Windows 8.1
- Select physical disks for the storage pool, and choose whether any disks should be allocated as hot spares that replace failed ...
- Select policy to import to the selected scopes: Only those policies can be imported for which IP address range has not been ...
- Select remote Network Policy Server (NPS) Administration to add exceptions to the firewall that allow you to manage this ...
- Select the action for the cluster to perform on the virtual machine resource when actions performed outside the cluster cause ...
- Select the action to use and the user or group that this rule should apply to. An allow action permits affected files to ...
- Select the application directory partitions you want to copy from the configuration set to the selected server. If you do ...
- Select the appropriate display resolution from the list below. For best results, use the resolution recommended by the manufacturer ...
- Select the attributes to which the following rules will be applied. Rules are processed in the order they appear in the list. ...
- Select the backup frequency and the time of day that you want Backup to run. You can schedule to run a backup multiple times ...
- Select the brand of your set-top box from the list. If your brand is not listed, select Not Listed at the bottom of the list. ...
- Select the certificate the server should use to prove its identity to the client. A certificate that is configured for Protected ...
- Select the certificate the server should use to prove its identity to the client. This certificate will override the certificate ...
- Select the certificate you want to use as network unlock certificate. You may select the certificate directly from Active ...
- Select the certificate you want to use as recovery agent certificate. You may select the certificate directly from Active ...
- Select the certification authority (CA) that you want to use for issuing certificates requested through this Certificate ...
- Select the check box for each drive or folder that you want to back up. Clear a check box to exclude an item from the backup. ...
- Select the columns you want to display. Click on a column and use the buttons to change the order in which it is displayed. ...
- Select the computer architecture, boot image, and user credentials that are used to connect to the server. These values will ...
- Select the connections that the DHCP server supports for servicing clients. If this list is empty, verify that a static IP ...
- Select the connections that the DHCP server supports for servicing clients. If this list is empty, verify that a static IPv6 ...
- Select the criteria that you want to change in the auto playlist. The auto playlist is updated automatically each time you ...
- Select the DCOM network protocol sequence that you want to add. Enter the endpoint details and click OK when you have finished. ...
- Select the device you want to unplug or eject, and then click Stop. When Windows notifies you that it is safe to do so unplug ...
- Select the encryption certificate and algorithm. These are included with your digitally signed messages so others can send ...
- Select the enhancements to apply for your current speaker configuration. Changes may not take effect until the next time ...
- Select the file format you want to import contacts from, so you can view them in this version of Windows and store them in ...
- Select the file from which the file hash will be created. Click Browse Files to select a specific file or click Browse Folders ...
- Select the file or folder path that this rule should affect. If you specify a folder path, all files underneath that path ...
- Select the folders containing encrypted files that you want to associate with the new certificate and key. Updating now helps ...
- Select the format you want to export contacts to. This can allow someone using another program or previous version of Windows ...
- Select the groups to which these {0} computers should belong. If no groups are selected, the computers will be moved to Unassigned ...
- Select the groups to which this computer should belong. If no groups are selected, the computer will be moved to Unassigned ...
- Select the identity that the Certificate Enrollment Web Service (CES) uses when communicating with the certification authority ...
- Select the install image that will be deployed to the device. This will generate a report of which driver packages are eligible ...
- Select the installation type. You can install roles and features on a running physical computer or virtual machine, or on ...
- Select the IP addresses that will serve DNS requests. The server can listen for DNS queries on all IP addresses defined for ...
- Select the items that you want to back up. Selecting bare metal recovery will provide you with the most options if you need ...
- Select the language that the template will support and then type a Name and Description of the template to be displayed to ...
- Select the location of the application information you want to copy. Copying the information from backup files is usually ...
- Select the manufacturer and model of the printer driver to install. If the driver you want is not listed, click Have Disk ...
- Select the manufacturer and model of your device. If your device is not on this list, and you have an install disk (or you ...
- Select the manufacturer and model of your hardware device and then click Next. If you have a disk that contains the driver ...
- Select the manufacturer and model of your modem. If your modem is not listed, or if you have an installation disk, click ...
- Select the manufacturer and model of your printer. If your printer came with an installation disk, click Have Disk. If your ...
- Select the maximum number of processors and memory allowed on a single virtual non-uniform memory architecture (NUMA) node. ...
- Select the members that will replicate with the new member, and then click Add. The wizard will create connections between ...
- Select the members to be included in the report. These members will be polled to obtain events and other information related ...
- Select the network connection method that you want to deploy on your network for NAP-capable client computers. Created policies ...
- Select the network name (SSID) of your wireless network from the list. Network names may take up to 60 seconds to appear. ...
- Select the order for the Remote Desktop license servers: The RD Session Host server or the RD Virtualization Host server ...
- Select the picture or pictures and click on "Get Pictures." For multiple pictures, hold Shift or Control while selecting ...
- Select the picture or pictures and click on "Get Pictures." To copy multiple pictures, hold the Shift or Control keys while ...
- Select the policy settings that you want to enable for your server domain. Enabling all policy settings will help protect ...
- Select the power plan that you want to customize, and then choose settings that reflect how you want your computer to manage ...
- Select the preferred owners for the Core Cluster Resource Group. Use the buttons to list them in order from most preferred ...
- Select the preferred owners for this clustered role. Use the buttons to list them in order from most preferred at the top ...
- Select the registration authority (RA) cryptographic service providers (CSPs) and key lengths for the signature and encryption ...
- Select the remote control buttons you want to relearn, or select "{0}" to relearn all {1} buttons. When you have finished, ...
- Select the remote control buttons you want to relearn, or select "{0}" to relearn all {1} buttons. When you have finished, ...
- Select the security option that you want to apply. This setting applies to the connections between the scan server and the ...
- Select the server that contains the content you want to replicate to other folder targets. This server is known as the primary ...
- Select the server that contains the content you want to replicate to other members. This server is known as the primary member. ...
- Select the server that was used as a baseline for this security policy. You can apply this policy to the selected server ...
- Select the servers and target ports (if applicable) to unmask this disk to. Deselect servers and target ports (if applicable) ...
- Select the servers from the server pool on which to install the RD Session Host role service. If more than one server is ...
- Select the servers from the server pool on which to install the RD Virtualization Host role service. If more than one server ...
- Select the services on your private network to which you want to redirect the Internet users. This will create NAT port redirection ...
- Select the services that you want Hyper-V to offer to this virtual machine. To use the services you select, you must install ...
- Select the SSL certificate that is associated with the AD RMS cluster. This certificate will be used to authenticate against ...
- Select the storage volume that you want to assign to this clustered role. You can assign additional storage to this clustered ...
- Select the tests that you want to run. A few tests are dependent on other tests. If you choose a dependent test, the test ...
- Select the type of filter. The type determines which property of the clients will be used to determine whether they have ...
- Select the type of network access server that sends the connection request to NPS. You can select either the network access ...
- Select the type of rules that you want to create. You should only create file hash rules when necessary. A file hash rule ...
- Select the type of storage, and then specify the path for the virtual desktops. You may specify a different path for the ...