Windows 8.1
- If a namespace server or folder target becomes unavailable, client computers might fail over to a distant namespace server ...
- If a network interface is in an unreachable state, then clients cannot communicate with the RRAS server by using that interface. ...
- If a persistent login was set up for the target, it may not have been removed. Check the iSCSI Initiator Control Panel to ...
- If a pre-existing computer object is used, please ensure that the computer object is in a Disabled state and that the user ...
- If a program or service uses a particular volume or device, add that volume or device to the list below, or click Auto Configure ...
- If a RD Session Host or RD Virtualization Host server (if applicable) cannot locate an activated license server with appropriate ...
- If a resource cannot be brought online or taken offline in the number of milliseconds specified by the PendingTimeout property, ...
- If a restart is required, this server restarts automatically, without additional notifications. Do you want to allow automatic ...
- If a USB device is not working after the computer wakes, Windows can reset the device each time the computer wakes from sleep. ...
- If a utility was provided by the application that installed the application directory partition, use that utility to remove ...
- If all or multiple languages are selected, a large portion of disk space will be used. This option could easily fill the ...
- If all OUs in your Active Directory domains are not protected from accidental deletion, your Active Directory environment ...
- If all the DCs are not SP1 or above and you enable this feature, there is a possibility that any user can view the password ...
- If an anti-spyware product is installed and functioning configure Security Center to stop monitoring anti-spyware status. ...
- If an app doesn't shut down gracefully, customers can lose data when the OS forces the shutdown. Not responding to system ...
- If an application calls PlaySound with a SND_LOOP flag, the sound plays continuously until PlaySound is called with a NULL ...
- If an application calls the FindFirstFile API on a directory, and then attempts to remove that directory without first closing ...
- If an application is using a certificate that has an invalid key usage, users will not be able to secure their access to ...
- If an application is using a certificate that has expired, users will not be able to secure their access to the application ...
- If an application is using a certificate that has no private key, users will not be able to secure their access to the application ...
- If an application is using a certificate that is not yet valid, users will not be able to secure their access to the application ...
- If an application passes an invalid window handle to the MessageBox API, and the lower 16 bits of that handle are NULL, Windows ...
- If an application uses a certificate that is not present on this server, Web Application Proxy will not publish the application ...
- If an appropriate .adm file cannot be found, the console displays the registry key information in the report section "Extra ...
- If an appropriate .adm file cannot be found, the console displays the registry key information in the report section "Extra ...
- If an I/O error is returned which is not defined in the standard FsRtl filter, it is converted to the following error which ...
- If an IP address range is not configured for the policy, policy clients will be issued an IP address from the scope range. ...
- If an item is \"offline\", indicates why it is offline. 0 - Unknown. Unable to determine reason. 1 - Not applicable. Item ...
- If an MM error is returned which is not defined in the standard FsRtl filter, it is converted to one of the following errors ...
- If an MM error is returned which is not defined in the standard FsRtl filter, it is converted to one of the following errors ...
- If an open program is associated with this process and you suspend it, you might lose any unsaved data. If you suspend a ...
- If an open program is associated with this process, it will close and you will lose any unsaved data. If you end a system ...
- If another method is being used to perform encryption, you can ignore this. Otherwise, modify the virtual machine settings ...
- If any domain controller is unable to start migration, try manual polling. Or run with option /CreateGlobalObjects. Migration ...
- If any of the above files are DLLs, OCX, SCR, CPL or EXEs that are not one of the application's main executables (has a shortcut ...
- If any read-only domain controller is stuck in the 'Eliminating' state for too long run with option /DeleteRoNtfrsMember. ...
- If applicable, defines the COM CLSID associated with server implementation. Note: decoupled providers do not have an associated ...
- If authentication occurs across an external trust boundary (where the user and the computer hosting the resource are in different ...
- If AuthNoEncap is specified as a protocol for a proposal in qmsecmethods, then no other protocols are allowed in that proposal. ...
- If Automatic Updates is enabled on any node in the cluster, ensure that it is not configured to automatically install updates. ...
- If Block Level Backup Engine Service is not set to use the local System account as the default logon account, you may encounter ...
- If Command Extensions are enabled CALL changes as follows: CALL command now accepts labels as the target of the CALL. The ...
- If Command Extensions are enabled CHDIR changes as follows: The current directory string is converted to use the same case ...
- If Command Extensions are enabled DEL and ERASE change as follows: The display semantics of the /S switch are reversed in ...
- If Command Extensions are enabled ENDLOCAL changes as follows: If the corresponding SETLOCAL enable or disabled command extensions ...
- If Command Extensions are enabled GOTO changes as follows: GOTO command now accepts a target label of :EOF which transfers ...
- If Command Extensions are enabled IF changes as follows: IF /I string1 compare-op string2 command IF CMDEXTVERSION number ...
- If Command Extensions are enabled MKDIR changes as follows: MKDIR creates any intermediate directories in the path, if needed. ...
- If Command Extensions are enabled SET changes as follows: SET command invoked with just a variable name, no equal sign or ...
- If Command Extensions are enabled SETLOCAL changes as follows: SETLOCAL batch command now accepts optional arguments: ENABLEEXTENSIONS ...
- If Command Extensions are enabled the DATE command supports the /T switch which tells the command to just output the current ...
- If Command Extensions are enabled the POPD command will delete any temporary drive letter created by PUSHD when you POPD ...
- If Command Extensions are enabled the PROMPT command supports the following additional formatting characters: $+ zero or ...
- If Command Extensions are enabled the PUSHD command accepts network paths in addition to the normal drive letter and path. ...
- If Command Extensions are enabled the SHIFT command supports the /n switch which tells the command to start shifting at the ...
- If Command Extensions are enabled the TIME command supports the /T switch which tells the command to just output the current ...
- If Command Extensions are enabled, and running on the Windows platform, then the BREAK command will enter a hard coded breakpoint ...
- If Command Extensions are enabled, external command invocation through the command line or the START command changes as follows: ...
- If Command Extensions are enabled, the following additional forms of the FOR command are supported: FOR /D %variable IN (set) ...
- If Command Extensions are enabled, then there are several dynamic environment variables that can be expanded but which don't ...
- If computer autoenrollment is desired, use the Group Policy Management Console to configure computer autoenrollment policy ...
- If conditions and constraints of the network policy match the connection request, the policy can either grant access or deny ...
- If Data Deduplication is used for the first time and initial optimization is still ongoing, no action is required. Otherwise, ...
- If desktop computers do not require remote connectivity to the internal network using DirectAccess, they do not need to be ...
- If DirectAccess and VPN are removed from Remote Access servers, remote client computers cannot connect to the corporate network ...
- If DirectAccess and VPN are removed from Remote Access servers, remote client computers cannot connect to the corporate network ...
- If DNS servers are not configured, the computer cannot resolve names or connect to network resources. Critical operations ...
- If Dynamic Host Configuration Protocol (DHCP) is running on this server, check both of the following check boxes and use ...
- If enabled (value = 4), the ComputerSystem can be reset via hardware (e.g. the power and reset buttons). If disabled (value ...
- If enabled (value = 4), the unitary computer system can be reset via hardware (e.g. the power and reset buttons). If disabled ...
- If enabled (value = 4), the UnitaryComputerSystem can be reset via hardware (e.g. the power and reset buttons). If disabled ...
- If enabled, all ASP scripts will access Windows Management services using the account under which IIS is run (most commonly ...
- If enabled, NPS evaluates this policy while processing connection requests. If disabled, NPS does not evalue this policy. ...
- If file locations are corrected during install, the uninstall program should attempt to find the file in its new location ...
- If Group Policy settings that are defined in the Default Domain Controllers Policy are not applied to domain controllers, ...