Windows 10

  1. All tests except DcPromo and RegisterInDNS must be run on computers after they have been promoted to directory server. Note: ...
  2. All the following tasks require administrator privileges on the computer running Client for NFS and possibly on other servers ...
  3. All the following tasks require administrator privileges on the computer running Server for NFS and possibly on other servers ...
  4. All wave devices that can play files in the current format are in use. Wait until a wave device is free, and then try again. ...
  5. All wave devices that can record files in the current format are in use. Wait until a wave device is free, and then try again. ...
  6. Allocation report: Total clusters : %1!s! (%2!s! bytes) Free clusters : %3!s! (%4!s! bytes) Reserved clusters : %5!s! (%6!s! ...
  7. Allow all users of this PC to see all detected items on the History tab. (This shows the items that are usually hidden to ...
  8. Allow communication through Windows Firewall Windows Firewall is currently set to block all incoming connections to this ...
  9. Allow log on through Remote Desktop Services This security setting determines which users or groups have permission to log ...
  10. Allow only connections that are both authenticated and integrity-protected by using IPsec. Compatible with Windows Vista ...
  11. Allow or Disallow use of encryption to protect the RPC protocol messages between File Share Shadow Copy Provider running ...
  12. Allow the focus of the Group Policy Snap-in to be changed when launching from the command line. This only applies if you ...
  13. Allow the selected computer to be changed when launching from the command line. This only applies if you save the console. ...
  14. Allow the selected computer to be changed when launching from the command line. This only applies if you save the console. ...
  15. Allow this configuration change only if you trust its origin. If you don't agree to this change, you should run a quick scan ...
  16. Allow Windows to manage your network connections Windows functionality to manage wireless connectivity on this computer is ...
  17. Allow your PC to be discoverable by other PCs and devices on this network. We recommend turning this on for private networks ...
  18. Allow-Bypass action specified, but the rule does not meet allow-bypass criteria (inbound, authenticate/encrypt flags set, ...
  19. Allowed Classifies per Second is the rate of Windows Filtering Platform security rule evaluations which allow network activity. ...
  20. Allowed to write systemPossSuperiors and systemAuxClasses as possSuperiors and auxClasses, if schema circular dependencies ...
  21. Allowing active content such as script and ActiveX controls can be useful. However, active content might also harm your computer. ...
  22. Allowing detected items to run might put your privacy, PC security, or PC performance at risk. Are you sure you want to do ...
  23. Allowing unsecured communication may expose your network to security risks by allowing IP traffic to be sent with no authentication ...
  24. Allowing web content to open a program can be useful, but it can potentially harm your computer. Do not allow it unless you ...
  25. Allows Administrators to enable and disable the ability for Outlook Express users to save or open attachments that can potentially ...
  26. Allows Administrators to enable and disable the Media Explorer Bar and set the auto-play default. The Media Explorer Bar ...
  27. Allows administrators to use the Windows Firewall component in Control Panel to define a local port exceptions list. Windows ...
  28. Allows administrators to use the Windows Firewall component in Control Panel to define a local program exceptions list. Windows ...
  29. Allows configuration of components of the operating system used by a client computer to connect to a network. This includes ...
  30. Allows control of file operations via transactions to commit or abort changes. TRANSACTION /START | /COMMIT | /ROLLBACK | ...
  31. Allows errors to be reported when programs stop working or responding and allows existing solutions to be delivered. Also ...
  32. Allows inbound file and printer sharing. To do this, Windows Firewall opens UDP ports 137 and 138, and TCP ports 139 and ...
  33. Allows inbound file and printer sharing. To do this, Windows Firewall opens UDP ports 137 and 138, and TCP ports 139 and ...
  34. Allows or denies development of Windows Store applications and installing them directly from an IDE. If you enable this setting ...
  35. Allows or Denies new TS Connections. The second parameter is optional, if specified and set to TRUE, then enables or disables ...
  36. Allows or Denies retrieving IP address of SessionDirectory according as whether Value is set to 1 or 0 respectively. The ...
  37. Allows programs to execute as a user that does not have Administrator access rights, but can still access resources accessible ...
  38. Allows programs to execute with only access to resources granted to open well-known groups, blocking access Administrator ...
  39. Allows programs to open data files in specified directories as if they were in the current directory. APPEND drive:]path[;. ...
  40. Allows remote administration of this computer using administrative tools such as the Microsoft Management Console (MMC) and ...
  41. Allows remote administration of this computer using administrative tools such as the Microsoft Management Console (MMC) and ...
  42. Allows rules created by local administrators to be merged with rules distributed through Group Policy. This setting can only ...
  43. Allows this computer to receive inbound Remote Desktop requests. To do this, Windows Firewall opens TCP port 3389. If you ...
  44. Allows this computer to receive inbound Remote Desktop requests. To do this, Windows Firewall opens TCP port 3389. If you ...
  45. Allows this computer to receive unicast responses to its outgoing multicast or broadcast messages. Note: This setting has ...
  46. Allows this computer to receive unsolicited inbound Plug and Play messages sent by network devices, such as routers with ...
  47. Allows this computer to receive unsolicited inbound Plug and Play messages sent by network devices, such as routers with ...
  48. Allows unsolicited incoming messages from specified systems that authenticate using the IPsec transport. If you enable this ...
  49. Allows UPnP devices to be hosted on this computer. If this service is stopped, any hosted UPnP devices will stop functioning ...
  50. Allows users to connect interactively to a remote computer. Remote Desktop and Remote Desktop Session Host Server depend ...
  51. Allows users to use the Add Printer Wizard to search the network for shared printers. If you enable this setting or do not ...
  52. Allows Windows Firewall to record information about the unsolicited incoming messages that it receives. If you enable this ...
  53. Allows you to analyze current systems settings against baseline settings that are stored in a database. The analysis results ...
  54. Allows you to configure a system with security settings stored in a database. The syntax of this command is: secedit /configure ...
  55. Allows you to disable System Restore configuration through System Protection. This policy setting allows you to turn off ...
  56. Allows you to disable System Restore. This policy setting allows you to turn off System Restore. System Restore enables users, ...
  57. Allows you to export security settings stored in a database. The syntax of this command is: secedit /export /db filename ...
  58. Allows you to generate a rollback template with respect to a configuration template. The syntax of this command is: secedit ...
  59. Allows you to have File Explorer display a confirmation dialog whenever a file is deleted or moved to the Recycle Bin. If ...
  60. Allows you to import a security template into a database so that the settings specified in the template can be applied to ...
  61. Allows you to remove the Run command from the Start menu, Internet Explorer, and Task Manager. If you enable this setting, ...
  62. Allows you to select multiple lines from the console using Shift+UpArrow/DownArrow and copy the selected lines to clipboard ...
  63. Allows you to specify that local computer administrators can supplement the "Define Activation Security Check exemptions" ...
  64. Allows you to validate the syntax of a security template. The syntax of this command is: secedit /validate filename /cfg ...
  65. Allows you to view and change a list of DCOM server application ids (appids) which are exempted from the DCOM Activation ...
  66. Allows you to view and change the inbound port exceptions list defined by Group Policy. Windows Firewall uses two port exception ...
  67. Allows you to view and change the inbound port exceptions list defined by Group Policy. Windows Firewall uses two port exception ...
  68. Allows you to view and change the program exceptions list defined by Group Policy. Windows Firewall uses two program exception ...
  69. Also apply redirection policy to Windows 2000, Windows 2000 server, Windows XP, and Windows Server 2003 operating systems ...
  70. Also apply redirection policy to Windows 2000, Windows 2000 Server, Windows XP, and Windows Server 2003 operating systems. ...
  71. Also make sure that you're speaking into the correct microphone (if there are multiple microphones) and that it is connected ...
  72. Also, confirm that both the wireless network adapter and the wireless network access point are using the same encryption ...
  73. Although the files were successfully added to the archive, Compressed (zipped) Folders was unable to completely remove the ...
  74. Although the Guid DNS name (%1) could not be resolved, the server name (%2) resolved to the IP address (%3) but was not pingable. ...
  75. Although the Guid DNS name (%1) couldn't be resolved, the server name (%2) resolved to the IP address (%3) and was pingable. ...