Windows 8

  1. Specify the identity mapping source used by the server. If available, the local mapping file (%WINDIR%\System32\drivers\etc\passwd) ...
  2. Specify the install image. The unattend file will contain settings for each boot image architecture that can deploy the specified ...
  3. Specify the interface types and specific interfaces to which this rule applies. Interfaces can only be specified when managing ...
  4. Specify the IPv4 address of the network access server sending the access request message. You can use pattern matching syntax. ...
  5. Specify the IPv6 address of the network access server sending the access request message. You can use pattern matching syntax. ...
  6. Specify the key combination you want to use to release the mouse when virtual machine drivers are not installed. This key ...
  7. Specify the language to use during Windows Setup. The corresponding Setup language pack must have been added to the boot ...
  8. Specify the length of time the resource can take to change states between Online and Offline before the Cluster service puts ...
  9. Specify the location of the parent virtual hard disk to restore the connection between the differencing disk and the parent ...
  10. Specify the location where the image is installed. Disk IDs start at 0 and Partition IDs start at 1. If you are installing ...
  11. Specify the lower busy threshold that must be met before decreasing the number of cores/packages that are unparked (in percentage). ...
  12. Specify the maximum block size that the Trivial File Transfer Protocol (TFTP) server should allow. If a client requests a ...
  13. Specify the minimum number of hours allowed since the client has checked for new security updates (maximum allowed is 72 ...
  14. Specify the minimum number of perf check intervals since the last performance state change before the performance state may ...
  15. Specify the minimum number of perf check intervals since the last performance state change before the performance state may ...
  16. Specify the name of the computer that will be the read-only domain controller (RODC). This account will be created in Active ...
  17. Specify the name of the forest where the installation will occur and account credentials that have sufficient privileges ...
  18. Specify the name of the phone book that you want the server to update. If you did not specify a phone book name on the previous ...
  19. Specify the network location for your backup files and provide credentials for Windows Backup to use when accessing the location. ...
  20. Specify the network resources (computers or Remote Desktop Session Host server farms) that the computer group will contain. ...
  21. Specify the number of days that rights account certificates (RACs) for external users authenticating using ADFS are valid. ...
  22. Specify the number of times the Cluster service will attempt to restart or fail over the clustered role in the specified ...
  23. Specify the number of times the Cluster service will attempt to restart or fail over the Core Cluster Resource Group in the ...
  24. Specify the number of times the DHCP server should attempt conflict detection for an IP address before the server leases ...
  25. Specify the percentage of memory that Hyper-V should try to reserve as a buffer. Hyper-V uses the percentage and the current ...
  26. Specify the processors to use. You can specify multiple processors by typing a numeric range separated by commas and hyphens ...
  27. Specify the Replica server name to use to replicate this virtual machine. If the Replica server is on a failover cluster, ...
  28. Specify the Server Manager data refresh period (in minutes) Setting the refresh interval too low results in very frequent ...
  29. Specify the super user group name in the format [email protected]. The group that you specify must be an Active Directory ...
  30. Specify the text and image that will appear in the Network Access Protection user interface on client computers. For more ...
  31. Specify the time that elapsed since the last idle state promotion or demotion before idle states may be promoted or demoted ...
  32. Specify the upper busy threshold that must be met before increasing the number of cores/packages that are unparked (in percentage). ...
  33. Specify the user groups that will be associated with this session collection. Users who are members of these groups can connect ...
  34. Specify user authentication methods or a health certificate to use during IPsec negotiations. Those higher in the list are ...
  35. Specify when a new key is generated. If you select both options, a new key is generated when the first threshold is reached. ...
  36. Specify where to save each type of storage report: Incident reports - generated automatically when a user exceeds a quota ...
  37. Specify whether connection requests are processed locally, are forwarded to remote RADIUS servers for authentication, or ...
  38. Specify whether content protected using this template may be revoked. Revocation denies permission to open such content based ...
  39. Specify whether selected DirectAccess users can authenticate with a user name and password when OTP authentication is enabled. ...
  40. Specify whether the clustered role will automatically fail back to the most preferred owner (which is set on the General ...
  41. Specify whether the Core Cluster Resource Group will automatically fail back to the most preferred owner (which is set on ...
  42. Specify whether the processor performance engine should take latency sensitivity hints into account when selecting a performance ...
  43. Specify whether this entry point can be accessed by client computers running Windows 7. Access for these clients must be ...
  44. Specify whether to enable or disable access to local client devices and resources in your remote session for clients that ...
  45. Specify whether to enable or disable access to local client devices and resources in your remote session for clients that ...
  46. Specify whether to enable or disable client device redirection for clients that connect through RD Gateway, and then select ...
  47. Specify whether to send an e-mail message or run a script when the criteria specified on the Define a Filter page are met. ...
  48. Specify whether to use local Internet Protocol security (IPsec) policy on this computer. If local IPsec policy is not used, ...
  49. Specify whether to use Remote Desktop connection authorization policies (RD CAPs) stored on the local or central server that ...
  50. Specify which e-mail domains are trusted. If AD RMS needs to expand group membership across forests, licensing to security ...
  51. Specify which e-mail domains or user accounts to allow or block when issuing licenses from this AD RMS cluster. To specify ...
  52. Specify which users and groups have rights to work with content protected using this template. Some rights are not used in ...
  53. Specifying a lower setting for this virtual machine might prevent it from starting when other virtual machines are running ...
  54. Specifying an asterisk (*) applies the selected filtering mode to all users in all domains. This will permanently remove ...
  55. Specifying PassThru returns the DAMgmtServers object which contains the list of changes to the management server list and ...
  56. Specifying PassThru returns the Remote Access object which contains the entire Remote Access (DirectAccess and VPN) configuration. ...
  57. Specifying this parameter indicates that static pool IPv4 addressing should be enabled. The parameter contains an IP address ...
  58. Specifying this parameter indicates that the health details for the specified ComputerName/Cluster or EntryPoint should be ...
  59. Specifying this parameter indicates that the health for the entire cluster needs to be retrieved. If both cluster and ComputerName ...
  60. Specifying this parameter indicates that the Network location server is present on a different server and represents the ...
  61. Specifying this switch parameter indicates that Directaccess should be deployed behind a NAT. In a single network adapter ...
  62. Speech recognition allows me to dictate text into most programs on my computer. I can also browse the internet using "Say ...
  63. Speech recognition allows me to dictate text into most programs on my computer. I can also browse the Internet using "Say ...
  64. Speech recognition allows me to dictate text into most programs on my computer. I can also browse the internet using "Say ...
  65. Speech recognition allows me to dictate text into most programs on my computer. I can also browse the Internet using "Say ...
  66. Speech recognition allows me to dictate text into most programs on my computer. I can also browse the Internet using "Say ...
  67. Speech Recognition allows you to control windows, start programs, switch between windows, work with menus, and click on buttons, ...
  68. Speech Recognition allows you to dictate text by voice. In fact, you can create almost any type of document or email simply ...
  69. Speech Recognition encountered an error. Please restart Speech Recognition to ensure that you can continue to use Speech ...
  70. Speech recognition in the selected language cannot be initialized because this language is unsupported on your system. Please ...
  71. Speech Recognition will continue to run so that you can continue speaking to your computer. Click here to not show this reminder ...
  72. Speech Recognition will use the updated settings the next time it starts. Ensure that the recognizer language matches the ...
  73. Speech Training is not configured properly. Please go to the Speech Recognition Control Panel, click on Advanced Options ...
  74. Spell checking provider returned error indexes out of the string boundaries. This indicates that the provider either has ...
  75. Spinlock acquires/sec is the rate of spinlock acquisitions. It includes the basic spinlocks, queued spinlocks, in-stack queued ...