Windows 8
- Implement an RFC2307-based identity mapping solution such as Active Directory Domain Services (AD DS), Active Directory Lightweight ...
- Implements stealth-mode filtering by silently dropping all incoming packets for which TCP does not have a listening endpoint. ...
- Implements the File Server Resource Manager protocol for management of storage resources. It controls the management of quotas, ...
- Implements the File Server Resource Manager protocol for management of storage resources. It controls the management of quotas, ...
- Implements the SMB 1.x (CIFS) protocol. This protocol provides connectivity to network resources on pre-Windows Vista servers ...
- Import a trusted user domain from file {0} with the display name being set to "{1}" and the flag of trusting AD federated ...
- Import failed because a virtual machine with the same identifier already exists. Select a new identifier and try the import ...
- Import failed because the import was called from a different WMI namespace then the export file was generated from. Call ...
- Import failed because the source file '%1' and the destination file '%2' are different file types. Please check the order ...
- Import failed because the source path is not specified for destination resource path '%1'. Please try to run the import again ...
- Import failed to configure network connection for network card '%1'. You must modify the connection of all affected network ...
- Import failed. Number of parameters supplied for resource paths are not consistent. You should have a SourceResourcePath ...
- Import failed. Unable to find virtual machine import files under location '%1'. You can import a virtual machine only if ...
- Import failed. Unable to search import files under location '%3'. Error: %1 (%2). You can import a virtual machine only if ...
- Import failed. You need to have admin rights to import this Virtual machine since AllowFullScsiCommandSet property is set ...
- Import file groups from a file. The syntax of this command is: Filescrn Filegroup Import /File:PATH /Filegroup:FG_NAME | ...
- Import from backup is successful. %r Details - %r Backup%r Directory: %1%r Instance : %2%r Comment : %3%r %r Source GPO:%r ...
- Import from backup is successful. %r Details - %r Backup%r Directory: %1%r Instance : %2%r Comment : %3%r %r Source Template:%r ...
- Import from files in XML format resource allocation policies, process matching criteria, calendar events, schedules, conditional ...
- IMPORT Import a transportable shadow copy set from a loaded metadata .cab file. Transportable shadow copies are not available ...
- Import of backup failed. Error %1]. %r Details - %r Backup%r Directory: %1%r Instance : %2%r Comment : %3%r %r Source GPO:%r ...
- Import of backup failed. Error %1]. %r Details - %r Backup%r Directory: %1%r Instance : %2%r Comment : %3%r %r Source Template:%r ...
- Import of {0} address ranges is complete. {1} out of {2} objects successfully imported. {3} out of {2} objects failed to ...
- Import of {0} addresses is complete. {1} out of {2} objects successfully imported. {3} out of {2} objects failed to get imported. ...
- Import templates from a file. The syntax of this command is: Dirquota Template Import /File:PATH /Template:TEMPLATE_NAME ...
- Import templates from a file. The syntax of this command is: Filescrn Template Import /File:PATH /Template:TEMPLATE_NAME ...
- Import the trusted publishing domain (.xml) file that contains the server licensor certificate, cluster key, and templates ...
- Import the trusted user domain (.bin) file that contains the server licensor certificate of the AD RMS cluster to be trusted. ...
- Important! Do not press OK until all transforms are added and ordered correctly. For more information, right-click on the ...
- IMPORTANT: "netsh firewall" is deprecated; use "netsh advfirewall firewall" instead. For more information on using "netsh ...
- IMPORTANT: A connection profile must be created on a computer that uses the same 32-bit or 64-bit processor architecture ...
- IMPORTANT: Command executed successfully. However, "netsh firewall" is deprecated; use "netsh advfirewall firewall" instead. ...
- Important: Computer certificates are the recommended method of authentication. A preshared key is a relatively weak authentication ...
- Important: The default settings are not appropriate for servers that have high I/O load. For heavily used servers, you should ...
- Important: This option will copy just the application data to the new location - this will not recover the application itself. ...
- Important: You must enable external SSL termination on the SSL bridging product you plan to use and configure it to connect ...
- Importing a policy will overwrite all of the current Windows Firewall with Advanced Security policy. If you wish to save ...
- Importing policies may take several minutes or longer. Canceling this process or closing this program before import finishes ...
- Importing settings will permanently delete this GPO's existing settings. It is therefore recommended that you back up this ...
- Importing the Rights Template from trusted publishing domain file has encountered the following error: {0} The Language ID ...
- Importing the Rights Template from trusted publishing domain file has encountered the following error: {0} You must remove ...
- Importing the Rights Template from trusted publishing domain file has encountered the following error: {0} You must rename ...
- Importing this file will cause the existing settings for this RD Gateway server to be overwritten. If you want to save the ...
- Imports a .csv file as an update of all IP address range records that belong to the specified combination of ManagedByService ...
- Imports a .csv file as an update of all IP address range records that belong to the specified combination of ManagedByService ...
- Imports a .csv file as an update of all IP address records that belong to the specified IP address range. Along with adding ...
- Imports a .csv file as an update of all IP address records that belong to the specified IP address range. Along with adding ...
- Imports a .csv file with IP address range records into IPAM. This operation will add new IP address ranges that are not already ...
- Imports a .csv file with IP address range records into IPAM. This operation will add new IP address ranges that are not already ...
- Imports a .csv file with IP address records into IPAM. This operation will add new IP addresses that are not already in the ...
- Imports a .csv file with IP address records into IPAM. This operation will add new IP addresses that are not already in the ...
- Imports a foreign disk group into the local computer's online disk group. Syntax: IMPORT NOERR NOERR For scripting only. ...
- Imports update metadata (but not content files, approvals, or server settings) to this server from an export package file ...
- Imports update metadata from WsusScan cab and the associated payload into this WSUS Server. WsusScan cab version needs to ...
- Improve your wireless signal quality Windows Help and Support can provide more information about low wireless signal quality ...
- Improved security settings in Windows Server 2008, Windows Server 2008 R2, and Windows Server 2012 affect older versions ...
- Improves system performance by enabling write caching on the device, but a power outage or equipment failure might result ...
- In "Revocation Policy" settings, verify that the revocation policy public key file exists and that the file size is between ...
- In "User Rights" settings, you must either add at least one user with at least one right for the user, or you must select ...
- In a few easy steps, you can add features to your PC to get a different edition of %WINDOWS_SHORT%. Your apps, files, and ...
- In a load balanced cluster, one or more of the IP addresses configured on the external network adapter should be specified ...
- In a load-balanced cluster, the length of the IP-HTTPS or VPN IPv6 prefix must be 59 bits. Specify a valid prefix length. ...
- In a multisite deployment, Remote Access must be configured to use certificates issued from a trusted CA. The use of self-signed ...
- In a read-only domain controller environment, if you pre-create a computer account (computer object), the account must have ...
- In a Remote Desktop Session Host server pool, this feature allows a user to reconnect to a Remote Desktop Session Host server ...
- In a Windows PowerShell Workflow, loop conditions that invoke activities are not supported. Conditions can use only variable ...
- In a Windows PowerShell Workflow, loop conditions that modify variables are not supported. To change a variable, place the ...
- In a Windows PowerShell Workflow, parameter defaults may only be simple value types (such as integers) and strings. In addition, ...
- In a Windows PowerShell Workflow, the CmdletBinding attribute only supports the following values: "DefaultParameterSetName, ...
- In a Windows PowerShell Workflow, the syntax for Start-Sleep is: "Start-Sleep -Seconds " or "Start-Sleep -Milliseconds ". ...
- In a Windows PowerShell Workflow, throw statements that invoke activities (other than New-Object) are not supported. Throw ...
- In addition to obtaining a new certificate for your certification authority (CA), you also have the option of generating ...
- In addition to the certificate for Hyper-V Replica Broker, each node of the cluster must also have a valid certificate with ...
- In addition to the microphone button, audio meter and text feedback area, the user interface has a Close button and a Minimize ...
- In addition to the normal file names, the server is creating short, eight-character file names with a three-character file ...