Windows 7

  1. All the resource groups selected for migration were migrated successfully. You may now take the resource groups offline in ...
  2. All wave devices that can play files in the current format are in use. Wait until a wave device is free, and then try again. ...
  3. All wave devices that can record files in the current format are in use. Wait until a wave device is free, and then try again. ...
  4. All Windows Deployment Services PXE providers are required to export an initialization function 'PxeProviderInitialize'. ...
  5. Allow any authenticated user to update all DNS records with the same name. This setting applies only to DNS records for a ...
  6. Allow applications and services to prevent automatic sleep. If you enable this policy setting, any application, service or ...
  7. Allow Automatic Sleep with Open Network Files. If you enable this policy setting, the computer will automatically sleep when ...
  8. Allow communication through Windows Firewall Windows Firewall is currently set to block all incoming connections to this ...
  9. Allow log on through Remote Desktop Services This security setting determines which users or groups have permission to log ...
  10. Allow only connections that are both authenticated and integrity-protected by using IPsec. Compatible with Windows Vista ...
  11. Allow remote clients to connect to this server through either a dial-up connection or a secure virtual private network (VPN) ...
  12. Allow remote clients to connect to this server through the Internet and local clients to connect to the Internet using a ...
  13. Allow the focus of the Group Policy Snap-in to be changed when launching from the command line. This only applies if you ...
  14. Allow the selected computer to be changed when launching from the command line. This only applies if you save the console. ...
  15. Allow the selected computer to be changed when launching from the command line. This only applies if you save the console. ...
  16. Allow Windows to manage your network connections Windows functionality to manage wireless connectivity on this computer is ...
  17. Allow-Bypass action specified, but the rule does not meet allow-bypass criteria (inbound, authenticate/encrypt flags set, ...
  18. Allowed Classifies per Second is the rate of Windows Filtering Platform security rule evaluations which allow network activity. ...
  19. Allowed to write systemPossSuperiors and systemAuxClasses as possSuperiors and auxClasses, if schema circular dependencies ...
  20. Allowing a proxy address from a federated user could allow a malicious user to spoof an authorized user's credentials and ...
  21. Allowing active content such as script and ActiveX controls can be useful. However, active content might also harm your computer. ...
  22. Allowing connections to any port is a less secure configuration because it might allow access to all services inside the ...
  23. Allowing executable files to run with no restrictions on the command-line arguments will open the RD Session Host server ...
  24. Allowing nonsecure dynamic updates is a significant security vulnerability because updates can be accepted from untrusted ...
  25. Allowing unsecured communication may expose your network to security risks by allowing IP traffic to be sent with no authentication ...
  26. Allowing web content to open a program can be useful, but it can potentially harm your computer. Do not allow it unless you ...
  27. Allows Administrators to enable and disable the ability for Outlook Express users to save or open attachments that can potentially ...
  28. Allows Administrators to enable and disable the Media Explorer Bar and set the auto-play default. The Media Explorer Bar ...
  29. Allows administrators to use the Windows Firewall component in Control Panel to define a local port exceptions list. Windows ...
  30. Allows administrators to use the Windows Firewall component in Control Panel to define a local program exceptions list. Windows ...
  31. Allows configuration of components of the operating system used by a client computer to connect to a network. This includes ...
  32. Allows control of file operations via transactions to commit or abort changes. TRANSACTION /START | /COMMIT | /ROLLBACK | ...
  33. Allows errors to be reported when programs stop working or responding and allows existing solutions to be delivered. Also ...
  34. Allows files to be automatically copied and maintained simultaneously on multiple servers. If this service is stopped, file ...
  35. Allows inbound file and printer sharing. To do this, Windows Firewall opens UDP ports 137 and 138, and TCP ports 139 and ...
  36. Allows inbound file and printer sharing. To do this, Windows Firewall opens UDP ports 137 and 138, and TCP ports 139 and ...
  37. Allows or Denies new TS Connections. The second parameter is optional, if specified and set to TRUE, then enables or disables ...
  38. Allows or Denies retrieving IP address of SessionDirectory according as whether Value is set to 1 or 0 respectively. The ...
  39. Allows programs to execute as a user that does not have Administrator access rights, but can still access resources accessible ...
  40. Allows programs to execute with only access to resources granted to open well-known groups, blocking access Administrator ...
  41. Allows programs to open data files in specified directories as if they were in the current directory. APPEND drive:]path[;. ...
  42. Allows remote administration of this computer using administrative tools such as the Microsoft Management Console (MMC) and ...
  43. Allows remote administration of this computer using administrative tools such as the Microsoft Management Console (MMC) and ...
  44. Allows Remote Desktop Services administrators to install and configure programs remotely. By default, system administrators ...
  45. Allows setting of properties on the specified application pool. The exact application pool identifier must be provided and ...
  46. Allows setting of properties on the specified application. The exact application identifier must be provided and must resolve ...
  47. Allows setting of properties on the specified configuration section for the specified configuration path. If the configuration ...
  48. Allows setting of properties on the specified module. The exact module identifier must be provided and must resolve to an ...
  49. Allows setting of properties on the specified virtual directory. The exact virtual directory identifier must be provided ...
  50. Allows setting of properties on the specified virtual site. The exact site identifier must be provided and must resolve to ...
  51. Allows this computer to receive inbound Remote Desktop requests. To do this, Windows Firewall opens TCP port 3389. If you ...
  52. Allows this computer to receive inbound Remote Desktop requests. To do this, Windows Firewall opens TCP port 3389. If you ...
  53. Allows this computer to receive unicast responses to its outgoing multicast or broadcast messages. Note: This setting has ...
  54. Allows this computer to receive unsolicited inbound Plug and Play messages sent by network devices, such as routers with ...
  55. Allows this computer to receive unsolicited inbound Plug and Play messages sent by network devices, such as routers with ...
  56. Allows unrestricted network access for clients when the connection request matches the policy. Use this option for reporting ...
  57. Allows unrestricted network access until the specified date and time. After the specified date and time, health policy is ...
  58. Allows unsolicited incoming messages from specified systems that authenticate using the IPsec transport. If you enable this ...
  59. Allows UPnP devices to be hosted on this computer. If this service is stopped, any hosted UPnP devices will stop functioning ...
  60. Allows user-based policy processing, roaming user profiles, and user object logon scripts for interactive logons across forests. ...
  61. Allows users in other Directory environments that have federated trust relationships established with your enterprise's Active ...
  62. Allows users to connect interactively to a remote computer. Remote Desktop and Remote Desktop Session Host Server depend ...
  63. Allows users to install programs from removable media, such as floppy disks and CD-ROMs, during privileged installations. ...
  64. Allows users to search for installation files during privileged installations. This setting enables the Browse button in ...
  65. Allows users to upgrade programs during privileged installations. This setting permits all users to install patches, even ...
  66. Allows users to use the Add Printer Wizard to search the network for shared printers. If you enable this setting or do not ...
  67. Allows Web-based programs to install software on the computer without notifying the user. By default, when a script hosted ...
  68. Allows Windows Firewall to record information about the unsolicited incoming messages that it receives. If you enable this ...
  69. Allows you to analyze current systems settings against baseline settings that are stored in a database. The analysis results ...
  70. Allows you to configure a system with security settings stored in a database. The syntax of this command is: secedit /configure ...
  71. Allows you to configure how often a Distributed File System (DFS) client attempts to discover domain controllers on their ...
  72. Allows you to disable System Restore configuration through System Protection. System Restore enables users, in the event ...
  73. Allows you to disable System Restore. System Restore enables users, in the event of a problem, to restore their computers ...
  74. Allows you to disable Windows Messenger. If you enable this setting, Windows Messenger will not run. If you disable or do ...
  75. Allows you to export security settings stored in a database. The syntax of this command is: secedit /export /db filename ...