Windows 8.1

  1. Select physical disks for the storage pool, and choose whether any disks should be allocated as hot spares that replace failed ...
  2. Select policy to import to the selected scopes: Only those policies can be imported for which IP address range has not been ...
  3. Select remote Network Policy Server (NPS) Administration to add exceptions to the firewall that allow you to manage this ...
  4. Select the action for the cluster to perform on the virtual machine resource when actions performed outside the cluster cause ...
  5. Select the action to use and the user or group that this rule should apply to. An allow action permits affected files to ...
  6. Select the application directory partitions you want to copy from the configuration set to the selected server. If you do ...
  7. Select the appropriate display resolution from the list below. For best results, use the resolution recommended by the manufacturer ...
  8. Select the attributes to which the following rules will be applied. Rules are processed in the order they appear in the list. ...
  9. Select the backup frequency and the time of day that you want Backup to run. You can schedule to run a backup multiple times ...
  10. Select the brand of your set-top box from the list. If your brand is not listed, select Not Listed at the bottom of the list. ...
  11. Select the certificate the server should use to prove its identity to the client. A certificate that is configured for Protected ...
  12. Select the certificate the server should use to prove its identity to the client. This certificate will override the certificate ...
  13. Select the certificate you want to use as network unlock certificate. You may select the certificate directly from Active ...
  14. Select the certificate you want to use as recovery agent certificate. You may select the certificate directly from Active ...
  15. Select the certification authority (CA) that you want to use for issuing certificates requested through this Certificate ...
  16. Select the check box for each drive or folder that you want to back up. Clear a check box to exclude an item from the backup. ...
  17. Select the columns you want to display. Click on a column and use the buttons to change the order in which it is displayed. ...
  18. Select the computer architecture, boot image, and user credentials that are used to connect to the server. These values will ...
  19. Select the connections that the DHCP server supports for servicing clients. If this list is empty, verify that a static IP ...
  20. Select the connections that the DHCP server supports for servicing clients. If this list is empty, verify that a static IPv6 ...
  21. Select the criteria that you want to change in the auto playlist. The auto playlist is updated automatically each time you ...
  22. Select the DCOM network protocol sequence that you want to add. Enter the endpoint details and click OK when you have finished. ...
  23. Select the device you want to unplug or eject, and then click Stop. When Windows notifies you that it is safe to do so unplug ...
  24. Select the encryption certificate and algorithm. These are included with your digitally signed messages so others can send ...
  25. Select the enhancements to apply for your current speaker configuration. Changes may not take effect until the next time ...
  26. Select the file format you want to import contacts from, so you can view them in this version of Windows and store them in ...
  27. Select the file from which the file hash will be created. Click Browse Files to select a specific file or click Browse Folders ...
  28. Select the file or folder path that this rule should affect. If you specify a folder path, all files underneath that path ...
  29. Select the folders containing encrypted files that you want to associate with the new certificate and key. Updating now helps ...
  30. Select the format you want to export contacts to. This can allow someone using another program or previous version of Windows ...
  31. Select the groups to which these {0} computers should belong. If no groups are selected, the computers will be moved to Unassigned ...
  32. Select the groups to which this computer should belong. If no groups are selected, the computer will be moved to Unassigned ...
  33. Select the identity that the Certificate Enrollment Web Service (CES) uses when communicating with the certification authority ...
  34. Select the install image that will be deployed to the device. This will generate a report of which driver packages are eligible ...
  35. Select the installation type. You can install roles and features on a running physical computer or virtual machine, or on ...
  36. Select the IP addresses that will serve DNS requests. The server can listen for DNS queries on all IP addresses defined for ...
  37. Select the items that you want to back up. Selecting bare metal recovery will provide you with the most options if you need ...
  38. Select the language that the template will support and then type a Name and Description of the template to be displayed to ...
  39. Select the location of the application information you want to copy. Copying the information from backup files is usually ...
  40. Select the manufacturer and model of the printer driver to install. If the driver you want is not listed, click Have Disk ...
  41. Select the manufacturer and model of your device. If your device is not on this list, and you have an install disk (or you ...
  42. Select the manufacturer and model of your hardware device and then click Next. If you have a disk that contains the driver ...
  43. Select the manufacturer and model of your modem. If your modem is not listed, or if you have an installation disk, click ...
  44. Select the manufacturer and model of your printer. If your printer came with an installation disk, click Have Disk. If your ...
  45. Select the maximum number of processors and memory allowed on a single virtual non-uniform memory architecture (NUMA) node. ...
  46. Select the members that will replicate with the new member, and then click Add. The wizard will create connections between ...
  47. Select the members to be included in the report. These members will be polled to obtain events and other information related ...
  48. Select the network connection method that you want to deploy on your network for NAP-capable client computers. Created policies ...
  49. Select the network name (SSID) of your wireless network from the list. Network names may take up to 60 seconds to appear. ...
  50. Select the order for the Remote Desktop license servers: The RD Session Host server or the RD Virtualization Host server ...
  51. Select the picture or pictures and click on "Get Pictures." For multiple pictures, hold Shift or Control while selecting ...
  52. Select the picture or pictures and click on "Get Pictures." To copy multiple pictures, hold the Shift or Control keys while ...
  53. Select the policy settings that you want to enable for your server domain. Enabling all policy settings will help protect ...
  54. Select the power plan that you want to customize, and then choose settings that reflect how you want your computer to manage ...
  55. Select the preferred owners for the Core Cluster Resource Group. Use the buttons to list them in order from most preferred ...
  56. Select the preferred owners for this clustered role. Use the buttons to list them in order from most preferred at the top ...
  57. Select the registration authority (RA) cryptographic service providers (CSPs) and key lengths for the signature and encryption ...
  58. Select the remote control buttons you want to relearn, or select "{0}" to relearn all {1} buttons. When you have finished, ...
  59. Select the remote control buttons you want to relearn, or select "{0}" to relearn all {1} buttons. When you have finished, ...
  60. Select the security option that you want to apply. This setting applies to the connections between the scan server and the ...
  61. Select the server that contains the content you want to replicate to other folder targets. This server is known as the primary ...
  62. Select the server that contains the content you want to replicate to other members. This server is known as the primary member. ...
  63. Select the server that was used as a baseline for this security policy. You can apply this policy to the selected server ...
  64. Select the servers and target ports (if applicable) to unmask this disk to. Deselect servers and target ports (if applicable) ...
  65. Select the servers from the server pool on which to install the RD Session Host role service. If more than one server is ...
  66. Select the servers from the server pool on which to install the RD Virtualization Host role service. If more than one server ...
  67. Select the services on your private network to which you want to redirect the Internet users. This will create NAT port redirection ...
  68. Select the services that you want Hyper-V to offer to this virtual machine. To use the services you select, you must install ...
  69. Select the SSL certificate that is associated with the AD RMS cluster. This certificate will be used to authenticate against ...
  70. Select the storage volume that you want to assign to this clustered role. You can assign additional storage to this clustered ...
  71. Select the tests that you want to run. A few tests are dependent on other tests. If you choose a dependent test, the test ...
  72. Select the type of filter. The type determines which property of the clients will be used to determine whether they have ...
  73. Select the type of network access server that sends the connection request to NPS. You can select either the network access ...
  74. Select the type of rules that you want to create. You should only create file hash rules when necessary. A file hash rule ...
  75. Select the type of storage, and then specify the path for the virtual desktops. You may specify a different path for the ...