Windows 8
- In addition, substitution of FOR variable references has been enhanced. You can now use the following optional syntax: %~I ...
- In both real-time and accounting cases the object consists of the following properties. A separate instance of the object ...
- In case of a port conflict, the Windows PowerShell cmdlet Set-IpamConfiguration can be used to update the port and reconfigure ...
- In case of sequential node failure or shutdown, this allows the cluster to continue running with less than a majority of ...
- In expiration policy settings, the use license expiration duration will not be saved unless you add at least one user or ...
- In future versions of Windows, Microsoft might remove dnscmd.exe. If you currently use dnscmd.exe to configure and manage ...
- In future versions of Windows, Microsoft might remove the Netsh functionality for %1!s!. Microsoft recommends that you transition ...
- In NT 4, GetShortPathName did not care if the file existed - it would give the short path name anyway. This behavior was ...
- In order for AD RMS clients to discover this cluster, you must register the AD RMS service connection point (SCP) in "{0}" ...
- In order for AD RMS clients to discover this cluster, you must register the AD RMS service connection point (SCP) in this ...
- In order for AD RMS clients to discover this cluster, you must register the AD RMS service connection point in "{0}" Active ...
- In order for AD RMS clients to discover this cluster, you must register the AD RMS service connection point in this Active ...
- In order for Scan Management to display scan server logs, you must enable Remote Event Log Management in Windows Firewall ...
- In order for the changes to the RADIUS authentication or accounting ports to take effect, the service must be stopped (if ...
- In order for this domain controller to be located by other domain members and domain controllers, the A record corresponding ...
- In order for this domain controller to be located by other domain members and domain controllers, the domain controller Locator ...
- In order for your changes to take effect, you must restart Windows. Save your work and close all programs, then click Restart ...
- In order for your phone book to be downloaded properly, the phone book name must be eight characters or less and it cannot ...
- In order to check the status of a certificate, a revocation configuration for the Online Responder must identify the CA that ...
- In order to check the status of a certificate, a revocation configuration for the Online Responder must identify the CA that ...
- In order to check the status of a certificate, a revocation configuration for the Online Responder must identify the CA that ...
- In order to deploy these packages to clients, you must add them to a driver group. A package can be in many driver groups, ...
- In order to dial correctly, your computer might require additional information, such as a calling-card number or the area ...
- In order to import the trusted publishing domain of "{0}", the drive's current location must be reset from {1} to {2}. Do ...
- In order to install Active Directory Domain Services, you must first make these ports available by removing or reconfiguring ...
- In order to refresh the drive {0}, it must reset its current location from {1} to drive root {2}. Do you want to continue? ...
- In order to remotely administer the cluster the remote registry service is required to be running. If cluster nodes are starting ...
- In order to remove the selected item {0}, the drive's current location must be reset from {1} to {2}. Are you sure you want ...
- In order to set administrative callback mode, either you must specify a callback number or the user must already have a callback ...
- In order to share this printer, Windows Firewall must be configured to allow this printer to be shared with other computers ...
- In order to share this printer, Windows Firewall will be configured to allow this printer to be shared with other computers ...
- In order to transfer music to your Creative Nomad digital audio player, you must upgrade to version 2.50 or later. The update ...
- In particular, there is at least one node ({0}) that has only IPv4 addresses and at least one node ({1}) that has only IPv6 ...
- In redirected access mode, clustered roles that are using the Cluster Shared Volume do not have to be stopped while certain ...
- In some editions of Windows, the disk might include file shadow copies and older Windows Complete PC Backup images as part ...
- In Templates Management, you create and modify NPS templates. NPS templates allow you to create and save an NPS component ...
- in the AD RMS logging database has been decrypted successfully. Click Search Report in the Actions pane to locate specific ...
- in the domain {2} trust(s) service principal name (SPN) {0} for delegation, but SPN {0} is not registered to an account. ...
- In the event of a cluster failover or move to another node, Hyper-V replication will pause if the new node does not also ...
- In the event of a failover (planned, unplanned, or test), the Replica virtual machine will come online using the same IP ...
- In the event of a failure on the domain's only domain controller, users will not be able to log in to the domain or access ...
- In the event of data loss or disk failure, you can reset the password that protects the AD RMS cluster key. If you used the ...
- In the event of data loss or disk failure, you can reset the password that protects the AD RMS cluster key. This policy setting ...
- In the guest operating system, do the following: Verify that appropriate drivers are installed and all networking devices ...
- In the list below, top values take precedence over lower values during classification. Lower values may be overridden by ...
- In the Password Replication Policy, you can specify whose passwords are allowed to replicate to the read-only domain controller ...
- In the past %1 hour(s) and %2 minute(s), %3 HTTP.SYS responses have had their application requested QoS conflict with URL ...
- In the resource mapping for class {0}, the node defines reference-to-collection cmdlets for property {1}, which is not a ...
- In the Start menu you can choose a computer activity, such as reading new e-mail messages or browsing the Web. This menu ...
- In the upper pane, select a virtual machine or specific files on a virtual machine, then drag and drop them into a folder ...
- In the value for parameter {0} double quotes were not used, but required. Double quotes are required for all values that ...
- In this section you will learn how to scroll up and down in any open window, close and minimize windows, and switch between ...
- In this topology, each member replicates with all other members of the replication group. This topology works well when there ...
- In this topology, the Remote Access server is deployed at the edge of the internal corporate network and is configured with ...
- In this topology, the Remote Access server is deployed behind an edge firewall or device, and is configured with two adapters. ...
- In this topology, the Remote Access server is deployed with a single network adapter that is connected to the internal network. ...
- In Windows 2003 and earlier versions of Windows, the Remote Procedure Call (RPC) Locator service manages the RPC name service ...
- In Windows 9x applications could restart the computer by calling the ExitWindowsEx API. Windows XP requires the application ...
- In Windows 9x, DirectDraw manipulates the palette directly without using GDI, while on NT it uses GDI. Therefore, if an application ...
- In Windows 9x, the DrawText API would accept out of range values and then convert them to acceptable values. This compatibility ...
- In Windows XP, applications are restricted from modifying the system menu. Instead, each application gets a separate copy ...
- In Windows XP, due to a modification in the caching between MoveFile and DeleteFile API's, when the VerInstallFileW API is ...
- In Windows XP, the WS_EX_CLIENTEDGE window style causes applications to run with the taskbar still visible. This may not ...
- In Windows XP, we have changed foreground semantics to stop foreground focus stealing by one app if another application is ...
- In you internet browser, you use the "Go to" command to put the cursor in the address field. Then you dictate the URL of ...
- In you internet browser, you use the "Go to" command to put the cursor in the address field. Then you use the spelling panel ...
- Inbound allow rule to allow traffic to the network location server deployed on the Remote Access server (with a single network ...
- Inbound Allowed Default Block Exempt Packets is the total number of default block exempt packets forwarded from a public ...
- Inbound Allowed Default Block Exempt Packets per Second is the rate at which default block exempt packets are forwarded from ...
- Inbound Allowed Filter Exempt IPv6 Packets is the total number of IPv6 filter exempt packets forwarded from a public interface ...
- Inbound Allowed Filter Exempt IPv6 Packets per Second is the rate at which IPv6 filter exempt packets are forwarded from ...
- Inbound Allowed ICMPv6 Packets is the total number of ICMPv6 packets forwarded from a public interface to an internal interface. ...
- Inbound Allowed ICMPv6 Packets per Second is the rate at which ICMPv6 packets are forwarded from a public interface to an ...
- Inbound Allowed IPv6 IPsec Authenticated Packets is the total number of authenticated IKEv1, IKEv2, AuthIP, or ESP IPv6 packets ...
- Inbound Allowed IPv6 IPsec Authenticated Packets per Second is the rate at which authenticated IKEv1, IKEv2, AuthIP or ESP ...