Windows 7
- When using Enterprise Certification Authorities, both Authenticated and Anonymous certificate templates need to be set at ...
- When using Microsoft Office Outlook in online mode, you can enable this policy to control how fast online mail is indexed ...
- When using the cmdlet New-Item to create a new rights template, the optional parameter "name" and its value "{0}" are not ...
- When using the Mastered format, you can only burn once to this kind of disc. If you want to add files to this disc more than ...
- When using this command, do not specify both the /PackagePath and /PackageName options. Re-enter the command, specifying ...
- When using WS_SSL_TRANSPORT_SECURITY_BINDING on the server, localCertCredential must be NULL. The server certificate must ...
- When using your IMAP account, does it take a while for changes made on one computer to show up on another computer? To resynchronize ...
- When viewing or setting load balance policies with the '-d' switch, the MPIO disk number is used to address the disk. For ...
- When visiting intranet sites, you may be repeatedly prompted for credentials (your user name and password) as a result of ...
- When visiting intranet sites, you may be repeatedly prompted for credentials (your user name and password) as a result of ...
- When WINS replicated with its partners, one of the partners showed there was more data that actually existed. WINS adjusted ...
- When working offline on a slow connection, you can work online again by pressing the "Work online" button in Windows Explorer. ...
- When you activate and validate %1, you get all of the benefits and support for your software, including downloads reserved ...
- When you add a Remote Desktop Virtualization Host (RD Virtualization Host) server, you can make virtual machines that are ...
- When you add a Web page to the Local intranet zone, you are adding the domain for that page. Therefore, all pages within ...
- When you add a Web page to the Trusted sites zone, you are adding the domain for that page. Therefore, all pages within that ...
- When you add a Web page to the Trusted sites zone, you are adding the domain for that page. Therefore, all pages within that ...
- When you apply a template to existing file screens, the current properties of the template overwrite all properties of the ...
- When you apply a template to existing quotas, the current properties of the template overwrite all properties of the quotas. ...
- When you apply an auto apply quota to existing quotas, the current auto apply quota template properties overwrite all properties ...
- When you apply Internet Explorer Enhanced Security Configuration to any user group and an instance of Internet Explorer is ...
- When you apply Internet Explorer Enhanced Security Configuration to any user group while Internet Explorer is open, you must ...
- When you apply Internet Explorer Enhanced Security Configuration to the Administrators group, the settings are applied to ...
- When you apply Internet Explorer Enhanced Security Configuration to the Administrators group, the settings are applied to ...
- When you change the default parameters for a report, the changes affect all incident reports and any existing report tasks ...
- When you click Finish, this wizard creates the interface and enables it on the router. To edit the interface, in the Routing ...
- When you click Finish, you will create the data source which you have just configured. The driver may prompt you for more ...
- When you click Finish, your device will be updated to mirror your Windows Media Player library. In the future, the device ...
- When you click Next, this wizard will start the Routing and Remote Access service and then start the Demand-Dial Interface ...
- When you click OK or Apply on the Properties dialog, you will be asked if you want the changes to affect all subfolders and ...
- When you click Revert Now, all changes to files and folders on this volume made after the selected shadow copy time will ...
- When you compose a new message, briefly summarize what the message is about in the subject line . That way, the recipient ...
- When you configure federation trust relationships with other organizations or when you use Active Directory Federation Services ...
- When you configure NPS as a NAP health policy server, you create health policies that allow NPS to validate the configuration ...
- When you configure NPS as a RADIUS server for 802.1X connections, you create network policies that allow NPS to authenticate ...
- When you configure NPS as a RADIUS server for Dial-Up or VPN connections, you create network policies that allow NPS to authenticate ...
- When you configure SQL Logging, you set up the data link between NPS and SQL Server. You also select an existing database ...
- When you create a task, you can specify the conditions that will trigger the task. To change these triggers, open the task ...
- When you create a task, you must specify the action that will occur when your task starts. To change these actions, open ...
- When you decide how much memory to assign to a virtual machine, consider how you intend to use the virtual machine and the ...
- When you delete a virtual desktop pool, users will no longer be able to connect to the virtual machines in the pool by using ...
- When you delete a virtual machine from the pool, users will no longer be able to connect to the virtual machine by using ...
- When you delete messages from an IMAP account, they are crossed through and the envelope icon has a red X . To permanently ...
- When you deploy 802.1X authenticating switches on your network, NPS can authenticate and authorize connection requests made ...
- When you deploy 802.1X wireless access points on your network, NPS can authenticate and authorize connection requests made ...
- When you deploy Dial-up servers on your network, NPS can authenticate and authorize connection requests made by dial-up clients ...
- When you deploy VPN servers on your network, NPS can authenticate and authorize connection requests made by VPN clients connecting ...
- When you dial into a router, it can offer to call you back to reduce your phone charges or to increase security. Specify ...
- When you dial into a server, it can offer to call you back to reduce your phone charges. Specify your callback preferences. ...
- When you enable Internet Explorer Enhanced Security Configuration, it sets Internet Explorer security settings to limit how ...
- When you enable the Active Directory Federation Services (AD FS) Windows token-based agent, authorized security tokens and ...
- When you enable this option, the UI screens on the client computer are processed using the settings in the Windows Deployment ...
- When you enable this setting, it will prevent Internet Information Services (IIS) from being installed, and you will not ...
- When you export RADIUS client and remote RADIUS server shared secrets, ensure that the exported file is stored in a secure ...
- When you finish this wizard, the selected disks will be reformatted and all the existing volumes and data on the disks will ...
- When you include a folder in a library, the files appear in the library, but continue to be stored in their original locations. ...
- When you make matches, the gumdrops from the back of the tile goes in the jar. Collect all of the gumdrops to win the board. ...
- When you make matches, the shamrock from the back of the tile goes in the jar. Collect all of the shamrocks to win the board. ...
- When you make matches, the smiley face from the back of the tile goes in the jar. Collect all of the smiley faces to win ...
- When you match 2 mixer tiles, all tiles on the board are mixed up. If you have a lot of tiles memorized, try to avoid the ...
- When you open Media Guide, you can access the latest music, movie trailers, and news updates, but your computer must be connected ...
- When you participate, we collect anonymous information about your hardware configuration and how you use Internet Explorer. ...
- When you post a message to a newsgroup or send an e-mail message, your display name will appear in the From field. Type your ...
- When you reach your server limit, e-mail messages in Folders on the server may be deleted. You can clean out your Folders ...
- When you remove a property, any profile data that is stored for that property is also removed. Are you sure that you want ...
- When you remove a RemoteApp source, RemoteApp programs on the RemoteApp source will no longer be available through RemoteApp ...
- When you remove a target, all initiators currently logged on to that target will no longer be able to access the LUNs that ...
- When you remove an RD Virtualization Host server, users will no longer be able to connect to virtual machines on the RD Virtualization ...
- When you renew a Certification Authority, you may reuse the existing keys. Select "Yes" to reuse keys and "No" to generate ...
- When you select token redirection, the Remote Desktop Session Host server switches to token redirection mode. In this mode, ...
- When you send an e-mail message, it will be placed in your 'Outbox' folder ready to be sent the next time you choose the ...
- When you send e-mail, your name will appear in the From field of the outgoing message. Type your name as you would like it ...
- When you send problem reports to Microsoft, you will receive solutions when they are available. You can adjust how much information ...
- When you set up Windows Media Center for use with a CableCARD to access premium channels, information about your computer ...
- When you specify a Dynamic Link Library as a connect action, you must provide the function name that will be called as the ...