Windows 8

  1. You can adjust the maximum disk space used for system protection. As space fills up, older restore points will be deleted ...
  2. You can align a group of items to the left, right, top, or bottom. To align items, select the group, click the Layout menu, ...
  3. You can allow communication with this app from any computer, including those on the Internet or just from computers on your ...
  4. You can allow Hyper-V to manage the amount of memory assigned to this virtual machine dynamically within the specified range. ...
  5. You can also click what you see. Say the type of click you want, followed by the item you want to click. For example, you ...
  6. You can also configure the network connections with the preferred DNS server to be used for DNS name resolution. To do so, ...
  7. You can also delete specific words or passages of text. To do this, you say "Delete", followed by the word, or words that ...
  8. You can also select text, delete text, and navigate to different places in the document. There are four basic commands to ...
  9. You can also turn on Windows Defender right now to help provide antimalware protection. If you turn on Windows Defender, ...
  10. You can also use the Initiator and Source IP lists to restrict the tunnel mode outer address to specific initiators and source ...
  11. You can also use this Web site to download a certificate authority (CA) certificate, certificate chain, or certificate revocation ...
  12. You can arrange the order in which this computer accesses information on the network. Providers and other connections are ...
  13. You can automatically configure the proxy settings for Internet Explorer for each active connection on a client computer. ...
  14. You can browse through the columns below and select one or more containers to add to your Active Directory Administrative ...
  15. You can change how this virtual hard disk is attached to the virtual machine. If an operating system is installed on this ...
  16. You can change the location of the virtual machine and its files to a valid cluster-managed storage location, or use the ...
  17. You can change the name and workgroup membership of this computer. You cannot join a computer running this edition of %WINDOWS_SHORT% ...
  18. You can change the name of this computer. You must start the Workstation service before you can change this computer's domain ...
  19. You can change where files in this folder are stored to another place on this hard drive, another drive, or another computer ...
  20. You can change where menus and scroll bars appear without affecting your handwriting recognition. (Not all programs respond ...
  21. You can choose how downstream server rollup data is displayed, which items are shown in the To Do list, and how validation ...
  22. You can choose the lookup zone types that are appropriate to your network size. Advanced administrators can configure root ...
  23. You can choose the order in which your screen rotates. This sequence occurs when you use a tablet button to change your screen ...
  24. You can choose these servers to be managed or unmanaged by IPAM. Managed servers must be configured with access settings ...
  25. You can choose to apply the certificate that is currently stored on the RD Connection Broker server, or you can select a ...
  26. You can choose to migrate maps to AD DS and overwrite existing data or preserve that data and view migration steps in a file. ...
  27. You can choose to store only the latest recovery point of the primary virtual machine on the Replica server or to add additional ...
  28. You can choose to store only the latest recovery point of the primary virtual machine on the Replica server or to add additional ...
  29. You can choose whether this Windows Server Update Services server synchronizes from Microsoft Update or from an upstream ...
  30. You can choose whether to download update files, where to store downloaded files, and which update languages you want to ...
  31. You can clear all check boxes that hide pages and messages when checked. This action restores Hyper-V confirmation messages ...
  32. You can close one or more files or directories shared on this computer. Users connected to a shared folder or file are disconnected ...
  33. You can close this dialog box at any time. The search will continue (although it will take more time) and any files that ...
  34. You can close this window and continue working in the active Windows PowerShell session. Otherwise, if you are finished working ...
  35. You can close this wizard without interrupting running tasks. View task progress or open this page again by clicking Notifications ...
  36. You can close, maximize, restore or minimize the active window (the window that has the focus - the window that is on top ...
  37. You can configure a DVD drive to use a CD image (.iso) file or a physical CD/DVD drive after you attach the drive to the ...
  38. You can configure a hard drive to use a virtual hard disk or a physical hard disk after you attach the drive to the controller. ...
  39. You can configure high availability for an application controlled by a script that runs in Windows Script Host. For more ...
  40. You can configure high availability for some applications that were not originally designed to run on a cluster. For more ...
  41. You can configure high availability for some services that were not originally designed to run on a cluster. For more information, ...
  42. You can configure Hyper-V to allow virtual machines to span non-uniform memory architecture (NUMA) nodes. When the physical ...
  43. You can configure NPS to monitor IPv4 RADIUS traffic, IPv6 RADIUS traffic, or both on specific network adapters. Learn more. ...
  44. You can configure several of the basic Windows Server Update Services settings by running this wizard. Each of the settings ...
  45. You can configure the default parameters for each storage report that are appropriate for your server environment. These ...
  46. You can configure the virtual COM port to communicate with the physical computer through a named pipe. If the named pipe ...
  47. You can continue to use your drive during the scan. Windows repairs errors that can be repaired while the drive is available. ...
  48. You can convert the existing one-way trust into a two-way trust. Two-way trusts consist of two one-way trusts between the ...
  49. You can create a basic Internet connection with limited administrative control, or a more complex Internet connection with ...
  50. You can create a comprehensive information system that displays all the subjects that are available. Or you can customize ...
  51. You can create a folder or use an existing folder to store the virtual machine. If you don't select a folder, the virtual ...
  52. You can create a lineup of your favorite TV channels to filter the Guide listings (lineups appear under Guide Categories). ...
  53. You can create a LUN on a storage subsystem attached to this server if it has enough storage space available and its Virtual ...
  54. You can create a new Briefcase folder to sync files with another computer. The primary purpose of Briefcase is to sync files ...
  55. You can create a new security policy; edit or apply an existing security policy; or rollback the last applied security policy. ...
  56. You can create a report to identify which users have been issued a RDS Per User CAL by this license server. Information about ...
  57. You can create a separate virtual machine to verify that a recovery point is able to start successfully, and that the virtual ...
  58. You can create a superscope; however, a large range creates a large number of scopes and is extremely resource-intensive. ...
  59. You can create a volume for the new LUN now or you can create it later on the server that has access to the LUN by using ...
  60. You can create a volume on one or more disks that are available on this server if they have enough unallocated space. The ...
  61. You can create an invitation and send it to your helper. You can also use Easy Connect to simplify connections to your helper. ...
  62. You can define the range of media access control (MAC) addresses that can be assigned dynamically to virtual network adapters. ...
  63. You can define the range of World Wide Port Name (WWPN) addresses that can be assigned dynamically to a virtual Fibre Channel ...
  64. You can delegate control of any folder. It is recommended that you delegate control at the level of the domain or organizational ...
  65. You can deploy NPS as a Remote Authentication Dial-In User Service (RADIUS) server and proxy and as a Network Access Protection ...
  66. You can disconnect one or more users who are using shared folders on this computer. Users may lose data if disconnected without ...
  67. You can duplicate most objects as you drag them. Select the object (to select multiple objects, press the Ctrl key as you ...
  68. You can enable logging to create log files to record connection errors. To view or save log files as one report or send them ...
  69. You can enable or disable file name completion for a particular invocation of CMD.EXE with the /F:ON or /F:OFF switch. You ...
  70. You can enable the logging of job accounting information (for example, user, processor time, and memory usage) and set the ...
  71. You can ensure that a minimum version of the AD RMS client software is used to consume protected content. If the lockbox ...
  72. You can ensure that AD RMS clients use a minimum version of the lockbox. The lockbox provides encryption-decryption functionality ...
  73. You can establish NIC Teaming in the guest operating system to aggregate bandwidth and provide redundancy. This is useful ...
  74. You can export only the binary data for the columns displayed in the details pane. To add a column to the details pane, on ...
  75. You can extend built-in custom fields below by adding additional values, or create new user-defined custom fields. Custom ...