%1 -- Use CA's registry key %2 -- Use CA's restore registry key %3 -- Use policy module's registry key %4 -- Use first exit module's registry key %5 -- Use template registry key (use -user for user templates) %6 -- Use enrollment registry key (use -user for user context) %7 -- Use chain configuration registry key %8 -- Use Policy Servers registry key %9 -- Use policy or exit module's ProgId (registry subkey name) RegistryValueName -- registry value name (use "Name*" to prefix match) Value -- new numeric, string or date registry value or filename. If a numeric value starts with "+" or "-", the bits specified in the new value are set or cleared in the existing registry value. If a string value starts with "+" or "-", and the existing value is a REG_MULTI_SZ value, the string is added to or removed from the existing registry value. To force creation of a REG_MULTI_SZ value, add a " " to the end of the string value. If the value starts with "@", the rest of the value is the name of the file containing the hexadecimal text representation of a binary value. If it does not refer to a valid file, it is instead parsed as [Date][+|-][%11] -- an optional date plus or minus optional days and hours. If both are specified, use a plus sign (+) or minus sign (-) separator. Use "%10+%11" for a date relative to the current time. Use "%7\%12 @%10" to effectively flush cached CRLs.
Use an existing smart card certificate Search the smart card for an existing file encryption certificate and use it to encrypt ...
Use an instance of this class to allow the client to give a hint to the DS Instance Provider to scope enumerations and queries ...
Use authentication to ensure that you are sending the file to the correct device. The authentication also protects the file ...
Use Basic authentication with an SSL binding, and make sure that the site or application is set to require SSL. Alternatively, ...
Use CA's registry key %2 - Use CA's restore registry key %3 - Use policy module's registry key %4 - Use first exit module's ...
Use Contacts to store contact information, such as e-mail addresses, home or business addresses, and phone numbers. To create ...
Use Credential Manager to store credentials, such as user names and passwords, in vaults so you can easily log on to computers ...
Use DFS Replication to replicate data from a server in a branch office to a server in a hub office or data center for backup ...
Use double quotes if a string contains spaces. Default is "*". /k Specifies to search in key names only. /d Specifies the ...