Windows 8
- If a "Say what you see" command might apply to multiple items, the computer will ask you for clarification. Later in the ...
- If a client computer is not running the latest version of RDC, the user will be unable to connect to internal network resources ...
- If a clustered role is configured to use the current drive letter, changing the drive letter can cause that clustered role ...
- If a clustered role is configured to use the current drive letter, changing the drive letter can cause that role to fail. ...
- If a clustered role is configured to use the disk, assigning the disk to another role can cause that clustered role to fail. ...
- If a domain controller becomes unavailable, client computers that are using the SYSVOL folder of the domain controller might ...
- If a domain controller that is running on a VM does not comply with the recommended best practice guidelines, the Active ...
- If a driver was provided, make sure it is designed to work with Windows for 32-bit systems. If you do not have an appropriate ...
- If a driver was provided, make sure it is designed to work with Windows for ARM-based systems. If you do not have an appropriate ...
- If a driver was provided, make sure it is designed to work with Windows for Itanium-based systems. If you do not have an ...
- If a driver was provided, make sure it is designed to work with Windows for x64-based systems. If you do not have an appropriate ...
- If a file is signed, the wizard will create a rule using the publisher's signature and attributes of the signed file. If ...
- If a file is signed, the wizard will create a rule using the publisher's signature and the attributes of the signed file. ...
- If a firewall is in use on the failover cluster nodes, configure a firewall rule to allow the coordinator computer to restart ...
- If a namespace server or folder target becomes unavailable, client computers might fail over to a distant namespace server ...
- If a network interface is in an unreachable state, then clients cannot communicate with the RRAS server by using that interface. ...
- If a persistent login was set up for the target, it may not have been removed. Check the iSCSI Initiator Control Panel to ...
- If a pre-existing computer object is used, please ensure that the computer object is in a Disabled state and that the user ...
- If a program or service uses a particular volume or device, add that volume or device to the list below, or click Auto Configure ...
- If a RD Session Host or RD Virtualization Host server (if applicable) cannot locate an activated license server with appropriate ...
- If a restart is required, this server restarts automatically, without additional notifications. Do you want to allow automatic ...
- If a time is not provided, no end event was logged before the Start screen became available for use. This indicates that ...
- If a USB device is not working after the computer wakes, Windows can reset the device each time the computer wakes from sleep. ...
- If a utility was provided by the application that installed the application directory partition, use that utility to remove ...
- If all or multiple languages are selected, a large portion of disk space will be used. This option could easily fill the ...
- If all OUs in your Active Directory domains are not protected from accidental deletion, your Active Directory environment ...
- If all the DCs are not SP1 or above and you enable this feature, there is a possibility that any user can view the password ...
- If an anti-spyware product is installed and functioning configure Security Center to stop monitoring anti-spyware status. ...
- If an application calls PlaySound with a SND_LOOP flag, the sound plays continuously until PlaySound is called with a NULL ...
- If an application calls the FindFirstFile API on a directory, and then attempts to remove that directory without first closing ...
- If an application passes an invalid window handle to the MessageBox API, and the lower 16 bits of that handle are NULL, Windows ...
- If an appropriate .adm file cannot be found, the console displays the registry key information in the report section "Extra ...
- If an appropriate .adm file cannot be found, the console displays the registry key information in the report section "Extra ...
- If an I/O error is returned which is not defined in the standard FsRtl filter, it is converted to the following error which ...
- If an IP address range is not configured for the policy, policy clients will be issued an IP address from the scope range. ...
- If an MM error is returned which is not defined in the standard FsRtl filter, it is converted to one of the following errors ...
- If an MM error is returned which is not defined in the standard FsRtl filter, it is converted to one of the following errors ...
- If an open program is associated with this process and you suspend it, you might lose any unsaved data. If you suspend a ...
- If an open program is associated with this process, it will close and you will lose any unsaved data. If you end a system ...
- If another method is being used to perform encryption, you can ignore this. Otherwise, modify the virtual machine settings ...
- If any domain controller is unable to start migration, try manual polling. Or run with option /CreateGlobalObjects. Migration ...
- If any read-only domain controller is stuck in the 'Eliminating' state for too long run with option /DeleteRoNtfrsMember. ...
- If authentication occurs across an external trust boundary (where the user and the computer hosting the resource are in different ...
- If AuthNoEncap is specified as a protocol for a proposal in qmsecmethods, then no other protocols are allowed in that proposal. ...
- If Automatic Updates is enabled on any node in the cluster, ensure that it is not configured to automatically install updates. ...
- If Command Extensions are enabled CALL changes as follows: CALL command now accepts labels as the target of the CALL. The ...
- If Command Extensions are enabled CHDIR changes as follows: The current directory string is converted to use the same case ...
- If Command Extensions are enabled DEL and ERASE change as follows: The display semantics of the /S switch are reversed in ...
- If Command Extensions are enabled ENDLOCAL changes as follows: If the corresponding SETLOCAL enable or disabled command extensions ...
- If Command Extensions are enabled GOTO changes as follows: GOTO command now accepts a target label of :EOF which transfers ...
- If Command Extensions are enabled IF changes as follows: IF /I string1 compare-op string2 command IF CMDEXTVERSION number ...
- If Command Extensions are enabled MKDIR changes as follows: MKDIR creates any intermediate directories in the path, if needed. ...
- If Command Extensions are enabled SET changes as follows: SET command invoked with just a variable name, no equal sign or ...
- If Command Extensions are enabled SETLOCAL changes as follows: SETLOCAL batch command now accepts optional arguments: ENABLEEXTENSIONS ...
- If Command Extensions are enabled the DATE command supports the /T switch which tells the command to just output the current ...
- If Command Extensions are enabled the POPD command will delete any temporary drive letter created by PUSHD when you POPD ...
- If Command Extensions are enabled the PROMPT command supports the following additional formatting characters: $+ zero or ...
- If Command Extensions are enabled the PUSHD command accepts network paths in addition to the normal drive letter and path. ...
- If Command Extensions are enabled the SHIFT command supports the /n switch which tells the command to start shifting at the ...
- If Command Extensions are enabled the TIME command supports the /T switch which tells the command to just output the current ...
- If Command Extensions are enabled, and running on the Windows platform, then the BREAK command will enter a hard coded breakpoint ...
- If Command Extensions are enabled, external command invocation through the command line or the START command changes as follows: ...
- If Command Extensions are enabled, the following additional forms of the FOR command are supported: FOR /D %variable IN (set) ...
- If Command Extensions are enabled, then there are several dynamic environment variables that can be expanded but which don't ...
- If computer autoenrollment is desired, use the Group Policy Management Console to configure computer autoenrollment policy ...
- If conditions and constraints of the network policy match the connection request, the policy can either grant access or deny ...
- If Data Deduplication is used for the first time and initial optimization is still ongoing, no action is required. Otherwise, ...
- If desktop computers do not require remote connectivity to the internal network using DirectAccess, they do not need to be ...
- If DirectAccess and VPN are removed from Remote Access servers, remote client computers cannot connect to the corporate network ...
- If DirectAccess and VPN are removed from Remote Access servers, remote client computers cannot connect to the corporate network ...
- If DNS servers are not configured, the computer cannot resolve names or connect to network resources. Critical operations ...
- If Dynamic Host Configuration Protocol (DHCP) is running on this server, check both of the following check boxes and use ...
- If enabled, all ASP scripts will access Windows Management services using the account under which IIS is run (most commonly ...
- If enabled, NPS evaluates this policy while processing connection requests. If disabled, NPS does not evalue this policy. ...
- If file locations are corrected during install, the uninstall program should attempt to find the file in its new location ...