Windows 8
- You can adjust the maximum disk space used for system protection. As space fills up, older restore points will be deleted ...
- You can align a group of items to the left, right, top, or bottom. To align items, select the group, click the Layout menu, ...
- You can allow communication with this app from any computer, including those on the Internet or just from computers on your ...
- You can allow Hyper-V to manage the amount of memory assigned to this virtual machine dynamically within the specified range. ...
- You can also click what you see. Say the type of click you want, followed by the item you want to click. For example, you ...
- You can also configure the network connections with the preferred DNS server to be used for DNS name resolution. To do so, ...
- You can also delete specific words or passages of text. To do this, you say "Delete", followed by the word, or words that ...
- You can also select text, delete text, and navigate to different places in the document. There are four basic commands to ...
- You can also turn on Windows Defender right now to help provide antimalware protection. If you turn on Windows Defender, ...
- You can also use the Initiator and Source IP lists to restrict the tunnel mode outer address to specific initiators and source ...
- You can also use this Web site to download a certificate authority (CA) certificate, certificate chain, or certificate revocation ...
- You can arrange the order in which this computer accesses information on the network. Providers and other connections are ...
- You can automatically configure the proxy settings for Internet Explorer for each active connection on a client computer. ...
- You can browse through the columns below and select one or more containers to add to your Active Directory Administrative ...
- You can change how this virtual hard disk is attached to the virtual machine. If an operating system is installed on this ...
- You can change the location of the virtual machine and its files to a valid cluster-managed storage location, or use the ...
- You can change the name and workgroup membership of this computer. You cannot join a computer running this edition of %WINDOWS_SHORT% ...
- You can change the name of this computer. You must start the Workstation service before you can change this computer's domain ...
- You can change where files in this folder are stored to another place on this hard drive, another drive, or another computer ...
- You can change where menus and scroll bars appear without affecting your handwriting recognition. (Not all programs respond ...
- You can choose how downstream server rollup data is displayed, which items are shown in the To Do list, and how validation ...
- You can choose the lookup zone types that are appropriate to your network size. Advanced administrators can configure root ...
- You can choose the order in which your screen rotates. This sequence occurs when you use a tablet button to change your screen ...
- You can choose these servers to be managed or unmanaged by IPAM. Managed servers must be configured with access settings ...
- You can choose to apply the certificate that is currently stored on the RD Connection Broker server, or you can select a ...
- You can choose to migrate maps to AD DS and overwrite existing data or preserve that data and view migration steps in a file. ...
- You can choose to store only the latest recovery point of the primary virtual machine on the Replica server or to add additional ...
- You can choose to store only the latest recovery point of the primary virtual machine on the Replica server or to add additional ...
- You can choose whether this Windows Server Update Services server synchronizes from Microsoft Update or from an upstream ...
- You can choose whether to download update files, where to store downloaded files, and which update languages you want to ...
- You can clear all check boxes that hide pages and messages when checked. This action restores Hyper-V confirmation messages ...
- You can close one or more files or directories shared on this computer. Users connected to a shared folder or file are disconnected ...
- You can close this dialog box at any time. The search will continue (although it will take more time) and any files that ...
- You can close this window and continue working in the active Windows PowerShell session. Otherwise, if you are finished working ...
- You can close this wizard without interrupting running tasks. View task progress or open this page again by clicking Notifications ...
- You can close, maximize, restore or minimize the active window (the window that has the focus - the window that is on top ...
- You can configure a DVD drive to use a CD image (.iso) file or a physical CD/DVD drive after you attach the drive to the ...
- You can configure a hard drive to use a virtual hard disk or a physical hard disk after you attach the drive to the controller. ...
- You can configure high availability for an application controlled by a script that runs in Windows Script Host. For more ...
- You can configure high availability for some applications that were not originally designed to run on a cluster. For more ...
- You can configure high availability for some services that were not originally designed to run on a cluster. For more information, ...
- You can configure Hyper-V to allow virtual machines to span non-uniform memory architecture (NUMA) nodes. When the physical ...
- You can configure NPS to monitor IPv4 RADIUS traffic, IPv6 RADIUS traffic, or both on specific network adapters. Learn more. ...
- You can configure several of the basic Windows Server Update Services settings by running this wizard. Each of the settings ...
- You can configure the default parameters for each storage report that are appropriate for your server environment. These ...
- You can configure the virtual COM port to communicate with the physical computer through a named pipe. If the named pipe ...
- You can continue to use your drive during the scan. Windows repairs errors that can be repaired while the drive is available. ...
- You can convert the existing one-way trust into a two-way trust. Two-way trusts consist of two one-way trusts between the ...
- You can create a basic Internet connection with limited administrative control, or a more complex Internet connection with ...
- You can create a comprehensive information system that displays all the subjects that are available. Or you can customize ...
- You can create a folder or use an existing folder to store the virtual machine. If you don't select a folder, the virtual ...
- You can create a lineup of your favorite TV channels to filter the Guide listings (lineups appear under Guide Categories). ...
- You can create a LUN on a storage subsystem attached to this server if it has enough storage space available and its Virtual ...
- You can create a new Briefcase folder to sync files with another computer. The primary purpose of Briefcase is to sync files ...
- You can create a new security policy; edit or apply an existing security policy; or rollback the last applied security policy. ...
- You can create a report to identify which users have been issued a RDS Per User CAL by this license server. Information about ...
- You can create a separate virtual machine to verify that a recovery point is able to start successfully, and that the virtual ...
- You can create a superscope; however, a large range creates a large number of scopes and is extremely resource-intensive. ...
- You can create a volume for the new LUN now or you can create it later on the server that has access to the LUN by using ...
- You can create a volume on one or more disks that are available on this server if they have enough unallocated space. The ...
- You can create an invitation and send it to your helper. You can also use Easy Connect to simplify connections to your helper. ...
- You can define the range of media access control (MAC) addresses that can be assigned dynamically to virtual network adapters. ...
- You can define the range of World Wide Port Name (WWPN) addresses that can be assigned dynamically to a virtual Fibre Channel ...
- You can delegate control of any folder. It is recommended that you delegate control at the level of the domain or organizational ...
- You can deploy NPS as a Remote Authentication Dial-In User Service (RADIUS) server and proxy and as a Network Access Protection ...
- You can disconnect one or more users who are using shared folders on this computer. Users may lose data if disconnected without ...
- You can duplicate most objects as you drag them. Select the object (to select multiple objects, press the Ctrl key as you ...
- You can enable logging to create log files to record connection errors. To view or save log files as one report or send them ...
- You can enable or disable file name completion for a particular invocation of CMD.EXE with the /F:ON or /F:OFF switch. You ...
- You can enable the logging of job accounting information (for example, user, processor time, and memory usage) and set the ...
- You can ensure that a minimum version of the AD RMS client software is used to consume protected content. If the lockbox ...
- You can ensure that AD RMS clients use a minimum version of the lockbox. The lockbox provides encryption-decryption functionality ...
- You can establish NIC Teaming in the guest operating system to aggregate bandwidth and provide redundancy. This is useful ...
- You can export only the binary data for the columns displayed in the details pane. To add a column to the details pane, on ...
- You can extend built-in custom fields below by adding additional values, or create new user-defined custom fields. Custom ...