Windows 7

  1. See also: dsget - describes parameters that apply to all commands. dsget computer - displays properties of computers in the ...
  2. See also: dsget - describes parameters that apply to all commands. dsget computer - displays properties of computers in the ...
  3. See also: dsget - describes parameters that apply to all commands. dsget computer - displays properties of computers in the ...
  4. See also: dsget - describes parameters that apply to all commands. dsget computer - displays properties of computers in the ...
  5. See also: dsmod computer /? - help for modifying an existing computer in the directory. dsmod contact /? - help for modifying ...
  6. See also: dsmod computer /? - help for modifying an existing computer in the directory. dsmod contact /? - help for modifying ...
  7. See also: dsquery computer /? - help for finding computers in the directory. dsquery contact /? - help for finding contacts ...
  8. See also: dsquery computer /? - help for finding computers in the directory. dsquery contact /? - help for finding contacts ...
  9. See if we have secure channels from all of the DC's in the domain the domains specified by /testdomain:. /nositerestriction ...
  10. Segment Load} A virtual DOS machine (VDM) is loading, unloading, or moving an MS-DOS or Win16 program segment image. An exception ...
  11. Segments Received/sec is the rate at which segments are received, including those received in error. This count includes ...
  12. Segments Retransmitted/sec is the rate at which segments are retransmitted, that is, segments transmitted containing one ...
  13. Segments Sent/sec is the rate at which segments are sent, including those on current connections, but excluding those containing ...
  14. Select a certificate from the following list and then click "Register" to register it in Active Directory Domain Services. ...
  15. Select a computer naming format for new client computers, and set the location in the directory service where client computer ...
  16. Select a contact from the contact list below. Your contact will be able to connect to you securely without using a password. ...
  17. Select a cover page template, and type a subject line and note if required by the template. This information is automatically ...
  18. Select a cryptographic service provider and a bit length. The bit length of the encryption key determines the certificate's ...
  19. Select a game controller from the list below, and then click OK. If your game controller does not appear in the list, click ...
  20. Select a group in Active Directory Domain Services (AD DS) that will map to this group claim. Once mapped, the group in AD ...
  21. Select a hard disk drive with enough free space to temporarily store files you're burning to a disc. The drive might need ...
  22. Select a key from the list. The listed keys are the keys available on this computer matching the search criteria. You may ...
  23. Select a language below to get started. Only languages that are currently installed and can be personalized are listed. What ...
  24. Select a license server from the list of known license servers, or type in the name or IP address of a license server, and ...
  25. Select a line on your ISDN adapter, and type its multiple subscriber numbers, as provided by your phone company. After entering ...
  26. Select a line on your ISDN adapter. Then, select each channel, and type its phone number and SPID, as provided by your phone ...
  27. Select a line on your ISDN adapter. Then, select each channel, and type its phone number, as provided by your phone company. ...
  28. Select a line on your ISDN adapter. Then, select each logical terminal, and type its subaddress and phone number Repeat for ...
  29. Select a location to save the reports that are generated when volumes reach their threshold values. One report is generated ...
  30. Select a particular font or piece of stationery to be used every time you start a new e-mail message. Click the Tools menu, ...
  31. Select a reference member that has the most up-to-date files. Files on this member will be used to compare files on other ...
  32. Select a server to use as a baseline for this security policy. You can apply this policy to the selected server or to any ...
  33. Select a service provider. If you do not have a membership with the provider you select, the wizard will help you create ...
  34. Select a service provider. If you do not have a membership with the provider you select, the wizard will help you create ...
  35. Select a Starter GPO cabinet (CAB) file to load into this domain's Starter GPO store. Check the version comparison table ...
  36. Select a user name and associate it with one or more roles. You can create additional roles and re-associate the user with ...
  37. Select a VPN server from the list below. You might choose a server closest to your current location, or a server closest ...
  38. Select Add Channel to enter the name and channel number for a standard TV channel that is missing from the Guide. To add ...
  39. Select an Active Directory Domain Controller from the list below by either name or site. (You can refresh the list by either ...
  40. Select an existing file encryption certificate or create a new one. If you have already encrypted files, you can update them ...
  41. Select an item below to configure NPS as a RADIUS server, Network Access Protection (NAP) policy server, or RADIUS proxy. ...
  42. Select an item below to create, configure, and manage templates. All templates can be exported to or imported from other ...
  43. Select and order acceptable SSPI packages. This virtual server will attempt to negotiate with the client using the selected ...
  44. Select at least one supported Windows authentication method. If you select both methods, users that use either method will ...
  45. Select Configure Accounting if you want to run the Accounting Configuration Wizard. The wizard allows you to choose between ...
  46. Select EAP types to use with PEAP. The authentication type determines the kind of credentials that NPS can accept from client ...
  47. Select Enable to automatically synchronize passwords in the Windows to UNIX direction for all NIS accounts that have been ...
  48. Select how long Server for NFS will wait for clients to reclaims locks when Server for NFS recovers from a disruption in ...
  49. Select how long you would like to keep your download history. You can also purge your download history by clicking 'Clear ...
  50. Select how to resolve the following error codes that may be returned for this system health validator and its associated ...
  51. Select one of the following options, depending on whether you want to replicate domain data over the network from an existing ...
  52. Select one of these options to determine which action Windows Firewall with Advanced Security will take for the incoming ...
  53. Select one or more identity claims that this account store will provide. Configure the LDAP attributes that will be used ...
  54. Select one or more networks for this virtual machine to use for live migration. Use the buttons to list them in order from ...
  55. Select one or more sync conflicts. Then click Resolve to view the details of each conflict and decide how to resolve them. ...
  56. Select one or more volumes to store your backups. Use multiple volumes in different disks if you want to store backups offsite. ...
  57. Select one preferred network Windows Help and Support can provide more information about how to prevent your computer from ...
  58. Select one preferred network Windows Help and Support can provide more information about how to prevent your computer from ...
  59. Select only one file to rename, or use MS-DOS wildcards (for example, *.txt) to rename a group of files with similar names. ...
  60. Select only the storage volumes that you want to assign to this service or application. You can assign additional storage ...
  61. Select options below to enable and change or disable types of global filters that will be applied to the Administrative Templates ...
  62. Select or type a name to represent this folder on all members of the replication group. This name is known as the replicated ...
  63. Select remote Network Policy Server (NPS) Administration to add exceptions to the firewall that allow you to manage this ...
  64. Select the action for the cluster to perform on the virtual machine resource when actions performed outside the cluster cause ...
  65. Select the action to use and the user or group that this rule should apply to. An allow action permits affected files to ...
  66. Select the Active Directory Domain Services (AD DS) domains and forests that you want this account partner to trust. The ...
  67. Select the application directory partitions you want to copy from the configuration set to the selected server. If you do ...
  68. Select the appropriate display resolution from the list below. For best results, use the resolution recommended by the manufacturer ...
  69. Select the attributes to which the following rules will be applied. Rules are processed in the order they appear in the list. ...
  70. Select the brand of your set-top box from the list. If your brand is not listed, select Not Listed at the bottom of the list. ...
  71. Select the certificate the server should use to prove its identity to the client. A certificate that is configured for Protected ...
  72. Select the certificate the server should use to prove its identity to the client. This certificate will override the certificate ...
  73. Select the check box of the items that you want to include in the backup. What files are excluded by default from the backup? ...
  74. Select the columns you want to display. Click on a column and use the buttons to change the order in which it is displayed. ...
  75. Select the connections that the DHCP server supports for servicing clients. If this list is empty, verify that a static IP ...