Windows 8.1
- Use the World Wide Web method to activate a license server or install licenses by connecting to the Microsoft Remote Desktop ...
- Use these options to automatically remove the application when it is no longer managed, publish OLE information in the active ...
- Use these settings to open a port through Windows Firewall. Choose a meaningful name you'll remember. To find the port number ...
- Use these steps to create and manage the enforcement clients, specify user interface settings for the Network Access Protection ...
- Use these steps to specify the certification authorities that the health registration authority uses, and configure cryptographic ...
- Use these steps to specify the security mechanism by which a client computer communicates with a health registration authority ...
- Use these Windows Easy Transfer Reports to help you see what was transferred and to see what apps you might want to install ...
- Use this feature to enable computers using BITS (Background Intelligent Transfer Service) to upload files to virtual directories. ...
- Use this option for excluding rights account certificates of external users who do not have an Active Directory Domain Services ...
- Use this option for excluding rights account certificates of internal users who have an Active Directory Domain Services ...
- Use this option if there are computers on your network that do not support IPsec or have an incompatible IPsec configuration. ...
- Use this option to provide a central location on your network for users to share files or for server applications that open ...
- Use this option to provide storage for server applications or virtual machines that leave files open for extended periods ...
- Use this option to specify the days and times at which replication occurs by default. The initial replication schedule has ...
- Use this section to configure auditing based on your auditing objectives. The auditing policy determines the success and ...
- Use this section to configure protocols used to communicate with other computers. When configured to communicate with computers ...
- Use this section to configure rules for Windows Firewall with Advanced Security based on the roles and administrative options ...
- Use this section to configure services based on the selected server's roles and other features. These roles and other features ...
- Use this section to save the policy you have created. You can apply it to the selected server now, or you can apply it to ...
- Use this snap-in to manage Windows Deployment Services. Windows Deployment Services is used to deploy the Windows operating ...
- Use this snap-in to quickly and reliably deploy the latest updates to your computers. To connect to a remote server, on the ...
- Use this tab to configure the Remote Desktop Services startup environment. These settings override client-specified settings. ...
- Use this tab to configure the Remote Desktop Services user profile. Settings in this profile apply to Remote Desktop Services. ...
- Use this template to create a basic Data Collector Set. You can add or remove counters and change the scheduling options ...
- Use this to indicate if the template associated with this event contains valid WinRT types i.e. the event payload fields ...
- Use this Web site to request a certificate for your Web browser, e-mail client, or other program. By using a certificate, ...
- Use this wizard to determine how much content to make available offline. You can also set up a schedule to synchronize the ...
- Use this wizard to quickly schedule a common task. For more advanced options or settings such as multiple task actions or ...
- Use this wizard to set up DirectAccess with basic settings. After completing this wizard, click the Configuration node to ...
- Use Windows PowerShell to reconfigure how the storage file paths are allocated to the pool so that a child pool is always ...
- Use Windows PowerShell to reconfigure the storage resource pools so that multiple pools do not use the same storage path. ...
- Use your favorite email address to sign in to Windows. If you already use an email address to sign in to PCs running Windows, ...
- Use your natural handwriting style. For example, if you normally write in cursive, copy the sentences in cursive. If you ...
- UseCustomSorting requires an object that implements IResultNodeComparer and the MMCListView.Sorter property set to the object. ...
- Used Average is the current number of resources (buffers) in use at this time. The number in parentheses following the resource ...
- used Dynamic Signature Service to discard obsolete signatures. Current Signature Version:%b%3 Signature Type:%b%12 Current ...
- used Dynamic Signature Service to retrieve additional signatures to help protect your machine. Current Signature Version:%b%3 ...
- Used for any of the following tasks: - Display the hardware IDs of storage on the system. - Have MSDSM claim/unclaim MPIO ...
- Used in LDAP URLs for the Authority Information Access extension Specifies the object class as certification authority Example ...
- Used in LDAP URLs for the CRL Distribution Points extension Specifies the object class as CRL distribution point Example ...
- Used in LDAP URLs Inserts the container name of the configuration data partition Example location: ldap:///CN= ,CN= ,CN=CDP,CN=Public ...
- Used in URLs and paths Derived from the name of the CA, guaranteed to be unique and less than 64 chars Example location: ...
- Used in URLs and paths Derived from the name of the CA, guaranteed to be unique and less than 64 chars Example location: ...
- Used in URLs and paths for the Authority Information Access extension Appends a suffix to distinguish the certificate file ...
- Used in URLs and paths for the CRL Distribution Points extension Appends a suffix to distinguish the CRL file name Example ...
- Used in URLs and paths Inserts the DNS name of the server Example location: http:// /CertEnroll/ _ .crt Or (for OCSP) http:// ...
- Used in URLs and paths Substitutes the Delta CRL file name suffix for the CRL file name suffix, if appropriate Example location: ...
- Used Maximum is the maximum number of NetBEUI resources (buffers) in use at any point in time. This value is useful in sizing ...
- Used to add sites to their respective Trusted' or Intranet' zones. This is to mitigate some of the problems that the applications ...
- Used to discover and locate other PCs, devices, and network infrastructure components on the network. Also used to determine ...
- Used to modify the options attribute of an NTDS Site Settings Object. SYNTAX /siteoptions DSA /site: {+|-}IS_AUTO_TOPOLOGY_DISABLED ...
- Useful for tools that must always be available, such as remote administration tools. If you specify this option, you must ...
- User "%1" is currently logged on. If you delete the user, they will not be able to log on to the computer again, unlock the ...
- User %1 cannot be authenticated with OTP. Ensure that a DN is defined for the user name in Active Directory. Error code: ...
- User %1 cannot be authenticated with OTP. Ensure that a UPN is defined for the user name in Active Directory. Error code: ...
- User %1\%2 will be logged on to the local redirector machine (assuming TS Farm scenario). Sending local IP address to the ...
- User '[2]' has previously initiated an install for product '[3]'. That user will need to run that install again before they ...
- User '[2]' has previously initiated an install for product '[3]'. That user will need to run that install again before they ...
- User ({0}) could not be excluded since this user has not been issued a rights account certificate by your AD RMS cluster. ...
- User ({0}) to be excluded cannot be found in database and there is no AD RMS account certificate issued by this installation ...
- User / Device claims information. Subject: Security ID: %1 Account Name: %2 Account Domain: %3 Logon ID: %4 Logon Type: %9 ...
- User / Device Claims This policy allows you to audit user and device claims information in the user's logon token. Events ...
- User Account Changed: Target Account Name: %2 Target Domain: %3 Target Account ID: %4 Caller User Name: %5 Caller Domain: ...
- User Account Control is turned on, but you must restart your PC for the change to take effect. How does User Account Control ...
- User Account Control: Allow UIAccess applications to prompt for elevation without using the secure desktop. This policy setting ...
- User Account Control: Behavior of the elevation prompt for administrators in Admin Approval Mode This policy setting controls ...
- User Account Control: Behavior of the elevation prompt for standard users This policy setting controls the behavior of the ...
- User Account Control: Detect application installations and prompt for elevation This policy setting controls the behavior ...
- User Account Control: Only elevate executable files that are signed and validated This policy setting enforces public key ...
- User Account Control: Only elevate UIAccess applications that are installed in secure locations This policy setting controls ...
- User Account Control: Switch to the secure desktop when prompting for elevation This policy setting controls whether the ...
- User Account Control: Turn on Admin Approval Mode This policy setting controls the behavior of all User Account Control (UAC) ...
- User Account Control: Use Admin Approval Mode for the built-in Administrator account This policy setting controls the behavior ...
- User Account Control: Virtualize file and registry write failures to per-user locations This policy setting controls whether ...
- User Account Created: New Account Name: %1 New Domain: %2 New Account ID: %3 Caller User Name: %4 Caller Domain: %5 Caller ...