Windows Server 2008
- For balancing DHCP server usage, a good practice is to use the "80/20" rule to divide the IP addresses in a scope between ...
- For best results, provide as many writing samples as possible. You can return at any time to provide more. Additional samples ...
- For best results, provide as many writing samples as possible. You can return at any time to provide more. Additional samples ...
- For best results, write as many sentences as possible. If you want to stop before you reach the end of the group of sentences, ...
- For best results, write as many sentences as possible. If you want to stop before you reach the end of the group of sentences, ...
- For certificate-based authentication of users and computers the client computers must use CAs registered in the Active Directory ...
- For certificate-based authentication of users and computers, along with CAs that are registered in Active Directory, the ...
- For clients that need to keep the same IP address, you can either manually configure a static IP address, or assign a reservation ...
- For clients to connect to this TS Gateway server, you must manually distribute its root certificate to clients. We recommend ...
- For complete terms and conditions governing the use of this product, see the license agreements, which can be found in online ...
- For devices, follow the instructions in the information that came with the device, or on the LCD of the device, if applicable. ...
- For each custom component, specify a compressed cabinet (.CAB) file or a self-extracting executable (.EXE) if applicable. ...
- For each device you want Windows Media Center to control you will need to plug an IR control cable into your Windows Media ...
- For each spoke member, review the required and optional hub members. Click Edit to change the required hub member or change ...
- For encryption and decryption of messages, both a public key and a private key are required. You must provide the password ...
- For encryption and decryption of messages, both a public key and a private key are required. You must supply a password for ...
- For enhanced security, you can configure TS Gateway for use with ISA Server or a non-Microsoft product to perform secure ...
- For example, file-based applications would typically have scope names based on file paths, whereas Web-based applications ...
- For example, if you entered "Acme" in the field below, the title bar would be: "Windows Internet Explorer provided by Acme". ...
- For file access across network domains to function properly, each UNIX user or group identity should map to a Windows user ...
- For help solving this problem with additional wireless software, contact the manufacturer of the wireless hardware or your ...
- For help solving this problem with additional wireless software, contact the manufacturer of the wireless hardware or your ...
- For increased security of your protected content, you can enable this exclusion policy and prevent users of Windows 98 Second ...
- For information about testing and deploying your Connection Manager profile and its installation program, click Help. To ...
- For information about this operation please see the following directory on the target machine(s): %windir%\security\msscw\Logs ...
- For information on command line arguments specific to Windows Deployment Services, see the Windows Deployment Services documentation. ...
- For Install images: - WDSUTIL Options /Add-Image /ImageFile: /Server: /ImageType:Install /SkipVerify /ImageGroup: /SingleImage: ...
- For Install images: - WDSUTIL Options /Export-Image /Image: /Server: /ImageType:Install /ImageGroup: /Filename: /DestinationImage ...
- For Install images: - WDSUTIL Options /Replace-Image /Image: /Server: /ImageType:Install /ImageGroup: /Filename: /ReplacementImage ...
- For Install images: - WDSUTIL Options /Set-Image /Image: /Server: /ImageType:Install /ImageGroup: /Filename: /Name: /Description: ...
- For machine certificates, please read help and contact a system administrator if this warning reappears the next time you ...
- For more information about how to configure TS RemoteApp and TS Web Access, open Help from the TS RemoteApp Manager snap-in. ...
- For more information about setting up a Routing and Remote Access, deployment scenarios, and troubleshooting, see Routing ...
- For more information about setting up a Routing and Remote Access, deployment scenarios, and troubleshooting, see Routing ...
- For more information about setting up Routing and Remote Access server, deployment scenarios, and troubleshooting, see Help. ...
- For more information about Windows Ultimate Extras services and software offers, visit the Windows Ultimate Extras website ...
- For more information on how to set up and position your antenna for the best signal reception, please contact your antenna ...
- For more information on using the Local intranet or Trusted sites zones' inclusion lists, see Managing Internet Explorer ...
- For more information on Windows Defender and available support options, visit http://go.microsoft.com/fwlink/?LinkId=70604 ...
- For more information on Windows Error Reporting, refer to the privacy statement at http://go.microsoft.com/fwlink/?linkid=50163 ...
- For more information, see the event log: Diagnostics, Event Viewer, Applications and Services Logs, Microsoft, Windows, Server ...
- For multihomed partners, you need to repeat the process for each IP address on the multihomed server. For more information ...
- For reports to display properly, the location of .adm files must be specified. For changes you make here to be reflected ...
- For security reasons, Microsoft does not recommend a network setup where computers are connected directly to the Internet. ...
- For security reasons, Windows can not synchronize with the server because your date does not match. Please fix the date and ...
- For security reasons, Windows does not allow multiple connections to the same server with a different user name and password ...
- For sharing and discovery to work properly, make sure the settings in your firewall program match the following settings. ...
- For some languages, the handwriting recognizer can learn your handwriting style or vocabulary if you allow it to collect ...
- For some languages, you can provide samples of your handwriting to increase the likelihood that your writing will be recognized ...
- For the Connect to a Network Projector wizard to establish a connection between your computer and a network projector, specific ...
- For the Local intranet zone, the security level is set to Medium-Low, which allows your user credentials (name and password) ...
- For the operation to be completed, a Reboot is required. Couldn't restart the computer. Error - %s Please restart the computer. ...
- For the operation to be completed, the user needs to logoff and relogon. Couldn't log the user off. Error - %s. Please logoff. ...
- For the servers you selected for this cluster, the reports from cluster configuration validation tests appear to be missing ...
- For the servers you selected for this cluster, the reports from cluster configuration validation tests indicate that the ...
- For the specified Policy, Lists the Calendar Events and Schedules of which the specified Policy is a member wsrmc /Depends:Pol ...
- For the Technology Preview, the log file (back_end.log) cannot be viewed on remote computers. In a default installation, ...
- For the Windows Media Center Extender to connect to your computer, some of the Windows Firewall settings and services may ...
- For these settings to take effect, you must recycle the default application pool of IIS. Doing this will disconnect all active ...
- For TS Gateway to function correctly, the IIS settings must be modified. A virtual directory must also be created on the ...
- For TS Licensing to function correctly, a terminal server must be configured correctly to contact an available license server ...
- For up-to-date information about Internet Explorer security zones, go to the Microsoft MSDN Library Web site (http://msd ...
- For Windows Installer packages, this is the file system path to the Windows installer package. For ZAP packages, this is ...
- For Windows NT only) The WinstationDesktop property specifies either the name of the desktop only or the name of both the ...
- For your computer's security, Internet Explorer does not allow you to drag web content to a program outside Protected mode ...
- For your computer's security, this file was saved to the Temporary Internet Files folder Do you want to open this folder? ...
- For your tuner configuration, Windows Media Center requires {0:d} GB for TV Pause Buffer files, in addition to any space ...
- Force a download of a specified resource. The connection and bandwidth are controlled by other methods. This method assumes ...
- Force deletion of root? Namespace server {0} is not online. Do you want to forcibly remove the namespace server and delete ...
- Force device Read/Write permissions to match the permission necessary for all IOCTLs. This compatibility fix enables SecureROM ...
- Force pending I/O requests cannot be enabled without Enhanced I/O verification. Would you like to enable Enhanced I/O verification ...
- Force shutdown from a remote system This security setting determines which users are allowed to shut down a computer from ...
- Force this resource to become unavailable to simulate failure. Used by applications to test their failover configurations. ...
- Forced migration allowed for objects belonging to same AD domain. Existing object's class = '%1' object = '%2' object's AD ...
- Forces a BitLocker-protected OS into recovery mode on restart. Deletes all TPM-related key protectors from the OS volume. ...