Windows 7

  1. When using Enterprise Certification Authorities, both Authenticated and Anonymous certificate templates need to be set at ...
  2. When using Microsoft Office Outlook in online mode, you can enable this policy to control how fast online mail is indexed ...
  3. When using the cmdlet New-Item to create a new rights template, the optional parameter "name" and its value "{0}" are not ...
  4. When using the Mastered format, you can only burn once to this kind of disc. If you want to add files to this disc more than ...
  5. When using this command, do not specify both the /PackagePath and /PackageName options. Re-enter the command, specifying ...
  6. When using WS_SSL_TRANSPORT_SECURITY_BINDING on the server, localCertCredential must be NULL. The server certificate must ...
  7. When using your IMAP account, does it take a while for changes made on one computer to show up on another computer? To resynchronize ...
  8. When viewing or setting load balance policies with the '-d' switch, the MPIO disk number is used to address the disk. For ...
  9. When visiting intranet sites, you may be repeatedly prompted for credentials (your user name and password) as a result of ...
  10. When visiting intranet sites, you may be repeatedly prompted for credentials (your user name and password) as a result of ...
  11. When WINS replicated with its partners, one of the partners showed there was more data that actually existed. WINS adjusted ...
  12. When working offline on a slow connection, you can work online again by pressing the "Work online" button in Windows Explorer. ...
  13. When you activate and validate %1, you get all of the benefits and support for your software, including downloads reserved ...
  14. When you add a Remote Desktop Virtualization Host (RD Virtualization Host) server, you can make virtual machines that are ...
  15. When you add a Web page to the Local intranet zone, you are adding the domain for that page. Therefore, all pages within ...
  16. When you add a Web page to the Trusted sites zone, you are adding the domain for that page. Therefore, all pages within that ...
  17. When you add a Web page to the Trusted sites zone, you are adding the domain for that page. Therefore, all pages within that ...
  18. When you apply a template to existing file screens, the current properties of the template overwrite all properties of the ...
  19. When you apply a template to existing quotas, the current properties of the template overwrite all properties of the quotas. ...
  20. When you apply an auto apply quota to existing quotas, the current auto apply quota template properties overwrite all properties ...
  21. When you apply Internet Explorer Enhanced Security Configuration to any user group and an instance of Internet Explorer is ...
  22. When you apply Internet Explorer Enhanced Security Configuration to any user group while Internet Explorer is open, you must ...
  23. When you apply Internet Explorer Enhanced Security Configuration to the Administrators group, the settings are applied to ...
  24. When you apply Internet Explorer Enhanced Security Configuration to the Administrators group, the settings are applied to ...
  25. When you change the default parameters for a report, the changes affect all incident reports and any existing report tasks ...
  26. When you click Finish, this wizard creates the interface and enables it on the router. To edit the interface, in the Routing ...
  27. When you click Finish, you will create the data source which you have just configured. The driver may prompt you for more ...
  28. When you click Finish, your device will be updated to mirror your Windows Media Player library. In the future, the device ...
  29. When you click Next, this wizard will start the Routing and Remote Access service and then start the Demand-Dial Interface ...
  30. When you click OK or Apply on the Properties dialog, you will be asked if you want the changes to affect all subfolders and ...
  31. When you click Revert Now, all changes to files and folders on this volume made after the selected shadow copy time will ...
  32. When you compose a new message, briefly summarize what the message is about in the subject line . That way, the recipient ...
  33. When you configure federation trust relationships with other organizations or when you use Active Directory Federation Services ...
  34. When you configure NPS as a NAP health policy server, you create health policies that allow NPS to validate the configuration ...
  35. When you configure NPS as a RADIUS server for 802.1X connections, you create network policies that allow NPS to authenticate ...
  36. When you configure NPS as a RADIUS server for Dial-Up or VPN connections, you create network policies that allow NPS to authenticate ...
  37. When you configure SQL Logging, you set up the data link between NPS and SQL Server. You also select an existing database ...
  38. When you create a task, you can specify the conditions that will trigger the task. To change these triggers, open the task ...
  39. When you create a task, you must specify the action that will occur when your task starts. To change these actions, open ...
  40. When you decide how much memory to assign to a virtual machine, consider how you intend to use the virtual machine and the ...
  41. When you delete a virtual desktop pool, users will no longer be able to connect to the virtual machines in the pool by using ...
  42. When you delete a virtual machine from the pool, users will no longer be able to connect to the virtual machine by using ...
  43. When you delete messages from an IMAP account, they are crossed through and the envelope icon has a red X . To permanently ...
  44. When you deploy 802.1X authenticating switches on your network, NPS can authenticate and authorize connection requests made ...
  45. When you deploy 802.1X wireless access points on your network, NPS can authenticate and authorize connection requests made ...
  46. When you deploy Dial-up servers on your network, NPS can authenticate and authorize connection requests made by dial-up clients ...
  47. When you deploy VPN servers on your network, NPS can authenticate and authorize connection requests made by VPN clients connecting ...
  48. When you dial into a router, it can offer to call you back to reduce your phone charges or to increase security. Specify ...
  49. When you dial into a server, it can offer to call you back to reduce your phone charges. Specify your callback preferences. ...
  50. When you enable Internet Explorer Enhanced Security Configuration, it sets Internet Explorer security settings to limit how ...
  51. When you enable the Active Directory Federation Services (AD FS) Windows token-based agent, authorized security tokens and ...
  52. When you enable this option, the UI screens on the client computer are processed using the settings in the Windows Deployment ...
  53. When you enable this setting, it will prevent Internet Information Services (IIS) from being installed, and you will not ...
  54. When you export RADIUS client and remote RADIUS server shared secrets, ensure that the exported file is stored in a secure ...
  55. When you finish this wizard, the selected disks will be reformatted and all the existing volumes and data on the disks will ...
  56. When you include a folder in a library, the files appear in the library, but continue to be stored in their original locations. ...
  57. When you make matches, the gumdrops from the back of the tile goes in the jar. Collect all of the gumdrops to win the board. ...
  58. When you make matches, the shamrock from the back of the tile goes in the jar. Collect all of the shamrocks to win the board. ...
  59. When you make matches, the smiley face from the back of the tile goes in the jar. Collect all of the smiley faces to win ...
  60. When you match 2 mixer tiles, all tiles on the board are mixed up. If you have a lot of tiles memorized, try to avoid the ...
  61. When you open Media Guide, you can access the latest music, movie trailers, and news updates, but your computer must be connected ...
  62. When you participate, we collect anonymous information about your hardware configuration and how you use Internet Explorer. ...
  63. When you post a message to a newsgroup or send an e-mail message, your display name will appear in the From field. Type your ...
  64. When you reach your server limit, e-mail messages in Folders on the server may be deleted. You can clean out your Folders ...
  65. When you remove a property, any profile data that is stored for that property is also removed. Are you sure that you want ...
  66. When you remove a RemoteApp source, RemoteApp programs on the RemoteApp source will no longer be available through RemoteApp ...
  67. When you remove a target, all initiators currently logged on to that target will no longer be able to access the LUNs that ...
  68. When you remove an RD Virtualization Host server, users will no longer be able to connect to virtual machines on the RD Virtualization ...
  69. When you renew a Certification Authority, you may reuse the existing keys. Select "Yes" to reuse keys and "No" to generate ...
  70. When you select token redirection, the Remote Desktop Session Host server switches to token redirection mode. In this mode, ...
  71. When you send an e-mail message, it will be placed in your 'Outbox' folder ready to be sent the next time you choose the ...
  72. When you send e-mail, your name will appear in the From field of the outgoing message. Type your name as you would like it ...
  73. When you send problem reports to Microsoft, you will receive solutions when they are available. You can adjust how much information ...
  74. When you set up Windows Media Center for use with a CableCARD to access premium channels, information about your computer ...
  75. When you specify a Dynamic Link Library as a connect action, you must provide the function name that will be called as the ...