Windows 7

  1. If enabled, NPS evaluates this policy while processing connection requests. If disabled, NPS does not evalue this policy. ...
  2. If enabled, Search and Indexing Options in Control Panel does not allow opening the Advanced Options dialog. Otherwise it ...
  3. If enabled, Search and Indexing Options in Control Panel does not allow opening the Modify Locations dialog. Otherwise it ...
  4. If enabled, the indexer pauses whenever the computer is running on battery. If disabled, the indexing follows the default ...
  5. If enabled, the search indexer backoff feature will be disabled. Indexing will continue at full speed even when system activity ...
  6. If file locations are corrected during install, the uninstall program should attempt to find the file in its new location ...
  7. If IP address redirection is disabled, only one IP address can be selected for reconnection. To replace the current IP address, ...
  8. If logging fails due to network or other problems, NPS can continue to process connection requests or it can discard them ...
  9. If logging fails due to network or other problems, NPS can continue to process connection requests or it can discard them ...
  10. If necessary, move the position of the on-screen display menu by using the monitor buttons, so the menu doesn't cover the ...
  11. If necessary, the wizard will create a shared folder on the namespace server. To modify the settings of the shared folder, ...
  12. If new child domains were recently added to the specified forest, this forest might not have detected them yet. To ensure ...
  13. If no filter action in the following list matches your needs, click Add to create a new one. Select Use Add Wizard to create ...
  14. If only a single line connected, the server might not be configured to accept multi-link calls. to avoid unnecessary connection ...
  15. If open programs are associated with the selected processes and you suspend them, you might lose any unsaved data. If you ...
  16. If open programs are associated with the selected processes, they will close and you will lose any unsaved data. If you end ...
  17. If open programs or processes are associated with the selected process trees, they will close and you will lose any unsaved ...
  18. If open programs or processes are associated with this process tree, they will close and you will lose any unsaved data. ...
  19. If open programs or processes are associated with this process tree, they will close and you will lose any unsaved data. ...
  20. If power was interrupted try again using the same restore point. If a system error or reset occurred, try choosing a different ...
  21. If problems are found, Startup Repair will fix them automatically. Your computer might restart several times during this ...
  22. If provided, TemplateGoalSettings are elements of class CIM_SettingData, or a derived class, that is used as the template ...
  23. If provided, the optional information entered on this page will only be used by Microsoft support professionals to help you ...
  24. If provider is configured for Per Local Initialization, then the Locale property refers to Locale's particular instantiation ...
  25. If provider is configured for Per User Initialization, then the User property refers to User's particular instantiation of ...
  26. If RD Gateway is running only on the local computer, click Next. If RD Gateway is running on one or more remote computers, ...
  27. If remote media connection is turned on, users with the following identities will be able to access your shared music, pictures ...
  28. If routing is enabled for a particular name suffix, all authentication requests in the local forest that use that suffix ...
  29. If routing is enabled for a particular name suffix, all authentication requests in the specified forest that use that suffix ...
  30. If routing is enabled for a particular name suffix, all authentication requests using that suffix are routed to the specified ...
  31. If selected, NAP-capable client computers that are denied full access to the network because they are not compliant with ...
  32. If session limit is reached or connection is broken, one of the following actions is taken: Disconnect - User is disconnected ...
  33. If set to TRUE, all ICMP traffic will be filtered by the cluster and accepted by only a single host. If FALSE, all hosts ...
  34. If set to true, connections will be allowed only to SDR TS servers. If set to false, connections will be allowed to older ...
  35. If set to TRUE, do NOT join cluster and suspend all ways to control the operation of the cluster until a \"resume\" operation ...
  36. If set to TRUE, do NOT join cluster and suspend all ways to control the operation of the cluster until a \"resume\" operation ...
  37. If set to TRUE, if all ways to control the operation of the cluster are suspended, then, upon a reboot of the system, the ...
  38. If set to true, only consent message capable clients can connect to the TSG. If set to false, older clients can also connect ...
  39. If set to true: once the file system is mounted, NFS requests are retried until the hosting system responds. If set to false: ...
  40. If set to true: retries are performed in the foreground. If set to false: if the first mount attempt fails, retries are performed ...
  41. If set, APIs that open OLE Structured Storage docfiles for writing (StgOpenStorageEx, etc.) will revert to passing FILE_SHARE_WRITE ...
  42. If set, NDR will not check that an Interface Pointer returned in a call has the same IID as was requested by iid_is]. NB: ...
  43. If some of the information blocks are obscured, hover over the information blocks and a tooltip will show the hidden information. ...
  44. If some of the members of an RD Gateway server farm are not available on the network or are not running the same version ...
  45. If specified, will cause the root application containing a root virtual directory pointing to the specified path to be created ...
  46. If specified, will cause the root virtual directory to be created for this application. If omitted, the application will ...
  47. If strict replication consistency on the domain controller {0} is not enabled, lingering objects can be replicated to the ...
  48. If the AD RMS cluster has been configured for SSL, you must import and configure the cluster's SSL certificate on this server. ...
  49. If the appearance of text on your preferred display is not satisfactory, you can select a different resolution. This may ...
  50. If the application was installed via on-demand installation by a file extension, this is the file extension that caused that ...
  51. If the application was installed via on-demand installation through a COM activation, this is the CLSID that caused the installation ...
  52. If the application was installed via on-demand installation through a COM activation, this is the ProgId that caused the ...
  53. If the backup location you want is not listed below, connect the drive with the backup to this computer, and then click Refresh. ...
  54. If the Certificate Enrollment Web Service is installed on a computer other than the CA, you must enable delegation for the ...
  55. If the changes are trusted then suspend and resume BitLocker. This will reset BitLocker to use the new boot application information. ...
  56. If the changes to the system boot information are trusted, then suspend and resume BitLocker. This will reset BitLocker to ...
  57. If the channel didn't change correctly, ensure your IR emitter is positioned correctly. Next try specifying a different channel ...
  58. If the channel didn't change correctly, the control codes may not be correctly identified. Try learning your set-top box ...
  59. If the channel didn't change correctly, the control codes may not be correctly identified. Try relearning your set-top box ...
  60. If the component was imported, no interface information is available. If the component was installed, the interface information ...
  61. If the conflict is a folder, then this attribute gives the total number of files and folders under the conflicted parent ...
  62. If the connection request matches the conditions and constraints of this network policy and the policy grants access, perform ...
  63. If the Create method fails to start, the ErrorControl parameter passes the severity of the error. The value indicates the ...
  64. If the default site in Internet Information Services (IIS) is not already enabled for Secure Sockets Layer (SSL), a self-signed ...
  65. If the DefaultSeparateVDM switch in the Windows section of WIN.INI is TRUE, this flag causes the CreateProcess function to ...
  66. If the DNS resolver is configured with its own IP address and the DNS server is not running locally, the Active Directory ...
  67. If the DNS server cannot be configured to allow underscore characters in the host names, then the computer name must be modified. ...
  68. If the domain exists but is unavailable, try again when it is available. If it no longer exists as a Windows domain, then ...
  69. If the domain no longer exists or is a non-Windows Kerberos Realm, you can use the /FORCE flag to remove the trust objects. ...
  70. If the driver is not compatible, your hardware will not work correctly and your computer might become unstable or stop working ...
  71. If the first protocol specified for a proposal in qmsecmethods is ESP, then no other protocols are allowed in that proposal. ...
  72. If the folders to be replicated already exist on multiple servers, the folders and files on the primary member will be authoritative ...
  73. If the Internet Explorer Information bar does not appear, you can enable the ActiveX control by using the Manage Add-ons ...
  74. If the IP settings are assigned to your computer automatically by using DHCP, contact your network/DNS administrator. The ...
  75. If the KCC in the site {1} is disabled, you must create replication connections manually to tailor the replication topology. ...