Windows 8

  1. If a "Say what you see" command might apply to multiple items, the computer will ask you for clarification. Later in the ...
  2. If a client computer is not running the latest version of RDC, the user will be unable to connect to internal network resources ...
  3. If a clustered role is configured to use the current drive letter, changing the drive letter can cause that clustered role ...
  4. If a clustered role is configured to use the current drive letter, changing the drive letter can cause that role to fail. ...
  5. If a clustered role is configured to use the disk, assigning the disk to another role can cause that clustered role to fail. ...
  6. If a domain controller becomes unavailable, client computers that are using the SYSVOL folder of the domain controller might ...
  7. If a domain controller that is running on a VM does not comply with the recommended best practice guidelines, the Active ...
  8. If a driver was provided, make sure it is designed to work with Windows for 32-bit systems. If you do not have an appropriate ...
  9. If a driver was provided, make sure it is designed to work with Windows for ARM-based systems. If you do not have an appropriate ...
  10. If a driver was provided, make sure it is designed to work with Windows for Itanium-based systems. If you do not have an ...
  11. If a driver was provided, make sure it is designed to work with Windows for x64-based systems. If you do not have an appropriate ...
  12. If a file is signed, the wizard will create a rule using the publisher's signature and attributes of the signed file. If ...
  13. If a file is signed, the wizard will create a rule using the publisher's signature and the attributes of the signed file. ...
  14. If a firewall is in use on the failover cluster nodes, configure a firewall rule to allow the coordinator computer to restart ...
  15. If a namespace server or folder target becomes unavailable, client computers might fail over to a distant namespace server ...
  16. If a network interface is in an unreachable state, then clients cannot communicate with the RRAS server by using that interface. ...
  17. If a persistent login was set up for the target, it may not have been removed. Check the iSCSI Initiator Control Panel to ...
  18. If a pre-existing computer object is used, please ensure that the computer object is in a Disabled state and that the user ...
  19. If a program or service uses a particular volume or device, add that volume or device to the list below, or click Auto Configure ...
  20. If a RD Session Host or RD Virtualization Host server (if applicable) cannot locate an activated license server with appropriate ...
  21. If a restart is required, this server restarts automatically, without additional notifications. Do you want to allow automatic ...
  22. If a time is not provided, no end event was logged before the Start screen became available for use. This indicates that ...
  23. If a USB device is not working after the computer wakes, Windows can reset the device each time the computer wakes from sleep. ...
  24. If a utility was provided by the application that installed the application directory partition, use that utility to remove ...
  25. If all or multiple languages are selected, a large portion of disk space will be used. This option could easily fill the ...
  26. If all OUs in your Active Directory domains are not protected from accidental deletion, your Active Directory environment ...
  27. If all the DCs are not SP1 or above and you enable this feature, there is a possibility that any user can view the password ...
  28. If an anti-spyware product is installed and functioning configure Security Center to stop monitoring anti-spyware status. ...
  29. If an application calls PlaySound with a SND_LOOP flag, the sound plays continuously until PlaySound is called with a NULL ...
  30. If an application calls the FindFirstFile API on a directory, and then attempts to remove that directory without first closing ...
  31. If an application passes an invalid window handle to the MessageBox API, and the lower 16 bits of that handle are NULL, Windows ...
  32. If an appropriate .adm file cannot be found, the console displays the registry key information in the report section "Extra ...
  33. If an appropriate .adm file cannot be found, the console displays the registry key information in the report section "Extra ...
  34. If an I/O error is returned which is not defined in the standard FsRtl filter, it is converted to the following error which ...
  35. If an IP address range is not configured for the policy, policy clients will be issued an IP address from the scope range. ...
  36. If an MM error is returned which is not defined in the standard FsRtl filter, it is converted to one of the following errors ...
  37. If an MM error is returned which is not defined in the standard FsRtl filter, it is converted to one of the following errors ...
  38. If an open program is associated with this process and you suspend it, you might lose any unsaved data. If you suspend a ...
  39. If an open program is associated with this process, it will close and you will lose any unsaved data. If you end a system ...
  40. If another method is being used to perform encryption, you can ignore this. Otherwise, modify the virtual machine settings ...
  41. If any domain controller is unable to start migration, try manual polling. Or run with option /CreateGlobalObjects. Migration ...
  42. If any read-only domain controller is stuck in the 'Eliminating' state for too long run with option /DeleteRoNtfrsMember. ...
  43. If authentication occurs across an external trust boundary (where the user and the computer hosting the resource are in different ...
  44. If AuthNoEncap is specified as a protocol for a proposal in qmsecmethods, then no other protocols are allowed in that proposal. ...
  45. If Automatic Updates is enabled on any node in the cluster, ensure that it is not configured to automatically install updates. ...
  46. If Command Extensions are enabled CALL changes as follows: CALL command now accepts labels as the target of the CALL. The ...
  47. If Command Extensions are enabled CHDIR changes as follows: The current directory string is converted to use the same case ...
  48. If Command Extensions are enabled DEL and ERASE change as follows: The display semantics of the /S switch are reversed in ...
  49. If Command Extensions are enabled ENDLOCAL changes as follows: If the corresponding SETLOCAL enable or disabled command extensions ...
  50. If Command Extensions are enabled GOTO changes as follows: GOTO command now accepts a target label of :EOF which transfers ...
  51. If Command Extensions are enabled IF changes as follows: IF /I string1 compare-op string2 command IF CMDEXTVERSION number ...
  52. If Command Extensions are enabled MKDIR changes as follows: MKDIR creates any intermediate directories in the path, if needed. ...
  53. If Command Extensions are enabled SET changes as follows: SET command invoked with just a variable name, no equal sign or ...
  54. If Command Extensions are enabled SETLOCAL changes as follows: SETLOCAL batch command now accepts optional arguments: ENABLEEXTENSIONS ...
  55. If Command Extensions are enabled the DATE command supports the /T switch which tells the command to just output the current ...
  56. If Command Extensions are enabled the POPD command will delete any temporary drive letter created by PUSHD when you POPD ...
  57. If Command Extensions are enabled the PROMPT command supports the following additional formatting characters: $+ zero or ...
  58. If Command Extensions are enabled the PUSHD command accepts network paths in addition to the normal drive letter and path. ...
  59. If Command Extensions are enabled the SHIFT command supports the /n switch which tells the command to start shifting at the ...
  60. If Command Extensions are enabled the TIME command supports the /T switch which tells the command to just output the current ...
  61. If Command Extensions are enabled, and running on the Windows platform, then the BREAK command will enter a hard coded breakpoint ...
  62. If Command Extensions are enabled, external command invocation through the command line or the START command changes as follows: ...
  63. If Command Extensions are enabled, the following additional forms of the FOR command are supported: FOR /D %variable IN (set) ...
  64. If Command Extensions are enabled, then there are several dynamic environment variables that can be expanded but which don't ...
  65. If computer autoenrollment is desired, use the Group Policy Management Console to configure computer autoenrollment policy ...
  66. If conditions and constraints of the network policy match the connection request, the policy can either grant access or deny ...
  67. If Data Deduplication is used for the first time and initial optimization is still ongoing, no action is required. Otherwise, ...
  68. If desktop computers do not require remote connectivity to the internal network using DirectAccess, they do not need to be ...
  69. If DirectAccess and VPN are removed from Remote Access servers, remote client computers cannot connect to the corporate network ...
  70. If DirectAccess and VPN are removed from Remote Access servers, remote client computers cannot connect to the corporate network ...
  71. If DNS servers are not configured, the computer cannot resolve names or connect to network resources. Critical operations ...
  72. If Dynamic Host Configuration Protocol (DHCP) is running on this server, check both of the following check boxes and use ...
  73. If enabled, all ASP scripts will access Windows Management services using the account under which IIS is run (most commonly ...
  74. If enabled, NPS evaluates this policy while processing connection requests. If disabled, NPS does not evalue this policy. ...
  75. If file locations are corrected during install, the uninstall program should attempt to find the file in its new location ...