Windows 7

  1. This option installs a minimal installation of Windows Server without the standard Windows user interface, and with a subset ...
  2. This option installs the complete installation of Windows Server. This installation includes the entire user interface, and ...
  3. This option is less secure than when Network Level Authentication is used because user authentication occurs later in the ...
  4. This option is not available when the snap-in is targeted at a Read-only Domain Controller. You must connect to a writable ...
  5. This option is only available from the server console, and only if the server meets one of these conditions: - The server ...
  6. This option is recommended for most production deployment scenarios. You should use a certificate issued by a certification ...
  7. This option is recommended for most production scenarios. You can use a certificate issued by your own internal certification ...
  8. This option is recommended for most production scenarios. You can use a certificate issued by your own internal certification ...
  9. This option is recommended for most production scenarios. You should use a certificate issued by an external certification ...
  10. This option is recommended for most production scenarios. You should use a certificate issued by an external certification ...
  11. This option is recommended for small-scale deployments or test scenarios only. After installing AD FS, you must manually ...
  12. This option is recommended for small-scale deployments or test scenarios only. After installing AD RMS, you must manually ...
  13. This option is recommended for small-scale deployments or test scenarios only. After installing HCAP, you must manually install ...
  14. This option is recommended for small-scale deployments or test scenarios only. After installing HRA and HCAP, you must manually ...
  15. This option is recommended for small-scale deployments or test scenarios only. After installing HRA, you must manually install ...
  16. This option is recommended for small-scale deployments or test scenarios only. After installing RD Gateway, you must manually ...
  17. This option is recommended for small-scale deployments or test scenarios only. After installing WS-AT, you must manually ...
  18. This option is recommended if you don't have your own internal CA or don't want to use a certificate issued by an external ...
  19. This option is recommended if you don't want to use SSL, or if you plan to request a certificate from a CA and import it ...
  20. This option is recommended if you plan to request a certificate from a CA and import it to the local computer personal certificate ...
  21. This option requires a 24-bit audio device. If you experience sound or computer problems while playing audio CDs, clear this ...
  22. This option requires less management overhead as every fax user can access all received faxes, but provides less privacy ...
  23. This option retains all printers including shared printers. Users can still print through this server unless you manually ...
  24. This option shares the replicated folder, applies shared folder permissions to new shared folders, and publishes the replicated ...
  25. This option should be used to recover an AD RMS cluster only if the configuration database is unrecoverable and had content ...
  26. This option specifies an upper bound for how long a client should wait before refreshing information retrieved from DHCPv6 ...
  27. This option specifies the client affinity. The possible values are None, Single and Network. Single and Network are used ...
  28. This option stops replicating the replicated folder and deletes the replicated folder from the replication group. The replicated ...
  29. This option stops replicating the replicated folder, deletes the replicated folder from the replication group, and removes ...
  30. This option will delete everything on your computer and replace it with a recovery image provided by your computer manufacturer. ...
  31. This option will reinstall Windows on your computer. Afterward, you can restore your files from a backup. Any programs you've ...
  32. This optional class allows the author to 'reserve' a specified amount of disk space in any directory, depending on the installation ...
  33. This package will no longer be placed on the desktop of every user. It will continue to be installed for users who have already ...
  34. This page accesses data on another domain. Do you want to allow this? To avoid this message in Internet Explorer, you can ...
  35. This page contains a list of your connections. Double-click a connection to open it. Use the task panel to open a new connection ...
  36. This page has been rated by a rating system that you do not have installed. For more information about these ratings, connect ...
  37. This page is a backup of Trusted Platform Module (TPM) owner authorization information. Upon request, use the authorization ...
  38. This page is a backup of Trusted Platform Module (TPM) security hardware owner password information. Upon request, use the ...
  39. This page is attempting to make or monitor telephone calls or other multimedia connections on your computer. Do you want ...
  40. This page lets you view and manage a list of user groups. A user group provides the ability to categorize users and to perform ...
  41. This page lets you view and manage the list of application pools on the server. Application pools are associated with worker ...
  42. This page lets you view and manage the list of user identities that are defined in the application. The list of users can ...
  43. This page lets you view and manage the list of virtual directories in an application. Virtual directories contain content ...
  44. This page lists Windows Firewall rules that are needed for the roles and other options you have selected. Selected rules ...
  45. This page provides potentially unsafe information to an ActiveX control. Your current security settings prohibit running ...
  46. This page uses fonts that need to be temporarily installed. This is usually safe. Do you want to allow these fonts to be ...
  47. This parameter has relevance only when the Dialect parameter exists, and its value is specified as Association. Otherwise ...
  48. This parameter indicates whether the bad sectors should be located and the readable information should be recovered from ...
  49. This parameter indicates whether the chkdsk operation should be performed at next boot up time, in case the operation could ...
  50. This parameter indicates whether the volume should be dismounted to a no-automount (offline) state. The volume may be returned ...
  51. This parameter is a Win32_DefragAnalysis object that contains properties describing the extent to which the volume is fragmented. ...
  52. This parameter is the volume that is to be shadowed. This parameter can be specified as a volume drive letter, mount point ...
  53. This parameter is the volume that is used for the shadow copy. This volume is sometimes referred to as the 'original' volume. ...
  54. This parameter is the volume to be used to store the shadow differential area. If this paramter is not supplied the specified ...
  55. This parameter is used to force the original volume to dismount before starting the revert operation. Forcing a volume to ...
  56. This parameter is used to specify the list of drives that should be excluded from autochk at next reboot. The string syntax ...
  57. This parameter is used to specify the list of drives that should be scheduled for autochk at next reboot. The string syntax ...
  58. This parameter is used to specify the list of volumes that should be excluded from autochk at next reboot. The string syntax ...
  59. This parameter is used to specify the list of volumes that should be scheduled for autochk at next reboot. The string syntax ...
  60. This password does not meet your organization's password complexity requirements. Please type a password that meets these ...
  61. This password has already been used to request a (%1) certificate. Only one signing certificate and one exchange certificate ...
  62. This patch package cannot be processed by the Windows Installer service. You must install a Windows service pack that contains ...
  63. This patch package could not be opened. Contact the application vendor to verify that this is a valid Windows Installer patch ...
  64. This patch package could not be opened. Verify that the patch package exists and that you can access it, or contact the application ...
  65. This path references the %configsetroot% environment variable but the answer file does not appear to be part of a configuration ...
  66. This Period mSec - Kernel mode shows the time, in milliseconds, of kernel mode processor time used by all the processes in ...
  67. This Period mSec - Processor shows the time, in milliseconds, of processor time used by all the processes in the Job object, ...
  68. This Period mSec - User mode shows the time, in milliseconds, of user mode processor time used by all the processes in the ...
  69. This picture is too large to be rotated. Use Paint or another image-editing program to make it smaller, and then try again. ...
  70. This playlist is not valid or is corrupted. Create a new playlist using Windows Media Player, then sync the new playlist ...
  71. This playlist updates when new content is available. If you want changes in the playlist to sync to your device, you should ...
  72. This plex is present in the driver, but has not yet been loaded to the provider cache. A volume modified notification will ...
  73. This policy allows you to prevent Windows from sending an error report when a device driver requests additional software ...
  74. This policy cannot be created because a policy with this name already exists. Specify another name for this policy, and then ...
  75. This policy cannot be updated because a policy with this name already exists. Specify another name for this policy, and then ...