Windows 7

  1. If a clustered service or application is configured to use the current drive letter, changing the drive letter can cause ...
  2. If a domain controller that is running on a VM does not comply with the recommended best practice guidelines, the Active ...
  3. If a driver was provided, make sure it is designed to work with Windows for 32-bit systems. If you do not have an appropriate ...
  4. If a driver was provided, make sure it is designed to work with Windows for Itanium-based systems. If you do not have an ...
  5. If a driver was provided, make sure it is designed to work with Windows for x64-based systems. If you do not have an appropriate ...
  6. If a file is signed, the wizard will create a rule using the publisher's signature and attributes of the signed file. If ...
  7. If a file is signed, the wizard will create a rule using the publisher's signature and the attributes of the signed file. ...
  8. If a persistent login was set up for the target, it may not have been removed. Check the iSCSI Initiator Control Panel to ...
  9. If a pre-existing computer object is used, please ensure that the computer object is in a Disabled state and that the user ...
  10. If a program or service uses a particular volume or device, add that volume or device to the list below, or click Auto Configure ...
  11. If a Remote Desktop Session Host server cannot locate an activated license server with installed RDS CALs before the grace ...
  12. If a resource cannot be brought online or taken offline in the number of milliseconds specified by the PendingTimeout property, ...
  13. If a selection is dimmed, a Group Policy setting is currently being applied to the computer that prevents that functionality ...
  14. If a utility was provided by the application that installed the application directory partition, use that utility to remove ...
  15. If all OUs in your Active Directory domains are not protected from accidental deletion, your Active Directory environment ...
  16. If all the computers on this network are at your home, and you recognize them, this is a trusted home network. Don't choose ...
  17. If all the computers on this network are at your workplace, and you recognize them, this is a trusted work network. Don't ...
  18. If all the DCs are not SP1 or above and you enable this feature, there is a possibility that any user can view the password ...
  19. If an anti-spyware product is installed and functioning configure Security Center to stop monitoring anti-spyware status. ...
  20. If an application calls PlaySound with a SND_LOOP flag, the sound plays continuously until PlaySound is called with a NULL ...
  21. If an application calls the FindFirstFile API on a directory, and then attempts to remove that directory without first closing ...
  22. If an application passes an invalid window handle to the MessageBox API, and the lower 16 bits of that handle are NULL, Windows ...
  23. If an appropriate .adm file cannot be found, the console displays the registry key information in the report section "Extra ...
  24. If an appropriate .adm file cannot be found, the console displays the registry key information in the report section "Extra ...
  25. If an I/O error is returned which is not defined in the standard FsRtl filter, it is converted to the following error which ...
  26. If an Internet site tries to use scripting or ActiveX controls, a dialog box is displayed to notify you. You can add the ...
  27. If an Internet site tries to use scripting or ActiveX controls, a dialog box will prompt you to add the Internet site to ...
  28. If an item is \"offline\", indicates why it is offline. 0 - Unknown. Unable to determine reason. 1 - Not applicable. Item ...
  29. If an MM error is returned which is not defined in the standard FsRtl filter, it is converted to one of the following errors ...
  30. If an MM error is returned which is not defined in the standard FsRtl filter, it is converted to one of the following errors ...
  31. If an open program is associated with this process and you suspend it, you might lose any unsaved data. If you suspend a ...
  32. If an open program is associated with this process, it will close and you will lose any unsaved data. If you end a system ...
  33. If an open program is associated with this process, it will close and you will lose any unsaved data. If you end a system ...
  34. If any DC is unable to start migration then try manual polling. OR Run with option /CreateGlobalObjects. Migration can start ...
  35. If applicable, defines the COM CLSID associated with server implementation. Note: decoupled providers do not have an associated ...
  36. If AuthNoEncap is specified as a protocol for a proposal in qmsecmethods, then no other protocols are allowed in that proposal. ...
  37. If Command Extensions are enabled CALL changes as follows: CALL command now accepts labels as the target of the CALL. The ...
  38. If Command Extensions are enabled CHDIR changes as follows: The current directory string is converted to use the same case ...
  39. If Command Extensions are enabled DEL and ERASE change as follows: The display semantics of the /S switch are reversed in ...
  40. If Command Extensions are enabled ENDLOCAL changes as follows: If the corresponding SETLOCAL enable or disabled command extensions ...
  41. If Command Extensions are enabled GOTO changes as follows: GOTO command now accepts a target label of :EOF which transfers ...
  42. If Command Extensions are enabled IF changes as follows: IF /I string1 compare-op string2 command IF CMDEXTVERSION number ...
  43. If Command Extensions are enabled MKDIR changes as follows: MKDIR creates any intermediate directories in the path, if needed. ...
  44. If Command Extensions are enabled SET changes as follows: SET command invoked with just a variable name, no equal sign or ...
  45. If Command Extensions are enabled SETLOCAL changes as follows: SETLOCAL batch command now accepts optional arguments: ENABLEEXTENSIONS ...
  46. If Command Extensions are enabled the DATE command supports the /T switch which tells the command to just output the current ...
  47. If Command Extensions are enabled the POPD command will delete any temporary drive letter created by PUSHD when you POPD ...
  48. If Command Extensions are enabled the PROMPT command supports the following additional formatting characters: $+ zero or ...
  49. If Command Extensions are enabled the PUSHD command accepts network paths in addition to the normal drive letter and path. ...
  50. If Command Extensions are enabled the SHIFT command supports the /n switch which tells the command to start shifting at the ...
  51. If Command Extensions are enabled the TIME command supports the /T switch which tells the command to just output the current ...
  52. If Command Extensions are enabled, and running on the Windows platform, then the BREAK command will enter a hard coded breakpoint ...
  53. If Command Extensions are enabled, external command invocation through the command line or the START command changes as follows: ...
  54. If Command Extensions are enabled, the following additional forms of the FOR command are supported: FOR /D %variable IN (set) ...
  55. If Command Extensions are enabled, then there are several dynamic environment variables that can be expanded but which don't ...
  56. If computer autoenrollment is desired, use the Group Policy Management Console to configure computer autoenrollment policy ...
  57. If conditions and constraints of the network policy match the connection request, the policy can either grant access or deny ...
  58. If DNS servers are not configured, the computer cannot resolve names or connect to network resources. Critical operations ...
  59. If Dynamic Host Configuration Protocol (DHCP) is running on this server, check both of the following check boxes and use ...
  60. If enabled (value = 4), the ComputerSystem can be reset via hardware (e.g. the power and reset buttons). If disabled (value ...
  61. If enabled (value = 4), the unitary computer system can be reset via hardware (e.g. the power and reset buttons). If disabled ...
  62. If enabled (value = 4), the UnitaryComputerSystem can be reset via hardware (e.g. the power and reset buttons). If disabled ...
  63. If enabled then discovered targets may not be manually configured. If disabled then discovered targets may be manually configured. ...
  64. If enabled then do not allow the initiator CHAP secret to be changed. If disabled then the initiator CHAP secret may be changed. ...
  65. If enabled then do not allow the initiator iqn name to be changed. If disabled then the initiator iqn name may be changed. ...
  66. If enabled then new iSNS servers may not be added and thus new targets discovered via those iSNS servers; existing iSNS servers ...
  67. If enabled then new target portals may not be added and thus new targets discovered on those portals; existing target portals ...
  68. If enabled then new targets may not be manually configured by entering the target name and target portal; already discovered ...
  69. If enabled then only those connections that are configured for IPSec may be established. If disabled then connections that ...
  70. If enabled then only those sessions that are configured for mutual CHAP may be established. If disabled then sessions that ...
  71. If enabled then only those sessions that are configured for one-way CHAP may be established. If disabled then sessions that ...
  72. If enabled then only those sessions that are established via a persistent login will be established and no new persistent ...
  73. If enabled, all ASP scripts will access Windows Management services using the account under which IIS is run (most commonly ...
  74. If enabled, clients will be unable to query this computer's index remotely. Thus, when they are browsing network shares that ...
  75. If enabled, files on network shares made available offline are not indexed. Otherwise they are indexed. Disabled by default. ...