Windows Server 2008

  1. This class provides statistical and operational information for each volume that contains (or contained) replicated folders. ...
  2. This class represents an association between a managed system element collection and the class representing statistical information ...
  3. This class represents the association between an operating system and the autochk settings that apply to the disks on the ...
  4. This class represents the directory layout for the product. Each instance of the class represents a directory in both the ...
  5. This class represents the settings for the autochk operation for a disk. The setting applies to all disks on the computer ...
  6. This class specifies information needed to check a particular setting file for a specific entry that contains a value that ...
  7. This class specifies the information to be used to modify a particular setting file for a specific entry with a specific ...
  8. This class supplies additional information about a data provider. Querying this class with an instance name returned from ...
  9. This cluster cannot be destroyed. It has non-core application groups which must be deleted before the cluster can be destroyed. ...
  10. This cluster node has lost all network connectivity. It cannot participate in the cluster until connectivity is restored. ...
  11. This cluster node has no network connectivity. It cannot participate in the cluster until connectivity is restored. Run the ...
  12. This cluster node is running with a different message security level ('%1') than remote node '%3' ('%2'). These two nodes ...
  13. This cmdlet supports the common parameters: -Verbose, -Debug, -ErrorAction, -ErrorVariable, and -OutVariable. For more information, ...
  14. This collection includes the Random, Swirl, Warp, Anon, Falloff, Water, Bubble, Dizzy, Windmill, Niagara, Blender, X Marks ...
  15. This column is a list of names of services or load ordering groups that the system must start before this service. Names ...
  16. This column specifies the action taken by the startup program if the service fails to start during startup. One of the following ...
  17. This COM name is being used by another device (such as another com port or modem). Using duplicate names can lead to inaccessible ...
  18. This command activates or deactivates the TPM. This command requires physical presence at the computer and cannot be run ...
  19. This command allows an admin to view or modify the password replication policy for RODCs. /prp ADDITIONAL_ARGS can be either ...
  20. This command allows an entity with knowledge of the migration authorization ticket (as generated by TPM_CMK_CreateTicket) ...
  21. This command allows an entity with knowledge of the migration authorization ticket of a key (as created with TPM_CMK_CreateTicket) ...
  22. This command allows an owner of a loaded key to obtain the public key value of that key. The loaded key is created using ...
  23. This command allows or disallows the ability to set an owner. This command requires physical presence at the computer and ...
  24. This command allows software to protect secrets so that they are released only if a specified computer configuration is validated. ...
  25. This command allows the operator of the computer to deactivate the TPM until the next computer restart. The operator must ...
  26. This command allows the owner of the counter to release the specified counter. This command stops all subsequent reads or ...
  27. This command allows the TPM owner to change the TPM owner authorization value or the storage root key (SRK) authorization ...
  28. This command allows the TPM owner to clear the TPM. This means that the only key remaining on the TPM is the endorsement ...
  29. This command allows the TPM owner to create a maintenance archive that enables the migration of data held by the TPM. This ...
  30. This command allows the TPM owner to create a migration authorization ticket so that users can move keys without involvement ...
  31. This command allows the TPM owner to create a new monotonic counter, assign an authorization value to that counter, increment ...
  32. This command allows the TPM owner to create a signature verification ticket using a provided public key. This ticket is used ...
  33. This command allows the TPM owner to create an authorization ticket for one or more migration authorities so that users can ...
  34. This command allows the TPM owner to define space for an area of non-volatile storage on the TPM. This definition includes ...
  35. This command allows the TPM owner to enable or disable the TPM. See the descriptions for the TPM_PhysicalEnable and TPM_PhysicalDisable ...
  36. This command allows the TPM owner to establish the Direct Anonymous Attestation (DAA) parameters in the TPM for a specific ...
  37. This command allows the TPM owner to generate an Attestation Identity Key (AIK) that can be used to sign information generated ...
  38. This command allows the TPM owner to load a maintenance archive (generated by TPM_CreateMaintenanceArchive). When loaded, ...
  39. This command allows the TPM owner to load a row of a delegation tables into the TPM's non-volatile storage. This command ...
  40. This command allows the TPM owner to manage delegation family tables. Run this command at least once before running delegation ...
  41. This command allows the TPM owner to permanently disable the TPM_OwnerClear command. Once used, the owner must run the TPM_ForceClear ...
  42. This command allows the TPM owner to prevent the creation of a maintenance archive using the TPM_CreateMaintenanceArchive ...
  43. This command allows the TPM owner to release the specified counter. This stops all subsequent reads or increments of the ...
  44. This command allows the TPM owner to return the public portion of the TPM endorsement key (EK) or storage root key (SRK). ...
  45. This command allows the TPM owner to set certain attributes such as whether the key can be evicted by anyone but the owner. ...
  46. This command allows the TPM owner to set the audit flag for a given command number. When this flag is turned on, the command ...
  47. This command allows the TPM owner to unwrap the session key that allows for the decryption of the Attestation Identity Key ...
  48. This command allows the TPM to migrate a blob (as generated by TPM_CreateMigrationBlob or TPM_CMK_CreateBlob) to a destination ...
  49. This command certifies a loaded key (created by TPM_LoadKey2) with the public portion of another key. A TPM identity key ...
  50. This command clears a revocable TPM endorsement key (generated by TPM_CreateRevocableEK) and resets the TPM, if it finds ...
  51. This command clears the TPM. This command requires physical presence at the computer and cannot be run by the operating system. ...
  52. This command completes a pending SHA-1 digest process, returns the resulting SHA-1 hash output, and incorporates this hash ...
  53. This command completes the transport session. If logging is turned on, this command returns a hash of all operations performed ...
  54. This command could not be executed. Possible causes: - NLB is not bound, enabled or installed on this system. - You do not ...
  55. This command creates a certifiable migration key blob that can be loaded onto another computer using the TPM_LoadKey2 command. ...
  56. This command creates a copy of the specified boot entry. bcdedit /store /copy { } /d Specifies the store to be used. If this ...
  57. This command creates a key blob that can be loaded onto another computer using the TPM_LoadKey2 command. This command is ...
  58. This command creates a new entry in the boot configuration data store. If a well-known identifier is specified, then the ...
  59. This command creates the TPM endorsement key (EK). The user can also specify whether the EK can be reset, and can specify ...
  60. This command defines the operator authorization value. This command requires physical presence at the computer and cannot ...
  61. This command deletes a data element from an entry in the boot configuration data store. bcdedit /store /deletevalue Specifies ...
  62. This command deletes an entry from the boot configuration data store. bcdedit /store /delete /f /cleanup | /nocleanup Specifies ...
  63. This command delivers a wrapped TPM command to the TPM within a transport session. The TPM unwraps the command and then runs ...
  64. This command disables the TPM. This command requires physical presence at the computer and cannot be run by the operating ...
  65. This command enables or disables Emergency Management Services for the specified entry. bcdedit /bootems { ON | OFF } Specifies ...
  66. This command enables or disables Emergency Management Services for the specified operating system boot entry. bcdedit /ems ...
  67. This command enables or disables the boot debugger for the specified boot entry. Although this command works for any entry, ...
  68. This command enables or disables the kernel debugger for the specified boot entry. bcdedit /debug { ON | OFF } Specifies ...
  69. This command enables the TPM. This command requires physical presence at the computer and cannot be run by the operating ...
  70. This command establishes a transport session that can be used to confidentially transmit shared secrets, encryption keys, ...
  71. This command generates a secure asymmetric certifiable migration key using the authorization ticket for one or more migration ...
  72. This command generates an authorization session handle for the Delegate-Specific Authorization Protocol (DSAP) used to securely ...
  73. This command generates an authorization session handle for the Object-Independent Authorization Protocol (OIAP) used to securely ...
  74. This command generates an authorization session handle for the Object-Specific Authorization Protocol (OSAP) used to securely ...
  75. This command informs the TPM that it may complete the self test of all TPM functions that were not tested during the power-on ...