Windows 7

  1. Select the connections that the DHCP server supports for servicing clients. If this list is empty, verify that a static IPv6 ...
  2. Select the criteria that you want to change in the auto playlist. The auto playlist is updated automatically each time you ...
  3. Select the DCOM network protocol sequence that you want to add. Enter the endpoint details and click OK when you have finished. ...
  4. Select the device you want to unplug or eject, and then click Stop. When Windows notifies you that it is safe to do so unplug ...
  5. Select the encryption certificate and algorithm. These are included with your digitally signed messages so others can send ...
  6. Select the enhancements to apply for your current speaker configuration. Changes may not take effect until the next time ...
  7. Select the fibre channel ports you want to enable on the selected server or cluster. All ports that you enable will have ...
  8. Select the file data source that describes the driver that you wish to connect to. You can use any file data source that ...
  9. Select the file format you want to import contacts from, so you can view them in this version of Windows and store them in ...
  10. Select the file from which the file hash will be created. Click Browse Files to select a specific file or click Browse Folders ...
  11. Select the file or folder path that this rule should affect. If you specify a folder path, all files underneath that path ...
  12. Select the folders containing encrypted files that you want to associate with the new certificate and key. Updating now helps ...
  13. Select the format you want to export contacts to. This can allow someone using another program or previous version of Windows ...
  14. Select the functionality that you want to provide. Additional functionality can be configured by using the Remote Desktop ...
  15. Select the identity the Certificate Enrollment Web Service should use when communicating with the CA and other services on ...
  16. Select the IP addresses that will serve DNS requests. The server can listen for DNS queries on all IP addresses defined for ...
  17. Select the items that you want to back up. Selecting bare metal recovery will provide you with the most options if you need ...
  18. Select the language that the template will support and then type a Name and Description of the template to be displayed to ...
  19. Select the location of the application information you want to copy. Copying the information from backup files is usually ...
  20. Select the manufacturer and model of the printer driver to install. If the driver you want is not listed, click Have Disk ...
  21. Select the manufacturer and model of your device. If your device is not on this list, and you have an install disk (or you ...
  22. Select the manufacturer and model of your hardware device and then click Next. If you have a disk that contains the driver ...
  23. Select the manufacturer and model of your modem. If your modem is not listed, or if you have an installation disk, click ...
  24. Select the manufacturer and model of your printer. If your printer came with an installation disk, click Have Disk. If your ...
  25. Select the members that will replicate with the new member, and then click Add. The wizard will create connections between ...
  26. Select the members to be included in the report. These members will be polled to obtain events and other information related ...
  27. Select the network connection method that you want to deploy on your network for NAP-capable client computers. Created policies ...
  28. Select the network location or network locations that you would like to merge into a single network location or delete. Managed ...
  29. Select the network name (SSID) of your wireless network from the list. Network names may take up to 60 seconds to appear. ...
  30. Select the picture or pictures and click on "Get Pictures." For multiple pictures, hold Shift or Control while selecting ...
  31. Select the picture or pictures and click on "Get Pictures." To copy multiple pictures, hold the Shift or Control keys while ...
  32. Select the power plan that you want to customize, and then choose settings that reflect how you want your computer to manage ...
  33. Select the preferred owners for the Core Cluster Resource Group. Use the buttons to list them in order from most preferred ...
  34. Select the preferred owners for this service or application. Use the buttons to list them in order from most preferred at ...
  35. Select the programs that you want to add to the RemoteApp Programs list. You can also configure individual RemoteApp properties, ...
  36. Select the remote control buttons you want to relearn, or select "{0}" to relearn all {1} buttons. When you have finished, ...
  37. Select the remote control buttons you want to relearn, or select "{0}" to relearn all {1} buttons. When you have finished, ...
  38. Select the security option that you want to apply. This setting applies to the connections between the scan server and the ...
  39. Select the server that contains the content you want to replicate to other folder targets. This server is known as the primary ...
  40. Select the server that contains the content you want to replicate to other members. This server is known as the primary member. ...
  41. Select the server that was used as a baseline for this security policy. You can apply this policy to the selected server ...
  42. Select the services on your private network to which you want to redirect the Internet users. This will create NAT port redirection ...
  43. Select the services that you want for each input language shown in the list. Use the Add and Remove buttons to modify this ...
  44. Select the services that you want Hyper-V to offer to this virtual machine. To use the services you select, you must install ...
  45. Select the SQL server, or type the name of the server or its CNAME alias (preferred) and then click Get Database Instances. ...
  46. Select the storage volume that you want to assign to this service or application. You can assign additional storage to this ...
  47. Select the tests that you want to run. A few tests are dependent on other tests. If you choose a dependent test, the test ...
  48. Select the type of filter. The type determines which property of the clients will be used to determine whether they have ...
  49. Select the type of network access server that sends the connection request to NPS. You can select either the network access ...
  50. Select the type of rules that you want to create. You should only create file hash rules when necessary. A file hash rule ...
  51. Select the user account Network Device Enrollment Service should use when authorizing certificate requests. The user must ...
  52. Select the user group or groups that you want to apply Enhanced Security Configuration to ( Administrators group or All other ...
  53. Select the user group(s) that you want to apply the enhanced security configuration to - Administrators group , or All other ...
  54. Select the users you want to designate as recovery agents. You may select the users directly from Active Directory if the ...
  55. Select the virtual machines to add to the virtual desktop pool. The list shows only virtual machines that are not assigned ...
  56. Select this check box to make the button on the right the one you use for primary functions such as selecting and dragging. ...
  57. Select this checkbox if you are using the IFM feature to copy the system state files to install an Active Directory database. ...
  58. Select this option for domain controllers unless you have completely eliminated NetBIOS name resolution from your network. ...
  59. Select this option if clients will only be able to access the web service while connected directly to your internal network. ...
  60. Select this option if the application that you plan to install creates an application directory upon installation, or if ...
  61. Select this option if the application that you plan to install does not create an application directory partition upon installation. ...
  62. Select this option if this CA does not use Directory Service data to issue or manage certificates. A standalone CA can be ...
  63. Select this option if you are a member of Enterprise Admins group and you want to start using this AD RMS cluster as soon ...
  64. Select this option if you are the only person who uses this computer. Your server will allow a longer period of inactivity ...
  65. Select this option if you have an existing certificate on this computer or if you want to import a certificate and use its ...
  66. Select this option if you have retained private keys from a previous installation or want to use a private key from an alternate ...
  67. Select this option if you plan to provide users with digital X.509 certificates for client authentication. This option will ...
  68. Select this option if you use RD Web Access on a public computer. Be sure to log off when you have finished using RD Web ...
  69. Select this option if you want to create a custom topology after you finish this wizard. No replication will take place until ...
  70. Select this option if you want to join additional AD RMS servers to this cluster before making it available to clients or ...
  71. Select this option if you would like users to enter a username and password to authenticate to the web service. This option ...
  72. Select this option to provide quick access to the documents you opened most recently. Clearing this list does not delete ...
  73. Select this option to undo the System Restore done at the time listed, if you think it didn't fix problems or caused more ...
  74. Select this option when you have multiple network connections or when you need routing protocols or demand-dial connections. ...
  75. Select this to delete any existing partitions and reformat all disks on this computer to match the layout of the system image. ...