Windows Server 2008

  1. You can specify which components go in each of the installation options. The description text field will only be seen if ...
  2. You can specify which extensions to enable, in order to add or remove functionality in your console, snap-in, or extension. ...
  3. You can synchronize the Internet Explorer 7 version available on your machine with the latest version available on the web. ...
  4. You can synchronize this page any time you are connected by choosing Synchronize from the Tools menu. You can also set up ...
  5. You can transfer files and settings from more than one drive to a single drive on the new computer. Files and folders with ...
  6. You can turn the touch pointer on or off in Pen and Input Devices under Mobile PC in Control Panel, or by tapping the touch ...
  7. You can type up to 15 letters, numbers, spaces and underscores. If you create a new name, you might want to use this name ...
  8. You can use a fax server to share and manage network fax resources from a central location, which enables users to send and ...
  9. You can use a pen to do many of the things that you can do with a mouse. For example, you can move the pointer around on ...
  10. You can use a recovery disc to restore your computer using system recovery options if you do not have a Windows installation ...
  11. You can use a stand-alone production installation, where the UDDI Services Web Application and UDDI Services Database are ...
  12. You can use a USB flash drive to add computers and devices to your network. Check the device manual to see if you can use ...
  13. You can use a wizard in the NPS console to configure Network Access Protection (NAP). To open the NPS console after installation, ...
  14. You can use Active Directory Federation Services (AD FS) to provide users on your network with access to federated applications ...
  15. You can use an FTP site when you want customers to upload or download files. After you publish the address of the FTP site, ...
  16. You can use an identity integration product, such as Identity Management for UNIX (available in Windows Server 2003 R2 and ...
  17. You can use command-line tools to synchronize data from Active Directory Domain Services (AD DS) to an AD LDS configuration ...
  18. You can use Device Manager to view a list of hardware devices installed on your computer and set properties for each device. ...
  19. You can use dynamic disks to create software-based RAID volumes that can be mirrored, or they can be striped or spanned across ...
  20. You can use dynamic disks to create software-based volumes that can be mirrored, or they can be striped or spanned across ...
  21. You can use either UNIX-style password and group files or Network Information Service (NIS) servers to create maps for UNIX-style ...
  22. You can use filename character mappings to replace characters which NFS supports but NTFS does not with characters NTFS does ...
  23. You can use flicks to quickly navigate and perform common shortcuts using your finger. For example, performing a downward ...
  24. You can use information about how these programs operate to choose whether to deny them or permit them to run on your computer. ...
  25. You can use Input Panel to enter text almost anywhere that you can use a standard keyboard to enter text. Input Panel converts ...
  26. You can use Network Policy Server (NPS) as a RADIUS proxy to forward connection requests from RADIUS clients, such as VPN ...
  27. You can use Network Policy Server (NPS) to deploy Network Access Protection (NAP), which is a client health policy creation, ...
  28. You can use Network Policy Server (NPS) to perform authentication and authorization for connection requests from users and ...
  29. You can use Network Policy Server (NPS) to perform centralized authentication and authorization of connection requests from ...
  30. You can use Network Policy Server (NPS) to perform centralized authentication and authorization of connection requests from ...
  31. You can use Print Management to list or remove printers in Active Directory Domain Services (AD DS). This makes it easier ...
  32. You can use Print Management to update or add printer drivers to the server. This allows client computers to automatically ...
  33. You can use Print Management with Group Policy to automatically add printer connections to a computer's Printers folder. ...
  34. You can use printer filters to display only those printers that meet a certain set of criteria, such as printers that are ...
  35. You can use routing methods to control what happens to faxes that are received by the server. You can use any combination ...
  36. You can use shadow copies to restore previous versions of files that have been accidentally modified or deleted. What are ...
  37. You can use Tablet PC Input Panel to enter text almost anywhere that you can use a standard keyboard to enter text. Input ...
  38. You can use Task Scheduler to create and manage common tasks that your computer will carry out automatically at the times ...
  39. You can use Terminal Services Configuration to configure settings for new connections, modify the settings of existing connections, ...
  40. You can use the Active Directory Certificate Services Client software to host the certificate enrollment Web pages on a separate ...
  41. You can use the Delegation of Control Wizard to delegate administrative control of a particular domain or organizational ...
  42. You can use the Internet Connection Wizard (ICW) to customize what users will see as the sign-up interface. You can customize ...
  43. You can use the Journal Note Writer print driver to capture an electronic image of your document that you can navigate, print, ...
  44. You can use the Printer Migration Wizard or the Printbrm.exe command-line tool to export print queues, printer settings, ...
  45. You can use the recovery disc, instead of a Windows installation disc, to restore your computer using Startup Repair or other ...
  46. You can use the recovery disc, instead of a Windows installation disc, to restore your computer using system recovery options. ...
  47. You can use the touch pointer to interact with objects on the screen. For example, you can use the touch pointer to double-tap ...
  48. You can use the touch pointer to more precisely target objects on the screen. For example, you may find that it's easier ...
  49. You can use these settings to configure clients to connect through a specific TS Gateway server when they use RemoteApp programs ...
  50. You can use this printer to save any document or picture as an XPS document (.xps) file. Print to the Microsoft XPS Document ...
  51. You can use this space to list the computer and group records that are in the WINS database. To list the records, click Action, ...
  52. You can use this wizard to configure backups to run on a regular schedule. To create a backup schedule, you should first ...
  53. You can use this wizard to configure Windows Deployment Services. After completing configuration you may optionally add images ...
  54. You can use this wizard to recover files, applications, and volumes from a backup. You can recover data from the local computer ...
  55. You can use wildcards to add all sub-domains for a given domain. For example, you can add *.microsoft.com to the list, which ...
  56. You can use Windows Deployment Services to deploy an image that contains a Windows installation as well as many other applications ...
  57. You can use Windows Deployment Services to install and configure Microsoft Windows operating systems remotely on computers ...
  58. You can use Windows Easy Transfer to transfer files and settings from a computer running Microsoft Windows XP or Windows ...
  59. You can use your finger to do many of the things that you can do by using a mouse. For example, you can move the pointer ...
  60. You can use your finger to double-tap items in the same way that you use a mouse to double-click items. For example, you ...
  61. You can use your finger to single-tap items in the same way that you use a mouse to single-click items. For example, you ...
  62. You can use your pen to double-tap items in the same way that you use a mouse to double-click items. For example, you can ...
  63. You can use your set-top box remote control to identify the codes that Windows Media Center uses to control your set-top ...
  64. You can view simulated policy settings for a selected user (or a container with user information) and computer (or a container ...
  65. You can view the display name for this trust policy and specify additional display names that will be associated with this ...
  66. You can view this folder in Windows Explorer. To view this folder, click Allow when you see the Internet Explorer Security ...
  67. You can't move your King onto a square that is under attack by another piece. Your opponent has a piece on the board that ...
  68. You can't print pictures that use this file format. Use Paint or another image editing program to save the picture in a standard ...
  69. You can't remove %1 because this object is inheriting permissions from its parent. To remove %1, you must prevent this object ...
  70. You can't write files that are greater than 2GB to a disc. You can remove any files that are greater than 2GB and try again. ...
  71. You cannot add any more replicated folders to this wizard. If you need to add more replicated folders, complete this wizard, ...
  72. You cannot add more key exchange security methods. The maximum of %d key exchange security methods have already been added ...
  73. You cannot add more than 10 additional authentication methods. Please remove an existing authentication method in order to ...
  74. You cannot bring the group online because the owner of the group is not in the preferred list for the group. To change the ...
  75. You cannot configure the properties of an individual incoming connection. Please configure the properties of the 'Incoming ...