Windows 7

  1. Specify the DNS servers from which you want to load the zone. A stub zone is loaded by querying the zone's master server ...
  2. Specify the domain user account (domain\username) and password that will be used for AD RMS. We highly recommend that you ...
  3. Specify the EAP types required for client computer authentication method configuration to match this policy. Use of this ...
  4. Specify the federation scenario that this resource partner will use with its designated account partner. Selecting the checkbox ...
  5. Specify the file name for the certificate request. This information can be sent to a certification authority for signing. ...
  6. Specify the folder that you want to share. On a volume with appropriate characteristics and space, select an existing folder ...
  7. Specify the GUID of the NetworkAdapterID to set. If the ID is invalid or does not exist, the return value should indicate ...
  8. Specify the Host Credential Authorization Protocol (HCAP) user groups required to match this policy. You can use pattern ...
  9. Specify the interface types and specific interfaces to which this rule applies. Interfaces can only be specified when managing ...
  10. Specify the IP Address of the NetworkAdapter to set. If the IP is invalid or does not exist, the return value should indicate ...
  11. Specify the IP addresses of the DNS servers that clients will use for name resolution. These DNS servers will be used for ...
  12. Specify the IP addresses of the WINS servers that clients will use for name resolution. These WINS servers will be used for ...
  13. Specify the IPv4 address of the network access server sending the access request message. You can use pattern matching syntax. ...
  14. Specify the IPv6 address of the network access server sending the access request message. You can use pattern matching syntax. ...
  15. Specify the key combination you want to use to release the mouse when virtual machine drivers are not installed. This key ...
  16. Specify the LanaID of the network adapter to set. If the LanaID specified is invalid or does not exist, an appropriate error ...
  17. Specify the length of time the resource can take to change states between Online and Offline before the Cluster service puts ...
  18. Specify the location of the parent virtual hard disk to restore the connection between the differencing disk and the parent ...
  19. Specify the lower busy threshold that must be met before decreasing the number of cores/packages that are unparked (in percentage). ...
  20. Specify the MAC Address of the NetworkAdapter to set. If the MAC is invalid or does not exist, or if the mode is per-Session ...
  21. Specify the minimum number of hours allowed since the client has checked for new security updates (maximum allowed is 72 ...
  22. Specify the minimum number of perf check intervals since the last performance state change before the performance state may ...
  23. Specify the minimum number of perf check intervals since the last performance state change before the performance state may ...
  24. Specify the name of the computer that will be the read-only domain controller (RODC). This account will be created in Active ...
  25. Specify the name of the forest where the installation will occur and account credentials that have sufficient privileges ...
  26. Specify the name of the phone book that you want the server to update. If you did not specify a phone book name on the previous ...
  27. Specify the network location for your backup files and provide credentials for Windows Backup to use when accessing the location. ...
  28. Specify the network resources (computers or Remote Desktop Session Host server farms) that the computer group will contain. ...
  29. Specify the number of days that rights account certificates (RACs) for external users authenticating using ADFS are valid. ...
  30. Specify the number of times the Cluster service will attempt to restart or fail over the Core Cluster Resource Group in the ...
  31. Specify the number of times the Cluster service will attempt to restart or fail over the service or application in the specified ...
  32. Specify the number of times the DHCP server should attempt conflict detection for an IP address before the server leases ...
  33. Specify the path of the program that need not use a Virtual IP. If the program does not exist in ProgramList, the return ...
  34. Specify the path of the program that need to use a Virtual IP. If the path is invalid or does not exist, the return value ...
  35. Specify the percentage of battery capacity remaining that triggers the reserve power mode. If you enable this policy setting, ...
  36. Specify the period of inactivity before Windows automatically reduces brightness of the display. If you enable this policy ...
  37. Specify the period of inactivity before Windows transitions to sleep automatically when a user is not present at the computer. ...
  38. Specify the processors to use. You can specify multiple processors by typing a numeric range separated by commas and hyphens ...
  39. Specify the RD Connection Broker server that you want to import the farm and server names from. You can enter an IP address, ...
  40. Specify the required information for the certificate. State/province and City/locality must be specified as official names ...
  41. Specify the super user group name in the format [email protected]. The group that you specify must be an Active Directory ...
  42. Specify the text and image that will appear in the Network Access Protection user interface on client computers. For more ...
  43. Specify the threshold above which a core is considered to have had significant affinitized work scheduled to it while parked. ...
  44. Specify the time that elapsed since the last idle state promotion or demotion before idle states may be promoted or demoted ...
  45. Specify the upper busy threshold that must be met before increasing the number of cores/packages that are unparked (in percentage). ...
  46. Specify user authentication methods or a health certificate to use during IPsec negotiations. Those higher in the list are ...
  47. Specify when a new key is generated. If you select both options, a new key is generated when the first threshold is reached. ...
  48. Specify where to save each type of storage report: Incident reports - generated automatically when a user exceeds a quota ...
  49. Specify whether connection requests are processed locally, are forwarded to remote RADIUS servers for authentication, or ...
  50. Specify whether content protected using this template may be revoked. Revocation denies permission to open such content based ...
  51. Specify whether the Core Cluster Resource Group will automatically fail back to the most preferred owner (which is set on ...
  52. Specify whether the service or application will automatically fail back to the most preferred owner (which is set on the ...
  53. Specify whether to enable or disable access to local client devices and resources in your remote session for clients that ...
  54. Specify whether to enable or disable access to local client devices and resources in your remote session for clients that ...
  55. Specify whether to enable or disable client device redirection for clients that connect through RD Gateway, and then select ...
  56. Specify whether to send an e-mail message or run a script when the criteria specified on the Define a Filter page are met. ...
  57. Specify whether to use local Internet Protocol security (IPsec) policy on this computer. If local IPsec policy is not used, ...
  58. Specify whether to use Remote Desktop connection authorization policies ( RD CAPs ) stored on the local or central server ...
  59. Specify whether you want to use your default credentials automatically with Virtual Machine Connection to connect to a running ...
  60. Specify which e-mail domains are trusted. If AD RMS needs to expand group membership across forests, licensing to security ...
  61. Specify which e-mail domains or users accounts cannot receive licenses from this AD RMS cluster. To exclude a user account ...
  62. Specify which users and groups have rights to work with content protected using this template. Some rights are not used in ...
  63. Speech recognition in the selected language cannot be initialized because this language is unsupported on your system. Please ...
  64. Speech Recognition will use the updated settings the next time it starts. Ensure that the recognizer language matches the ...
  65. Spinlock acquires/sec is the rate of spinlock acquisitions. It includes the basic spinlocks, queued spinlocks, in-stack queued ...
  66. Spinlock contentions/sec is the rate of spinlock contentions. It includes the basic spinlocks, queued spinlocks, in-stack ...
  67. Spinlock spins/sec is the rate of spinlock spins. It includes the spins to acquire basic spinlocks, queued spinlocks, in-stack ...
  68. Split IO/Sec reports the rate at which I/Os to the disk were split into multiple I/Os. A split I/O may result from requesting ...
  69. Split-Scope is configured successfully. The Scope configured on the Added DHCP Server is in the deactivated state. It needs ...
  70. Splitting DHCP scope between multiple DHCP servers can increase fault tolerance. With a split-scope configuration, if one ...
  71. Spn check for SMB/SMB2 fails. Subject: Security ID: %1 Account Name: %2 Account Domain: %3 Logon ID: %4 SPN: SPN Name: %5 ...
  72. Spotlight on Active Directory requires the latest Visual Basic 5.0 run-time files (Msvbvm50.exe) in order to run properly. ...
  73. SPSS for Windows 10 has a known compatibility issue with this version of Windows and might not run as expected. The program ...
  74. SQL log configuration: - Connection = %1!s! Description = %2!s! Accounting = %3!s! Authentication = %4!s! Periodic accounting ...
  75. SQL Server 2000 Analysis Services sp2 and below is not supported by this version of Windows. Please apply sp3 after installation ...