Windows 8.1

  1. This option allows the computer to be trusted for delegation. Trusting the computer for delegation is a security-sensitive ...
  2. This option allows the wizard to configure and maintain your domain name automatically. You may need to purchase a SSL certificate ...
  3. This option allows you to move the virtual machine without moving its virtual hard disks. The virtual machine's virtual hard ...
  4. This option allows you to specify locations to move the virtual hard disks and automatically move the other virtual machine ...
  5. This option audits both successful changes and failed attempts to system and configuration files, allowing you to determine ...
  6. This option audits successful changes to system and configuration files, allowing you to reconstruct events after the fact ...
  7. This option automatically creates a new instance of AD LDS that uses the default configuration and schema partitions. The ...
  8. This option compacts the file size of a virtual hard disk. The storage capacity of the virtual hard disk remains the same. ...
  9. This option configures two-way replication between two servers, such as a branch server and a hub (destination) server. This ...
  10. This option converts a virtual hard disk by copying the contents to a new virtual hard disk. The new virtual hard disk can ...
  11. This option copies a new unattended Setup answer file to an existing image. You can copy the answer file from an existing ...
  12. This option copies the contents of a supported Windows CD and associates a standard unattended Setup answer file with the ...
  13. This option creates a new instance of AD LDS that uses the configuration and schema partitions replicated from another instance ...
  14. This option creates a virtual hard disk that provides up to {0} GB of storage. This format is compatible with earlier versions ...
  15. This option deletes the member from the replication group and stops replicating the folder on the member. However, users ...
  16. This option deletes the member from the replication group, stops replicating the replicated folder on the member, and removes ...
  17. This option deletes the replication group and stops replicating the folder. However, users can still use the namespace to ...
  18. This option deletes the replication group, stops replicating the replicated folder, and removes the replicated folder from ...
  19. This option digitally signs all file and print traffic. This signing is processor intensive, so it is recommended only if ...
  20. This option does not need to be selected if you remotely manage this server using Remote Destkop Server for Remote Desktop ...
  21. This option enables higher-quality audio CDs, such as HDCDs, to play back at their full audio quality. The audio quality ...
  22. This option installs a complete installation of Windows Server, with some optional features available for installation remotely. ...
  23. This option is not available when the snap-in is targeted at a Read-only Domain Controller. You must connect to a writable ...
  24. This option is only available from the server console, and only if the server meets one of these conditions: - The server ...
  25. This option is recommended for most production scenarios. You should use a certificate issued by an external certification ...
  26. This option is recommended for small-scale deployments or test scenarios only. After installing the server, you must manually ...
  27. This option is recommended if you don't want to use SSL, or if you plan to request a certificate from a CA and import it ...
  28. This option is useful when a GUI is required for example, to provide backward compatibility for an application that cannot ...
  29. This option is useful when a GUI is required for example, to provide backward compatibility for an application that cannot ...
  30. This option moves the virtual machine's items to the destination computer by reusing the locations configured on the source ...
  31. This option requires a 24-bit audio device. If you experience sound or computer problems while playing audio CDs, clear this ...
  32. This option requires the latest Integration Components be installed in the guest. For non-Windows guest operating systems, ...
  33. This option shares the replicated folder, applies shared folder permissions to new shared folders, and publishes the replicated ...
  34. This option specifies an upper bound for how long a client should wait before refreshing information retrieved from DHCPv6 ...
  35. This option specifies an upper bound for how long a client should wait before refreshing information retrieved from DHCPv6 ...
  36. This option specifies the client affinity. The possible values are None, Single and Network. Single and Network are used ...
  37. This option stops replicating the replicated folder and deletes the replicated folder from the replication group. The replicated ...
  38. This option stops replicating the replicated folder, deletes the replicated folder from the replication group, and removes ...
  39. This optional class allows the author to 'reserve' a specified amount of disk space in any directory, depending on the installation ...
  40. This organization won't allow you to sign in here with this Microsoft account. To continue, sign in with a different Microsoft ...
  41. This package will no longer be placed on the computer's desktop of every user. It will continue to be installed for users ...
  42. This page has been rated by a rating system that you do not have installed. For more information about these ratings, connect ...
  43. This page is a backup of Trusted Platform Module (TPM) owner authorization information. Upon request, use the authorization ...
  44. This page is a backup of Trusted Platform Module (TPM) security hardware owner password information. Upon request, use the ...
  45. This page is attempting to make or monitor telephone calls or other multimedia connections on your computer. Do you want ...
  46. This page lists Windows Firewall rules that are needed for the roles and other options you have selected. Selected rules ...
  47. This page provides potentially unsafe information to an ActiveX control. Your current security settings prohibit running ...
  48. This page shows servers that are running Windows Server 2012, and that have been added by using the Add Servers command in ...
  49. This page shows the status of Active Directory and SYSVOL (DFSR) replication for this domain as it relates to Group Policy. ...
  50. This page shows the status of Active Directory and Sysvol (FRS) replication for this domain as it relates to Group Policy. ...
  51. This page shows the status of Active Directory and SYSVOL (FRS) replication for this domain as it relates to Group Policy. ...
  52. This page uses fonts that need to be temporarily installed. This is usually safe. Do you want to allow these fonts to be ...
  53. This parameter determines the property of the IPsec connection to the application servers and can take one of the following ...
  54. This parameter enables a user to filter the statistics of active connections based on the server (resource) that the end-user ...
  55. This parameter has relevance only when the Dialect parameter exists, and its value is specified as Association. Otherwise ...
  56. This parameter indicates whether the bad sectors should be located and the readable information should be recovered from ...
  57. This parameter indicates whether the chkdsk operation should be performed at next boot up time, in case the operation could ...
  58. This parameter indicates whether the volume should be dismounted to a no-automount (offline) state. The volume may be returned ...
  59. This parameter is a Win32_DefragAnalysis object that contains properties describing the extent to which the volume is fragmented. ...
  60. This parameter is applicable only in case of multisite deployment and represents the name to be used when creating the down-level ...
  61. This parameter is only applicable in case of a multi-site deployment and represent the names of one or more down-level client ...
  62. This parameter is the volume that is to be shadowed. This parameter can be specified as a volume drive letter, mount point ...
  63. This parameter is the volume that is used for the shadow copy. This volume is sometimes referred to as the 'original' volume. ...
  64. This parameter is the volume to be used to store the shadow differential area. If this paramter is not supplied the specified ...
  65. This parameter is used to change the configuration in which DirectAccess has been deployed. It can take one of the following ...
  66. This parameter is used to configure Teredo. It can take one of the following values 1. Enabled 2. Disabled Following are ...
  67. This parameter is used to enable/disable health checks for DirectAccess clients. It can take one of the following values ...
  68. This parameter is used to force the original volume to dismount before starting the revert operation. Forcing a volume to ...
  69. This parameter is used to specify the list of drives that should be excluded from autochk at next reboot. The string syntax ...
  70. This parameter is used to specify the list of drives that should be scheduled for autochk at next reboot. The string syntax ...
  71. This parameter is used to specify the list of volumes that should be excluded from autochk at next reboot. The string syntax ...
  72. This parameter is used to specify the list of volumes that should be scheduled for autochk at next reboot. The string syntax ...
  73. This parameter is used to specify the time duration for which store should be emptied and indicates the start date. If no ...
  74. This parameter is used to specify the time duration for which the statistics of historical connections is to be retrieved ...
  75. This parameter is used to specify the time duration for which the statistics of historical connections is to be retrieved ...