Windows 8.1

  1. Specify how much processors may opportunistically increase frequency above maximum when allowed by current operating conditions. ...
  2. Specify how processors select a target frequency when allowed to select above maximum frequency by current operating conditions. ...
  3. Specify how this network adapter utilizes network bandwidth. Both Minimum Bandwidth and Maximum Bandwidth are measured in ...
  4. Specify how this shared folder is to be used by clients accessing it over the SMB protocol. You can use the description to ...
  5. Specify how to prioritize the availability of memory for this virtual machine compared to other virtual machines on this ...
  6. Specify idle/session timeout values for clients that connect through RD Gateway, and then select the session timeout actions. ...
  7. Specify items to include in the backup by selecting or clearing the associated check boxes. The items that you have included ...
  8. Specify names to identify the multisite deployment, and the first entry point. This is used for configuration and monitoring ...
  9. Specify NTFS permissions to control how individual users and groups access this folder locally. For network access to a shared ...
  10. Specify properties for this rule. The rule defines a device, or group of devices used to transmit a fax to the specified ...
  11. Specify Quality of Service management for this virtual hard disk. Minimum and maximum IOPS are measured in 8 KB increments. ...
  12. Specify settings for the network location server, used to determine the location of DirectAccess client computers. A client ...
  13. Specify share permissions for NFS-based access to the shared folder. For network access to a shared folder, the more restrictive ...
  14. Specify share permissions for SMB-based access to the shared folder. For network access to a shared folder, the more restrictive ...
  15. Specify the account name and password for the Active Directory account used by the Cluster service on the old cluster. Alternatively, ...
  16. Specify the algorithm used to select a new performance state when the ideal performance state is higher than the current ...
  17. Specify the algorithm used to select a new performance state when the ideal performance state is lower than the current performance ...
  18. Specify the allowed authentication methods and whether remote client devices are redirected to the local computer during ...
  19. Specify the amount of memory to allocate to this virtual machine. You can specify an amount from {0} MB through {1} MB. To ...
  20. Specify the amount that must expire before processor performance states and parked cores may be reevaluated (in milliseconds). ...
  21. Specify the authentication types to allow for incoming replication traffic. Ensure that the ports you specify are open in ...
  22. Specify the backup policy to remove or use the -All parameter with Remove-WBPolicy to remove the currently set backup policy. ...
  23. Specify the boot image version. The unattend file will contain settings for each architecture supported by the boot image ...
  24. Specify the conditions that determine whether this connection request policy is evaluated for a connection request. A minimum ...
  25. Specify the conditions that determine whether this network policy is evaluated for a connection request. A minimum of one ...
  26. Specify the conditions that, along with the trigger, determine whether the task should run. The task will not run if any ...
  27. Specify the conditions that, along with the trigger, determine whether the task should run. The task will not run if any ...
  28. Specify the conditions that, along with the trigger, determine whether the task should run. The task will not run if any ...
  29. Specify the configuration of the network adapter for the test Replica virtual machine to use. A test Replica virtual machine ...
  30. Specify the credentials for a member of the Administrators group to Sysprep generalize the virtual desktop template automatically. ...
  31. Specify the credentials for configuring AD RMS. The account that you specify must be a domain user who is a member of the ...
  32. Specify the criteria for the filter. The following criteria will be added together, and only items matching all of the criteria ...
  33. Specify the default mount type for mapping a drive letter to an NFS share. Soft mounts will retry connections a fixed number ...
  34. Specify the default UNIX-style file permissions Client for NFS will use when creating new files and folders on NFS shares. ...
  35. Specify the dial-up networking entry that you want to customize. You must type each entry name exactly as it appears in the ...
  36. Specify the DNS servers from which you want to load the zone. A stub zone is loaded by querying the zone's master server ...
  37. Specify the domain names (domain.com) of organizations that can publish content against this AD RMS cluster. You can specify ...
  38. Specify the domain user account (domain\username) and password that will be used for AD RMS. We highly recommend that you ...
  39. Specify the EAP types required for client computer authentication method configuration to match this policy. Use of this ...
  40. Specify the folder that you want to share. On a volume with appropriate characteristics and space, select an existing folder ...
  41. Specify the GUID of the NetworkAdapterID to set. If the ID is invalid or does not exist, the return value should indicate ...
  42. Specify the Host Credential Authorization Protocol (HCAP) user groups required to match this policy. You can use pattern ...
  43. Specify the identity mapping source used by the server. If available, the local mapping file (%WINDIR%\System32\drivers\etc\passwd) ...
  44. Specify the install image. The unattend file will contain settings for each boot image architecture that can deploy the specified ...
  45. Specify the interface types and specific interfaces to which this rule applies. Interfaces can only be specified when managing ...
  46. Specify the IP Address of the NetworkAdapter to set. If the IP is invalid or does not exist, the return value should indicate ...
  47. Specify the IPv4 address of the network access server sending the access request message. You can use pattern matching syntax. ...
  48. Specify the IPv6 address of the network access server sending the access request message. You can use pattern matching syntax. ...
  49. Specify the key combination you want to use to release the mouse when virtual machine drivers are not installed. This key ...
  50. Specify the LanaID of the network adapter to set. If the LanaID specified is invalid or does not exist, an appropriate error ...
  51. Specify the language to use during Windows Setup. The corresponding Setup language pack must have been added to the boot ...
  52. Specify the length of time the resource can take to change states between Online and Offline before the Cluster service puts ...
  53. Specify the location of the parent virtual hard disk to restore the connection between the differencing disk and the parent ...
  54. Specify the location where the image is installed. Disk IDs start at 0 and Partition IDs start at 1. If you are installing ...
  55. Specify the lower busy threshold that must be met before decreasing the number of cores/packages that are unparked (in percentage). ...
  56. Specify the MAC Address of the NetworkAdapter to set. If the MAC is invalid or does not exist, or if the mode is per-Session ...
  57. Specify the maximum block size that the Trivial File Transfer Protocol (TFTP) server should allow. If a client requests a ...
  58. Specify the maximum percentage of CPU utilization during a scan. This policy setting allows you to configure the maximum ...
  59. Specify the minimum number of hours allowed since the client has checked for new security updates (maximum allowed is 72 ...
  60. Specify the minimum number of perf check intervals since the last performance state change before the performance state may ...
  61. Specify the minimum number of perf check intervals since the last performance state change before the performance state may ...
  62. Specify the name of the computer that will be the read-only domain controller (RODC). This account will be created in Active ...
  63. Specify the name of the forest where the installation will occur and account credentials that have sufficient privileges ...
  64. Specify the name of the phone book that you want the server to update. If you did not specify a phone book name on the previous ...
  65. Specify the network location for your backup files and provide credentials for Windows Backup to use when accessing the location. ...
  66. Specify the network resources (computers or Remote Desktop Session Host server farms) that the computer group will contain. ...
  67. Specify the number of days that rights account certificates (RACs) for external users authenticating using ADFS are valid. ...
  68. Specify the number of processor performance time check intervals to use when calculating the average utility for core parking. ...
  69. Specify the number of processor performance time check intervals to use when calculating the average utility to determine ...
  70. Specify the number of processor performance time check intervals to use when calculating the average utility to determine ...
  71. Specify the number of times the Cluster service will attempt to restart or fail over the clustered role in the specified ...
  72. Specify the number of times the Cluster service will attempt to restart or fail over the Core Cluster Resource Group in the ...
  73. Specify the number of times the DHCP server should attempt conflict detection for an IP address before the server leases ...
  74. Specify the path of the program that need not use a Virtual IP. If the program does not exist in ProgramList, the return ...
  75. Specify the path of the program that need to use a Virtual IP. If the path is invalid or does not exist, the return value ...