Windows 7
- All the resource groups selected for migration were migrated successfully. You may now take the resource groups offline in ...
- All wave devices that can play files in the current format are in use. Wait until a wave device is free, and then try again. ...
- All wave devices that can record files in the current format are in use. Wait until a wave device is free, and then try again. ...
- All Windows Deployment Services PXE providers are required to export an initialization function 'PxeProviderInitialize'. ...
- Allow any authenticated user to update all DNS records with the same name. This setting applies only to DNS records for a ...
- Allow applications and services to prevent automatic sleep. If you enable this policy setting, any application, service or ...
- Allow Automatic Sleep with Open Network Files. If you enable this policy setting, the computer will automatically sleep when ...
- Allow communication through Windows Firewall Windows Firewall is currently set to block all incoming connections to this ...
- Allow log on through Remote Desktop Services This security setting determines which users or groups have permission to log ...
- Allow only connections that are both authenticated and integrity-protected by using IPsec. Compatible with Windows Vista ...
- Allow remote clients to connect to this server through either a dial-up connection or a secure virtual private network (VPN) ...
- Allow remote clients to connect to this server through the Internet and local clients to connect to the Internet using a ...
- Allow the focus of the Group Policy Snap-in to be changed when launching from the command line. This only applies if you ...
- Allow the selected computer to be changed when launching from the command line. This only applies if you save the console. ...
- Allow the selected computer to be changed when launching from the command line. This only applies if you save the console. ...
- Allow Windows to manage your network connections Windows functionality to manage wireless connectivity on this computer is ...
- Allow-Bypass action specified, but the rule does not meet allow-bypass criteria (inbound, authenticate/encrypt flags set, ...
- Allowed Classifies per Second is the rate of Windows Filtering Platform security rule evaluations which allow network activity. ...
- Allowed to write systemPossSuperiors and systemAuxClasses as possSuperiors and auxClasses, if schema circular dependencies ...
- Allowing a proxy address from a federated user could allow a malicious user to spoof an authorized user's credentials and ...
- Allowing active content such as script and ActiveX controls can be useful. However, active content might also harm your computer. ...
- Allowing connections to any port is a less secure configuration because it might allow access to all services inside the ...
- Allowing executable files to run with no restrictions on the command-line arguments will open the RD Session Host server ...
- Allowing nonsecure dynamic updates is a significant security vulnerability because updates can be accepted from untrusted ...
- Allowing unsecured communication may expose your network to security risks by allowing IP traffic to be sent with no authentication ...
- Allowing web content to open a program can be useful, but it can potentially harm your computer. Do not allow it unless you ...
- Allows Administrators to enable and disable the ability for Outlook Express users to save or open attachments that can potentially ...
- Allows Administrators to enable and disable the Media Explorer Bar and set the auto-play default. The Media Explorer Bar ...
- Allows administrators to use the Windows Firewall component in Control Panel to define a local port exceptions list. Windows ...
- Allows administrators to use the Windows Firewall component in Control Panel to define a local program exceptions list. Windows ...
- Allows configuration of components of the operating system used by a client computer to connect to a network. This includes ...
- Allows control of file operations via transactions to commit or abort changes. TRANSACTION /START | /COMMIT | /ROLLBACK | ...
- Allows errors to be reported when programs stop working or responding and allows existing solutions to be delivered. Also ...
- Allows files to be automatically copied and maintained simultaneously on multiple servers. If this service is stopped, file ...
- Allows inbound file and printer sharing. To do this, Windows Firewall opens UDP ports 137 and 138, and TCP ports 139 and ...
- Allows inbound file and printer sharing. To do this, Windows Firewall opens UDP ports 137 and 138, and TCP ports 139 and ...
- Allows or Denies new TS Connections. The second parameter is optional, if specified and set to TRUE, then enables or disables ...
- Allows or Denies retrieving IP address of SessionDirectory according as whether Value is set to 1 or 0 respectively. The ...
- Allows programs to execute as a user that does not have Administrator access rights, but can still access resources accessible ...
- Allows programs to execute with only access to resources granted to open well-known groups, blocking access Administrator ...
- Allows programs to open data files in specified directories as if they were in the current directory. APPEND drive:]path[;. ...
- Allows remote administration of this computer using administrative tools such as the Microsoft Management Console (MMC) and ...
- Allows remote administration of this computer using administrative tools such as the Microsoft Management Console (MMC) and ...
- Allows Remote Desktop Services administrators to install and configure programs remotely. By default, system administrators ...
- Allows setting of properties on the specified application pool. The exact application pool identifier must be provided and ...
- Allows setting of properties on the specified application. The exact application identifier must be provided and must resolve ...
- Allows setting of properties on the specified configuration section for the specified configuration path. If the configuration ...
- Allows setting of properties on the specified module. The exact module identifier must be provided and must resolve to an ...
- Allows setting of properties on the specified virtual directory. The exact virtual directory identifier must be provided ...
- Allows setting of properties on the specified virtual site. The exact site identifier must be provided and must resolve to ...
- Allows this computer to receive inbound Remote Desktop requests. To do this, Windows Firewall opens TCP port 3389. If you ...
- Allows this computer to receive inbound Remote Desktop requests. To do this, Windows Firewall opens TCP port 3389. If you ...
- Allows this computer to receive unicast responses to its outgoing multicast or broadcast messages. Note: This setting has ...
- Allows this computer to receive unsolicited inbound Plug and Play messages sent by network devices, such as routers with ...
- Allows this computer to receive unsolicited inbound Plug and Play messages sent by network devices, such as routers with ...
- Allows unrestricted network access for clients when the connection request matches the policy. Use this option for reporting ...
- Allows unrestricted network access until the specified date and time. After the specified date and time, health policy is ...
- Allows unsolicited incoming messages from specified systems that authenticate using the IPsec transport. If you enable this ...
- Allows UPnP devices to be hosted on this computer. If this service is stopped, any hosted UPnP devices will stop functioning ...
- Allows user-based policy processing, roaming user profiles, and user object logon scripts for interactive logons across forests. ...
- Allows users in other Directory environments that have federated trust relationships established with your enterprise's Active ...
- Allows users to connect interactively to a remote computer. Remote Desktop and Remote Desktop Session Host Server depend ...
- Allows users to install programs from removable media, such as floppy disks and CD-ROMs, during privileged installations. ...
- Allows users to search for installation files during privileged installations. This setting enables the Browse button in ...
- Allows users to upgrade programs during privileged installations. This setting permits all users to install patches, even ...
- Allows users to use the Add Printer Wizard to search the network for shared printers. If you enable this setting or do not ...
- Allows Web-based programs to install software on the computer without notifying the user. By default, when a script hosted ...
- Allows Windows Firewall to record information about the unsolicited incoming messages that it receives. If you enable this ...
- Allows you to analyze current systems settings against baseline settings that are stored in a database. The analysis results ...
- Allows you to configure a system with security settings stored in a database. The syntax of this command is: secedit /configure ...
- Allows you to configure how often a Distributed File System (DFS) client attempts to discover domain controllers on their ...
- Allows you to disable System Restore configuration through System Protection. System Restore enables users, in the event ...
- Allows you to disable System Restore. System Restore enables users, in the event of a problem, to restore their computers ...
- Allows you to disable Windows Messenger. If you enable this setting, Windows Messenger will not run. If you disable or do ...
- Allows you to export security settings stored in a database. The syntax of this command is: secedit /export /db filename ...