Windows 7

  1. By configuring Routing and Remote Access to act as a remote access server, you can connect remote or mobile workers to your ...
  2. By default administrator accounts are not displayed when attempting to elevate a running application. If you enable this ...
  3. By default users are allowed to share files within their profile to other users on their network once an administrator opts ...
  4. By default Windows Anytime Upgrade is available for all administrators. If you enable this policy setting, Windows Anytime ...
  5. By default, an Active Directory forest includes one domain. If necessary, you can deploy an additional domain to isolate ...
  6. By default, clients can receive security updates from Microsoft Update. If additional sources are required for your deployment, ...
  7. By default, clients can receive security updates from Microsoft Update. If additional sources are required for your deployment, ...
  8. By default, connections to wireless networks from your computer can be accessed by anyone with a user account on the computer ...
  9. By default, DNS uses the parent domain name when creating a Mail Exchange record. You can specify a host or child name, but ...
  10. By default, each instance of AD LDS running on an AD LDS server stores its database file and the associated log files in ...
  11. By default, IIS enables kernel-mode authentication, which may improve authentication performance and prevent authentication ...
  12. By default, only share permissions are set on this folder. To control local access permissions to this folder or objects ...
  13. By default, property values that have already been set are ignored during classification. To enable this rule to re-evaluate ...
  14. By default, Remote Desktop clients connect to network resources remotely through TCP port 3389. Specify whether to use TCP ...
  15. By default, Remote Desktop Services clients connect to network resources remotely through TCP port 3389, the port used for ...
  16. By default, Remote Desktop Services sessions use native Remote Desktop Protocol (RDP) encryption. However, RDP does not provide ...
  17. By default, Room Calibration assumes a directional microphone with unspecified frequency response. Check the box below if ...
  18. By default, snap-ins are added under the console root node. Selecting this check box enables you to choose the parent snap-in ...
  19. By default, users can add their computer to a homegroup on a home network. If you enable this policy setting, a user on this ...
  20. By default, when a Peer Group is created that allows for password-authentication (or the password for such a Group is changed), ...
  21. By default, Windows Firewall blocks all unsolicited incoming TCP/IP traffic. To remotely manage your DHCP servers that have ...
  22. By forcing the removal of Active Directory Domain Services (AD DS), you remove AD DS from this domain controller, including ...
  23. By participating you can help us improve the quality and relevance of your Help experience. The information collected is ...
  24. By resetting ADFS URL to empty, the default Rights Account Certification (RAC) URL will be used for ADFS trust. The current ...
  25. By saving the .INS file and .CAB files, you can use them for Automatic Configuration. The URL specified below will be entered ...
  26. By selecting this option you can save your credentials so that they can be used in the future when connecting to these programs. ...
  27. By selecting this option, the Remote Desktop Session Host server switches to the redirector mode and User Logon Mode will ...
  28. By selecting this option, this Remote Desktop Session Host server will no longer be configured as a dedicated farm for redirection ...
  29. By subscribing to a newsgroup, the newsgroup will remain in your Folders list for easy access. Click the Tools menu and then ...
  30. By unchecking this box, Windows will not control wired LAN. Consequently no wired LAN connection and security settings will ...
  31. By unchecking this box, Windows will not control wireless LAN. Consequently no wireless LAN connection and security settings ...
  32. By using a forwarder, you can manage name resolution for names that are outside of your network, such as names on the Internet ...
  33. By using RemoteApp together with RD Gateway, you can enable users to connect from the Internet to individual programs on ...
  34. Bypass traverse checking This user right determines which users can traverse directory trees even though the user may not ...
  35. bytes could not be read due to the presence of bad clusters on your hard disks, and so have not been backed up. Run CHKDSK ...
  36. bytes could not be restored because of bad clusters on the backup image. We recommend that you run the recovery again from ...
  37. bytes could not be written to the restored volume because of bad clusters on the recovered volume. We recommend that you ...
  38. Bytes of read I/Os that are received by ReadyBoost. This counter includes all reads whether or not they were satisfied by ...
  39. Bytes Received Per Second shows an estimate of the average number of bytes that were received each second over the past 30 ...
  40. Bytes Received/sec is the rate at which bytes are received by the local computer over an NBT connection to some remote computer. ...
  41. Bytes Received/sec is the rate at which bytes are received over each network adapter, including framing characters. Network ...
  42. Bytes Received/sec is the rate of bytes coming in to the Redirector from the network. It includes all application data as ...
  43. Bytes Sent/sec is the rate at which bytes are sent by the local computer over an NBT connection to some remote computer. ...
  44. Bytes Sent/sec is the rate at which bytes are sent over each network adapter, including framing characters. Network Interface\Bytes ...
  45. Bytes Total/sec is the rate at which bytes are sent and received over each network adapter, including framing characters. ...
  46. Bytes Total/sec is the rate at which bytes are sent or received by the local computer over an NBT connection to some remote ...
  47. Bytes Total/sec is the rate the Redirector is processing data bytes. This includes all application and file data in addition ...
  48. Bytes Total/sec is the sum of Bytes Sent/sec and Bytes Received/sec. This is the total rate of bytes transferred by the FTP ...
  49. Bytes Total/sec is the sum of Bytes Sent/sec and Bytes Received/sec. This is the total rate of bytes transferred by the Web ...
  50. Bytes Total/sec is the total rate of bytes sent to or received from the network by the protocol, but only for the frames ...
  51. Bytes Transmitted/sec is the rate at which bytes are leaving the Redirector to the network. It includes all application data ...
  52. C1 Time is the percentage of time the processor spends in the C1 low-power idle state. % C1 Time is a subset of the total ...
  53. C1 Time is the percentage of time the processor spends in the C1 low-power idle state. % C1 Time is a subset of the total ...
  54. C1 Transitions/sec is the rate that the CPU enters the C1 low-power idle state. The CPU enters the C1 state when it is sufficiently ...
  55. C2 Time is the percentage of time the processor spends in the C2 low-power idle state. % C2 Time is a subset of the total ...
  56. C2 Time is the percentage of time the processor spends in the C2 low-power idle state. % C2 Time is a subset of the total ...
  57. C2 Transitions/sec is the rate that the CPU enters the C2 low-power idle state. The CPU enters the C2 state when it is sufficiently ...
  58. C3 Time is the percentage of time the processor spends in the C3 low-power idle state. % C3 Time is a subset of the total ...
  59. C3 Time is the percentage of time the processor spends in the C3 low-power idle state. % C3 Time is a subset of the total ...
  60. C3 Transitions/sec is the rate that the CPU enters the C3 low-power idle state. The CPU enters the C3 state when it is sufficiently ...
  61. C:\WINDOWS> dir Directory of C:\WINDOWS SYSTEM 03-01-95 WIN COM 22,087 03-01-95 WIN INI 11,728 03-01-95 WELCOME EXE 19,539 ...
  62. CableManagementStrategy is a free-form string that contains information on how the various cables are connected and bundled ...
  63. Cables and links utilize physical connectors to actually 'connect' physical elements. This association explicitly defines ...
  64. Cache Bytes is the sum of the Memory\System Cache Resident Bytes, Memory\System Driver Resident Bytes, Memory\System Code ...
  65. Cache Bytes Peak is the maximum number of bytes used by the file system cache since the system was last restarted. This might ...
  66. Cache Faults/sec is the rate at which faults occur when a page sought in the file system cache is not found and must be retrieved ...
  67. Cache Stats: - Checks where cache exceeded limit = %1!10lu! Successful cache enforcement passes = %2!10lu! Failed cache enforcement ...
  68. Cached printer %1 has been scavenged and deleted. This printer's age (%2 seconds) has surpassed the expiry age of %3 seconds. ...
  69. Cached printer %1 has been scheduled for deletion due to a logon scavenging operation. This printer is no longer referenced ...
  70. Cached: Amount of memory (including Standby and Modified memory) containing cached data and code for rapid access by processes, ...
  71. Calendar agent failed to determine the primary calendar for mailbox: %1. For more information, click http://www.microsoft.com/contentredirect.asp. ...
  72. Calendaring agent failed in the following function with error code %1. For more information, click http://www.microsoft.com/contentredirect.asp. ...
  73. Calendaring agent failed in the following function with error code: %1. For more information, click http://www.microsoft.com/contentredirect.asp. ...
  74. Calendaring agent failed to initialize with error %1. For more information, click http://www.microsoft.com/contentredirect.asp. ...
  75. Calendaring agent failed to open registry with error code %1. For more information, click http://www.microsoft.com/contentredirect.asp. ...