Windows 8.1

  1. This cmdlet updates the list of Management servers of the DirectAccess deployment. Management server here refers to patch ...
  2. This cmdlet will change the IPAM GPO prefix from %1 to %2. The cmdlet will not create any new GPOs. Use the Invoke-IpamGpoProvisioning ...
  3. This cmdlet will configure IPAM to use database %1 on server %2. IPAM will verify the database before making this configuration. ...
  4. This cmdlet will configure IPAM to use the Group Policy based provisioning method. This will not create required Group Policy ...
  5. This cmdlet will configure IPAM to use the Group Policy based provisioning method. This will not create required Group Policy ...
  6. This cmdlet will disable %1 for IPAM. This will not delete any data for the capability that IPAM has previously gathered. ...
  7. This cmdlet will edit the properties of server %1 in IPAM. Deleting a server role will remove this server role from being ...
  8. This cmdlet will edit the properties of server %1 in IPAM. Setting manageability status to Unmanaged will remove all configuration ...
  9. This cmdlet will edit the properties of server %1 in IPAM. Setting manageability status to Unmanaged will remove all configuration ...
  10. This cmdlet will edit the properties of the server with name %1. Setting manageability status to Unmanaged will remove all ...
  11. This cmdlet will enable %1 for IPAM. IPAM will now start collecting data related to the capability. You can disable the capability ...
  12. This cmdlet will provision IPAM on %1. As a part of provisioning, this cmdlet will provision IPAM to use Microsoft SQL Server ...
  13. This cmdlet will provision IPAM on %1. As a part of provisioning, this cmdlet will provision IPAM to use Microsoft SQL Server ...
  14. This cmdlet will provision IPAM on %1. As a part of provisioning, this cmdlet will provision IPAM to use Microsoft SQL Server ...
  15. This cmdlet will provision IPAM on %1. As a part of provisioning, this cmdlet will provision IPAM to use Microsoft SQL Server ...
  16. This cmdlet will provision IPAM on %1. As a part of provisioning, this cmdlet will provision IPAM to use Windows Internal ...
  17. This cmdlet will update the IPAM server. As a part of update, this cmdlet will update the database and also update user roles ...
  18. This collection includes the Random, Swirl, Warp, Anon, Falloff, Water, Bubble, Dizzy, Windmill, Niagara, Blender, X Marks ...
  19. This color profile is a system default profile. It is also a read-only file. Are you sure you want to remove it from the ...
  20. This column is a list of names of services or load ordering groups that the system must start before this service. Names ...
  21. This column specifies the action taken by the startup program if the service fails to start during startup. One of the following ...
  22. This COM name is being used by another device (such as another com port or modem). Using duplicate names can lead to inaccessible ...
  23. This command activates or deactivates the TPM. This command requires physical presence at the computer and cannot be run ...
  24. This command allows an admin to view or modify the password replication policy for RODCs. /prp ADDITIONAL_ARGS can be either ...
  25. This command allows an entity with knowledge of the migration authorization ticket (as generated by TPM_CMK_CreateTicket) ...
  26. This command allows an entity with knowledge of the migration authorization ticket of a key (as created with TPM_CMK_CreateTicket) ...
  27. This command allows an owner of a loaded key to obtain the public key value of that key. The loaded key is created using ...
  28. This command allows or disallows the ability to set an owner. This command requires physical presence at the computer and ...
  29. This command allows software to protect secrets so that they are released only if a specified computer configuration is validated. ...
  30. This command allows the operator of the computer to deactivate the TPM until the next computer restart. The operator must ...
  31. This command allows the owner of the counter to release the specified counter. This command stops all subsequent reads or ...
  32. This command allows the TPM owner to change the TPM owner authorization value or the storage root key (SRK) authorization ...
  33. This command allows the TPM owner to clear the TPM. This means that the only key remaining on the TPM is the endorsement ...
  34. This command allows the TPM owner to create a maintenance archive that enables the migration of data held by the TPM. This ...
  35. This command allows the TPM owner to create a migration authorization ticket so that users can move keys without involvement ...
  36. This command allows the TPM owner to create a new monotonic counter, assign an authorization value to that counter, increment ...
  37. This command allows the TPM owner to create a signature verification ticket using a provided public key. This ticket is used ...
  38. This command allows the TPM owner to create an authorization ticket for one or more migration authorities so that users can ...
  39. This command allows the TPM owner to define space for an area of non-volatile storage on the TPM. This definition includes ...
  40. This command allows the TPM owner to enable or disable the TPM. See the descriptions for the TPM_PhysicalEnable and TPM_PhysicalDisable ...
  41. This command allows the TPM owner to establish the Direct Anonymous Attestation (DAA) parameters in the TPM for a specific ...
  42. This command allows the TPM owner to generate an Attestation Identity Key (AIK) that can be used to sign information generated ...
  43. This command allows the TPM owner to load a maintenance archive (generated by TPM_CreateMaintenanceArchive). When loaded, ...
  44. This command allows the TPM owner to load a row of a delegation tables into the TPM's non-volatile storage. This command ...
  45. This command allows the TPM owner to manage delegation family tables. Run this command at least once before running delegation ...
  46. This command allows the TPM owner to permanently disable the TPM_OwnerClear command. Once used, the owner must run the TPM_ForceClear ...
  47. This command allows the TPM owner to prevent the creation of a maintenance archive using the TPM_CreateMaintenanceArchive ...
  48. This command allows the TPM owner to release the specified counter. This stops all subsequent reads or increments of the ...
  49. This command allows the TPM owner to return the public portion of the TPM endorsement key (EK) or storage root key (SRK). ...
  50. This command allows the TPM owner to set certain attributes such as whether the key can be evicted by anyone but the owner. ...
  51. This command allows the TPM owner to set the audit flag for a given command number. When this flag is turned on, the command ...
  52. This command allows the TPM owner to unwrap the session key that allows for the decryption of the Attestation Identity Key ...
  53. This command allows the TPM to migrate a blob (as generated by TPM_CreateMigrationBlob or TPM_CMK_CreateBlob) to a destination ...
  54. This command cannot be executed because the Connection URI is not in correct format. Please check the connection uri and ...
  55. This command cannot be run because either the parameter "{0}" has a value that is not valid or cannot be used with this command. ...
  56. This command cannot be run because the debugger cannot be attached to the process "{0} ({1})". Specify another process and ...
  57. This command cannot be run because the file path '{0}' is not valid. Please provide a valid file path and then run the command. ...
  58. This command cannot be run because the input "{0}" is not a valid Application. Give a valid application and run your command ...
  59. This command cannot be run because the prefix value in the Namespace parameter is null. Provide a valid value for the prefix, ...
  60. This command cannot be run due to error 1783. The possible cause of this error can be using of a non-existing user "{0}". ...
  61. This command cannot be run due to the following error: the service cannot be started because it is disabled or does not have ...
  62. This command cannot be used because the configuration is corrupted. Run WinRM invoke Restore WinRM/config to restore the ...
  63. This command cannot be used because the parameter does not match any properties on the ResourceURI.Check the input parameters ...
  64. This command cannot be used because the parameter matches a non-text property on the ResourceURI.Check the input parameters ...
  65. This command cannot be used because the parameter matches multiple properties on the ResourceURI.Check the input parameters ...
  66. This command cannot be used because the parameter value type is invalid. {0} configuration expects a value of Type {1}. Verify ...
  67. This command cannot be used from the current path. Move to root path of the provider using cd\ and run your command again. ...
  68. This command cannot be used in multi-tenant deployment. Use RemoteAccess PowerShell cmdlets for viewing or modifying the ...
  69. This command cannot be used to remove the computer 'localhost' because it will always be connected. Give some other connected ...
  70. This command cannot be used without Basic or Digest authentication algorithm because credentials are specified.Use Basic ...
  71. This command cannot be used without credential because the authentication algorithm is Basic or Digest. Use Credentials parameter ...
  72. This command cannot set the input value because these values are Primary keys or Container items of the resource object. ...
  73. This command certifies a loaded key (created by TPM_LoadKey2) with the public portion of another key. A TPM identity key ...
  74. This command clears a revocable TPM endorsement key (generated by TPM_CreateRevocableEK) and resets the TPM, if it finds ...
  75. This command clears the TPM. This command requires physical presence at the computer and cannot be run by the operating system. ...