Windows 7
- If a clustered service or application is configured to use the current drive letter, changing the drive letter can cause ...
- If a domain controller that is running on a VM does not comply with the recommended best practice guidelines, the Active ...
- If a driver was provided, make sure it is designed to work with Windows for 32-bit systems. If you do not have an appropriate ...
- If a driver was provided, make sure it is designed to work with Windows for Itanium-based systems. If you do not have an ...
- If a driver was provided, make sure it is designed to work with Windows for x64-based systems. If you do not have an appropriate ...
- If a file is signed, the wizard will create a rule using the publisher's signature and attributes of the signed file. If ...
- If a file is signed, the wizard will create a rule using the publisher's signature and the attributes of the signed file. ...
- If a persistent login was set up for the target, it may not have been removed. Check the iSCSI Initiator Control Panel to ...
- If a pre-existing computer object is used, please ensure that the computer object is in a Disabled state and that the user ...
- If a program or service uses a particular volume or device, add that volume or device to the list below, or click Auto Configure ...
- If a Remote Desktop Session Host server cannot locate an activated license server with installed RDS CALs before the grace ...
- If a resource cannot be brought online or taken offline in the number of milliseconds specified by the PendingTimeout property, ...
- If a selection is dimmed, a Group Policy setting is currently being applied to the computer that prevents that functionality ...
- If a utility was provided by the application that installed the application directory partition, use that utility to remove ...
- If all OUs in your Active Directory domains are not protected from accidental deletion, your Active Directory environment ...
- If all the computers on this network are at your home, and you recognize them, this is a trusted home network. Don't choose ...
- If all the computers on this network are at your workplace, and you recognize them, this is a trusted work network. Don't ...
- If all the DCs are not SP1 or above and you enable this feature, there is a possibility that any user can view the password ...
- If an anti-spyware product is installed and functioning configure Security Center to stop monitoring anti-spyware status. ...
- If an application calls PlaySound with a SND_LOOP flag, the sound plays continuously until PlaySound is called with a NULL ...
- If an application calls the FindFirstFile API on a directory, and then attempts to remove that directory without first closing ...
- If an application passes an invalid window handle to the MessageBox API, and the lower 16 bits of that handle are NULL, Windows ...
- If an appropriate .adm file cannot be found, the console displays the registry key information in the report section "Extra ...
- If an appropriate .adm file cannot be found, the console displays the registry key information in the report section "Extra ...
- If an I/O error is returned which is not defined in the standard FsRtl filter, it is converted to the following error which ...
- If an Internet site tries to use scripting or ActiveX controls, a dialog box is displayed to notify you. You can add the ...
- If an Internet site tries to use scripting or ActiveX controls, a dialog box will prompt you to add the Internet site to ...
- If an item is \"offline\", indicates why it is offline. 0 - Unknown. Unable to determine reason. 1 - Not applicable. Item ...
- If an MM error is returned which is not defined in the standard FsRtl filter, it is converted to one of the following errors ...
- If an MM error is returned which is not defined in the standard FsRtl filter, it is converted to one of the following errors ...
- If an open program is associated with this process and you suspend it, you might lose any unsaved data. If you suspend a ...
- If an open program is associated with this process, it will close and you will lose any unsaved data. If you end a system ...
- If an open program is associated with this process, it will close and you will lose any unsaved data. If you end a system ...
- If any DC is unable to start migration then try manual polling. OR Run with option /CreateGlobalObjects. Migration can start ...
- If applicable, defines the COM CLSID associated with server implementation. Note: decoupled providers do not have an associated ...
- If AuthNoEncap is specified as a protocol for a proposal in qmsecmethods, then no other protocols are allowed in that proposal. ...
- If Command Extensions are enabled CALL changes as follows: CALL command now accepts labels as the target of the CALL. The ...
- If Command Extensions are enabled CHDIR changes as follows: The current directory string is converted to use the same case ...
- If Command Extensions are enabled DEL and ERASE change as follows: The display semantics of the /S switch are reversed in ...
- If Command Extensions are enabled ENDLOCAL changes as follows: If the corresponding SETLOCAL enable or disabled command extensions ...
- If Command Extensions are enabled GOTO changes as follows: GOTO command now accepts a target label of :EOF which transfers ...
- If Command Extensions are enabled IF changes as follows: IF /I string1 compare-op string2 command IF CMDEXTVERSION number ...
- If Command Extensions are enabled MKDIR changes as follows: MKDIR creates any intermediate directories in the path, if needed. ...
- If Command Extensions are enabled SET changes as follows: SET command invoked with just a variable name, no equal sign or ...
- If Command Extensions are enabled SETLOCAL changes as follows: SETLOCAL batch command now accepts optional arguments: ENABLEEXTENSIONS ...
- If Command Extensions are enabled the DATE command supports the /T switch which tells the command to just output the current ...
- If Command Extensions are enabled the POPD command will delete any temporary drive letter created by PUSHD when you POPD ...
- If Command Extensions are enabled the PROMPT command supports the following additional formatting characters: $+ zero or ...
- If Command Extensions are enabled the PUSHD command accepts network paths in addition to the normal drive letter and path. ...
- If Command Extensions are enabled the SHIFT command supports the /n switch which tells the command to start shifting at the ...
- If Command Extensions are enabled the TIME command supports the /T switch which tells the command to just output the current ...
- If Command Extensions are enabled, and running on the Windows platform, then the BREAK command will enter a hard coded breakpoint ...
- If Command Extensions are enabled, external command invocation through the command line or the START command changes as follows: ...
- If Command Extensions are enabled, the following additional forms of the FOR command are supported: FOR /D %variable IN (set) ...
- If Command Extensions are enabled, then there are several dynamic environment variables that can be expanded but which don't ...
- If computer autoenrollment is desired, use the Group Policy Management Console to configure computer autoenrollment policy ...
- If conditions and constraints of the network policy match the connection request, the policy can either grant access or deny ...
- If DNS servers are not configured, the computer cannot resolve names or connect to network resources. Critical operations ...
- If Dynamic Host Configuration Protocol (DHCP) is running on this server, check both of the following check boxes and use ...
- If enabled (value = 4), the ComputerSystem can be reset via hardware (e.g. the power and reset buttons). If disabled (value ...
- If enabled (value = 4), the unitary computer system can be reset via hardware (e.g. the power and reset buttons). If disabled ...
- If enabled (value = 4), the UnitaryComputerSystem can be reset via hardware (e.g. the power and reset buttons). If disabled ...
- If enabled then discovered targets may not be manually configured. If disabled then discovered targets may be manually configured. ...
- If enabled then do not allow the initiator CHAP secret to be changed. If disabled then the initiator CHAP secret may be changed. ...
- If enabled then do not allow the initiator iqn name to be changed. If disabled then the initiator iqn name may be changed. ...
- If enabled then new iSNS servers may not be added and thus new targets discovered via those iSNS servers; existing iSNS servers ...
- If enabled then new target portals may not be added and thus new targets discovered on those portals; existing target portals ...
- If enabled then new targets may not be manually configured by entering the target name and target portal; already discovered ...
- If enabled then only those connections that are configured for IPSec may be established. If disabled then connections that ...
- If enabled then only those sessions that are configured for mutual CHAP may be established. If disabled then sessions that ...
- If enabled then only those sessions that are configured for one-way CHAP may be established. If disabled then sessions that ...
- If enabled then only those sessions that are established via a persistent login will be established and no new persistent ...
- If enabled, all ASP scripts will access Windows Management services using the account under which IIS is run (most commonly ...
- If enabled, clients will be unable to query this computer's index remotely. Thus, when they are browsing network shares that ...
- If enabled, files on network shares made available offline are not indexed. Otherwise they are indexed. Disabled by default. ...