Acrolinx enhancement effort

This commit is contained in:
Siddarth Mandalika 2022-03-07 11:26:50 +05:30
parent c24214d2e7
commit f71cd85109
5 changed files with 50 additions and 50 deletions

View File

@ -72,7 +72,7 @@ manager: dansimp
<!--Description--> <!--Description-->
This policy setting lets you turn on Content URI Rules to supplement the static Content URI Rules that were defined as part of the app manifest and apply to all Windows Store apps that use the enterpriseAuthentication capability on a computer. This policy setting lets you turn on Content URI Rules to supplement the static Content URI Rules that were defined as part of the app manifest and apply to all Windows Store apps that use the enterpriseAuthentication capability on a computer.
If you enable this policy setting, you can define additional Content URI Rules that all Windows Store apps that use the enterpriseAuthentication capability on a computer can use. If you enable this policy setting, you can define more Content URI Rules that all Windows Store apps that use the enterpriseAuthentication capability on a computer can use.
If you disable or don't set this policy setting, Windows Store apps will only use the static Content URI Rules. If you disable or don't set this policy setting, Windows Store apps will only use the static Content URI Rules.
@ -117,11 +117,11 @@ ADMX Info:
<!--/Scope--> <!--/Scope-->
<!--Description--> <!--Description-->
This policy setting lets you control whether Windows Store apps can open files using the default desktop app for a file type. Because desktop apps run at a higher integrity level than Windows Store apps, there is a risk that a Windows Store app might compromise the system by opening a file in the default desktop app for a file type. This policy setting lets you control whether Windows Store apps can open files using the default desktop app for a file type. Because desktop apps run at a higher integrity level than Windows Store apps, there's a risk that a Windows Store app might compromise the system by opening a file in the default desktop app for a file type.
If you enable this policy setting, Windows Store apps cannot open files in the default desktop app for a file type; they can open files only in other Windows Store apps. If you enable this policy setting, Windows Store apps can't open files in the default desktop app for a file type; they can open files only in other Windows Store apps.
If you disable or do not configure this policy setting, Windows Store apps can open files in the default desktop app for a file type. If you disable or don't configure this policy setting, Windows Store apps can open files in the default desktop app for a file type.
<!--/Description--> <!--/Description-->
@ -164,9 +164,9 @@ ADMX Info:
<!--Description--> <!--Description-->
This policy setting controls whether Universal Windows apps with Windows Runtime API access directly from web content can be launched. This policy setting controls whether Universal Windows apps with Windows Runtime API access directly from web content can be launched.
If you enable this policy setting, Universal Windows apps which declare Windows Runtime API access in ApplicationContentUriRules section of the manifest cannot be launched; Universal Windows apps which have not declared Windows Runtime API access in the manifest are not affected. If you enable this policy setting, Universal Windows apps that declare Windows Runtime API access in ApplicationContentUriRules section of the manifest can't be launched; Universal Windows apps that haven't declared Windows Runtime API access in the manifest aren't affected.
If you disable or do not configure this policy setting, all Universal Windows apps can be launched. If you disable or don't configure this policy setting, all Universal Windows apps can be launched.
> [!WARNING] > [!WARNING]
> This policy should not be enabled unless recommended by Microsoft as a security response because it can cause severe app compatibility issues. > This policy should not be enabled unless recommended by Microsoft as a security response because it can cause severe app compatibility issues.
@ -211,11 +211,11 @@ ADMX Info:
<!--/Scope--> <!--/Scope-->
<!--Description--> <!--Description-->
This policy setting lets you control whether Windows Store apps can open URIs using the default desktop app for a URI scheme. Because desktop apps run at a higher integrity level than Windows Store apps, there is a risk that a URI scheme launched by a Windows Store app might compromise the system by launching a desktop app. This policy setting lets you control whether Windows Store apps can open URIs using the default desktop app for a URI scheme. Because desktop apps run at a higher integrity level than Windows Store apps, there's a risk that a URI scheme launched by a Windows Store app might compromise the system by launching a desktop app.
If you enable this policy setting, Windows Store apps cannot open URIs in the default desktop app for a URI scheme; they can open URIs only in other Windows Store apps. If you enable this policy setting, Windows Store apps can't open URIs in the default desktop app for a URI scheme; they can open URIs only in other Windows Store apps.
If you disable or do not configure this policy setting, Windows Store apps can open URIs in the default desktop app for a URI scheme. If you disable or don't configure this policy setting, Windows Store apps can open URIs in the default desktop app for a URI scheme.
> [!NOTE] > [!NOTE]
> Enabling this policy setting does not block Windows Store apps from opening the default desktop app for the http, https, and mailto URI schemes. The handlers for these URI schemes are hardened against URI-based vulnerabilities from untrusted sources, reducing the associated risk. > Enabling this policy setting does not block Windows Store apps from opening the default desktop app for the http, https, and mailto URI schemes. The handlers for these URI schemes are hardened against URI-based vulnerabilities from untrusted sources, reducing the associated risk.

View File

@ -77,13 +77,13 @@ This policy setting allows you to configure the logic that Windows uses to deter
Preferring the file handler instructs Windows to use the file handler data over the file type data. For example, trust notepad.exe, but don't trust .txt files. Preferring the file handler instructs Windows to use the file handler data over the file type data. For example, trust notepad.exe, but don't trust .txt files.
Preferring the file type instructs Windows to use the file type data over the file handler data. For example, trust .txt files, regardless of the file handler. Using both the file handler and type data is the most restrictive option. Windows chooses the more restrictive recommendation which will cause users to see more trust prompts than choosing the other options. Preferring the file type instructs Windows to use the file type data over the file handler data. For example, trust .txt files, regardless of the file handler. Using both the file handler and type data is the most restrictive option. Windows chooses the more restrictive recommendation that will cause users to see more trust prompts than choosing the other options.
If you enable this policy setting, you can choose the order in which Windows processes risk assessment data. If you enable this policy setting, you can choose the order in which Windows processes risk assessment data.
If you disable this policy setting, Windows uses its default trust logic, which prefers the file handler over the file type. If you disable this policy setting, Windows uses its default trust logic, which prefers the file handler over the file type.
If you do not configure this policy setting, Windows uses its default trust logic, which prefers the file handler over the file type. If you don't configure this policy setting, Windows uses its default trust logic, which prefers the file handler over the file type.
<!--/Description--> <!--/Description-->
@ -130,13 +130,13 @@ High Risk: If the attachment is in the list of high-risk file types and is from
Moderate Risk: If the attachment is in the list of moderate-risk file types and is from the restricted or Internet zone, Windows prompts the user before accessing the file. Moderate Risk: If the attachment is in the list of moderate-risk file types and is from the restricted or Internet zone, Windows prompts the user before accessing the file.
Low Risk: If the attachment is in the list of low-risk file types, Windows will not prompt the user before accessing the file, regardless of the file's zone information. Low Risk: If the attachment is in the list of low-risk file types, Windows won't prompt the user before accessing the file, regardless of the file's zone information.
If you enable this policy setting, you can specify the default risk level for file types. If you enable this policy setting, you can specify the default risk level for file types.
If you disable this policy setting, Windows sets the default risk level to moderate. If you disable this policy setting, Windows sets the default risk level to moderate.
If you do not configure this policy setting, Windows sets the default risk level to moderate. If you don't configure this policy setting, Windows sets the default risk level to moderate.
<!--/Description--> <!--/Description-->
@ -183,7 +183,7 @@ If you enable this policy setting, you can create a custom list of high-risk fil
If you disable this policy setting, Windows uses its built-in list of file types that pose a high risk. If you disable this policy setting, Windows uses its built-in list of file types that pose a high risk.
If you do not configure this policy setting, Windows uses its built-in list of high-risk file types. If you don't configure this policy setting, Windows uses its built-in list of high-risk file types.
<!--/Description--> <!--/Description-->
@ -224,13 +224,13 @@ ADMX Info:
<!--/Scope--> <!--/Scope-->
<!--Description--> <!--Description-->
This policy setting allows you to configure the list of low-risk file types. If the attachment is in the list of low-risk file types, Windows will not prompt the user before accessing the file, regardless of the file's zone information. This inclusion list overrides the list of high-risk file types built into Windows and has a lower precedence than the high-risk or medium-risk inclusion lists (where an extension is listed in more than one inclusion list). This policy setting allows you to configure the list of low-risk file types. If the attachment is in the list of low-risk file types, Windows won't prompt the user before accessing the file, regardless of the file's zone information. This inclusion list overrides the list of high-risk file types built into Windows and has a lower precedence than the high-risk or medium-risk inclusion lists (where an extension is listed in more than one inclusion list).
If you enable this policy setting, you can specify file types that pose a low risk. If you enable this policy setting, you can specify file types that pose a low risk.
If you disable this policy setting, Windows uses its default trust logic. If you disable this policy setting, Windows uses its default trust logic.
If you do not configure this policy setting, Windows uses its default trust logic. If you don't configure this policy setting, Windows uses its default trust logic.
<!--/Description--> <!--/Description-->
@ -273,11 +273,11 @@ ADMX Info:
<!--Description--> <!--Description-->
This policy setting allows you to configure the list of moderate-risk file types. If the attachment is in the list of moderate-risk file types and is from the restricted or Internet zone, Windows prompts the user before accessing the file. This inclusion list overrides the list of potentially high-risk file types built into Windows and it takes precedence over the low-risk inclusion list but has a lower precedence than the high-risk inclusion list (where an extension is listed in more than one inclusion list). This policy setting allows you to configure the list of moderate-risk file types. If the attachment is in the list of moderate-risk file types and is from the restricted or Internet zone, Windows prompts the user before accessing the file. This inclusion list overrides the list of potentially high-risk file types built into Windows and it takes precedence over the low-risk inclusion list but has a lower precedence than the high-risk inclusion list (where an extension is listed in more than one inclusion list).
If you enable this policy setting, you can specify file types which pose a moderate risk. If you enable this policy setting, you can specify file types that pose a moderate risk.
If you disable this policy setting, Windows uses its default trust logic. If you disable this policy setting, Windows uses its default trust logic.
If you do not configure this policy setting, Windows uses its default trust logic. If you don't configure this policy setting, Windows uses its default trust logic.
<!--/Description--> <!--/Description-->

View File

@ -65,7 +65,7 @@ This policy setting determines what information is logged in security audit even
If you enable this policy setting, the command line information for every process will be logged in plain text in the security event log as part of the Audit Process Creation event 4688, "a new process has been created," on the workstations and servers on which this policy setting is applied. If you enable this policy setting, the command line information for every process will be logged in plain text in the security event log as part of the Audit Process Creation event 4688, "a new process has been created," on the workstations and servers on which this policy setting is applied.
If you disable or do not configure this policy setting, the process's command line information will not be included in Audit Process Creation events. If you disable or don't configure this policy setting, the process's command line information won't be included in Audit Process Creation events.
Default is Not configured. Default is Not configured.

View File

@ -102,12 +102,12 @@ manager: dansimp
<!--Description--> <!--Description-->
This setting affects whether the BITS client is allowed to use Windows Branch Cache. If the Windows Branch Cache component is installed and enabled on a computer, BITS jobs on that computer can use Windows Branch Cache by default. This setting affects whether the BITS client is allowed to use Windows Branch Cache. If the Windows Branch Cache component is installed and enabled on a computer, BITS jobs on that computer can use Windows Branch Cache by default.
If you enable this policy setting, the BITS client does not use Windows Branch Cache. If you enable this policy setting, the BITS client doesn't use Windows Branch Cache.
If you disable or do not configure this policy setting, the BITS client uses Windows Branch Cache. If you disable or don't configure this policy setting, the BITS client uses Windows Branch Cache.
> [!NOTE] > [!NOTE]
> This policy setting does not affect the use of Windows Branch Cache by applications other than BITS. This policy setting does not apply to BITS transfers over SMB. This setting has no effect if the computer's administrative settings for Windows Branch Cache disable its use entirely. > This policy setting doesn't affect the use of Windows Branch Cache by applications other than BITS. This policy setting doesn't apply to BITS transfers over SMB. This setting has no effect if the computer's administrative settings for Windows Branch Cache disable its use entirely.
<!--/Description--> <!--/Description-->
@ -152,7 +152,7 @@ This policy setting specifies whether the computer will act as a BITS peer cachi
If you enable this policy setting, the computer will no longer use the BITS peer caching feature to download files; files will be downloaded only from the origin server. However, the computer will still make files available to its peers. If you enable this policy setting, the computer will no longer use the BITS peer caching feature to download files; files will be downloaded only from the origin server. However, the computer will still make files available to its peers.
If you disable or do not configure this policy setting, the computer attempts to download peer-enabled BITS jobs from peer computers before reverting to the origin server. If you disable or don't configure this policy setting, the computer attempts to download peer-enabled BITS jobs from peer computers before reverting to the origin server.
> [!NOTE] > [!NOTE]
> This policy setting has no effect if the "Allow BITS peer caching" policy setting is disabled or not configured. > This policy setting has no effect if the "Allow BITS peer caching" policy setting is disabled or not configured.
@ -201,7 +201,7 @@ This policy setting specifies whether the computer will act as a BITS peer cachi
If you enable this policy setting, the computer will no longer cache downloaded files and offer them to its peers. However, the computer will still download files from peers. If you enable this policy setting, the computer will no longer cache downloaded files and offer them to its peers. However, the computer will still download files from peers.
If you disable or do not configure this policy setting, the computer will offer downloaded and cached files to its peers. If you disable or don't configure this policy setting, the computer will offer downloaded and cached files to its peers.
> [!NOTE] > [!NOTE]
> This setting has no effect if the "Allow BITS peer caching" setting is disabled or not configured. > This setting has no effect if the "Allow BITS peer caching" setting is disabled or not configured.
@ -249,11 +249,11 @@ ADMX Info:
<!--Description--> <!--Description-->
This policy setting determines if the Background Intelligent Transfer Service (BITS) peer caching feature is enabled on a specific computer. By default, the files in a BITS job are downloaded only from the origin server specified by the job's owner. This policy setting determines if the Background Intelligent Transfer Service (BITS) peer caching feature is enabled on a specific computer. By default, the files in a BITS job are downloaded only from the origin server specified by the job's owner.
If BITS peer caching is enabled, BITS caches downloaded files and makes them available to other BITS peers. When transferring a download job, BITS first requests the files for the job from its peers in the same IP subnet. If none of the peers in the subnet have the requested files, BITS downloads them from the origin server. If BITS peer caching is enabled, BITS caches downloaded files and makes them available to other BITS peers. When a download job is being transferred, BITS first requests the files for the job from its peers in the same IP subnet. If none of the peers in the subnet have the requested files, BITS downloads them from the origin server.
If you enable this policy setting, BITS downloads files from peers, caches the files, and responds to content requests from peers. Using the "Do not allow the computer to act as a BITS peer caching server" and "Do not allow the computer to act as a BITS peer caching client" policy settings, it is possible to control BITS peer caching functionality at a more detailed level. However, it should be noted that the "Allow BITS peer caching" policy setting must be enabled for the other two policy settings to have any effect. If you enable this policy setting, BITS downloads files from peers, caches the files, and responds to content requests from peers. Using the "Do not allow the computer to act as a BITS peer caching server" and "Do not allow the computer to act as a BITS peer caching client" policy settings, it's possible to control BITS peer caching functionality at a more detailed level. However, it should be noted that the "Allow BITS peer caching" policy setting must be enabled for the other two policy settings to have any effect.
If you disable or do not configure this policy setting, the BITS peer caching feature will be disabled, and BITS will download files directly from the origin server. If you disable or don't configure this policy setting, the BITS peer caching feature will be disabled, and BITS will download files directly from the origin server.
<!--/Description--> <!--/Description-->
@ -296,15 +296,15 @@ ADMX Info:
<!--/Scope--> <!--/Scope-->
<!--Description--> <!--Description-->
This policy setting limits the network bandwidth that BITS uses for peer cache transfers (this setting does not affect transfers from the origin server). This policy setting limits the network bandwidth that BITS uses for peer cache transfers (this setting doesn't affect transfers from the origin server).
To prevent any negative impact to a computer caused by serving other peers, by default BITS will use up to 30 percent of the bandwidth of the slowest active network interface. For example, if a computer has both a 100 Mbps network card and a 56 Kbps modem, and both are active, BITS will use a maximum of 30 percent of 56 Kbps. To prevent any negative impact to a computer caused by serving other peers, by default, BITS will use up to 30 percent of the bandwidth of the slowest active network interface. For example, if a computer has both a 100-Mbps network card and a 56-Kbps modem, and both are active, BITS will use a maximum of 30 percent of 56 Kbps.
You can change the default behavior of BITS, and specify a fixed maximum bandwidth that BITS will use for peer caching. You can change the default behavior of BITS, and specify a fixed maximum bandwidth that BITS will use for peer caching.
If you enable this policy setting, you can enter a value in bits per second (bps) between 1048576 and 4294967200 to use as the maximum network bandwidth used for peer caching. If you enable this policy setting, you can enter a value in bits per second (bps) between 1048576 and 4294967200 to use as the maximum network bandwidth used for peer caching.
If you disable this policy setting or do not configure it, the default value of 30 percent of the slowest active network interface will be used. If you disable this policy setting or don't configure it, the default value of 30 percent of the slowest active network interface will be used.
> [!NOTE] > [!NOTE]
> This setting has no effect if the "Allow BITS peer caching" policy setting is disabled or not configured. > This setting has no effect if the "Allow BITS peer caching" policy setting is disabled or not configured.
@ -354,7 +354,7 @@ If you enable this policy setting, you can define a separate set of network band
You can specify a limit to use for background jobs during a maintenance schedule. For example, if normal priority jobs are currently limited to 256 Kbps on a work schedule, you can further limit the network bandwidth of normal priority jobs to 0 Kbps from 8:00 A.M. to 10:00 A.M. on a maintenance schedule. You can specify a limit to use for background jobs during a maintenance schedule. For example, if normal priority jobs are currently limited to 256 Kbps on a work schedule, you can further limit the network bandwidth of normal priority jobs to 0 Kbps from 8:00 A.M. to 10:00 A.M. on a maintenance schedule.
If you disable or do not configure this policy setting, the limits defined for work or non-work schedules will be used. If you disable or don't configure this policy setting, the limits defined for work or non-work schedules will be used.
> [!NOTE] > [!NOTE]
> The bandwidth limits that are set for the maintenance period supersede any limits defined for work and other schedules. > The bandwidth limits that are set for the maintenance period supersede any limits defined for work and other schedules.
@ -399,13 +399,13 @@ ADMX Info:
<!--/Scope--> <!--/Scope-->
<!--Description--> <!--Description-->
This policy setting limits the network bandwidth that Background Intelligent Transfer Service (BITS) uses for background transfers during the work and non-work days and hours. The work schedule is defined using a weekly calendar, which consists of days of the week and hours of the day. All hours and days that are not defined in a work schedule are considered non-work hours. This policy setting limits the network bandwidth that Background Intelligent Transfer Service (BITS) uses for background transfers during the work and non-work days and hours. The work schedule is defined using a weekly calendar, which consists of days of the week and hours of the day. All hours and days that aren't defined in a work schedule are considered non-work hours.
If you enable this policy setting, you can set up a schedule for limiting network bandwidth during both work and non-work hours. After the work schedule is defined, you can set the bandwidth usage limits for each of the three BITS background priority levels: high, normal, and low. If you enable this policy setting, you can set up a schedule for limiting network bandwidth during both work and non-work hours. After the work schedule is defined, you can set the bandwidth usage limits for each of the three BITS background priority levels: high, normal, and low.
You can specify a limit to use for background jobs during a work schedule. For example, you can limit the network bandwidth of low priority jobs to 128 Kbps from 8:00 A.M. to 5:00 P.M. on Monday through Friday, and then set the limit to 512 Kbps for non-work hours. You can specify a limit to use for background jobs during a work schedule. For example, you can limit the network bandwidth of low priority jobs to 128 Kbps from 8:00 A.M. to 5:00 P.M. on Monday through Friday, and then set the limit to 512 Kbps for non-work hours.
If you disable or do not configure this policy setting, BITS uses all available unused bandwidth for background job transfers. If you disable or don't configure this policy setting, BITS uses all available unused bandwidth for background job transfers.
<!--/Description--> <!--/Description-->
@ -451,7 +451,7 @@ This policy setting limits the maximum amount of disk space that can be used for
If you enable this policy setting, you can enter the percentage of disk space to be used for the BITS peer cache. You can enter a value between 1 percent and 80 percent. If you enable this policy setting, you can enter the percentage of disk space to be used for the BITS peer cache. You can enter a value between 1 percent and 80 percent.
If you disable or do not configure this policy setting, the default size of the BITS peer cache is 1 percent of the total system disk size. If you disable or don't configure this policy setting, the default size of the BITS peer cache is 1 percent of the total system disk size.
> [!NOTE] > [!NOTE]
> This policy setting has no effect if the "Allow BITS peer caching" setting is disabled or not configured. > This policy setting has no effect if the "Allow BITS peer caching" setting is disabled or not configured.
@ -495,11 +495,11 @@ ADMX Info:
<!--/Scope--> <!--/Scope-->
<!--Description--> <!--Description-->
Available in the latest Windows 10 Insider Preview Build. This policy setting limits the maximum age of files in the Background Intelligent Transfer Service (BITS) peer cache. In order to make the most efficient use of disk space, by default BITS removes any files in the peer cache that have not been accessed in the past 90 days. Available in the latest Windows 10 Insider Preview Build. This policy setting limits the maximum age of files in the Background Intelligent Transfer Service (BITS) peer cache. In order to make the most efficient use of disk space, by default, BITS removes any files in the peer cache that haven't been accessed in the past 90 days.
If you enable this policy setting, you can specify in days the maximum age of files in the cache. You can enter a value between 1 and 120 days. If you enable this policy setting, you can specify in days the maximum age of files in the cache. You can enter a value between 1 and 120 days.
If you disable or do not configure this policy setting, files that have not been accessed for the past 90 days will be removed from the peer cache. If you disable or don't configure this policy setting, files that haven't been accessed for the past 90 days will be removed from the peer cache.
> [!NOTE] > [!NOTE]
> This policy setting has no effect if the "Allow BITS Peercaching" policy setting is disabled or not configured. > This policy setting has no effect if the "Allow BITS Peercaching" policy setting is disabled or not configured.
@ -547,11 +547,11 @@ This policy setting limits the amount of time that Background Intelligent Transf
The time limit applies only to the time that BITS is actively downloading files. When the cumulative download time exceeds this limit, the job is placed in the error state. The time limit applies only to the time that BITS is actively downloading files. When the cumulative download time exceeds this limit, the job is placed in the error state.
By default BITS uses a maximum download time of 90 days (7,776,000 seconds). By default, BITS uses a maximum download time of 90 days (7,776,000 seconds).
If you enable this policy setting, you can set the maximum job download time to a specified number of seconds. If you enable this policy setting, you can set the maximum job download time to a specified number of seconds.
If you disable or do not configure this policy setting, the default value of 90 days (7,776,000 seconds) will be used. If you disable or don't configure this policy setting, the default value of 90 days (7,776,000 seconds) will be used.
<!--/Description--> <!--/Description-->
@ -593,14 +593,14 @@ ADMX Info:
<!--/Scope--> <!--/Scope-->
<!--Description--> <!--Description-->
This policy setting limits the number of files that a BITS job can contain. By default, a BITS job is limited to 200 files. You can use this setting to raise or lower the maximum number of files a BITS jobs can contain. This policy setting limits the number of files that a BITS job can contain. By default, a BITS job is limited to 200 files. You can use this setting to raise or lower the maximum number of files a BITS job can contain.
If you enable this policy setting, BITS will limit the maximum number of files a job can contain to the specified number. If you enable this policy setting, BITS will limit the maximum number of files a job can contain to the specified number.
If you disable or do not configure this policy setting, BITS will use the default value of 200 for the maximum number of files a job can contain. If you disable or don't configure this policy setting, BITS will use the default value of 200 for the maximum number of files a job can contain.
> [!NOTE] > [!NOTE]
> BITS Jobs created by services and the local administrator account do not count toward this limit. > BITS Jobs created by services and the local administrator account don't count toward this limit.
<!--/Description--> <!--/Description-->
@ -646,10 +646,10 @@ This policy setting limits the number of BITS jobs that can be created for all u
If you enable this policy setting, BITS will limit the maximum number of BITS jobs to the specified number. If you enable this policy setting, BITS will limit the maximum number of BITS jobs to the specified number.
If you disable or do not configure this policy setting, BITS will use the default BITS job limit of 300 jobs. If you disable or don't configure this policy setting, BITS will use the default BITS job limit of 300 jobs.
> [!NOTE] > [!NOTE]
> BITS jobs created by services and the local administrator account do not count toward this limit. > BITS jobs created by services and the local administrator account don't count toward this limit.
<!--/Description--> <!--/Description-->
@ -695,10 +695,10 @@ This policy setting limits the number of BITS jobs that can be created by a user
If you enable this policy setting, BITS will limit the maximum number of BITS jobs a user can create to the specified number. If you enable this policy setting, BITS will limit the maximum number of BITS jobs a user can create to the specified number.
If you disable or do not configure this policy setting, BITS will use the default user BITS job limit of 300 jobs. If you disable or don't configure this policy setting, BITS will use the default user BITS job limit of 300 jobs.
> [!NOTE] > [!NOTE]
> This limit must be lower than the setting specified in the "Maximum number of BITS jobs for this computer" policy setting, or 300 if the "Maximum number of BITS jobs for this computer" policy setting is not configured. BITS jobs created by services and the local administrator account do not count toward this limit. > This limit must be lower than the setting specified in the "Maximum number of BITS jobs for this computer" policy setting, or 300 if the "Maximum number of BITS jobs for this computer" policy setting is not configured. BITS jobs created by services and the local administrator account don't count toward this limit.
<!--/Description--> <!--/Description-->
@ -744,10 +744,10 @@ This policy setting limits the number of ranges that can be added to a file in a
If you enable this policy setting, BITS will limit the maximum number of ranges that can be added to a file to the specified number. If you enable this policy setting, BITS will limit the maximum number of ranges that can be added to a file to the specified number.
If you disable or do not configure this policy setting, BITS will limit ranges to 500 ranges per file. If you disable or don't configure this policy setting, BITS will limit ranges to 500 ranges per file.
> [!NOTE] > [!NOTE]
> BITS Jobs created by services and the local administrator account do not count toward this limit. > BITS Jobs created by services and the local administrator account don't count toward this limit.
<!--/Description--> <!--/Description-->

View File

@ -130,7 +130,7 @@ If this policy setting is enabled, the Control Panel opens to the icon view.
If this policy setting is disabled, the Control Panel opens to the category view. If this policy setting is disabled, the Control Panel opens to the category view.
If this policy setting is not configured, the Control Panel opens to the view used in the last Control Panel session. If this policy setting isn't configured, the Control Panel opens to the view used in the last Control Panel session.
> [!NOTE] > [!NOTE]
> Icon size is dependent upon what the user has set it to in the previous session. > Icon size is dependent upon what the user has set it to in the previous session.
@ -177,7 +177,7 @@ ADMX Info:
<!--Description--> <!--Description-->
Available in the latest Windows 10 Insider Preview Build. Disables all Control Panel programs and the PC settings app. Available in the latest Windows 10 Insider Preview Build. Disables all Control Panel programs and the PC settings app.
This setting prevents Control.exe and SystemSettings.exe, the program files for Control Panel and PC settings, from starting. As a result, users cannot start Control Panel or PC settings, or run any of their items. This setting prevents Control.exe and SystemSettings.exe, the program files for Control Panel and PC settings, from starting. As a result, users can't start Control Panel or PC settings, or run any of their items.
This setting removes Control Panel from: This setting removes Control Panel from:
@ -233,7 +233,7 @@ ADMX Info:
<!--/Scope--> <!--/Scope-->
<!--Description--> <!--Description-->
This policy setting controls which Control Panel items such as Mouse, System, or Personalization, are displayed on the Control Panel window and the Start screen. The only items displayed in Control Panel are those you specify in this setting. This setting affects the Start screen and Control Panel, as well as other ways to access Control Panel items such as shortcuts in Help and Support or command lines that use control.exe. This policy has no effect on items displayed in PC settings. This policy setting controls which Control Panel items such as Mouse, System, or Personalization, are displayed on the Control Panel window and the Start screen. The only items displayed in Control Panel are those items you specify in this setting. This setting affects the Start screen and Control Panel, as well as other ways to access Control Panel items such as shortcuts in Help and Support or command lines that use control.exe. This policy has no effect on items displayed in PC settings.
To display a Control Panel item, enable this policy setting and click Show to access the list of allowed Control Panel items. In the Show Contents dialog box in the Value column, enter the Control Panel item's canonical name. For example, enter Microsoft.Mouse, Microsoft.System, or Microsoft.Personalization. To display a Control Panel item, enable this policy setting and click Show to access the list of allowed Control Panel items. In the Show Contents dialog box in the Value column, enter the Control Panel item's canonical name. For example, enter Microsoft.Mouse, Microsoft.System, or Microsoft.Personalization.