Windows 8
- Specify the identity mapping source used by the server. If available, the local mapping file (%WINDIR%\System32\drivers\etc\passwd) ...
- Specify the install image. The unattend file will contain settings for each boot image architecture that can deploy the specified ...
- Specify the interface types and specific interfaces to which this rule applies. Interfaces can only be specified when managing ...
- Specify the IPv4 address of the network access server sending the access request message. You can use pattern matching syntax. ...
- Specify the IPv6 address of the network access server sending the access request message. You can use pattern matching syntax. ...
- Specify the key combination you want to use to release the mouse when virtual machine drivers are not installed. This key ...
- Specify the language to use during Windows Setup. The corresponding Setup language pack must have been added to the boot ...
- Specify the length of time the resource can take to change states between Online and Offline before the Cluster service puts ...
- Specify the location of the parent virtual hard disk to restore the connection between the differencing disk and the parent ...
- Specify the location where the image is installed. Disk IDs start at 0 and Partition IDs start at 1. If you are installing ...
- Specify the lower busy threshold that must be met before decreasing the number of cores/packages that are unparked (in percentage). ...
- Specify the maximum block size that the Trivial File Transfer Protocol (TFTP) server should allow. If a client requests a ...
- Specify the minimum number of hours allowed since the client has checked for new security updates (maximum allowed is 72 ...
- Specify the minimum number of perf check intervals since the last performance state change before the performance state may ...
- Specify the minimum number of perf check intervals since the last performance state change before the performance state may ...
- Specify the name of the computer that will be the read-only domain controller (RODC). This account will be created in Active ...
- Specify the name of the forest where the installation will occur and account credentials that have sufficient privileges ...
- Specify the name of the phone book that you want the server to update. If you did not specify a phone book name on the previous ...
- Specify the network location for your backup files and provide credentials for Windows Backup to use when accessing the location. ...
- Specify the network resources (computers or Remote Desktop Session Host server farms) that the computer group will contain. ...
- Specify the number of days that rights account certificates (RACs) for external users authenticating using ADFS are valid. ...
- Specify the number of times the Cluster service will attempt to restart or fail over the clustered role in the specified ...
- Specify the number of times the Cluster service will attempt to restart or fail over the Core Cluster Resource Group in the ...
- Specify the number of times the DHCP server should attempt conflict detection for an IP address before the server leases ...
- Specify the percentage of memory that Hyper-V should try to reserve as a buffer. Hyper-V uses the percentage and the current ...
- Specify the processors to use. You can specify multiple processors by typing a numeric range separated by commas and hyphens ...
- Specify the Replica server name to use to replicate this virtual machine. If the Replica server is on a failover cluster, ...
- Specify the Server Manager data refresh period (in minutes) Setting the refresh interval too low results in very frequent ...
- Specify the super user group name in the format [email protected]. The group that you specify must be an Active Directory ...
- Specify the text and image that will appear in the Network Access Protection user interface on client computers. For more ...
- Specify the time that elapsed since the last idle state promotion or demotion before idle states may be promoted or demoted ...
- Specify the upper busy threshold that must be met before increasing the number of cores/packages that are unparked (in percentage). ...
- Specify the user groups that will be associated with this session collection. Users who are members of these groups can connect ...
- Specify user authentication methods or a health certificate to use during IPsec negotiations. Those higher in the list are ...
- Specify when a new key is generated. If you select both options, a new key is generated when the first threshold is reached. ...
- Specify where to save each type of storage report: Incident reports - generated automatically when a user exceeds a quota ...
- Specify whether connection requests are processed locally, are forwarded to remote RADIUS servers for authentication, or ...
- Specify whether content protected using this template may be revoked. Revocation denies permission to open such content based ...
- Specify whether selected DirectAccess users can authenticate with a user name and password when OTP authentication is enabled. ...
- Specify whether the clustered role will automatically fail back to the most preferred owner (which is set on the General ...
- Specify whether the Core Cluster Resource Group will automatically fail back to the most preferred owner (which is set on ...
- Specify whether the processor performance engine should take latency sensitivity hints into account when selecting a performance ...
- Specify whether this entry point can be accessed by client computers running Windows 7. Access for these clients must be ...
- Specify whether to enable or disable access to local client devices and resources in your remote session for clients that ...
- Specify whether to enable or disable access to local client devices and resources in your remote session for clients that ...
- Specify whether to enable or disable client device redirection for clients that connect through RD Gateway, and then select ...
- Specify whether to send an e-mail message or run a script when the criteria specified on the Define a Filter page are met. ...
- Specify whether to use local Internet Protocol security (IPsec) policy on this computer. If local IPsec policy is not used, ...
- Specify whether to use Remote Desktop connection authorization policies (RD CAPs) stored on the local or central server that ...
- Specify which e-mail domains are trusted. If AD RMS needs to expand group membership across forests, licensing to security ...
- Specify which e-mail domains or user accounts to allow or block when issuing licenses from this AD RMS cluster. To specify ...
- Specify which users and groups have rights to work with content protected using this template. Some rights are not used in ...
- Specifying a lower setting for this virtual machine might prevent it from starting when other virtual machines are running ...
- Specifying an asterisk (*) applies the selected filtering mode to all users in all domains. This will permanently remove ...
- Specifying PassThru returns the DAMgmtServers object which contains the list of changes to the management server list and ...
- Specifying PassThru returns the Remote Access object which contains the entire Remote Access (DirectAccess and VPN) configuration. ...
- Specifying this parameter indicates that static pool IPv4 addressing should be enabled. The parameter contains an IP address ...
- Specifying this parameter indicates that the health details for the specified ComputerName/Cluster or EntryPoint should be ...
- Specifying this parameter indicates that the health for the entire cluster needs to be retrieved. If both cluster and ComputerName ...
- Specifying this parameter indicates that the Network location server is present on a different server and represents the ...
- Specifying this switch parameter indicates that Directaccess should be deployed behind a NAT. In a single network adapter ...
- Speech recognition allows me to dictate text into most programs on my computer. I can also browse the internet using "Say ...
- Speech recognition allows me to dictate text into most programs on my computer. I can also browse the Internet using "Say ...
- Speech recognition allows me to dictate text into most programs on my computer. I can also browse the internet using "Say ...
- Speech recognition allows me to dictate text into most programs on my computer. I can also browse the Internet using "Say ...
- Speech recognition allows me to dictate text into most programs on my computer. I can also browse the Internet using "Say ...
- Speech Recognition allows you to control windows, start programs, switch between windows, work with menus, and click on buttons, ...
- Speech Recognition allows you to dictate text by voice. In fact, you can create almost any type of document or email simply ...
- Speech Recognition encountered an error. Please restart Speech Recognition to ensure that you can continue to use Speech ...
- Speech recognition in the selected language cannot be initialized because this language is unsupported on your system. Please ...
- Speech Recognition will continue to run so that you can continue speaking to your computer. Click here to not show this reminder ...
- Speech Recognition will use the updated settings the next time it starts. Ensure that the recognizer language matches the ...
- Speech Training is not configured properly. Please go to the Speech Recognition Control Panel, click on Advanced Options ...
- Spell checking provider returned error indexes out of the string boundaries. This indicates that the provider either has ...
- Spinlock acquires/sec is the rate of spinlock acquisitions. It includes the basic spinlocks, queued spinlocks, in-stack queued ...