Windows 10
- All tests except DcPromo and RegisterInDNS must be run on computers after they have been promoted to directory server. Note: ...
- All the following tasks require administrator privileges on the computer running Client for NFS and possibly on other servers ...
- All the following tasks require administrator privileges on the computer running Server for NFS and possibly on other servers ...
- All wave devices that can play files in the current format are in use. Wait until a wave device is free, and then try again. ...
- All wave devices that can record files in the current format are in use. Wait until a wave device is free, and then try again. ...
- Allocation report: Total clusters : %1!s! (%2!s! bytes) Free clusters : %3!s! (%4!s! bytes) Reserved clusters : %5!s! (%6!s! ...
- Allow all users of this PC to see all detected items on the History tab. (This shows the items that are usually hidden to ...
- Allow communication through Windows Firewall Windows Firewall is currently set to block all incoming connections to this ...
- Allow log on through Remote Desktop Services This security setting determines which users or groups have permission to log ...
- Allow only connections that are both authenticated and integrity-protected by using IPsec. Compatible with Windows Vista ...
- Allow or Disallow use of encryption to protect the RPC protocol messages between File Share Shadow Copy Provider running ...
- Allow the focus of the Group Policy Snap-in to be changed when launching from the command line. This only applies if you ...
- Allow the selected computer to be changed when launching from the command line. This only applies if you save the console. ...
- Allow the selected computer to be changed when launching from the command line. This only applies if you save the console. ...
- Allow this configuration change only if you trust its origin. If you don't agree to this change, you should run a quick scan ...
- Allow Windows to manage your network connections Windows functionality to manage wireless connectivity on this computer is ...
- Allow your PC to be discoverable by other PCs and devices on this network. We recommend turning this on for private networks ...
- Allow-Bypass action specified, but the rule does not meet allow-bypass criteria (inbound, authenticate/encrypt flags set, ...
- Allowed Classifies per Second is the rate of Windows Filtering Platform security rule evaluations which allow network activity. ...
- Allowed to write systemPossSuperiors and systemAuxClasses as possSuperiors and auxClasses, if schema circular dependencies ...
- Allowing active content such as script and ActiveX controls can be useful. However, active content might also harm your computer. ...
- Allowing detected items to run might put your privacy, PC security, or PC performance at risk. Are you sure you want to do ...
- Allowing unsecured communication may expose your network to security risks by allowing IP traffic to be sent with no authentication ...
- Allowing web content to open a program can be useful, but it can potentially harm your computer. Do not allow it unless you ...
- Allows Administrators to enable and disable the ability for Outlook Express users to save or open attachments that can potentially ...
- Allows Administrators to enable and disable the Media Explorer Bar and set the auto-play default. The Media Explorer Bar ...
- Allows administrators to use the Windows Firewall component in Control Panel to define a local port exceptions list. Windows ...
- Allows administrators to use the Windows Firewall component in Control Panel to define a local program exceptions list. Windows ...
- Allows configuration of components of the operating system used by a client computer to connect to a network. This includes ...
- Allows control of file operations via transactions to commit or abort changes. TRANSACTION /START | /COMMIT | /ROLLBACK | ...
- Allows errors to be reported when programs stop working or responding and allows existing solutions to be delivered. Also ...
- Allows inbound file and printer sharing. To do this, Windows Firewall opens UDP ports 137 and 138, and TCP ports 139 and ...
- Allows inbound file and printer sharing. To do this, Windows Firewall opens UDP ports 137 and 138, and TCP ports 139 and ...
- Allows or denies development of Windows Store applications and installing them directly from an IDE. If you enable this setting ...
- Allows or Denies new TS Connections. The second parameter is optional, if specified and set to TRUE, then enables or disables ...
- Allows or Denies retrieving IP address of SessionDirectory according as whether Value is set to 1 or 0 respectively. The ...
- Allows programs to execute as a user that does not have Administrator access rights, but can still access resources accessible ...
- Allows programs to execute with only access to resources granted to open well-known groups, blocking access Administrator ...
- Allows programs to open data files in specified directories as if they were in the current directory. APPEND drive:]path[;. ...
- Allows remote administration of this computer using administrative tools such as the Microsoft Management Console (MMC) and ...
- Allows remote administration of this computer using administrative tools such as the Microsoft Management Console (MMC) and ...
- Allows rules created by local administrators to be merged with rules distributed through Group Policy. This setting can only ...
- Allows this computer to receive inbound Remote Desktop requests. To do this, Windows Firewall opens TCP port 3389. If you ...
- Allows this computer to receive inbound Remote Desktop requests. To do this, Windows Firewall opens TCP port 3389. If you ...
- Allows this computer to receive unicast responses to its outgoing multicast or broadcast messages. Note: This setting has ...
- Allows this computer to receive unsolicited inbound Plug and Play messages sent by network devices, such as routers with ...
- Allows this computer to receive unsolicited inbound Plug and Play messages sent by network devices, such as routers with ...
- Allows unsolicited incoming messages from specified systems that authenticate using the IPsec transport. If you enable this ...
- Allows UPnP devices to be hosted on this computer. If this service is stopped, any hosted UPnP devices will stop functioning ...
- Allows users to connect interactively to a remote computer. Remote Desktop and Remote Desktop Session Host Server depend ...
- Allows users to use the Add Printer Wizard to search the network for shared printers. If you enable this setting or do not ...
- Allows Windows Firewall to record information about the unsolicited incoming messages that it receives. If you enable this ...
- Allows you to analyze current systems settings against baseline settings that are stored in a database. The analysis results ...
- Allows you to configure a system with security settings stored in a database. The syntax of this command is: secedit /configure ...
- Allows you to disable System Restore configuration through System Protection. This policy setting allows you to turn off ...
- Allows you to disable System Restore. This policy setting allows you to turn off System Restore. System Restore enables users, ...
- Allows you to export security settings stored in a database. The syntax of this command is: secedit /export /db filename ...
- Allows you to generate a rollback template with respect to a configuration template. The syntax of this command is: secedit ...
- Allows you to have File Explorer display a confirmation dialog whenever a file is deleted or moved to the Recycle Bin. If ...
- Allows you to import a security template into a database so that the settings specified in the template can be applied to ...
- Allows you to remove the Run command from the Start menu, Internet Explorer, and Task Manager. If you enable this setting, ...
- Allows you to select multiple lines from the console using Shift+UpArrow/DownArrow and copy the selected lines to clipboard ...
- Allows you to specify that local computer administrators can supplement the "Define Activation Security Check exemptions" ...
- Allows you to validate the syntax of a security template. The syntax of this command is: secedit /validate filename /cfg ...
- Allows you to view and change a list of DCOM server application ids (appids) which are exempted from the DCOM Activation ...
- Allows you to view and change the inbound port exceptions list defined by Group Policy. Windows Firewall uses two port exception ...
- Allows you to view and change the inbound port exceptions list defined by Group Policy. Windows Firewall uses two port exception ...
- Allows you to view and change the program exceptions list defined by Group Policy. Windows Firewall uses two program exception ...
- Also apply redirection policy to Windows 2000, Windows 2000 server, Windows XP, and Windows Server 2003 operating systems ...
- Also apply redirection policy to Windows 2000, Windows 2000 Server, Windows XP, and Windows Server 2003 operating systems. ...
- Also make sure that you're speaking into the correct microphone (if there are multiple microphones) and that it is connected ...
- Also, confirm that both the wireless network adapter and the wireless network access point are using the same encryption ...
- Although the files were successfully added to the archive, Compressed (zipped) Folders was unable to completely remove the ...
- Although the Guid DNS name (%1) could not be resolved, the server name (%2) resolved to the IP address (%3) but was not pingable. ...
- Although the Guid DNS name (%1) couldn't be resolved, the server name (%2) resolved to the IP address (%3) and was pingable. ...