Syntax: Mtedit.exe [/domain:value] [/DC:value] [/forest:value] [/DisableTrustChecking] [filename] [/?] Parameters: /Domain:value Specifies the domains to be used with the "Populate from GPO" option. You can specify multiple domains. /DC:value Specifies the domain controller to use for the previously specified domain. If no domain controller is specified, any will be used. /Forest:value If specified, the Migration Table Editor will use all domains in the specified forest to populate the Domain list in the Select GPO dialog box used for the "Populate from GPO" option. This parameter can be specified multiple times in order to include domains from more than one forest. The forest name must be specified as the DNS name of the forest root domain in the forest. /DisableTrustChecking If this parameter is not specified, you can only access domains to which you have two-way trust. Filename Specifies the name of a migration table you want to open in the Editor. /? Displays help with usage.
Syntax: dsquery quota {domainroot | } -o {dn | rdn} -acct -qlimit -desc {-s | -d } -u -p { | *} -q -limit {-uc | -uco | -uci}] ...
Syntax: dsquery server -o {dn | rdn} -forest -domain -site -name -desc -hasfsmo {schema | name | infr | pdc | rid} -isgc ...
Syntax: dsquery slink -transport {ip | smtp} -o {dn | rdn} -name -desc {-s | -d } -u -p { | *} -q -gc -limit {-uc | -uco ...
Syntax: dsquery slinkbr -transport {ip | smtp} -o {dn | rdn} -name -desc {-s | -d } -u -p { | *} -q -gc -limit {-uc | -uco ...
Syntax: Mtedit.exe /domain:value /DC:value /forest:value /DisableTrustChecking filename /? Parameters: /Domain:value Specifies ...
Syntax: netsh wins server \ServerName | Address dump > FileName Parameters: ServerName - The name of the remote (non-local) ...
Synthesized POSIX offset for SID %1, computer %2. For more information about the compatibility of this operation with your ...
Sysprep USAGE: sysprep.exe /quiet /generalize /audit | /oobe /reboot | /shutdown | /quit /unattend: If no command-line arguments ...
System Additional Settings give you the ability to preset, and in some cases, lock down the users machine for certain functionality. ...