Do not allow color changes

This policy setting controls the ability to change the color of window frames. If you enable this policy setting you prevent users from changing the default window frame color. If you disable or do not configure this policy setting you allow users to change the default window frame color. Note: This policy setting can be used in conjunction with the “Specify a default color for window frames” policy setting to enforce a specific color for window frames that cannot be changed by users.

Specify a default color

This policy setting controls the default color for window frames when the user does not specify a color. If you enable this policy setting and specify a default color this color is used in glass window frames if the user does not specify a color. If you disable or do not configure this policy setting the default internal color is used if the user does not specify a color. Note: This policy setting can be used in conjunction with the “Prevent color changes of window frames” setting to enforce a specific color for window frames that cannot be changed by users.

Do not allow Flip3D invocation

This policy setting allows you to configure the accessibility of the Flip 3D feature. Flip 3D allows the user to view items on the Windows desktop as they are being flipped through in three dimensions. If you enable this policy setting Flip 3D is inaccessible. If you disable or do not configure this policy setting Flip 3D is accessible if desktop composition is turned on. When Windows Flip 3D is activated with the Windows+Tab keys a visual version of the desktop is presented and items can be flipped through to select. Changing this policy setting requires a logoff for it to be applied.

Do not allow window animations

This policy setting controls the appearance of window animations such as those found when restoring minimizing and maximizing windows. If you enable this policy setting window animations are turned off. If you disable or do not configure this policy setting window animations are turned on. Changing this policy setting requires a logoff for it to be applied.

Do not allow Digital Locker to run

Specifies whether Digital Locker can run. Digital Locker is a dedicated download manager associated with Windows Marketplace and a feature of Windows that can be used to manage and download products acquired and stored in the user’s Windows Marketplace Digital Locker. If you enable this setting Digital Locker will not run. If you disable or do not configure this setting Digital Locker can be run.

Turn off Windows Update device driver search prompt

Specifies whether the administrator will be prompted about going to Windows Update to search for device drivers using the Internet. Note: This setting only has effect if “Turn off Windows Update device driver searching” in “Administrative Templates/System/Internet Communication Management/Internet Communication settings” is disabled or not configured. If you enable this setting administrators will not be prompted to search Windows Update. If you disable or do not configure this setting and “Turn off Windows Update device driver searching” is disabled or not configured the administrator will be prompted for consent before going to Windows Update to search for device drivers.

Configure driver search locations

This setting configures the location that Windows searches for drivers when a new piece of hardware is found. By default Windows searches the following places for drivers: local installation floppy drives CD-ROM drives Windows Update. Using this setting you may remove the floppy and CD-ROM drives from the search algorithm. If you enable this setting you can remove the locations by selecting the associated check box beside the location name. If you disable or do not configure this setting Windows searches the installation location floppy drives and CD-ROM drives. Note: To prevent searching Windows Update for drivers also see “Turn off Windows Update device driver searching” in Administrative Templates/System/Internet Communication Management/Internet Communication settings.

Code signing for device drivers

Determines how the system responds when a user tries to install device driver files that are not digitally signed. This setting establishes the least secure response permitted on the systems of users in the group. Users can use System in Control Panel to select a more secure setting but when this setting is enabled the system does not implement any setting less secure than the one the setting established. When you enable this setting use the drop-down box to specify the desired response. — “Ignore” directs the system to proceed with the installation even if it includes unsigned files. — “Warn” notifies the user that files are not digitally signed and lets the user decide whether to stop or to proceed with the installation and whether to permit unsigned files to be installed. “Warn” is the default. — “Block” directs the system to refuse to install unsigned files. As a result the installation stops and none of the files in the driver package are installed. To change driver file security without specifying a setting use System in Control Panel. Right-click My Computer click Properties click the Hardware tab and then click the Driver Signing button.