Windows 7
- Use this feature to view information about worker processes running on the Web server and about requests running inside those ...
- Use this option for excluding rights account certificates of external users who do not have an Active Directory Domain Services ...
- Use this option for excluding rights account certificates of internal users who have an Active Directory Domain Services ...
- Use this option if there are computers on your network that do not support IPsec or have an incompatible IPsec configuration. ...
- Use this option if you don't have a private key or wish to create a new private key to enhance security. You will be asked ...
- Use this option to specify the days and times at which replication occurs by default. The initial replication schedule has ...
- Use this section to configure auditing based on your auditing objectives. The auditing policy determines the success and ...
- Use this section to configure protocols used to communicate with other computers. When configured to communicate with computers ...
- Use this section to configure rules for Windows Firewall with Advanced Security based on the roles and administrative options ...
- Use this section to configure services based on the selected server's roles and other features. These roles and other features ...
- Use this section to save the policy you have created. You can apply it to the selected server now, or you can apply it to ...
- Use this setting to control whether or not a user is given the choice to report an error. When Display Error Notification ...
- Use this snap-in to manage Windows Deployment Services. Windows Deployment Services is used to deploy the Windows operating ...
- Use this tab to configure the Remote Desktop Services startup environment. These settings override client-specified settings. ...
- Use this tab to configure the Remote Desktop Services user profile. Settings in this profile apply to Remote Desktop Services. ...
- Use this template to create a basic Data Collector Set. You can add or remove counters and change the scheduling options ...
- Use this Web site to request a certificate for your Web browser, e-mail client, or other program. By using a certificate, ...
- Use this wizard to determine how much content to make available offline. You can also set up a schedule to synchronize the ...
- Use this wizard to quickly schedule a common task. For more advanced options or settings such as multiple task actions or ...
- Use unattend.txt to add intranet sites and UNC servers to the Local intranet zone inclusion list as part of the installation ...
- Use unattend.txt to add intranet sites and UNC servers to the Local intranet zone inclusion list as part of the installation ...
- Use virtual machine snapshots to capture the state of a virtual machine while it is running. You can take multiple snapshots ...
- Use your natural handwriting style. For example, if you normally write in cursive, copy the sentences in cursive. If you ...
- UseCustomSorting requires an object that implements IResultNodeComparer and the MMCListView.Sorter property set to the object. ...
- Used Average is the current number of resources (buffers) in use at this time. The number in parentheses following the resource ...
- Used for any of the following tasks: - Display the hardware IDs of storage on the system. - Have MSDSM claim/unclaim MPIO ...
- Used in LDAP URLs for the Authority Information Access extension Specifies the object class as certification authority Example ...
- Used in LDAP URLs for the CRL Distribution Points extension Specifies the object class as CRL distribution point Example ...
- Used in LDAP URLs Inserts the container name of the configuration data partition Example location: ldap:///CN= ,CN= ,CN=CDP,CN=Public ...
- Used in URLs and paths Derived from the name of the CA, guaranteed to be unique and less than 64 chars Example location: ...
- Used in URLs and paths Derived from the name of the CA, guaranteed to be unique and less than 64 chars Example location: ...
- Used in URLs and paths for the Authority Information Access extension Appends a suffix to distinguish the certificate file ...
- Used in URLs and paths for the CRL Distribution Points extension Appends a suffix to distinguish the CRL file name Example ...
- Used in URLs and paths Inserts the DNS name of the server Example location: http:// /CertEnroll/ _ .crt Or (for OCSP) http:// ...
- Used in URLs and paths Substitutes the Delta CRL file name suffix for the CRL file name suffix, if appropriate Example location: ...
- Used Maximum is the maximum number of NetBEUI resources (buffers) in use at any point in time. This value is useful in sizing ...
- Used to add sites to their respective Trusted' or Intranet' zones. This is to mitigate some of the problems that the applications ...
- Used to discover and locate other PCs, devices, and network infrastructure components on the network. Also used to determine ...
- Used to modify the options attribute of an NTDS Site Settings Object. SYNTAX /siteoptions DSA /site: {+|-}IS_AUTO_TOPOLOGY_DISABLED ...
- Used with the -install parameter to install all subordinate role services and features along with the role, role service, ...
- Useful for tools that must always be available, such as remote administration tools. If you specify this option, you must ...
- User "%1" is currently logged on. If you delete the user, they will not be able to log on to the computer again, unlock the ...
- User %1\%2 will be logged on to the local redirector machine (assuming TS Farm scenario). Sending local IP address to the ...
- User '[2]' has previously initiated an install for product '[3]'. That user will need to run that install again before they ...
- User '[2]' has previously initiated an install for product '[3]'. That user will need to run that install again before they ...
- User ({0}) could not be excluded since this user has not been issued a rights account certificate by your AD RMS cluster. ...
- User ({0}) to be excluded cannot be found in database and there is no AD RMS account certificate issued by this installation ...
- User Account Changed: Target Account Name: %2 Target Domain: %3 Target Account ID: %4 Caller User Name: %5 Caller Domain: ...
- User Account Control is turned on, but you must restart your computer for the change to take effect. How does User Account ...
- User Account Control: Allow UIAccess applications to prompt for elevation without using the secure desktop. This policy setting ...
- User Account Control: Behavior of the elevation prompt for administrators in Admin Approval Mode This policy setting controls ...
- User Account Control: Behavior of the elevation prompt for standard users This policy setting controls the behavior of the ...
- User Account Control: Detect application installations and prompt for elevation This policy setting controls the behavior ...
- User Account Control: Only elevate executable files that are signed and validated This policy setting enforces public key ...
- User Account Control: Only elevate UIAccess applications that are installed in secure locations This policy setting controls ...
- User Account Control: Switch to the secure desktop when prompting for elevation This policy setting controls whether the ...
- User Account Control: Turn on Admin Approval Mode This policy setting controls the behavior of all User Account Control (UAC) ...
- User Account Control: Use Admin Approval Mode for the built-in Administrator account This policy setting controls the behavior ...
- User Account Control: Virtualize file and registry write failures to per-user locations This policy setting controls whether ...
- User Account Created: New Account Name: %1 New Domain: %2 New Account ID: %3 Caller User Name: %4 Caller Domain: %5 Caller ...
- User Account Deleted: Target Account Name: %1 Target Domain: %2 Target Account ID: %3 Caller User Name: %4 Caller Domain: ...
- User Account Disabled: Target Account Name: %1 Target Domain: %2 Target Account ID: %3 Caller User Name: %4 Caller Domain: ...
- User account does not have permission to access this document. Try to open this document using another account or contact ...
- User account does not have permission to access to this document. Try to open this document using another account or contact ...
- User Account Enabled: Target Account Name: %1 Target Domain: %2 Target Account ID: %3 Caller User Name: %4 Caller Domain: ...
- User account has not been activated on this machine. Activate the user account on this machine and reopen this document. ...
- User account is not setup for digital rights management. Contact your system administrator to set up your account for digital ...
- User Account Locked Out: Target Account Name: %1 Target Account ID: %3 Caller Machine Name: %2 Caller User Name: %4 Caller ...
- User Account password set: Target Account Name: %1 Target Domain: %2 Target Account ID: %3 Caller User Name: %4 Caller Domain: ...
- User account restriction error. The possible reasons are that blank passwords not allowed, or that a policy restriction has ...
- User Account Unlocked: Target Account Name: %1 Target Domain: %2 Target Account ID: %3 Caller User Name: %4 Caller Domain: ...
- User accounts must have passwords. Any user account that you use to connect remotely must have a password. Also, if you are ...
- User authentication using Basic authentication scheme failed. Additional Data Unexpected error received from LogonUser %1: ...
- User Choice Setting: This key is to be changed only by explicit user action brokered by system APIs. Reference for instruction ...
- User Control Panel settings configure options that are manually configurable via the Windows Control Panel and affect only ...