diff --git a/SafeExamBrowser.Lockdown/FeatureConfigurations/RegistryConfigurations/MachineHive/EaseOfAccessConfiguration.cs b/SafeExamBrowser.Lockdown/FeatureConfigurations/RegistryConfigurations/MachineHive/EaseOfAccessConfiguration.cs
index 7401e111..f386acd8 100644
--- a/SafeExamBrowser.Lockdown/FeatureConfigurations/RegistryConfigurations/MachineHive/EaseOfAccessConfiguration.cs
+++ b/SafeExamBrowser.Lockdown/FeatureConfigurations/RegistryConfigurations/MachineHive/EaseOfAccessConfiguration.cs
@@ -12,11 +12,16 @@ using SafeExamBrowser.Logging.Contracts;
namespace SafeExamBrowser.Lockdown.FeatureConfigurations.RegistryConfigurations.MachineHive
{
+ ///
+ /// Controls whether the ease of access option is available on the Security / Login Screen of the operating system. See also
+ /// https://learn.microsoft.com/en-us/windows-hardware/customize/desktop/unattend/microsoft-windows-embedded-embeddedlogon-brandingneutral.
+ ///
[Serializable]
internal class EaseOfAccessConfiguration : MachineHiveConfiguration
{
- protected override IEnumerable Items => new []
+ protected override IEnumerable Items => new[]
{
+ new RegistryConfigurationItem(@"HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows Embedded\EmbeddedLogon", "BrandingNeutral", 8, 0),
new RegistryConfigurationItem(@"HKEY_LOCAL_MACHINE\Software\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\Utilman.exe", "Debugger", "SebDummy.exe", "")
};
diff --git a/SafeExamBrowser.Lockdown/FeatureConfigurations/RegistryConfigurations/MachineHive/RemoteConnectionConfiguration.cs b/SafeExamBrowser.Lockdown/FeatureConfigurations/RegistryConfigurations/MachineHive/RemoteConnectionConfiguration.cs
index 08deb342..183977f7 100644
--- a/SafeExamBrowser.Lockdown/FeatureConfigurations/RegistryConfigurations/MachineHive/RemoteConnectionConfiguration.cs
+++ b/SafeExamBrowser.Lockdown/FeatureConfigurations/RegistryConfigurations/MachineHive/RemoteConnectionConfiguration.cs
@@ -16,13 +16,13 @@ namespace SafeExamBrowser.Lockdown.FeatureConfigurations.RegistryConfigurations.
/// Specifies whether Remote Desktop connections are enabled.
///
/// See https://docs.microsoft.com/en-us/windows-hardware/customize/desktop/unattend/microsoft-windows-terminalservices-localsessionmanager-fdenytsconnections:
- /// • 0 = Specifies that remote desktop connections are enabled.
- /// • 1 = Specifies that remote desktop connections are denied. This is the default value.
+ /// 0 = Specifies that remote desktop connections are enabled.
+ /// 1 = Specifies that remote desktop connections are denied. This is the default value.
///
[Serializable]
internal class RemoteConnectionConfiguration : MachineHiveConfiguration
{
- protected override IEnumerable Items => new []
+ protected override IEnumerable Items => new[]
{
new RegistryConfigurationItem(@"HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Control\Terminal Server", "fDenyTSConnections", 1, 0)
};