Windows 8.1
- Security policies on this computer are set to show info about the last interactive sign-in, but Windows couldn't retrieve ...
- Security settings could not be applied to the folder %1. To prevent unauthorized access to the folder, you should manually ...
- Security settings could not be applied to the shared folder %1. To prevent unauthorized access to the folder, you should ...
- Security Stats: - Security Context: Create = %1!10lu! Free = %2!10lu! Timeout = %3!10lu! Queue Length = %4!10lu! Queued = ...
- Security updates have been installed and require this computer to be restarted. Please close all applications and restart ...
- Security Zones and Content Ratings allow you to control what information the users can view and what is downloaded to their ...
- SecurityBreach is an enumerated, integer-valued property indicating whether a physical breach of the frame was attempted ...
- See additional information about disk space under the informational section in the "Amount of disk space used by replicated ...
- See also: dsadd computer /? - help for adding a computer to the directory. dsadd contact /? - help for adding a contact to ...
- See also: dsadd computer /? - help for adding a computer to the directory. dsadd contact /? - help for adding a contact to ...
- See also: dsget - describes parameters that apply to all commands. dsget computer - displays properties of computers in the ...
- See also: dsget - describes parameters that apply to all commands. dsget computer - displays properties of computers in the ...
- See also: dsget - describes parameters that apply to all commands. dsget computer - displays properties of computers in the ...
- See also: dsget - describes parameters that apply to all commands. dsget computer - displays properties of computers in the ...
- See also: dsget - describes parameters that apply to all commands. dsget computer - displays properties of computers in the ...
- See also: dsmod computer /? - help for modifying an existing computer in the directory. dsmod contact /? - help for modifying ...
- See also: dsmod computer /? - help for modifying an existing computer in the directory. dsmod contact /? - help for modifying ...
- See also: dsquery computer /? - help for finding computers in the directory. dsquery contact /? - help for finding contacts ...
- See also: dsquery computer /? - help for finding computers in the directory. dsquery contact /? - help for finding contacts ...
- See if we have secure channels from all of the DC's in the domain the domains specified by /testdomain:. /nositerestriction ...
- Segment Load} A virtual DOS machine (VDM) is loading, unloading, or moving an MS-DOS or Win16 program segment image. An exception ...
- Segments Received/sec is the rate at which segments are received, including those received in error. This count includes ...
- Segments Retransmitted/sec is the rate at which segments are retransmitted, that is, segments transmitted containing one ...
- Segments Sent/sec is the rate at which segments are sent, including those on current connections, but excluding those containing ...
- Select a certificate template used to enroll the certificate used by the Remote Access server to sign OTP certificate enrollment ...
- Select a computer naming format for new client computers, and set the location in the directory service where client computer ...
- Select a contact from the contact list below. Your contact will be able to connect to you securely without using a password. ...
- Select a cover page template, and type a subject line and note if required by the template. This information is automatically ...
- Select a domain name service provider. A domain name service provider can help you select a domain name that fits your needs. ...
- Select a game controller from the list below, and then click OK. If your game controller does not appear in the list, click ...
- Select a hard disk drive with enough free space to temporarily store files you're burning to a disc. The drive might need ...
- Select a key from the list. The listed keys are the keys available on the target computer matching the search criteria. You ...
- Select a language below to get started. Only languages that are currently installed and can be personalized are listed. What ...
- Select a line on your ISDN adapter, and type its multiple subscriber numbers, as provided by your phone company. After entering ...
- Select a line on your ISDN adapter. Then, select each channel, and type its phone number and SPID, as provided by your phone ...
- Select a line on your ISDN adapter. Then, select each channel, and type its phone number, as provided by your phone company. ...
- Select a line on your ISDN adapter. Then, select each logical terminal, and type its subaddress and phone number Repeat for ...
- Select a particular font or piece of stationery to be used every time you start a new e-mail message. Click the Tools menu, ...
- Select a quorum witness option to add or change the quorum witness for your cluster configuration. As a best practice, configure ...
- Select a reference member that has the most up-to-date files. Files on this member will be used to compare files on other ...
- Select a server on which to mount the virtual hard disk (VHD). If you select a VHD file from a network share, that share ...
- Select a server to use as a baseline for this security policy. You can apply this policy to the selected server or to any ...
- Select a service provider. If you do not have a membership with the provider you select, the wizard will help you create ...
- Select a service provider. If you do not have a membership with the provider you select, the wizard will help you create ...
- Select a Starter GPO cabinet (CAB) file to load into this domain's Starter GPO store. Check the version comparison table ...
- Select a VPN server from the list below. You might choose a server closest to your current location, or a server closest ...
- Select Add Channel to enter the name and channel number for a standard TV channel that is missing from the Guide. To add ...
- Select an Active Directory Domain Controller from the list below by either name or site. (You can refresh the list by either ...
- Select an existing file encryption certificate or create a new one. If you have already encrypted files, you can update them ...
- Select an item below to configure NPS as a RADIUS server, Network Access Protection (NAP) policy server, or RADIUS proxy. ...
- Select an item below to create, configure, and manage templates. All templates can be exported to or imported from other ...
- Select an offline VHD file on which Windows Server 2012 is already installed, and from which you want to remove roles and ...
- Select an offline VHD file on which Windows Server 2012 is already installed, and on which you want to install roles and ...
- Select at least one supported Windows authentication method. If you select both methods, users that use either method will ...
- Select certain built-in and custom fields and group them, in order to create meaningful view of logical grouping based on ...
- Select certain built-in and custom fields and group them, in order to create meaningful view of logical grouping based on ...
- Select certain built-in and custom fields and group them, in order to create meaningful view of logical grouping based on ...
- Select Configure Accounting if you want to run the Accounting Configuration Wizard. The wizard allows you to choose between ...
- Select EAP types to use with PEAP. The authentication type determines the kind of credentials that NPS can accept from client ...
- Select Enable to automatically synchronize passwords in the Windows to UNIX direction for all NIS accounts that have been ...
- Select how data for this virtual disk will be stored on the selected physical disks. These values customize the performance ...
- Select how long Server for NFS will wait for clients to reclaims locks when Server for NFS recovers from a disruption in ...
- Select how long you would like to keep your download history. You can also purge your download history by clicking Clear ...
- Select how to resolve the following error codes that may be returned for this system health validator and its associated ...
- Select one of the following options, depending on whether you want to replicate domain data over the network from an existing ...
- Select one of these options to determine which action Windows Firewall with Advanced Security will take for the incoming ...
- Select one or more networks for virtual machines to use for live migration. Use the buttons to list them in order from most ...
- Select one or more sync conflicts. Then click Resolve to view the details of each conflict and decide how to resolve them. ...
- Select one or more volumes to store your backups. Use multiple volumes in different disks if you want to store backups offsite. ...
- Select one preferred network Windows Help and Support can provide more information about how to prevent your computer from ...
- Select one preferred network Windows Help and Support can provide more information about how to prevent your computer from ...
- Select only one file to rename, or use MS-DOS wildcards (for example, *.txt) to rename a group of files with similar names. ...
- Select only the storage volumes that you want to assign to this clustered role. You can assign additional storage to this ...
- Select options below to enable and change or disable types of global filters that will be applied to the Administrative Templates ...
- Select or type a name to represent this folder on all members of the replication group. This name is known as the replicated ...