Windows 8.1

  1. If a namespace server or folder target becomes unavailable, client computers might fail over to a distant namespace server ...
  2. If a network interface is in an unreachable state, then clients cannot communicate with the RRAS server by using that interface. ...
  3. If a persistent login was set up for the target, it may not have been removed. Check the iSCSI Initiator Control Panel to ...
  4. If a pre-existing computer object is used, please ensure that the computer object is in a Disabled state and that the user ...
  5. If a program or service uses a particular volume or device, add that volume or device to the list below, or click Auto Configure ...
  6. If a RD Session Host or RD Virtualization Host server (if applicable) cannot locate an activated license server with appropriate ...
  7. If a resource cannot be brought online or taken offline in the number of milliseconds specified by the PendingTimeout property, ...
  8. If a restart is required, this server restarts automatically, without additional notifications. Do you want to allow automatic ...
  9. If a USB device is not working after the computer wakes, Windows can reset the device each time the computer wakes from sleep. ...
  10. If a utility was provided by the application that installed the application directory partition, use that utility to remove ...
  11. If all or multiple languages are selected, a large portion of disk space will be used. This option could easily fill the ...
  12. If all OUs in your Active Directory domains are not protected from accidental deletion, your Active Directory environment ...
  13. If all the DCs are not SP1 or above and you enable this feature, there is a possibility that any user can view the password ...
  14. If an anti-spyware product is installed and functioning configure Security Center to stop monitoring anti-spyware status. ...
  15. If an app doesn't shut down gracefully, customers can lose data when the OS forces the shutdown. Not responding to system ...
  16. If an application calls PlaySound with a SND_LOOP flag, the sound plays continuously until PlaySound is called with a NULL ...
  17. If an application calls the FindFirstFile API on a directory, and then attempts to remove that directory without first closing ...
  18. If an application is using a certificate that has an invalid key usage, users will not be able to secure their access to ...
  19. If an application is using a certificate that has expired, users will not be able to secure their access to the application ...
  20. If an application is using a certificate that has no private key, users will not be able to secure their access to the application ...
  21. If an application is using a certificate that is not yet valid, users will not be able to secure their access to the application ...
  22. If an application passes an invalid window handle to the MessageBox API, and the lower 16 bits of that handle are NULL, Windows ...
  23. If an application uses a certificate that is not present on this server, Web Application Proxy will not publish the application ...
  24. If an appropriate .adm file cannot be found, the console displays the registry key information in the report section "Extra ...
  25. If an appropriate .adm file cannot be found, the console displays the registry key information in the report section "Extra ...
  26. If an I/O error is returned which is not defined in the standard FsRtl filter, it is converted to the following error which ...
  27. If an IP address range is not configured for the policy, policy clients will be issued an IP address from the scope range. ...
  28. If an item is \"offline\", indicates why it is offline. 0 - Unknown. Unable to determine reason. 1 - Not applicable. Item ...
  29. If an MM error is returned which is not defined in the standard FsRtl filter, it is converted to one of the following errors ...
  30. If an MM error is returned which is not defined in the standard FsRtl filter, it is converted to one of the following errors ...
  31. If an open program is associated with this process and you suspend it, you might lose any unsaved data. If you suspend a ...
  32. If an open program is associated with this process, it will close and you will lose any unsaved data. If you end a system ...
  33. If another method is being used to perform encryption, you can ignore this. Otherwise, modify the virtual machine settings ...
  34. If any domain controller is unable to start migration, try manual polling. Or run with option /CreateGlobalObjects. Migration ...
  35. If any of the above files are DLLs, OCX, SCR, CPL or EXEs that are not one of the application's main executables (has a shortcut ...
  36. If any read-only domain controller is stuck in the 'Eliminating' state for too long run with option /DeleteRoNtfrsMember. ...
  37. If applicable, defines the COM CLSID associated with server implementation. Note: decoupled providers do not have an associated ...
  38. If authentication occurs across an external trust boundary (where the user and the computer hosting the resource are in different ...
  39. If AuthNoEncap is specified as a protocol for a proposal in qmsecmethods, then no other protocols are allowed in that proposal. ...
  40. If Automatic Updates is enabled on any node in the cluster, ensure that it is not configured to automatically install updates. ...
  41. If Block Level Backup Engine Service is not set to use the local System account as the default logon account, you may encounter ...
  42. If Command Extensions are enabled CALL changes as follows: CALL command now accepts labels as the target of the CALL. The ...
  43. If Command Extensions are enabled CHDIR changes as follows: The current directory string is converted to use the same case ...
  44. If Command Extensions are enabled DEL and ERASE change as follows: The display semantics of the /S switch are reversed in ...
  45. If Command Extensions are enabled ENDLOCAL changes as follows: If the corresponding SETLOCAL enable or disabled command extensions ...
  46. If Command Extensions are enabled GOTO changes as follows: GOTO command now accepts a target label of :EOF which transfers ...
  47. If Command Extensions are enabled IF changes as follows: IF /I string1 compare-op string2 command IF CMDEXTVERSION number ...
  48. If Command Extensions are enabled MKDIR changes as follows: MKDIR creates any intermediate directories in the path, if needed. ...
  49. If Command Extensions are enabled SET changes as follows: SET command invoked with just a variable name, no equal sign or ...
  50. If Command Extensions are enabled SETLOCAL changes as follows: SETLOCAL batch command now accepts optional arguments: ENABLEEXTENSIONS ...
  51. If Command Extensions are enabled the DATE command supports the /T switch which tells the command to just output the current ...
  52. If Command Extensions are enabled the POPD command will delete any temporary drive letter created by PUSHD when you POPD ...
  53. If Command Extensions are enabled the PROMPT command supports the following additional formatting characters: $+ zero or ...
  54. If Command Extensions are enabled the PUSHD command accepts network paths in addition to the normal drive letter and path. ...
  55. If Command Extensions are enabled the SHIFT command supports the /n switch which tells the command to start shifting at the ...
  56. If Command Extensions are enabled the TIME command supports the /T switch which tells the command to just output the current ...
  57. If Command Extensions are enabled, and running on the Windows platform, then the BREAK command will enter a hard coded breakpoint ...
  58. If Command Extensions are enabled, external command invocation through the command line or the START command changes as follows: ...
  59. If Command Extensions are enabled, the following additional forms of the FOR command are supported: FOR /D %variable IN (set) ...
  60. If Command Extensions are enabled, then there are several dynamic environment variables that can be expanded but which don't ...
  61. If computer autoenrollment is desired, use the Group Policy Management Console to configure computer autoenrollment policy ...
  62. If conditions and constraints of the network policy match the connection request, the policy can either grant access or deny ...
  63. If Data Deduplication is used for the first time and initial optimization is still ongoing, no action is required. Otherwise, ...
  64. If desktop computers do not require remote connectivity to the internal network using DirectAccess, they do not need to be ...
  65. If DirectAccess and VPN are removed from Remote Access servers, remote client computers cannot connect to the corporate network ...
  66. If DirectAccess and VPN are removed from Remote Access servers, remote client computers cannot connect to the corporate network ...
  67. If DNS servers are not configured, the computer cannot resolve names or connect to network resources. Critical operations ...
  68. If Dynamic Host Configuration Protocol (DHCP) is running on this server, check both of the following check boxes and use ...
  69. If enabled (value = 4), the ComputerSystem can be reset via hardware (e.g. the power and reset buttons). If disabled (value ...
  70. If enabled (value = 4), the unitary computer system can be reset via hardware (e.g. the power and reset buttons). If disabled ...
  71. If enabled (value = 4), the UnitaryComputerSystem can be reset via hardware (e.g. the power and reset buttons). If disabled ...
  72. If enabled, all ASP scripts will access Windows Management services using the account under which IIS is run (most commonly ...
  73. If enabled, NPS evaluates this policy while processing connection requests. If disabled, NPS does not evalue this policy. ...
  74. If file locations are corrected during install, the uninstall program should attempt to find the file in its new location ...
  75. If Group Policy settings that are defined in the Default Domain Controllers Policy are not applied to domain controllers, ...