Windows 8

  1. Use this tab to configure the Remote Desktop Services startup environment. These settings override client-specified settings. ...
  2. Use this tab to configure the Remote Desktop Services user profile. Settings in this profile apply to Remote Desktop Services. ...
  3. Use this template to create a basic Data Collector Set. You can add or remove counters and change the scheduling options ...
  4. Use this to indicate if the template associated with this event contains valid WinRT types i.e. the event payload fields ...
  5. Use this Web site to request a certificate for your Web browser, e-mail client, or other program. By using a certificate, ...
  6. Use this wizard to quickly schedule a common task. For more advanced options or settings such as multiple task actions or ...
  7. Use this wizard to set up DirectAccess with basic settings. After completing this wizard, click the Configuration node to ...
  8. Use Windows PowerShell to reconfigure how the storage file paths are allocated to the pool so that a child pool is always ...
  9. Use Windows PowerShell to reconfigure the storage resource pools so that multiple pools do not use the same storage path. ...
  10. Use your natural handwriting style. For example, if you normally write in cursive, copy the sentences in cursive. If you ...
  11. UseCustomSorting requires an object that implements IResultNodeComparer and the MMCListView.Sorter property set to the object. ...
  12. Used Average is the current number of resources (buffers) in use at this time. The number in parentheses following the resource ...
  13. Used for any of the following tasks: - Display the hardware IDs of storage on the system. - Have MSDSM claim/unclaim MPIO ...
  14. Used in LDAP URLs for the Authority Information Access extension Specifies the object class as certification authority Example ...
  15. Used in LDAP URLs for the CRL Distribution Points extension Specifies the object class as CRL distribution point Example ...
  16. Used in LDAP URLs Inserts the container name of the configuration data partition Example location: ldap:///CN= ,CN= ,CN=CDP,CN=Public ...
  17. Used in URLs and paths Derived from the name of the CA, guaranteed to be unique and less than 64 chars Example location: ...
  18. Used in URLs and paths Derived from the name of the CA, guaranteed to be unique and less than 64 chars Example location: ...
  19. Used in URLs and paths for the Authority Information Access extension Appends a suffix to distinguish the certificate file ...
  20. Used in URLs and paths for the CRL Distribution Points extension Appends a suffix to distinguish the CRL file name Example ...
  21. Used in URLs and paths Inserts the DNS name of the server Example location: http:// /CertEnroll/ _ .crt Or (for OCSP) http:// ...
  22. Used in URLs and paths Substitutes the Delta CRL file name suffix for the CRL file name suffix, if appropriate Example location: ...
  23. Used Maximum is the maximum number of NetBEUI resources (buffers) in use at any point in time. This value is useful in sizing ...
  24. Used to add sites to their respective Trusted' or Intranet' zones. This is to mitigate some of the problems that the applications ...
  25. Used to discover and locate other PCs, devices, and network infrastructure components on the network. Also used to determine ...
  26. Used to modify the options attribute of an NTDS Site Settings Object. SYNTAX /siteoptions DSA /site: {+|-}IS_AUTO_TOPOLOGY_DISABLED ...
  27. Useful for tools that must always be available, such as remote administration tools. If you specify this option, you must ...
  28. User "%1" is currently logged on. If you delete the user, they will not be able to log on to the computer again, unlock the ...
  29. User %1 cannot be authenticated with OTP. Ensure that a DN is defined for the user name in Active Directory. Error code: ...
  30. User %1 cannot be authenticated with OTP. Ensure that a UPN is defined for the user name in Active Directory. Error code: ...
  31. User %1\%2 will be logged on to the local redirector machine (assuming TS Farm scenario). Sending local IP address to the ...
  32. User ({0}) could not be excluded since this user has not been issued a rights account certificate by your AD RMS cluster. ...
  33. User ({0}) to be excluded cannot be found in database and there is no AD RMS account certificate issued by this installation ...
  34. User / Device claims information. Subject: Security ID: %1 Account Name: %2 Account Domain: %3 Logon ID: %4 Logon Type: %9 ...
  35. User / Device Claims This policy allows you to audit user and device claims information in the user's logon token. Events ...
  36. User Account Changed: Target Account Name: %2 Target Domain: %3 Target Account ID: %4 Caller User Name: %5 Caller Domain: ...
  37. User Account Control is turned on, but you must restart your PC for the change to take effect. How does User Account Control ...
  38. User Account Control: Allow UIAccess applications to prompt for elevation without using the secure desktop. This policy setting ...
  39. User Account Control: Behavior of the elevation prompt for administrators in Admin Approval Mode This policy setting controls ...
  40. User Account Control: Behavior of the elevation prompt for standard users This policy setting controls the behavior of the ...
  41. User Account Control: Detect application installations and prompt for elevation This policy setting controls the behavior ...
  42. User Account Control: Only elevate executable files that are signed and validated This policy setting enforces public key ...
  43. User Account Control: Only elevate UIAccess applications that are installed in secure locations This policy setting controls ...
  44. User Account Control: Switch to the secure desktop when prompting for elevation This policy setting controls whether the ...
  45. User Account Control: Turn on Admin Approval Mode This policy setting controls the behavior of all User Account Control (UAC) ...
  46. User Account Control: Use Admin Approval Mode for the built-in Administrator account This policy setting controls the behavior ...
  47. User Account Control: Virtualize file and registry write failures to per-user locations This policy setting controls whether ...
  48. User Account Created: New Account Name: %1 New Domain: %2 New Account ID: %3 Caller User Name: %4 Caller Domain: %5 Caller ...
  49. User Account Deleted: Target Account Name: %1 Target Domain: %2 Target Account ID: %3 Caller User Name: %4 Caller Domain: ...
  50. User Account Disabled: Target Account Name: %1 Target Domain: %2 Target Account ID: %3 Caller User Name: %4 Caller Domain: ...
  51. User account does not have permission to access this document. Try to open this document using another account or contact ...
  52. User account does not have permission to access to this document. Try to open this document using another account or contact ...
  53. User Account Enabled: Target Account Name: %1 Target Domain: %2 Target Account ID: %3 Caller User Name: %4 Caller Domain: ...
  54. User account has not been activated on this machine. Activate the user account on this machine and reopen this document. ...
  55. User account is not setup for digital rights management. Contact your system administrator to set up your account for digital ...
  56. User Account Locked Out: Target Account Name: %1 Target Account ID: %3 Caller Machine Name: %2 Caller User Name: %4 Caller ...
  57. User Account password set: Target Account Name: %1 Target Domain: %2 Target Account ID: %3 Caller User Name: %4 Caller Domain: ...
  58. User account restriction error. The possible reasons are that blank passwords not allowed, or that a policy restriction has ...
  59. User Account Unlocked: Target Account Name: %1 Target Domain: %2 Target Account ID: %3 Caller User Name: %4 Caller Domain: ...
  60. User accounts must have passwords. Any user account that you use to connect remotely must have a password. Also, if you are ...
  61. User accounts that have access to the virtual desktop collection will be automatically assigned a virtual desktop when they ...
  62. User authentication using Basic authentication scheme failed. Additional Data Unexpected error received from LogonUser %1: ...
  63. User Choice Setting: This key is to be changed only by explicit user action brokered by system APIs. Reference for instruction ...
  64. User Control Panel settings configure options that are manually configurable via the Windows Control Panel and affect only ...
  65. User count check did not pass because error %1 occurred in function %2.%r%3%rMake sure that the domain that this computer ...
  66. User credentials does not have permission to perform this operation. The account used for this test must have network logon ...
  67. User credentials does not have permission to perform this operation. The account used for this test must have network logon ...
  68. User initiated logoff: Subject: Security ID: %1 Account Name: %2 Account Domain: %3 Logon ID: %4 This event is generated ...
  69. User mode health monitoring has detected that the system is not being responsive. The Failover cluster virtual adapter has ...
  70. User mode health monitoring has detected that the system is not being responsive. The Failover cluster virtual adapter has ...
  71. User Name: %1 Domain: % %2 Request Type: %3 Logon Process: %4 Authentication Package: %5 Workstation Name: %6 Caller User ...
  72. User profile disks can only be enabled on a temporary collection. The specified collection {0} is not a temporary collection. ...
  73. User profile disks enable users to store settings and folders in a central location. You can enable folder redirection and ...
  74. User profiles store settings for your desktop and other information related to your user account. You can create a different ...
  75. User Settings are applied to users regardless of which computer they log on to, and affect only the individual users for ...