Windows 8.1

  1. This claim type currently applies to classes other than computer and user. If you save the claim type, these classes will ...
  2. This class contains the .INI information that the application needs to set in an .INI file. The .INI file information is ...
  3. This class encapsulates a VM Network Adapter, that corresponds to a port on a virtual switch, on which the traffic is to ...
  4. This class exists for backward compatibility to earlier CIM Schema definitions. With additions to Sensor and NumericSensor ...
  5. This class exists for backward compatibility to earlier CIM Schema definitions. With additions to Sensor and NumericSensor ...
  6. This class exists for backward compatibility to earlier CIM Schema definitions. With additions to Sensor and NumericSensor ...
  7. This class exists for backward compatibility to earlier CIM Schema definitions. With additions to Sensor and NumericSensor ...
  8. This class exposes attribute information associated with a fibre channel adapter. There should be one instance of this class ...
  9. This class exposes attribute information associated with a Fibre Channel port. There should be one instance of this class ...
  10. This class exposes FC3 Management information associated with a fibre channel adapter. There should be one instance of this ...
  11. This class exposes operations associated with FCP on a Fibre Channel adapter. There should be one instance of this class ...
  12. This class exposes operations that can be performed on a Fibre Channel port. There should be one instance of this class for ...
  13. This class exposes port discovery operations that can be by a fibre channel adapter. There should be one instance of this ...
  14. This class exposes port information operations that can be determined from the adapter. There should be one instance of this ...
  15. This class exposes statistical information associated with a Fibre Channel port. There should be one instance of this class ...
  16. This class extends LogicalElement to abstract the concept of an element that is enabled and disabled, such as a LogicalDevice ...
  17. This class provides access to ID table records. The ID table has a record for each file and folder known to the DFS Replication ...
  18. This class provides details about the files and folders that were moved to the Conflict and Deleted folder due to conflicting ...
  19. This class provides statistical and operational information for active sync sessions between the local replication group ...
  20. This class provides statistical and operational information for each incoming and outgoing connection of the local replication ...
  21. This class provides statistical and operational information for each replication group member hosted on the local computer. ...
  22. This class provides statistical and operational information for each volume that contains (or contained) replicated folders. ...
  23. This class represents a rule for how TCP/IP traffic is handled. The provider will only return the instances for this class ...
  24. This class represents a rule for how TCP/IP traffic is handled. The provider will only return the instances for this class ...
  25. This class represents an association between a managed system element collection and the class representing statistical information ...
  26. This class represents the association between an operating system and the autochk settings that apply to the disks on the ...
  27. This class represents the directory layout for the product. Each instance of the class represents a directory in both the ...
  28. This class represents the settings for the autochk operation for a disk. The setting applies to all disks on the computer ...
  29. This class specifies information needed to check a particular setting file for a specific entry that contains a value that ...
  30. This class specifies the information to be used to modify a particular setting file for a specific entry with a specific ...
  31. This cluster cannot be destroyed. It has non-core application groups which must be deleted before the cluster can be destroyed. ...
  32. This cluster node has lost all network connectivity. It cannot participate in the cluster until connectivity is restored. ...
  33. This cluster node has no network connectivity. It cannot participate in the cluster until connectivity is restored. Run the ...
  34. This cluster node is running with a different message security level ('%1') than remote node '%3' ('%2'). These two nodes ...
  35. This clustered role contains one or more Client Access Points. Deleting them will not remove associated Active Directory ...
  36. This clustered role contains one or more Client Access Points. Deleting them will remove associated Active Directory accounts ...
  37. This cmdlet adds a new external RADIUS server for one of the following purposes 1. VPN authentication 2. Accounting for DirectAccess ...
  38. This cmdlet adds the specified Management servers to the DirectAccess deployment. Management server here refers to patch ...
  39. This cmdlet cannot be used to uninstall Remote Access from the specified entry point. Use the Remove-DAEntrypoint cmdlet ...
  40. This cmdlet configures IPAM to use automatic provisioning. It does not create or edit the required GPOs. Use the Invoke-IpamGpoProvisioning ...
  41. This cmdlet configures the properties of the connection to application servers and the IPSec security traffic protection ...
  42. This cmdlet displays the accounting configuration for Remote Access, viz. the different types of accounting that are enabled ...
  43. This cmdlet displays the configured Management servers. Management server here refers to patch servers, domain controllers ...
  44. This cmdlet displays the following 1. Remote user activity over an active connection 2. Remote user activity based on accounting ...
  45. This cmdlet displays the following 1. Resources accessed over the active DA and VPN connections 2. Resources accessed over ...
  46. This cmdlet displays the following 1. Statistics of current (real-time) active DirectAccess and VPN connections 2. Statistics ...
  47. This cmdlet displays the following 1. Statistics of current (real-time) active DirectAccess and VPN connections 2. Statistics ...
  48. This cmdlet displays the following 1. Summary statistics of current (real-time) active DirectAccess and VPN connections 2. ...
  49. This cmdlet displays the list of application server security groups that are part of the DA deployment and the properties ...
  50. This cmdlet displays the list of client security groups that are part of the DirectAccess deployment and the client properties ...
  51. This cmdlet displays the list of the following types of RADIUS servers 1. Radius for VPN authentication 2. Radius for DirectAccess ...
  52. This cmdlet does the following 1. Configure the IPv4 address assignment method 2. Configure the IPv6 prefix for IPv6 address ...
  53. This cmdlet does the following 1. Configures the DNS server and proxy server addresses of a Name Resolution Policy Table ...
  54. This cmdlet does the following 1. Enables inbox and RADIUS accounting (both external RADIUS and Windows accounting) and configures ...
  55. This cmdlet does the following 1. Performs pre-requisite checks for DirectAccess to ensure that it can be installed 2. Installs ...
  56. This cmdlet edits the properties associated with an external RADIUS server being used for the following 1. VPN authentication ...
  57. This cmdlet is deprecated. For equivalent functionality, use the Export-IscsiVirtualDiskSnapshot cmdlet, assign the exported ...
  58. This cmdlet is deprecated. iSCSI virtual disks created on this version of Windows Server are optimized for large sector size ...
  59. This cmdlet is incompatible with the version of Microsoft iSCSI Target Server that it is trying to manage. Verify that the ...
  60. This cmdlet is used to configure the Network location server. It can be present on the DirectAccess server or on some other ...
  61. This cmdlet is used to modify parameters a S2S Interface. If the interface is already connected, the changes take effect ...
  62. This cmdlet is used to obtain the current health of a Remote Access deployment. 1. Health of a specific Remote Access server ...
  63. This cmdlet is used to set authentication method of incoming S2S VPN interfaces on RRAS server i.e., when this server is ...
  64. This cmdlet modifies configuration that is common to both DirectAccess and VPN viz. the following 1. SSL certificate 2. Internal ...
  65. This cmdlet performs the following operations 1. Adds a new application server security group to the DirectAccess deployment ...
  66. This cmdlet performs the following operations 1. Removes one or more client machine security group(s) from the DirectAccess ...
  67. This cmdlet performs the following operations 1. Removes the specified lit of application server security groups from the ...
  68. This cmdlet performs the following operations for clients and down-level (Windows 7) clients 1. Adds one or more client machine ...
  69. This cmdlet removes an external RADIUS server from being used for one of the following purposes 1. VPN authentication 2. ...
  70. This cmdlet removes the Name Resolution Policy Table entry corresponding to the specified DNS suffix from the Name Resolution ...
  71. This cmdlet removes the specified Management servers from the DirectAccess deployment. Management server here refers to patch ...
  72. This cmdlet requires Administrator permissions. Open Windows PowerShell with administrator privilege, and then try again. ...
  73. This cmdlet sets the value of the utilization threshold. You can specify a threshold type of Over or Under. An alert is logged ...
  74. This cmdlet supports the common parameters: Verbose, Debug, ErrorAction, ErrorVariable, WarningAction, WarningVariable, OutBuffer, ...
  75. This cmdlet supports the workflow common parameters: PSComputerName, JobName, PSApplicationName, PSCredential, PSPort, PSConfigurationName, ...