprehensive search of the target drive in an attempt to find the file. Note: This policy setting only applies to target files on NTFS partitions. FAT partitions don't have this ID tracking and search capability. | | Path | |--|--| diff --git a/windows/configuration/start/includes/hide-all-programs-list.md b/windows/configuration/start/includes/hide-all-programs-list.md index dcf5493512..1c5c8290f6 100644 --- a/windows/configuration/start/includes/hide-all-programs-list.md +++ b/windows/configuration/start/includes/hide-all-programs-list.md @@ -12,7 +12,7 @@ If you enable this setting, the Start Menu will either collapse or remove the al - **Collapse** doesn't display the app list next to the pinned tiles in Start. An **All apps** button is displayed on Start to open the all apps list. This is equivalent to setting the **Show app list in Start** in Settings to **Off** - **Collapse and disable setting** is the same as the collapse option and disable the **Show app list in Start menu** in Settings, so users can't turn it to On - **Remove and disable setting** removes the all apps list from Start and disable the **Show app list in Start menu** in Settings, so users can't turn it to On -- If you disable or do not configure this setting, the all apps list is visible by default, and the user can change **Show app list in Start** in Settings +- If you disable or don't configure this setting, the all apps list is visible by default, and the user can change **Show app list in Start** in Settings | | Path | |--|--| diff --git a/windows/configuration/start/includes/hide-frequently-used-apps.md b/windows/configuration/start/includes/hide-frequently-used-apps.md index aa18eb21dd..87132c4c1e 100644 --- a/windows/configuration/start/includes/hide-frequently-used-apps.md +++ b/windows/configuration/start/includes/hide-frequently-used-apps.md @@ -9,7 +9,7 @@ ms.topic: include If you enable this setting, the frequently used programs list is removed from the Start menu. -If you disable this setting or do not configure it, the frequently used programs list remains on the simple Start menu. +If you disable this setting or don't configure it, the frequently used programs list remains on the simple Start menu. | | Path | |--|--| diff --git a/windows/configuration/start/includes/hide-recently-added-apps.md b/windows/configuration/start/includes/hide-recently-added-apps.md index 8ea3fdf1db..62df219a28 100644 --- a/windows/configuration/start/includes/hide-recently-added-apps.md +++ b/windows/configuration/start/includes/hide-recently-added-apps.md @@ -7,7 +7,9 @@ ms.topic: include ### Hide recently added apps -With this policy setting you can prevent the Start menu from displaying a list of recently installed applications. If you enable this policy, the Start menu will doesn't display the **Recently added** list. The corresponding setting will also be disabled in Settings. +With this policy setting, you can prevent the Start menu from displaying a list of recently installed applications. + +If you enable this policy, the Start menu doesn't display the **Recently added** list. The corresponding setting is also disabled in Settings. | | Path | |--|--| diff --git a/windows/configuration/start/includes/hide-recommended-section.md b/windows/configuration/start/includes/hide-recommended-section.md index e7efb3d3c2..0e30403dda 100644 --- a/windows/configuration/start/includes/hide-recommended-section.md +++ b/windows/configuration/start/includes/hide-recommended-section.md @@ -7,7 +7,7 @@ ms.topic: include ### Hide recommended section -This policy setting allows you to prevent the Start menu from displaying a list of recommended applications and files. If you enable this policy setting, the Start menu doesn't show the section containing a list of recommended files and apps. +This policy setting prevents the Start menu from displaying a list of recommended applications and files. If you enable this policy setting, the Start menu doesn't show the section containing a list of recommended files and apps. | | Path | |--|--| diff --git a/windows/configuration/start/includes/hide-signout-button.md b/windows/configuration/start/includes/hide-signout-button.md index e80f8fffe7..7bc4877295 100644 --- a/windows/configuration/start/includes/hide-signout-button.md +++ b/windows/configuration/start/includes/hide-signout-button.md @@ -9,7 +9,7 @@ ms.topic: include With this policy setting you can remove the **Sign out** item from the Start menu and prevents users from restoring it: -- If you enable this policy setting, the **Sign out** item does not appear in the Start menu +- If you enable this policy setting, the **Sign out** item doesn't appear in the Start menu - If you disable or don't configure this policy setting, users can use the **Sign out** item in the Start menu > [!NOTE] diff --git a/windows/configuration/start/includes/prevent-changes-to-taskbar-and-start-menu-settings.md b/windows/configuration/start/includes/prevent-changes-to-taskbar-and-start-menu-settings.md index 66412f20c1..70470efa8c 100644 --- a/windows/configuration/start/includes/prevent-changes-to-taskbar-and-start-menu-settings.md +++ b/windows/configuration/start/includes/prevent-changes-to-taskbar-and-start-menu-settings.md @@ -9,8 +9,8 @@ ms.topic: include With this policy setting you can prevent changes to Taskbar and Start menu settings: -- If you enable this policy setting, users can't open the Taskbar or Start properties dialog box. If a user right-clicks the Taskbar or Start and then selects Properties, a message appears explaining that a setting prevents the action. -- If you disable or don'o't configure this policy setting, the Taskbar and Start Menu items are available from Settings on the Start menu +- If you enable this policy setting, users can't open the Taskbar or Start properties dialog box. If a user right-clicks the Taskbar or Start and then selects Properties, a message appears explaining that a setting prevents the action +- If you disable or don't configure this policy setting, the Taskbar and Start Menu items are available from Settings on the Start menu | | Path | |--|--| diff --git a/windows/configuration/start/includes/prevent-users-from-customizing-their-start.md b/windows/configuration/start/includes/prevent-users-from-customizing-their-start.md index 24ec7d1415..33d1e3c6f7 100644 --- a/windows/configuration/start/includes/prevent-users-from-customizing-their-start.md +++ b/windows/configuration/start/includes/prevent-users-from-customizing-their-start.md @@ -9,8 +9,8 @@ ms.topic: include With this policy setting you can prevent users from changing their Start menu layout: -- If you enable this setting, you prevent users from pinning/unpinning a Start menu element, entering the customize mode and rearranging elements within Start -- If you disable or don't configure this setting, users can pin/unpin elements, enter the customize mode and rearrange elements within Start +- If you enable this setting, users can't pin/unpin a Start menu element, and rearrange elements +- If you disable or don't configure this setting, users can pin/unpin elements, and rearrange elements | | Path | |--|--| diff --git a/windows/configuration/start/includes/remove-and-prevent-access-to-the-shut-down-restart-sleep-and-hibernate-commands-um.md b/windows/configuration/start/includes/remove-and-prevent-access-to-the-shut-down-restart-sleep-and-hibernate-commands-um.md index 78441e781a..a347cdbde7 100644 --- a/windows/configuration/start/includes/remove-and-prevent-access-to-the-shut-down-restart-sleep-and-hibernate-commands-um.md +++ b/windows/configuration/start/includes/remove-and-prevent-access-to-the-shut-down-restart-sleep-and-hibernate-commands-um.md @@ -7,7 +7,7 @@ ms.topic: include ### Remove and prevent access to the Shut Down, Restart, Sleep, and Hibernate commands -With this policy setting you can prevent users from performing the following commands from the Windows security screen, the sign in screen, and the Start menu: Shut Down, Restart, Sleep, and Hibernate. This policy setting doesn't prevent users from running Windows-based programs that perform these functions: +With this policy setting, you can prevent users from performing the following commands from the Windows security screen, the sign in screen, and the Start menu: Shut Down, Restart, Sleep, and Hibernate. This policy setting doesn't prevent users from running Windows-based programs that perform these functions: - If you enable this policy setting, the shutdown, restart, sleep, and hibernate commands are removed from the Start menu. The Power button is also removed from the Windows Security screen, which appears when you press CTRL+ALT+DELETE, and from the sign in screen - If you disable or don't configure this policy setting, the Power button and the Shut Down, Restart, Sleep, and Hibernate commands are available on the Start menu. The Power button on the Windows Security and sign in screens is also available diff --git a/windows/configuration/start/includes/remove-common-program-groups.md b/windows/configuration/start/includes/remove-common-program-groups.md index e0978e4305..1e56de0ef8 100644 --- a/windows/configuration/start/includes/remove-common-program-groups.md +++ b/windows/configuration/start/includes/remove-common-program-groups.md @@ -7,7 +7,7 @@ ms.topic: include ### Remove common program groups -Removes items in the All Users profile from the Programs menu on the Start menu. By default, the Programs menu contains items from the All Users profile and items from the user's profile. If you enable this setting, only items in the user's profile appear in the Programs menu. Tip: To see the Program menu items in the All Users profile, on the system drive, go to ProgramData\Microsoft\Windows\Start Menu\Programs. +This policy setting removes items in the *All Users* profile from the Programs menu on the Start menu. By default, the Programs menu contains items from the *All Users* profile and items from the user's profile. If you enable this setting, only items in the user's profile appear in the Programs menu. | | Path | |--|--| diff --git a/windows/configuration/start/includes/show-run-as-different-user-command.md b/windows/configuration/start/includes/show-run-as-different-user-command.md index 8e00612c92..cad1a7597d 100644 --- a/windows/configuration/start/includes/show-run-as-different-user-command.md +++ b/windows/configuration/start/includes/show-run-as-different-user-command.md @@ -7,7 +7,7 @@ ms.topic: include ### Show *Run as different user* command -With this policy setting you can hide the *Run as different user* command on the Start application bar. If you enable this setting, users can access the "Run as different user" command from Start for applications which support this functionality. If you disable or don't configure this setting, users can't access the *Run as different user* command from Start for any applications. +With this policy setting, you can hide the *Run as different user* command on the Start application bar. If you enable it, users can access the **Run as different user** command from Start. If you disable or don't configure this setting, users can't access the **Run as different user** command from Start for any applications. > [!NOTE] > This setting doesn't prevent users from using other methods, such as the SHIFT right-click menu on application's jumplists in the taskbar to issue the *Run as different user* command.