Windows 8.1
- In order for your phone book to be downloaded properly, the phone book name must be eight characters or less and it cannot ...
- In order to check the status of a certificate, a revocation configuration for the Online Responder must identify the CA that ...
- In order to check the status of a certificate, a revocation configuration for the Online Responder must identify the CA that ...
- In order to check the status of a certificate, a revocation configuration for the Online Responder must identify the CA that ...
- In order to complete the installation of 2], you must restart the computer. Other users are currently logged on to this computer, ...
- In order to deploy these packages to clients, you must add them to a driver group. A package can be in many driver groups, ...
- In order to dial correctly, your computer might require additional information, such as a calling-card number or the area ...
- In order to import the trusted publishing domain of "{0}", the drive's current location must be reset from {1} to {2}. Do ...
- In order to install Active Directory Domain Services, you must first make these ports available by removing or reconfiguring ...
- In order to perform this function, Windows Mail needs to Demand Install some files. Unfortunately your administrator has ...
- In order to refresh the drive {0}, it must reset its current location from {1} to drive root {2}. Do you want to continue? ...
- In order to remotely administer the cluster the remote registry service is required to be running. If cluster nodes are starting ...
- In order to remove the selected item {0}, the drive's current location must be reset from {1} to {2}. Are you sure you want ...
- In order to send encrypted mail to this person, you must add the digital ID to your contacts. Click the add button to create ...
- In order to set administrative callback mode, either you must specify a callback number or the user must already have a callback ...
- In order to share this printer, Windows Firewall must be configured to allow this printer to be shared with other computers ...
- In order to share this printer, Windows Firewall will be configured to allow this printer to be shared with other computers ...
- In order to transfer music to your Creative Nomad digital audio player, you must upgrade to version 2.50 or later. The update ...
- In order to use the SSLCertificateSHA1Hash WMI property, you mustfirst find the hexadecimal Thumbprint value for the certificatethat ...
- In particular, there is at least one node ({0}) that has only IPv4 addresses and at least one node ({1}) that has only IPv6 ...
- In redirected access mode, clustered roles that are using the Cluster Shared Volume do not have to be stopped while certain ...
- In response to local cultural norm, sensitivites and laws, your SafeSearch setting and access to adult content is locked ...
- In some editions of Windows, the disk might include file shadow copies and older Windows Complete PC Backup images as part ...
- In strict mode, function declarations cannot be nested inside a statement or block. They may only appear at the top level ...
- In Templates Management, you create and modify NPS templates. NPS templates allow you to create and save an NPS component ...
- in the AD RMS logging database has been decrypted successfully. Click Search Report in the Actions pane to locate specific ...
- In the case of an LDAP-derived instance, the ObjectClass property value(s) may be set to the objectClass attribute values. ...
- In the case of an LDAP-derived instance, the SeeAlso property specifies distinguished name of other Directory objects which ...
- In the case of an LDAP-derived instance, the UserPassword property may contain an encrypted password used to access the person's ...
- in the domain {2} trust(s) service principal name (SPN) {0} for delegation, but SPN {0} is not registered to an account. ...
- In the event of a cluster failover or move to another node, Hyper-V replication will pause if the new node does not also ...
- In the event of a failover (planned, unplanned, or test), the Replica virtual machine will come online using the same IP ...
- In the event of a failure on the domain's only domain controller, users will not be able to log in to the domain or access ...
- In the event of data loss or disk failure, you can reset the password that protects the AD RMS cluster key. If you used the ...
- In the event of data loss or disk failure, you can reset the password that protects the AD RMS cluster key. This policy setting ...
- In the event that you replace a hard disk drive or your computer fails to the point where it cannot be used or does not start ...
- In the guest operating system, do the following: Verify that appropriate drivers are installed and all networking devices ...
- In the input box, enter the expression or quoted strings that should be traced every time the tracepoint is encountered. ...
- In the input box, enter the expression to evaluate every time the breakpoint is encountered. If the expression evaluates ...
- In the list below, top values take precedence over lower values during classification. Lower values may be overridden by ...
- In the Password Replication Policy, you can specify whose passwords are allowed to replicate to the read-only domain controller ...
- In the past %1 hour(s) and %2 minute(s), %3 HTTP.SYS responses have had their application requested QoS conflict with URL ...
- In the resource mapping for class {0}, the node defines reference-to-collection cmdlets for property {1}, which is not a ...
- In the resource mapping of action '{0}' for class '{1}', the KeyParameterMap\Key section refers to a nonexistent key '{2}'. ...
- In the resource mapping of resource type '{0}' for action '{1}', the action parameter '{2}' mapped to a cmdlet parameter ...
- In the Start menu you can choose a computer activity, such as reading new e-mail messages or browsing the Web. This menu ...
- In the upper pane, select a virtual machine or specific files on a virtual machine, then drag and drop them into a folder ...
- In the value for parameter {0} double quotes were not used, but required. Double quotes are required for all values that ...
- In the Windows event log, look for event 12021 for more details about these applications. Consider issuing a new certificate ...
- In the Windows event log, look for events 12019 and 12020 for more details about these applications. This may occur due to ...
- In this phase, you will create a bootable USB flash drive that has the recovery software on it. The USB flash drive that ...
- In this topology, each member replicates with all other members of the replication group. This topology works well when there ...
- In this topology, the Remote Access server is deployed at the edge of the internal corporate network and is configured with ...
- In this topology, the Remote Access server is deployed behind an edge firewall or device, and is configured with two adapters. ...
- In this topology, the Remote Access server is deployed with a single network adapter that is connected to the internal network. ...
- In Windows 2003 and earlier versions of Windows, the Remote Procedure Call (RPC) Locator service manages the RPC name service ...
- In Windows 8 and prior versions of Windows, the help file opens when the Connection Manager Help button is clicked. In Windows ...
- In Windows 9x applications could restart the computer by calling the ExitWindowsEx API. Windows XP requires the application ...
- In Windows 9x, DirectDraw manipulates the palette directly without using GDI, while on NT it uses GDI. Therefore, if an application ...
- In Windows 9x, the DrawText API would accept out of range values and then convert them to acceptable values. This compatibility ...
- In Windows XP, applications are restricted from modifying the system menu. Instead, each application gets a separate copy ...
- In Windows XP, due to a modification in the caching between MoveFile and DeleteFile API's, when the VerInstallFileW API is ...
- In Windows XP, the WS_EX_CLIENTEDGE window style causes applications to run with the taskbar still visible. This may not ...
- In Windows XP, we have changed foreground semantics to stop foreground focus stealing by one app if another application is ...
- InactivityTimeout defines the time limit (in seconds) for automatic disconnection of the phone line, if no data is exchanged. ...
- Inbound allow rule to allow traffic to the network location server deployed on the Remote Access server (with a single network ...
- Inbound Allowed Default Block Exempt Packets is the total number of default block exempt packets forwarded from a public ...
- Inbound Allowed Default Block Exempt Packets per Second is the rate at which default block exempt packets are forwarded from ...
- Inbound Allowed Filter Exempt IPv6 Packets is the total number of IPv6 filter exempt packets forwarded from a public interface ...
- Inbound Allowed Filter Exempt IPv6 Packets per Second is the rate at which IPv6 filter exempt packets are forwarded from ...
- Inbound Allowed ICMPv6 Packets is the total number of ICMPv6 packets forwarded from a public interface to an internal interface. ...
- Inbound Allowed ICMPv6 Packets per Second is the rate at which ICMPv6 packets are forwarded from a public interface to an ...
- Inbound Allowed IPv6 IPsec Authenticated Packets is the total number of authenticated IKEv1, IKEv2, AuthIP, or ESP IPv6 packets ...
- Inbound Allowed IPv6 IPsec Authenticated Packets per Second is the rate at which authenticated IKEv1, IKEv2, AuthIP or ESP ...
- Inbound Allowed IPv6 IPsec Unauthenticated Packets is the total number of unauthenticated IKEv1, IKEv2, AuthIP, or ESP IPv6 ...