Windows 8.1

  1. Use the World Wide Web method to activate a license server or install licenses by connecting to the Microsoft Remote Desktop ...
  2. Use these options to automatically remove the application when it is no longer managed, publish OLE information in the active ...
  3. Use these settings to open a port through Windows Firewall. Choose a meaningful name you'll remember. To find the port number ...
  4. Use these steps to create and manage the enforcement clients, specify user interface settings for the Network Access Protection ...
  5. Use these steps to specify the certification authorities that the health registration authority uses, and configure cryptographic ...
  6. Use these steps to specify the security mechanism by which a client computer communicates with a health registration authority ...
  7. Use these Windows Easy Transfer Reports to help you see what was transferred and to see what apps you might want to install ...
  8. Use this feature to enable computers using BITS (Background Intelligent Transfer Service) to upload files to virtual directories. ...
  9. Use this option for excluding rights account certificates of external users who do not have an Active Directory Domain Services ...
  10. Use this option for excluding rights account certificates of internal users who have an Active Directory Domain Services ...
  11. Use this option if there are computers on your network that do not support IPsec or have an incompatible IPsec configuration. ...
  12. Use this option to provide a central location on your network for users to share files or for server applications that open ...
  13. Use this option to provide storage for server applications or virtual machines that leave files open for extended periods ...
  14. Use this option to specify the days and times at which replication occurs by default. The initial replication schedule has ...
  15. Use this section to configure auditing based on your auditing objectives. The auditing policy determines the success and ...
  16. Use this section to configure protocols used to communicate with other computers. When configured to communicate with computers ...
  17. Use this section to configure rules for Windows Firewall with Advanced Security based on the roles and administrative options ...
  18. Use this section to configure services based on the selected server's roles and other features. These roles and other features ...
  19. Use this section to save the policy you have created. You can apply it to the selected server now, or you can apply it to ...
  20. Use this snap-in to manage Windows Deployment Services. Windows Deployment Services is used to deploy the Windows operating ...
  21. Use this snap-in to quickly and reliably deploy the latest updates to your computers. To connect to a remote server, on the ...
  22. Use this tab to configure the Remote Desktop Services startup environment. These settings override client-specified settings. ...
  23. Use this tab to configure the Remote Desktop Services user profile. Settings in this profile apply to Remote Desktop Services. ...
  24. Use this template to create a basic Data Collector Set. You can add or remove counters and change the scheduling options ...
  25. Use this to indicate if the template associated with this event contains valid WinRT types i.e. the event payload fields ...
  26. Use this Web site to request a certificate for your Web browser, e-mail client, or other program. By using a certificate, ...
  27. Use this wizard to determine how much content to make available offline. You can also set up a schedule to synchronize the ...
  28. Use this wizard to quickly schedule a common task. For more advanced options or settings such as multiple task actions or ...
  29. Use this wizard to set up DirectAccess with basic settings. After completing this wizard, click the Configuration node to ...
  30. Use Windows PowerShell to reconfigure how the storage file paths are allocated to the pool so that a child pool is always ...
  31. Use Windows PowerShell to reconfigure the storage resource pools so that multiple pools do not use the same storage path. ...
  32. Use your favorite email address to sign in to Windows. If you already use an email address to sign in to PCs running Windows, ...
  33. Use your natural handwriting style. For example, if you normally write in cursive, copy the sentences in cursive. If you ...
  34. UseCustomSorting requires an object that implements IResultNodeComparer and the MMCListView.Sorter property set to the object. ...
  35. Used Average is the current number of resources (buffers) in use at this time. The number in parentheses following the resource ...
  36. used Dynamic Signature Service to discard obsolete signatures. Current Signature Version:%b%3 Signature Type:%b%12 Current ...
  37. used Dynamic Signature Service to retrieve additional signatures to help protect your machine. Current Signature Version:%b%3 ...
  38. Used for any of the following tasks: - Display the hardware IDs of storage on the system. - Have MSDSM claim/unclaim MPIO ...
  39. Used in LDAP URLs for the Authority Information Access extension Specifies the object class as certification authority Example ...
  40. Used in LDAP URLs for the CRL Distribution Points extension Specifies the object class as CRL distribution point Example ...
  41. Used in LDAP URLs Inserts the container name of the configuration data partition Example location: ldap:///CN= ,CN= ,CN=CDP,CN=Public ...
  42. Used in URLs and paths Derived from the name of the CA, guaranteed to be unique and less than 64 chars Example location: ...
  43. Used in URLs and paths Derived from the name of the CA, guaranteed to be unique and less than 64 chars Example location: ...
  44. Used in URLs and paths for the Authority Information Access extension Appends a suffix to distinguish the certificate file ...
  45. Used in URLs and paths for the CRL Distribution Points extension Appends a suffix to distinguish the CRL file name Example ...
  46. Used in URLs and paths Inserts the DNS name of the server Example location: http:// /CertEnroll/ _ .crt Or (for OCSP) http:// ...
  47. Used in URLs and paths Substitutes the Delta CRL file name suffix for the CRL file name suffix, if appropriate Example location: ...
  48. Used Maximum is the maximum number of NetBEUI resources (buffers) in use at any point in time. This value is useful in sizing ...
  49. Used to add sites to their respective Trusted' or Intranet' zones. This is to mitigate some of the problems that the applications ...
  50. Used to discover and locate other PCs, devices, and network infrastructure components on the network. Also used to determine ...
  51. Used to modify the options attribute of an NTDS Site Settings Object. SYNTAX /siteoptions DSA /site: {+|-}IS_AUTO_TOPOLOGY_DISABLED ...
  52. Useful for tools that must always be available, such as remote administration tools. If you specify this option, you must ...
  53. User "%1" is currently logged on. If you delete the user, they will not be able to log on to the computer again, unlock the ...
  54. User %1 cannot be authenticated with OTP. Ensure that a DN is defined for the user name in Active Directory. Error code: ...
  55. User %1 cannot be authenticated with OTP. Ensure that a UPN is defined for the user name in Active Directory. Error code: ...
  56. User %1\%2 will be logged on to the local redirector machine (assuming TS Farm scenario). Sending local IP address to the ...
  57. User '[2]' has previously initiated an install for product '[3]'. That user will need to run that install again before they ...
  58. User '[2]' has previously initiated an install for product '[3]'. That user will need to run that install again before they ...
  59. User ({0}) could not be excluded since this user has not been issued a rights account certificate by your AD RMS cluster. ...
  60. User ({0}) to be excluded cannot be found in database and there is no AD RMS account certificate issued by this installation ...
  61. User / Device claims information. Subject: Security ID: %1 Account Name: %2 Account Domain: %3 Logon ID: %4 Logon Type: %9 ...
  62. User / Device Claims This policy allows you to audit user and device claims information in the user's logon token. Events ...
  63. User Account Changed: Target Account Name: %2 Target Domain: %3 Target Account ID: %4 Caller User Name: %5 Caller Domain: ...
  64. User Account Control is turned on, but you must restart your PC for the change to take effect. How does User Account Control ...
  65. User Account Control: Allow UIAccess applications to prompt for elevation without using the secure desktop. This policy setting ...
  66. User Account Control: Behavior of the elevation prompt for administrators in Admin Approval Mode This policy setting controls ...
  67. User Account Control: Behavior of the elevation prompt for standard users This policy setting controls the behavior of the ...
  68. User Account Control: Detect application installations and prompt for elevation This policy setting controls the behavior ...
  69. User Account Control: Only elevate executable files that are signed and validated This policy setting enforces public key ...
  70. User Account Control: Only elevate UIAccess applications that are installed in secure locations This policy setting controls ...
  71. User Account Control: Switch to the secure desktop when prompting for elevation This policy setting controls whether the ...
  72. User Account Control: Turn on Admin Approval Mode This policy setting controls the behavior of all User Account Control (UAC) ...
  73. User Account Control: Use Admin Approval Mode for the built-in Administrator account This policy setting controls the behavior ...
  74. User Account Control: Virtualize file and registry write failures to per-user locations This policy setting controls whether ...
  75. User Account Created: New Account Name: %1 New Domain: %2 New Account ID: %3 Caller User Name: %4 Caller Domain: %5 Caller ...