Позволяет использовать SSI-директиву "#exec" для выполнения shell-команд. Я юзал на NT4, более не требовалось. Права на использования (как я понял) -- как у IIS, т.к. эти команды обрабатывает спец. ISAPI-фильтр (IMO ssinc.dll)
Вот хелп с MSDN:
--- cut: quote from MSDN ---
SSIEnableCmdDirective
Registry Path: HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Services\W3SVC\Parameters
Data Type: REG_DWORD
Default Value: 0 (disabled)
Range: 0 - 1
To execute shell commands, the #exec cmd directive of server-side includes is used. Security-conscious sites may want to disable the #exec cmd directive when untrusted parties are allowed to place files on the server by setting SSIEnableCmdDirective to 0 as an added security precaution. SSIEnableCmdDirective does not exist in the registry by default; to allow the #exec cmd directive to execute shell commands, you must first create SSIEnableCmdDirective and set it to 1.
--- cut ---