Windows 7

  1. Use this feature to view information about worker processes running on the Web server and about requests running inside those ...
  2. Use this option for excluding rights account certificates of external users who do not have an Active Directory Domain Services ...
  3. Use this option for excluding rights account certificates of internal users who have an Active Directory Domain Services ...
  4. Use this option if there are computers on your network that do not support IPsec or have an incompatible IPsec configuration. ...
  5. Use this option if you don't have a private key or wish to create a new private key to enhance security. You will be asked ...
  6. Use this option to specify the days and times at which replication occurs by default. The initial replication schedule has ...
  7. Use this section to configure auditing based on your auditing objectives. The auditing policy determines the success and ...
  8. Use this section to configure protocols used to communicate with other computers. When configured to communicate with computers ...
  9. Use this section to configure rules for Windows Firewall with Advanced Security based on the roles and administrative options ...
  10. Use this section to configure services based on the selected server's roles and other features. These roles and other features ...
  11. Use this section to save the policy you have created. You can apply it to the selected server now, or you can apply it to ...
  12. Use this setting to control whether or not a user is given the choice to report an error. When Display Error Notification ...
  13. Use this snap-in to manage Windows Deployment Services. Windows Deployment Services is used to deploy the Windows operating ...
  14. Use this tab to configure the Remote Desktop Services startup environment. These settings override client-specified settings. ...
  15. Use this tab to configure the Remote Desktop Services user profile. Settings in this profile apply to Remote Desktop Services. ...
  16. Use this template to create a basic Data Collector Set. You can add or remove counters and change the scheduling options ...
  17. Use this Web site to request a certificate for your Web browser, e-mail client, or other program. By using a certificate, ...
  18. Use this wizard to determine how much content to make available offline. You can also set up a schedule to synchronize the ...
  19. Use this wizard to quickly schedule a common task. For more advanced options or settings such as multiple task actions or ...
  20. Use unattend.txt to add intranet sites and UNC servers to the Local intranet zone inclusion list as part of the installation ...
  21. Use unattend.txt to add intranet sites and UNC servers to the Local intranet zone inclusion list as part of the installation ...
  22. Use virtual machine snapshots to capture the state of a virtual machine while it is running. You can take multiple snapshots ...
  23. Use your natural handwriting style. For example, if you normally write in cursive, copy the sentences in cursive. If you ...
  24. UseCustomSorting requires an object that implements IResultNodeComparer and the MMCListView.Sorter property set to the object. ...
  25. Used Average is the current number of resources (buffers) in use at this time. The number in parentheses following the resource ...
  26. Used for any of the following tasks: - Display the hardware IDs of storage on the system. - Have MSDSM claim/unclaim MPIO ...
  27. Used in LDAP URLs for the Authority Information Access extension Specifies the object class as certification authority Example ...
  28. Used in LDAP URLs for the CRL Distribution Points extension Specifies the object class as CRL distribution point Example ...
  29. Used in LDAP URLs Inserts the container name of the configuration data partition Example location: ldap:///CN= ,CN= ,CN=CDP,CN=Public ...
  30. Used in URLs and paths Derived from the name of the CA, guaranteed to be unique and less than 64 chars Example location: ...
  31. Used in URLs and paths Derived from the name of the CA, guaranteed to be unique and less than 64 chars Example location: ...
  32. Used in URLs and paths for the Authority Information Access extension Appends a suffix to distinguish the certificate file ...
  33. Used in URLs and paths for the CRL Distribution Points extension Appends a suffix to distinguish the CRL file name Example ...
  34. Used in URLs and paths Inserts the DNS name of the server Example location: http:// /CertEnroll/ _ .crt Or (for OCSP) http:// ...
  35. Used in URLs and paths Substitutes the Delta CRL file name suffix for the CRL file name suffix, if appropriate Example location: ...
  36. Used Maximum is the maximum number of NetBEUI resources (buffers) in use at any point in time. This value is useful in sizing ...
  37. Used to add sites to their respective Trusted' or Intranet' zones. This is to mitigate some of the problems that the applications ...
  38. Used to discover and locate other PCs, devices, and network infrastructure components on the network. Also used to determine ...
  39. Used to modify the options attribute of an NTDS Site Settings Object. SYNTAX /siteoptions DSA /site: {+|-}IS_AUTO_TOPOLOGY_DISABLED ...
  40. Used with the -install parameter to install all subordinate role services and features along with the role, role service, ...
  41. Useful for tools that must always be available, such as remote administration tools. If you specify this option, you must ...
  42. User "%1" is currently logged on. If you delete the user, they will not be able to log on to the computer again, unlock the ...
  43. User %1\%2 will be logged on to the local redirector machine (assuming TS Farm scenario). Sending local IP address to the ...
  44. User '[2]' has previously initiated an install for product '[3]'. That user will need to run that install again before they ...
  45. User '[2]' has previously initiated an install for product '[3]'. That user will need to run that install again before they ...
  46. User ({0}) could not be excluded since this user has not been issued a rights account certificate by your AD RMS cluster. ...
  47. User ({0}) to be excluded cannot be found in database and there is no AD RMS account certificate issued by this installation ...
  48. User Account Changed: Target Account Name: %2 Target Domain: %3 Target Account ID: %4 Caller User Name: %5 Caller Domain: ...
  49. User Account Control is turned on, but you must restart your computer for the change to take effect. How does User Account ...
  50. User Account Control: Allow UIAccess applications to prompt for elevation without using the secure desktop. This policy setting ...
  51. User Account Control: Behavior of the elevation prompt for administrators in Admin Approval Mode This policy setting controls ...
  52. User Account Control: Behavior of the elevation prompt for standard users This policy setting controls the behavior of the ...
  53. User Account Control: Detect application installations and prompt for elevation This policy setting controls the behavior ...
  54. User Account Control: Only elevate executable files that are signed and validated This policy setting enforces public key ...
  55. User Account Control: Only elevate UIAccess applications that are installed in secure locations This policy setting controls ...
  56. User Account Control: Switch to the secure desktop when prompting for elevation This policy setting controls whether the ...
  57. User Account Control: Turn on Admin Approval Mode This policy setting controls the behavior of all User Account Control (UAC) ...
  58. User Account Control: Use Admin Approval Mode for the built-in Administrator account This policy setting controls the behavior ...
  59. User Account Control: Virtualize file and registry write failures to per-user locations This policy setting controls whether ...
  60. User Account Created: New Account Name: %1 New Domain: %2 New Account ID: %3 Caller User Name: %4 Caller Domain: %5 Caller ...
  61. User Account Deleted: Target Account Name: %1 Target Domain: %2 Target Account ID: %3 Caller User Name: %4 Caller Domain: ...
  62. User Account Disabled: Target Account Name: %1 Target Domain: %2 Target Account ID: %3 Caller User Name: %4 Caller Domain: ...
  63. User account does not have permission to access this document. Try to open this document using another account or contact ...
  64. User account does not have permission to access to this document. Try to open this document using another account or contact ...
  65. User Account Enabled: Target Account Name: %1 Target Domain: %2 Target Account ID: %3 Caller User Name: %4 Caller Domain: ...
  66. User account has not been activated on this machine. Activate the user account on this machine and reopen this document. ...
  67. User account is not setup for digital rights management. Contact your system administrator to set up your account for digital ...
  68. User Account Locked Out: Target Account Name: %1 Target Account ID: %3 Caller Machine Name: %2 Caller User Name: %4 Caller ...
  69. User Account password set: Target Account Name: %1 Target Domain: %2 Target Account ID: %3 Caller User Name: %4 Caller Domain: ...
  70. User account restriction error. The possible reasons are that blank passwords not allowed, or that a policy restriction has ...
  71. User Account Unlocked: Target Account Name: %1 Target Domain: %2 Target Account ID: %3 Caller User Name: %4 Caller Domain: ...
  72. User accounts must have passwords. Any user account that you use to connect remotely must have a password. Also, if you are ...
  73. User authentication using Basic authentication scheme failed. Additional Data Unexpected error received from LogonUser %1: ...
  74. User Choice Setting: This key is to be changed only by explicit user action brokered by system APIs. Reference for instruction ...
  75. User Control Panel settings configure options that are manually configurable via the Windows Control Panel and affect only ...