Windows 8.1

  1. Indicates the mode in which the server is deployed:1 - indicates On Internet2 - indicates Behind NAT with Double NIC3 - indicates ...
  2. Indicates the port number on which the RADIUS server is accepting accounting requests. The default value is 1813 This parameter ...
  3. Indicates the port number on which the RADIUS server is accepting authentication requests. Default is 1812. This parameter ...
  4. Indicates the port number on which the RADIUS server is accepting authentication requests. The default value is 1813 This ...
  5. Indicates the port number on which the RADIUS server is accepting requests. The default value is 1813 for accounting and ...
  6. Indicates the power supply's input frequency range measured by the associated sensor. Range 1, 2 or both can be specified ...
  7. Indicates the power supply's input voltage range measured by the associated sensor. Range 1, 2 or both can be specified using ...
  8. Indicates the Primary Computer evaluation result: 1 = Is not primary computer 2 = Is primary computer 3 = Not evaluated because ...
  9. Indicates the purpose of the external RADIUS server. Can be one of the following 1. Authentication 2. Accounting 3. Otp If ...
  10. Indicates the requested operation would disable, delete or could prevent logon for an administration account. This is not ...
  11. Indicates the software features that make up the operating system. The software features can be part of different products. ...
  12. Indicates the specific power-related capabilities of a computer system and its associated running operating system. The values, ...
  13. Indicates the specific power-related capabilities of a ComputerSystem and its associated running OperatingSystem. The values, ...
  14. Indicates the specific power-related capabilities of a LogicalDevice. The array values, 0=\"Unknown\", 1=\"Not Supported\" ...
  15. Indicates the specific power-related capabilities of the logical device. The array values, 0=\"Unknown\", 1=\"Not Supported\" ...
  16. Indicates the state of the cluster. The cluster can be defined to be on-line (value=2), off-line (3), in a degraded mode ...
  17. Indicates the tolerance of the sensor for the measured property. Tolerance, along with resolution and accuracy, is used to ...
  18. Indicates the type of address specified in DomainControllerAddress. The following valid values are presented in order, DS_INET_ADDRESS ...
  19. Indicates the urgency or importance of execution of the Job. The lower the number, the higher the priority. Note that this ...
  20. Indicates the Win32 Configuration Manager error code. The following values may be returned: 0 This device is working properly. ...
  21. Indicates time spent parsing and executing JavaScript. This includes DOM events, timers, script evaluation, and animation ...
  22. Indicates whether a computer certificate is used to authenticate the DirectAccess client computer for the first IPsec tunnel ...
  23. Indicates whether appropriate policies should be deployed on downlevel clients (Windows 7) clients such that they too can ...
  24. Indicates whether appropriate policies should be deployed on downlevel clients (Windows 7) so that they can connect to the ...
  25. Indicates whether C type (burst) timing is supported (value=5) or not (value=4). Also, \"Other\" (1), \"Unknown\" (2) and ...
  26. Indicates whether DMA may execute in 'count by byte' mode (value=4) or not (value=3). Also, \"Other\" (1) and \"Unknown\" ...
  27. Indicates whether DMA may execute in 'count by word' mode (value=4) or not (value=3). Also, \"Other\" (1) and \"Unknown\" ...
  28. Indicates whether force tunneling should be enabled or disabled. Can take one of the following values: Enabled, Disabled. ...
  29. Indicates whether or not the job should be automatically deleted upon completion. Note that the \'completion\' of a recurring ...
  30. Indicates whether or not the Job should be automatically deleted upon termination. This parameter takes precedence over the ...
  31. Indicates whether power to the Hub Ports is individually or gang-switched. If this value is FALSE, power is switched individually ...
  32. Indicates whether the connection is disabled. If the connection is enabled, the DFS Replication service will use it; otherwise, ...
  33. Indicates whether the modified date and a checksum (SHA-256 if one is not specified) should be use to validate whether an ...
  34. Indicates whether the sending of accounting on/off messages should be enabled or disabled. Can take one of the following ...
  35. Indicates whether the sending of accounting on/off messages should be enabled or disabled. Can take one of the following ...
  36. Indicates whether the sending of accounting on/off messages should be enabled or disabled. Can take one of the following ...
  37. Indicates whether usage of message authenticator should be enabled or disabled. Can take one of the following values 1. Enabled ...
  38. Indicates whether usage of message authenticator should be enabled or disabled. Can take one of the following values 1. Enabled ...
  39. Indicates whether usage of message authenticator should be enabled or disabled. Can take one of the following values 1. Enabled ...
  40. Indicates whether usage of message authenticator should be enabled or disabled. Can take one of the following values 1. Enabled ...
  41. Indicating informational callback to request. (PendingCount %2) (InformationRoutine %3) (InformationContext %4) (Type %5) ...
  42. Indirect access to an object has been obtained: Object Type: %1 Object Name: %2 Process ID: %3 Primary User Name: %4 Primary ...
  43. Indirect access to an object was requested. Subject: Security ID: %1 Account Name: %2 Account Domain: %3 Logon ID: %4 Object: ...
  44. InFileList - comma separated list of Certificate or CRL files to modify and re-sign SerialNumber - Serial number of certificate ...
  45. InFileList|SerialNumber|%1 OutFileList StartDate+%9 +SerialNumberList | -SerialNumberList | -ObjectIdList | @ExtensionFile ...
  46. InfoName - indicates the CA property to display (see below) Use "*" for all properties Index - optional zero-based property ...
  47. Information about an individual's finances, including account status, account balance, payment or overdraft history, and ...
  48. Information about an individual's physical or mental health, sexual orientation, use of or inquiry into health care services ...
  49. Information about certificate templates can only be read from a domain controller. A domain controller cannot be located ...
  50. Information about membership in or affiliation with groups such as religious organizations, trade unions, professional associations, ...
  51. Information about the computer system that the individual is using to access the Internet, such as the IP number, domain ...
  52. Information about the MSDTC resource has not been configured correctly in the shared cluster registry. Error Specifics: %1%0 ...
  53. Information about the operation cannot be obtained because the operation was not found. Ensure that you are querying the ...
  54. Information about the shared folder cannot be retrieved. This error can occur if the shared folder does not use the Common ...
  55. Information for this content class was not found. Use the default content class. This error is obsolete and should no longer ...
  56. Information for this object is not currently available possibly due to a network or Active Directory Domain Controller failure. ...
  57. Information from the primary domain controller (PDC) for the domain %2 cannot be obtained because: %1 Make sure that the ...
  58. Information generated by browsing the Web site, such as which pages are visited, and how long an individual stays on each ...
  59. Information generated from or reflecting explicit interactions with the Web site, such as queries to a search engine, or ...
  60. Information is no longer available about this task because the object that monitors the progress no longer exists. This may ...
  61. Information is retained beyond the time it takes to complete the stated purpose because of a legal requirement or liability. ...
  62. Information may be archived or stored for the purpose of preserving social history as governed by an existing law or policy. ...
  63. Information may be used by the Web site to complete the activity for which it was provided, whether the activity is a one-time ...
  64. Information may be used for the technical support of the Web site and its computer system. For example, to process computer ...
  65. Information may be used to contact an individual, through a communications channel other than voice telephone, for the promotion ...
  66. Information may be used to tailor or modify the content or design of the Web site during a single visit to the site. For ...
  67. Information regarding the validation of the server URI will be presented below. Ensure that the properties returned from ...
  68. Information that allows an individual to be contacted or located in the physical world, such as a telephone number or a postal ...
  69. Information that allows an individual to be contacted or located on the Internet, such as an e-mail address. Often, this ...
  70. Information that can be linked to an individual may be used for research, analysis, and reporting. For example, data about ...
  71. Information that can be linked to an individual may be used to make a decision that directly affects that individual. For ...
  72. Information that is based upon a unique identifier but that cannot be linked an individual may be used to make a decision ...
  73. Information that is based upon a unique identifier but that cannot be linked to an individual may be used for research, analysis, ...
  74. Information will be sent to Microsoft or to the domain name service provider that you choose. For more information, see the ...
  75. Information you exchange with this site cannot be viewed or changed by others. However, there are the following problems ...