<?xml version="1.0" encoding="utf-16"?>
<GPO xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance" xmlns:xsd="http://www.w3.org/2001/XMLSchema" xmlns="http://www.microsoft.com/GroupPolicy/Settings">
  <Identifier>
    <Identifier xmlns="http://www.microsoft.com/GroupPolicy/Types">{AA91D5F1-6F2D-4AC5-AD30-ABD4E6A7D989}</Identifier>
    <Domain xmlns="http://www.microsoft.com/GroupPolicy/Types">DomainName.com</Domain>
  </Identifier>
  <Name>C_</Name>
  <CreatedTime>2007-09-11T10:55:17</CreatedTime>
  <ModifiedTime>2007-12-04T14:11:52</ModifiedTime>
  <ReadTime>2007-12-04T19:44:19.2394072Z</ReadTime>
  <SecurityDescriptor>
    <SDDL xmlns="http://www.microsoft.com/GroupPolicy/Types/Security">O:DAG:DUD:PAI(OA;CI;CR;edacfd8f-ffb3-11d1-b41d-00a0c968f939;;AU)(A;;CCDCLCSWRPWPDTLOSDRCWDWO;;;DA)(A;CI;CCDCLCSWRPWPDTLOSDRCWDWO;;;DA)(A;CI;CCDCLCSWRPWPDTLOSDRCWDWO;;;EA)(A;CI;LCRPLORC;;;ED)(A;CI;LCRPLORC;;;AU)(A;CI;CCDCLCSWRPWPDTLOSDRCWDWO;;;SY)(A;CIIO;CCDCLCSWRPWPDTLOSDRCWDWO;;;CO)S:AI(OU;CIIDSA;WPWD;;f30e3bc2-9ff0-11d1-b603-0000f80367c1;WD)(OU;CIIOIDSA;WP;f30e3bbe-9ff0-11d1-b603-0000f80367c1;bf967aa5-0de6-11d0-a285-00aa003049e2;WD)(OU;CIIOIDSA;WP;f30e3bbf-9ff0-11d1-b603-0000f80367c1;bf967aa5-0de6-11d0-a285-00aa003049e2;WD)</SDDL>
    <Owner xmlns="http://www.microsoft.com/GroupPolicy/Types/Security">
      <SID xmlns="http://www.microsoft.com/GroupPolicy/Types">S-1-5-21-5689218631-3547271264-2306440767-512</SID>
      <Name xmlns="http://www.microsoft.com/GroupPolicy/Types">DomainName\Domain Admins</Name>
    </Owner>
    <Group xmlns="http://www.microsoft.com/GroupPolicy/Types/Security">
      <SID xmlns="http://www.microsoft.com/GroupPolicy/Types">S-1-5-21-5689218631-3547271264-2306440767-513</SID>
      <Name xmlns="http://www.microsoft.com/GroupPolicy/Types">DomainName\Domain Users</Name>
    </Group>
    <Permissions xmlns="http://www.microsoft.com/GroupPolicy/Types/Security">
      <InheritsFromParent>false</InheritsFromParent>
      <TrusteePermissions>
        <Trustee>
          <SID xmlns="http://www.microsoft.com/GroupPolicy/Types">S-1-5-11</SID>
          <Name xmlns="http://www.microsoft.com/GroupPolicy/Types">NT AUTHORITY\Authenticated Users</Name>
        </Trustee>
        <Type xsi:type="PermissionType">
          <PermissionType>Allow</PermissionType>
        </Type>
        <Inherited>false</Inherited>
        <Applicability>
          <ToSelf>true</ToSelf>
          <ToDescendantObjects>false</ToDescendantObjects>
          <ToDescendantContainers>true</ToDescendantContainers>
          <ToDirectDescendantsOnly>false</ToDirectDescendantsOnly>
        </Applicability>
        <Standard>
          <GPOGroupedAccessEnum>Apply Group Policy</GPOGroupedAccessEnum>
        </Standard>
        <AccessMask>0</AccessMask>
      </TrusteePermissions>
      <TrusteePermissions>
        <Trustee>
          <SID xmlns="http://www.microsoft.com/GroupPolicy/Types">S-1-5-21-5689218631-3547271264-2306440767-512</SID>
          <Name xmlns="http://www.microsoft.com/GroupPolicy/Types">DomainName\Domain Admins</Name>
        </Trustee>
        <Type xsi:type="PermissionType">
          <PermissionType>Allow</PermissionType>
        </Type>
        <Inherited>false</Inherited>
        <Applicability>
          <ToSelf>true</ToSelf>
          <ToDescendantObjects>false</ToDescendantObjects>
          <ToDescendantContainers>true</ToDescendantContainers>
          <ToDirectDescendantsOnly>false</ToDirectDescendantsOnly>
        </Applicability>
        <Standard>
          <GPOGroupedAccessEnum>Edit, delete, modify security</GPOGroupedAccessEnum>
        </Standard>
        <AccessMask>0</AccessMask>
      </TrusteePermissions>
      <TrusteePermissions>
        <Trustee>
          <SID xmlns="http://www.microsoft.com/GroupPolicy/Types">S-1-5-18</SID>
          <Name xmlns="http://www.microsoft.com/GroupPolicy/Types">NT AUTHORITY\SYSTEM</Name>
        </Trustee>
        <Type xsi:type="PermissionType">
          <PermissionType>Allow</PermissionType>
        </Type>
        <Inherited>false</Inherited>
        <Applicability>
          <ToSelf>true</ToSelf>
          <ToDescendantObjects>false</ToDescendantObjects>
          <ToDescendantContainers>true</ToDescendantContainers>
          <ToDirectDescendantsOnly>false</ToDirectDescendantsOnly>
        </Applicability>
        <Standard>
          <GPOGroupedAccessEnum>Edit, delete, modify security</GPOGroupedAccessEnum>
        </Standard>
        <AccessMask>0</AccessMask>
      </TrusteePermissions>
    </Permissions>
    <PermissionsPresent xmlns="http://www.microsoft.com/GroupPolicy/Types/Security">true</PermissionsPresent>
    <AuditingPresent xmlns="http://www.microsoft.com/GroupPolicy/Types/Security">false</AuditingPresent>
  </SecurityDescriptor>
  <FilterDataAvailable>true<Computer><VersionDirectory>275</VersionDirectory><VersionSysvol>275</VersionSysvol><Enabled>true</Enabled><ExtensionData><Extension xmlns:q1="http://www.microsoft.com/GroupPolicy/Settings/Registry" xsi:type="q1:RegistrySettings"><q1:Policy><q1:Name>Registry policy processing</q1:Name><q1:State>Enabled</q1:State><q1:Explain>Determines when registry policies are updated.

This setting affects all policies in the Administrative Templates folder and any other policies that store values in the registry.

It overrides customized settings that the program implementing a registry policy set when it was installed.

If you enable this setting, you can use the check boxes provided to change the options. If you disable this setting or do not configure it, it has no effect on the system.

The "Do not apply during periodic background processing" option prevents the system from updating affected policies in the background while the computer is in use. When background updates are disabled, policy changes will not take effect until the next user logon or system restart.

The "Process even if the Group Policy objects have not changed" option updates and reapplies the policies even if the policies have not changed. Many policy implementations specify that they are updated only when changed. However, you might want to update unchanged policies, such as reapplying a desired setting in case a user has changed it.</q1:Explain><q1:Supported>At least Microsoft Windows 2000</q1:Supported><q1:Category>System/Group Policy</q1:Category><q1:CheckBox><q1:Name>Do not apply during periodic background processing</q1:Name><q1:State>Disabled</q1:State></q1:CheckBox><q1:CheckBox><q1:Name>Process even if the Group Policy objects have not changed</q1:Name><q1:State>Enabled</q1:State></q1:CheckBox></q1:Policy><q1:Policy><q1:Name>Restrictions for Unauthenticated RPC clients</q1:Name><q1:State>Enabled</q1:State><q1:Explain>If you enable this setting, it directs the RPC Runtime on an RPC server to restrict unauthenticated RPC clients connecting to RPC servers running on a machine. A client will be considered an authenticated client if it uses a named pipe to communicate with the server or if it uses RPC Security. RPC Interfaces that have specifically asked to be accessible by unauthenticated clients may be exempt from this restriction, depending on the selected value for this policy.

If you disable this setting or do not configure it, the value of Authenticated will be used for Windows XP and the value of None will be used for Server SKUs that support this policy setting. If you enable it, the following values are available:

--  "None" allows all RPC clients to connect to RPC Servers running on the machine on which the policy is applied.

--  "Authenticated" allows only authenticated RPC Clients (per the definition above) to connect to RPC Servers running on the machine on which the policy is applied. Interfaces that have asked to be exempt from this restriction will be granted an exemption.

-- "Authenticated without exceptions" allows only authenticated RPC Clients (per the definition above) to connect to RPC Servers running on the machine on which the policy is applied. No exceptions are allowed.

Note: This policy setting will not be applied unti the system is rebooted.</q1:Explain><q1:Supported>At least Microsoft Windows XP Professional with SP2</q1:Supported><q1:Category>System/Remote Procedure Call</q1:Category><q1:DropDownList><q1:Name>RPC Runtime Unauthenticated Client Restriction to Apply:</q1:Name><q1:State>Enabled</q1:State><q1:Value><q1:Name>Authenticated</q1:Name></q1:Value></q1:DropDownList></q1:Policy></Extension><Name>Registry</Name></ExtensionData><ExtensionData><Extension xmlns:q2="http://www.microsoft.com/GroupPolicy/Settings/Security" xsi:type="q2:SecuritySettings"><q2:Audit><q2:Name>AuditAccountLogon</q2:Name><q2:SuccessAttempts>true</q2:SuccessAttempts><q2:FailureAttempts>false</q2:FailureAttempts></q2:Audit><q2:Audit><q2:Name>AuditAccountManage</q2:Name><q2:SuccessAttempts>true</q2:SuccessAttempts><q2:FailureAttempts>false</q2:FailureAttempts></q2:Audit><q2:Audit><q2:Name>AuditLogonEvents</q2:Name><q2:SuccessAttempts>true</q2:SuccessAttempts><q2:FailureAttempts>false</q2:FailureAttempts></q2:Audit><q2:Audit><q2:Name>AuditObjectAccess</q2:Name><q2:SuccessAttempts>false</q2:SuccessAttempts><q2:FailureAttempts>false</q2:FailureAttempts></q2:Audit><q2:Audit><q2:Name>AuditProcessTracking</q2:Name><q2:SuccessAttempts>false</q2:SuccessAttempts><q2:FailureAttempts>false</q2:FailureAttempts></q2:Audit><q2:Audit><q2:Name>AuditSystemEvents</q2:Name><q2:SuccessAttempts>true</q2:SuccessAttempts><q2:FailureAttempts>false</q2:FailureAttempts></q2:Audit><q2:UserRightsAssignment><q2:Name>SeAssignPrimaryTokenPrivilege</q2:Name><q2:Member><SID xmlns="http://www.microsoft.com/GroupPolicy/Types">S-1-5-20</SID><Name xmlns="http://www.microsoft.com/GroupPolicy/Types">NT AUTHORITY\NETWORK SERVICE</Name></q2:Member><q2:Member><SID xmlns="http://www.microsoft.com/GroupPolicy/Types">S-1-5-19</SID><Name xmlns="http://www.microsoft.com/GroupPolicy/Types">NT AUTHORITY\LOCAL SERVICE</Name></q2:Member></q2:UserRightsAssignment><q2:UserRightsAssignment><q2:Name>SeAuditPrivilege</q2:Name><q2:Member><SID xmlns="http://www.microsoft.com/GroupPolicy/Types">S-1-5-20</SID><Name xmlns="http://www.microsoft.com/GroupPolicy/Types">NT AUTHORITY\NETWORK SERVICE</Name></q2:Member><q2:Member><SID xmlns="http://www.microsoft.com/GroupPolicy/Types">S-1-5-19</SID><Name xmlns="http://www.microsoft.com/GroupPolicy/Types">NT AUTHORITY\LOCAL SERVICE</Name></q2:Member></q2:UserRightsAssignment><q2:UserRightsAssignment><q2:Name>SeBackupPrivilege</q2:Name><q2:Member><SID xmlns="http://www.microsoft.com/GroupPolicy/Types">S-1-5-32-551</SID><Name xmlns="http://www.microsoft.com/GroupPolicy/Types">BUILTIN\Backup Operators</Name></q2:Member><q2:Member><SID xmlns="http://www.microsoft.com/GroupPolicy/Types">S-1-5-32-544</SID><Name xmlns="http://www.microsoft.com/GroupPolicy/Types">BUILTIN\Administrators</Name></q2:Member></q2:UserRightsAssignment><q2:UserRightsAssignment><q2:Name>SeChangeNotifyPrivilege</q2:Name><q2:Member><SID xmlns="http://www.microsoft.com/GroupPolicy/Types">S-1-5-32-544</SID><Name xmlns="http://www.microsoft.com/GroupPolicy/Types">BUILTIN\Administrators</Name></q2:Member></q2:UserRightsAssignment><q2:UserRightsAssignment><q2:Name>SeCreatePagefilePrivilege</q2:Name><q2:Member><SID xmlns="http://www.microsoft.com/GroupPolicy/Types">S-1-5-32-544</SID><Name xmlns="http://www.microsoft.com/GroupPolicy/Types">BUILTIN\Administrators</Name></q2:Member></q2:UserRightsAssignment><q2:UserRightsAssignment><q2:Name>SeDebugPrivilege</q2:Name><q2:Member><SID xmlns="http://www.microsoft.com/GroupPolicy/Types">S-1-5-32-544</SID><Name xmlns="http://www.microsoft.com/GroupPolicy/Types">BUILTIN\Administrators</Name></q2:Member></q2:UserRightsAssignment><q2:UserRightsAssignment><q2:Name>SeDenyNetworkLogonRight</q2:Name><q2:Member><Name xmlns="http://www.microsoft.com/GroupPolicy/Types">Support</Name></q2:Member><q2:Member><Name xmlns="http://www.microsoft.com/GroupPolicy/Types">Guest</Name></q2:Member></q2:UserRightsAssignment><q2:UserRightsAssignment><q2:Name>SeIncreaseBasePriorityPrivilege</q2:Name><q2:Member><SID xmlns="http://www.microsoft.com/GroupPolicy/Types">S-1-5-32-544</SID><Name xmlns="http://www.microsoft.com/GroupPolicy/Types">BUILTIN\Administrators</Name></q2:Member></q2:UserRightsAssignment><q2:UserRightsAssignment><q2:Name>SeInteractiveLogonRight</q2:Name><q2:Member><SID xmlns="http://www.microsoft.com/GroupPolicy/Types">S-1-5-32-545</SID><Name xmlns="http://www.microsoft.com/GroupPolicy/Types">BUILTIN\Users</Name></q2:Member><q2:Member><SID xmlns="http://www.microsoft.com/GroupPolicy/Types">S-1-5-32-544</SID><Name xmlns="http://www.microsoft.com/GroupPolicy/Types">BUILTIN\Administrators</Name></q2:Member></q2:UserRightsAssignment><q2:UserRightsAssignment><q2:Name>SeLoadDriverPrivilege</q2:Name><q2:Member><SID xmlns="http://www.microsoft.com/GroupPolicy/Types">S-1-5-32-544</SID><Name xmlns="http://www.microsoft.com/GroupPolicy/Types">BUILTIN\Administrators</Name></q2:Member></q2:UserRightsAssignment><q2:UserRightsAssignment><q2:Name>SeLockMemoryPrivilege</q2:Name></q2:UserRightsAssignment><q2:UserRightsAssignment><q2:Name>SeManageVolumePrivilege</q2:Name><q2:Member><SID xmlns="http://www.microsoft.com/GroupPolicy/Types">S-1-5-32-544</SID><Name xmlns="http://www.microsoft.com/GroupPolicy/Types">BUILTIN\Administrators</Name></q2:Member></q2:UserRightsAssignment><q2:UserRightsAssignment><q2:Name>SeNetworkLogonRight</q2:Name><q2:Member><SID xmlns="http://www.microsoft.com/GroupPolicy/Types">S-1-5-32-545</SID><Name xmlns="http://www.microsoft.com/GroupPolicy/Types">BUILTIN\Users</Name></q2:Member><q2:Member><SID xmlns="http://www.microsoft.com/GroupPolicy/Types">S-1-5-32-544</SID><Name xmlns="http://www.microsoft.com/GroupPolicy/Types">BUILTIN\Administrators</Name></q2:Member></q2:UserRightsAssignment><q2:UserRightsAssignment><q2:Name>SeRemoteInteractiveLogonRight</q2:Name><q2:Member><SID xmlns="http://www.microsoft.com/GroupPolicy/Types">S-1-5-32-555</SID><Name xmlns="http://www.microsoft.com/GroupPolicy/Types">BUILTIN\Remote Desktop Users</Name></q2:Member><q2:Member><SID xmlns="http://www.microsoft.com/GroupPolicy/Types">S-1-5-32-544</SID><Name xmlns="http://www.microsoft.com/GroupPolicy/Types">BUILTIN\Administrators</Name></q2:Member></q2:UserRightsAssignment><q2:UserRightsAssignment><q2:Name>SeRemoteShutdownPrivilege</q2:Name><q2:Member><SID xmlns="http://www.microsoft.com/GroupPolicy/Types">S-1-5-32-544</SID><Name xmlns="http://www.microsoft.com/GroupPolicy/Types">BUILTIN\Administrators</Name></q2:Member></q2:UserRightsAssignment><q2:UserRightsAssignment><q2:Name>SeSecurityPrivilege</q2:Name><q2:Member><SID xmlns="http://www.microsoft.com/GroupPolicy/Types">S-1-5-32-544</SID><Name xmlns="http://www.microsoft.com/GroupPolicy/Types">BUILTIN\Administrators</Name></q2:Member></q2:UserRightsAssignment><q2:UserRightsAssignment><q2:Name>SeShutdownPrivilege</q2:Name><q2:Member><SID xmlns="http://www.microsoft.com/GroupPolicy/Types">S-1-5-32-545</SID><Name xmlns="http://www.microsoft.com/GroupPolicy/Types">BUILTIN\Users</Name></q2:Member><q2:Member><SID xmlns="http://www.microsoft.com/GroupPolicy/Types">S-1-5-32-544</SID><Name xmlns="http://www.microsoft.com/GroupPolicy/Types">BUILTIN\Administrators</Name></q2:Member></q2:UserRightsAssignment><q2:UserRightsAssignment><q2:Name>SeSystemEnvironmentPrivilege</q2:Name><q2:Member><SID xmlns="http://www.microsoft.com/GroupPolicy/Types">S-1-5-32-544</SID><Name xmlns="http://www.microsoft.com/GroupPolicy/Types">BUILTIN\Administrators</Name></q2:Member></q2:UserRightsAssignment><q2:UserRightsAssignment><q2:Name>SeSystemProfilePrivilege</q2:Name><q2:Member><SID xmlns="http://www.microsoft.com/GroupPolicy/Types">S-1-5-32-544</SID><Name xmlns="http://www.microsoft.com/GroupPolicy/Types">BUILTIN\Administrators</Name></q2:Member></q2:UserRightsAssignment><q2:UserRightsAssignment><q2:Name>SeSystemTimePrivilege</q2:Name><q2:Member><SID xmlns="http://www.microsoft.com/GroupPolicy/Types">S-1-5-19</SID><Name xmlns="http://www.microsoft.com/GroupPolicy/Types">NT AUTHORITY\LOCAL SERVICE</Name></q2:Member><q2:Member><SID xmlns="http://www.microsoft.com/GroupPolicy/Types">S-1-5-32-544</SID><Name xmlns="http://www.microsoft.com/GroupPolicy/Types">BUILTIN\Administrators</Name></q2:Member></q2:UserRightsAssignment><q2:UserRightsAssignment><q2:Name>SeTakeOwnershipPrivilege</q2:Name><q2:Member><SID xmlns="http://www.microsoft.com/GroupPolicy/Types">S-1-5-32-544</SID><Name xmlns="http://www.microsoft.com/GroupPolicy/Types">BUILTIN\Administrators</Name></q2:Member></q2:UserRightsAssignment><q2:UserRightsAssignment><q2:Name>SeTcbPrivilege</q2:Name></q2:UserRightsAssignment><q2:UserRightsAssignment><q2:Name>SeUndockPrivilege</q2:Name><q2:Member><SID xmlns="http://www.microsoft.com/GroupPolicy/Types">S-1-5-32-545</SID><Name xmlns="http://www.microsoft.com/GroupPolicy/Types">BUILTIN\Users</Name></q2:Member><q2:Member><SID xmlns="http://www.microsoft.com/GroupPolicy/Types">S-1-5-32-544</SID><Name xmlns="http://www.microsoft.com/GroupPolicy/Types">BUILTIN\Administrators</Name></q2:Member></q2:UserRightsAssignment><q2:SecurityOptions><q2:KeyName>MACHINE\Software\Microsoft\Windows NT\CurrentVersion\Winlogon\ForceUnlockLogon</q2:KeyName><q2:SettingNumber>1</q2:SettingNumber><q2:Display><q2:Name>Interactive logon: Require Domain Controller authentication to unlock workstation</q2:Name><q2:Units /><q2:DisplayBoolean>true</q2:DisplayBoolean></q2:Display></q2:SecurityOptions><q2:SecurityOptions><q2:KeyName>MACHINE\Software\Microsoft\Windows NT\CurrentVersion\Winlogon\ScreenSaverGracePeriod</q2:KeyName><q2:SettingNumber>0</q2:SettingNumber><q2:Display><q2:Name>MSS: (ScreenSaverGracePeriod) The time in seconds before the screen saver grace period expires (0 recommended)</q2:Name><q2:Units /><q2:DisplayNumber>0</q2:DisplayNumber></q2:Display></q2:SecurityOptions><q2:SecurityOptions><q2:KeyName>MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\NoDriveTypeAutoRun</q2:KeyName><q2:SettingNumber>255</q2:SettingNumber><q2:Display><q2:Name>MSS: (NoDriveTypeAutoRun) Disable Autorun for all drives (recommended)</q2:Name><q2:Units /><q2:DisplayString>255, disable Autorun for all drives</q2:DisplayString></q2:Display></q2:SecurityOptions><q2:SecurityOptions><q2:KeyName>MACHINE\Software\Microsoft\Windows\CurrentVersion\Policies\System\ConsentPromptBehaviorAdmin</q2:KeyName><q2:SettingNumber>1</q2:SettingNumber><q2:Display><q2:Name>User Account Control: Behavior of the elevation prompt for administrators in Admin Approval Mode</q2:Name><q2:Units /><q2:DisplayString>Prompt for credentials</q2:DisplayString></q2:Display></q2:SecurityOptions><q2:SecurityOptions><q2:KeyName>MACHINE\Software\Microsoft\Windows\CurrentVersion\Policies\System\ConsentPromptBehaviorUser</q2:KeyName><q2:SettingNumber>0</q2:SettingNumber><q2:Display><q2:Name>User Account Control: Behavior of the elevation prompt for standard users</q2:Name><q2:Units /><q2:DisplayString>Automatically deny elevation requests</q2:DisplayString></q2:Display></q2:SecurityOptions><q2:SecurityOptions><q2:KeyName>MACHINE\Software\Microsoft\Windows\CurrentVersion\Policies\System\EnableInstallerDetection</q2:KeyName><q2:SettingNumber>1</q2:SettingNumber><q2:Display><q2:Name>User Account Control: Detect application installations and prompt for elevation</q2:Name><q2:Units /><q2:DisplayBoolean>true</q2:DisplayBoolean></q2:Display></q2:SecurityOptions><q2:SecurityOptions><q2:KeyName>MACHINE\Software\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA</q2:KeyName><q2:SettingNumber>1</q2:SettingNumber><q2:Display><q2:Name>User Account Control: Run all administrators in Admin Approval Mode</q2:Name><q2:Units /><q2:DisplayBoolean>true</q2:DisplayBoolean></q2:Display></q2:SecurityOptions><q2:SecurityOptions><q2:KeyName>MACHINE\Software\Microsoft\Windows\CurrentVersion\Policies\System\EnableSecureUIAPaths</q2:KeyName><q2:SettingNumber>1</q2:SettingNumber><q2:Display><q2:Name>User Account Control: Only elevate UIAccess applications that are installed in secure locations</q2:Name><q2:Units /><q2:DisplayBoolean>true</q2:DisplayBoolean></q2:Display></q2:SecurityOptions><q2:SecurityOptions><q2:KeyName>MACHINE\Software\Microsoft\Windows\CurrentVersion\Policies\System\EnableVirtualization</q2:KeyName><q2:SettingNumber>1</q2:SettingNumber><q2:Display><q2:Name>User Account Control: Virtualize file and registry write failures to per-user locations</q2:Name><q2:Units /><q2:DisplayBoolean>true</q2:DisplayBoolean></q2:Display></q2:SecurityOptions><q2:SecurityOptions><q2:KeyName>MACHINE\Software\Microsoft\Windows\CurrentVersion\Policies\System\FilterAdministratorToken</q2:KeyName><q2:SettingNumber>1</q2:SettingNumber><q2:Display><q2:Name>User Account Control: Admin Approval Mode for the Built-in Administrator account</q2:Name><q2:Units /><q2:DisplayBoolean>true</q2:DisplayBoolean></q2:Display></q2:SecurityOptions><q2:SecurityOptions><q2:KeyName>MACHINE\Software\Microsoft\Windows\CurrentVersion\Policies\System\PromptOnSecureDesktop</q2:KeyName><q2:SettingNumber>1</q2:SettingNumber><q2:Display><q2:Name>User Account Control: Switch to the secure desktop when prompting for elevation</q2:Name><q2:Units /><q2:DisplayBoolean>true</q2:DisplayBoolean></q2:Display></q2:SecurityOptions><q2:SecurityOptions><q2:KeyName>MACHINE\Software\Microsoft\Windows\CurrentVersion\Policies\System\ScForceOption</q2:KeyName><q2:SettingNumber>0</q2:SettingNumber><q2:Display><q2:Name>Interactive logon: Require smart card</q2:Name><q2:Units /><q2:DisplayBoolean>false</q2:DisplayBoolean></q2:Display></q2:SecurityOptions><q2:SecurityOptions><q2:KeyName>MACHINE\Software\Microsoft\Windows\CurrentVersion\Policies\System\ValidateAdminCodeSignatures</q2:KeyName><q2:SettingNumber>0</q2:SettingNumber><q2:Display><q2:Name>User Account Control: Only elevate executables that are signed and validated</q2:Name><q2:Units /><q2:DisplayBoolean>false</q2:DisplayBoolean></q2:Display></q2:SecurityOptions><q2:SecurityOptions><q2:KeyName>MACHINE\System\CurrentControlSet\Control\Lsa\DisableDomainCreds</q2:KeyName><q2:SettingNumber>1</q2:SettingNumber><q2:Display><q2:Name>Network access: Do not allow storage of credentials or .NET Passports for network authentication</q2:Name><q2:Units /><q2:DisplayBoolean>true</q2:DisplayBoolean></q2:Display></q2:SecurityOptions><q2:SecurityOptions><q2:KeyName>MACHINE\System\CurrentControlSet\Control\Lsa\EveryoneIncludesAnonymous</q2:KeyName><q2:SettingNumber>1</q2:SettingNumber><q2:Display><q2:Name>Network access: Let Everyone permissions apply to anonymous users</q2:Name><q2:Units /><q2:DisplayBoolean>true</q2:DisplayBoolean></q2:Display></q2:SecurityOptions><q2:SecurityOptions><q2:KeyName>MACHINE\System\CurrentControlSet\Control\Lsa\ForceGuest</q2:KeyName><q2:SettingNumber>0</q2:SettingNumber><q2:Display><q2:Name>Network access: Sharing and security model for local accounts</q2:Name><q2:Units /><q2:DisplayString>Classic - local users authenticate as themselves</q2:DisplayString></q2:Display></q2:SecurityOptions><q2:SecurityOptions><q2:KeyName>MACHINE\System\CurrentControlSet\Control\Lsa\LmCompatibilityLevel</q2:KeyName><q2:SettingNumber>4</q2:SettingNumber><q2:Display><q2:Name>Network security: LAN Manager authentication level</q2:Name><q2:Units /><q2:DisplayString>Send NTLMv2 response only. Refuse LM</q2:DisplayString></q2:Display></q2:SecurityOptions><q2:SecurityOptions><q2:KeyName>MACHINE\System\CurrentControlSet\Control\Lsa\MSV1_0\NTLMMinClientSec</q2:KeyName><q2:SettingNumber>537395200</q2:SettingNumber><q2:Display><q2:Name>Network security: Minimum session security for NTLM SSP based (including secure RPC) clients</q2:Name><q2:Units /><q2:DisplayFields><q2:Field><q2:Name>Require NTLMv2 session security</q2:Name><q2:Value>true</q2:Value></q2:Field><q2:Field><q2:Name>Require 128-bit encryption</q2:Name><q2:Value>true</q2:Value></q2:Field></q2:DisplayFields></q2:Display></q2:SecurityOptions><q2:SecurityOptions><q2:KeyName>MACHINE\System\CurrentControlSet\Control\Lsa\MSV1_0\NTLMMinServerSec</q2:KeyName><q2:SettingNumber>537395200</q2:SettingNumber><q2:Display><q2:Name>Network security: Minimum session security for NTLM SSP based (including secure RPC) servers</q2:Name><q2:Units /><q2:DisplayFields><q2:Field><q2:Name>Require NTLMv2 session security</q2:Name><q2:Value>true</q2:Value></q2:Field><q2:Field><q2:Name>Require 128-bit encryption</q2:Name><q2:Value>true</q2:Value></q2:Field></q2:DisplayFields></q2:Display></q2:SecurityOptions><q2:SecurityOptions><q2:KeyName>MACHINE\System\CurrentControlSet\Control\Lsa\RestrictAnonymous</q2:KeyName><q2:SettingNumber>1</q2:SettingNumber><q2:Display><q2:Name>Network access: Do not allow anonymous enumeration of SAM accounts and shares</q2:Name><q2:Units /><q2:DisplayBoolean>true</q2:DisplayBoolean></q2:Display></q2:SecurityOptions><q2:SecurityOptions><q2:KeyName>MACHINE\System\CurrentControlSet\Control\Lsa\RestrictAnonymousSAM</q2:KeyName><q2:SettingNumber>1</q2:SettingNumber><q2:Display><q2:Name>Network access: Do not allow anonymous enumeration of SAM accounts</q2:Name><q2:Units /><q2:DisplayBoolean>true</q2:DisplayBoolean></q2:Display></q2:SecurityOptions><q2:SecurityOptions><q2:KeyName>MACHINE\System\CurrentControlSet\Control\Lsa\SCENoApplyLegacyAuditPolicy</q2:KeyName><q2:SettingNumber>1</q2:SettingNumber><q2:Display><q2:Name>Audit: Force audit policy subcategory settings (Windows Vista or later) to override audit policy category settings</q2:Name><q2:Units /><q2:DisplayBoolean>true</q2:DisplayBoolean></q2:Display></q2:SecurityOptions><q2:SecurityOptions><q2:KeyName>MACHINE\System\CurrentControlSet\Control\Print\Providers\LanMan Print Services\Servers\AddPrinterDrivers</q2:KeyName><q2:SettingNumber>1</q2:SettingNumber><q2:Display><q2:Name>Devices: Prevent users from installing printer drivers</q2:Name><q2:Units /><q2:DisplayBoolean>true</q2:DisplayBoolean></q2:Display></q2:SecurityOptions><q2:SecurityOptions><q2:KeyName>MACHINE\System\CurrentControlSet\Control\SecurePipeServers\Winreg\AllowedExactPaths\Machine</q2:KeyName><q2:SettingStrings><q2:Value>System\CurrentControlSet\Control\ProductOptions</q2:Value><q2:Value>System\CurrentControlSet\Control\Server Applications</q2:Value><q2:Value>Software\Microsoft\Windows NT\CurrentVersion</q2:Value></q2:SettingStrings><q2:Display><q2:Name>Network access: Remotely accessible registry paths</q2:Name><q2:Units /><q2:DisplayStrings><q2:Value>System\CurrentControlSet\Control\ProductOptions</q2:Value><q2:Value>System\CurrentControlSet\Control\Server Applications</q2:Value><q2:Value>Software\Microsoft\Windows NT\CurrentVersion</q2:Value></q2:DisplayStrings></q2:Display></q2:SecurityOptions><q2:SecurityOptions><q2:KeyName>MACHINE\System\CurrentControlSet\Control\SecurePipeServers\Winreg\AllowedPaths\Machine</q2:KeyName><q2:SettingStrings><q2:Value>Software\Microsoft\Windows NT\CurrentVersion\Print</q2:Value><q2:Value>Software\Microsoft\Windows NT\CurrentVersion\Windows</q2:Value><q2:Value>System\CurrentControlSet\Control\Print\Printers</q2:Value><q2:Value>System\CurrentControlSet\Services\Eventlog</q2:Value><q2:Value>Software\Microsoft\OLAP Server</q2:Value><q2:Value>System\CurrentControlSet\Control\ContentIndex</q2:Value><q2:Value>System\CurrentControlSet\Control\Terminal Server</q2:Value><q2:Value>System\CurrentControlSet\Control\Terminal Server\UserConfig</q2:Value><q2:Value>System\CurrentControlSet\Control\Terminal Server\DefaultUserConfiguration</q2:Value><q2:Value>Software\Microsoft\Windows NT\CurrentVersion\Perflib</q2:Value><q2:Value>System\CurrentControlSet\Services\SysmonLog</q2:Value></q2:SettingStrings><q2:Display><q2:Name>Network access: Remotely accessible registry paths and sub-paths</q2:Name><q2:Units /><q2:DisplayStrings><q2:Value>Software\Microsoft\Windows NT\CurrentVersion\Print</q2:Value><q2:Value>Software\Microsoft\Windows NT\CurrentVersion\Windows</q2:Value><q2:Value>System\CurrentControlSet\Control\Print\Printers</q2:Value><q2:Value>System\CurrentControlSet\Services\Eventlog</q2:Value><q2:Value>Software\Microsoft\OLAP Server</q2:Value><q2:Value>System\CurrentControlSet\Control\ContentIndex</q2:Value><q2:Value>System\CurrentControlSet\Control\Terminal Server</q2:Value><q2:Value>System\CurrentControlSet\Control\Terminal Server\UserConfig</q2:Value><q2:Value>System\CurrentControlSet\Control\Terminal Server\DefaultUserConfiguration</q2:Value><q2:Value>Software\Microsoft\Windows NT\CurrentVersion\Perflib</q2:Value><q2:Value>System\CurrentControlSet\Services\SysmonLog</q2:Value></q2:DisplayStrings></q2:Display></q2:SecurityOptions><q2:SecurityOptions><q2:KeyName>MACHINE\System\CurrentControlSet\Control\Session Manager\Memory Management\ClearPageFileAtShutdown</q2:KeyName><q2:SettingNumber>0</q2:SettingNumber><q2:Display><q2:Name>Shutdown: Clear virtual memory pagefile</q2:Name><q2:Units /><q2:DisplayBoolean>false</q2:DisplayBoolean></q2:Display></q2:SecurityOptions><q2:SecurityOptions><q2:KeyName>MACHINE\System\CurrentControlSet\Control\Session Manager\ProtectionMode</q2:KeyName><q2:SettingNumber>1</q2:SettingNumber><q2:Display><q2:Name>System objects: Strengthen default permissions of internal system objects (e.g. Symbolic Links)</q2:Name><q2:Units /><q2:DisplayBoolean>true</q2:DisplayBoolean></q2:Display></q2:SecurityOptions><q2:SecurityOptions><q2:KeyName>MACHINE\SYSTEM\CurrentControlSet\Control\Session Manager\SafeDllSearchMode</q2:KeyName><q2:SettingNumber>1</q2:SettingNumber><q2:Display><q2:Name>MSS: (SafeDllSearchMode) Enable Safe DLL search mode (recommended)</q2:Name><q2:Units /><q2:DisplayBoolean>true</q2:DisplayBoolean></q2:Display></q2:SecurityOptions><q2:SecurityOptions><q2:KeyName>MACHINE\SYSTEM\CurrentControlSet\Services\Eventlog\Security\WarningLevel</q2:KeyName><q2:SettingNumber>90</q2:SettingNumber><q2:Display><q2:Name>MSS: (WarningLevel) Percentage threshold for the security event log at which the system will generate a warning</q2:Name><q2:Units /><q2:DisplayString>90%</q2:DisplayString></q2:Display></q2:SecurityOptions><q2:SecurityOptions><q2:KeyName>MACHINE\System\CurrentControlSet\Services\IPSEC\NoDefaultExempt</q2:KeyName><q2:SettingNumber>1</q2:SettingNumber><q2:Display><q2:Name>MSS: (NoDefaultExempt) Configure IPSec exemptions for various types of network traffic.</q2:Name><q2:Units /><q2:DisplayString>Multicast, broadcast, &amp; ISAKMP exempt (best for Windows XP).</q2:DisplayString></q2:Display></q2:SecurityOptions><q2:SecurityOptions><q2:KeyName>MACHINE\System\CurrentControlSet\Services\LanManServer\Parameters\NullSessionPipes</q2:KeyName><q2:SettingStrings><q2:Value>BROWSER</q2:Value><q2:Value>netlogon</q2:Value><q2:Value>lsarpc</q2:Value><q2:Value>samr</q2:Value></q2:SettingStrings><q2:Display><q2:Name>Network access: Named Pipes that can be accessed anonymously</q2:Name><q2:Units /><q2:DisplayStrings><q2:Value>BROWSER</q2:Value><q2:Value>netlogon</q2:Value><q2:Value>lsarpc</q2:Value><q2:Value>samr</q2:Value></q2:DisplayStrings></q2:Display></q2:SecurityOptions><q2:SecurityOptions><q2:KeyName>MACHINE\System\CurrentControlSet\Services\LanManServer\Parameters\NullSessionShares</q2:KeyName><q2:SettingStrings /><q2:Display><q2:Name>Network access: Shares that can be accessed anonymously</q2:Name><q2:Units /><q2:DisplayStrings /></q2:Display></q2:SecurityOptions><q2:SecurityOptions><q2:KeyName>MACHINE\System\CurrentControlSet\Services\LanManServer\Parameters\RestrictNullSessAccess</q2:KeyName><q2:SettingNumber>1</q2:SettingNumber><q2:Display><q2:Name>Network access: Restrict anonymous access to Named Pipes and Shares</q2:Name><q2:Units /><q2:DisplayBoolean>true</q2:DisplayBoolean></q2:Display></q2:SecurityOptions><q2:SecurityOptions><q2:KeyName>MACHINE\System\CurrentControlSet\Services\LDAP\LDAPClientIntegrity</q2:KeyName><q2:SettingNumber>1</q2:SettingNumber><q2:Display><q2:Name>Network security: LDAP client signing requirements</q2:Name><q2:Units /><q2:DisplayString>Negotiate signing</q2:DisplayString></q2:Display></q2:SecurityOptions><q2:SecurityOptions><q2:KeyName>MACHINE\System\CurrentControlSet\Services\Tcpip\Parameters\DisableIPSourceRouting</q2:KeyName><q2:SettingNumber>2</q2:SettingNumber><q2:Display><q2:Name>MSS: (DisableIPSourceRouting) IP source routing protection level (protects against packet spoofing)</q2:Name><q2:Units /><q2:DisplayString>Highest protection, source routing is completely disabled</q2:DisplayString></q2:Display></q2:SecurityOptions><q2:SecurityOptions><q2:KeyName>MACHINE\System\CurrentControlSet\Services\Tcpip\Parameters\EnableDeadGWDetect</q2:KeyName><q2:SettingNumber>0</q2:SettingNumber><q2:Display><q2:Name>MSS: (EnableDeadGWDetect) Allow automatic detection of dead network gateways (could lead to DoS)</q2:Name><q2:Units /><q2:DisplayBoolean>false</q2:DisplayBoolean></q2:Display></q2:SecurityOptions><q2:SecurityOptions><q2:KeyName>MACHINE\System\CurrentControlSet\Services\Tcpip\Parameters\EnableICMPRedirect</q2:KeyName><q2:SettingNumber>0</q2:SettingNumber><q2:Display><q2:Name>MSS: (EnableICMPRedirect) Allow ICMP redirects to override OSPF generated routes</q2:Name><q2:Units /><q2:DisplayBoolean>false</q2:DisplayBoolean></q2:Display></q2:SecurityOptions><q2:SecurityOptions><q2:KeyName>MACHINE\System\CurrentControlSet\Services\Tcpip\Parameters\KeepAliveTime</q2:KeyName><q2:SettingNumber>300000</q2:SettingNumber><q2:Display><q2:Name>MSS: (KeepAliveTime) How often keep-alive packets are sent in milliseconds</q2:Name><q2:Units /><q2:DisplayString>300000 or 5 minutes (recommended)</q2:DisplayString></q2:Display></q2:SecurityOptions><q2:SecurityOptions><q2:KeyName>MACHINE\System\CurrentControlSet\Services\Tcpip\Parameters\SynAttackProtect</q2:KeyName><q2:SettingNumber>0</q2:SettingNumber><q2:Display><q2:Name>MSS: (SynAttackProtect) Syn attack protection level (protects against DoS)</q2:Name><q2:Units /><q2:DisplayString>No additional protection, use default settings</q2:DisplayString></q2:Display></q2:SecurityOptions><q2:SecurityOptions><q2:KeyName>MACHINE\System\CurrentControlSet\Services\Tcpip\Parameters\TcpMaxConnectResponseRetransmissions</q2:KeyName><q2:SettingNumber>2</q2:SettingNumber><q2:Display><q2:Name>MSS: (TcpMaxConnectResponseRetransmissions) SYN-ACK retransmissions when a connection request is not acknowledged</q2:Name><q2:Units /><q2:DisplayString>3 &amp; 6 seconds, half-open connections dropped after 21 seconds</q2:DisplayString></q2:Display></q2:SecurityOptions><q2:SecurityOptions><q2:KeyName>MACHINE\System\CurrentControlSet\Services\Tcpip\Parameters\TcpMaxDataRetransmissions</q2:KeyName><q2:SettingNumber>3</q2:SettingNumber><q2:Display><q2:Name>MSS: (TcpMaxDataRetransmissions) How many times unacknowledged data is retransmitted (3 recommended, 5 is default)</q2:Name><q2:Units /><q2:DisplayNumber>3</q2:DisplayNumber></q2:Display></q2:SecurityOptions><q2:SecurityOptions><q2:SystemAccessPolicyName>LSAAnonymousNameLookup</q2:SystemAccessPolicyName><q2:SettingNumber>0</q2:SettingNumber></q2:SecurityOptions><q2:EventLog><q2:Name>MaximumLogSize</q2:Name><q2:Log>Application</q2:Log><q2:SettingNumber>32768</q2:SettingNumber></q2:EventLog><q2:EventLog><q2:Name>MaximumLogSize</q2:Name><q2:Log>System</q2:Log><q2:SettingNumber>32768</q2:SettingNumber></q2:EventLog><q2:EventLog><q2:Name>MaximumLogSize</q2:Name><q2:Log>Security</q2:Log><q2:SettingNumber>81920</q2:SettingNumber></q2:EventLog></Extension><Name>Security</Name></ExtensionData></Computer></FilterDataAvailable>
  <User>
    <VersionDirectory>28</VersionDirectory>
    <VersionSysvol>28</VersionSysvol>
    <Enabled>true</Enabled>
    <ExtensionData>
      <Extension xmlns:q3="http://www.microsoft.com/GroupPolicy/Settings/Registry" xsi:type="q3:RegistrySettings">
        <q3:Policy>
          <q3:Name>Prompt for password on resume from hibernate / suspend</q3:Name>
          <q3:State>Enabled</q3:State>
          <q3:Explain>This settings allows you to configure client computers to always lock when resuming from a hibernate or suspend.

If you enable this setting, the client computer is locked when it is resumed from a suspend or hibernate state.

If you disable or do not configure this setting, users can decide if their computer is automatically locked or not after performing a resume operation.</q3:Explain>
          <q3:Supported>At least Microsoft Windows XP Professional or Windows Server 2003 family</q3:Supported>
          <q3:Category>System/Power Management</q3:Category>
        </q3:Policy>
        <q3:Policy>
          <q3:Name>Do not preserve zone information in file attachments</q3:Name>
          <q3:State>Disabled</q3:State>
          <q3:Explain>This policy setting allows you to manage whether Windows marks file attachments with information about their zone of origin (i.e. restricted, Internet, intranet, local). This requires NTFS in order to function correctly, and will fail without notice on FAT32. By not preserving the zone information Windows cannot make proper risk assessments.

If you enable this policy setting Windows does not mark file attachments with their zone information.

If you disable this policy setting Windows marks file attachments with their zone information.

If you do not configure this policy setting Windows marks file attachments with their zone information.</q3:Explain>
          <q3:Supported>At least Microsoft Windows XP Professional with SP2</q3:Supported>
          <q3:Category>Windows Components/Attachment Manager</q3:Category>
        </q3:Policy>
      </Extension>
      <Name>Registry</Name>
    </ExtensionData>
  </User>
  <LinksTo>
    <SOMName>Personal</SOMName>
  </LinksTo>
  <LinksTo>
    <SOMName>Vista</SOMName>
  </LinksTo>
</GPO>