Windows Server 2008
- If a pre-existing computer object is used, please ensure that the computer object is in a Disabled state and that the user ...
- If a program or service uses a particular volume or device, add that volume or device to the list below, or click Autoconfigure ...
- If a resource cannot be brought online or taken offline in the number of milliseconds specified by the PendingTimeout property, ...
- If a terminal server cannot locate an activated license server with installed TS CALs before the grace period expires, the ...
- If a utility was provided by the application that installed the application directory partition, use that utility to remove ...
- If all the DCs are not SP1 or above and you enable this feature, there is a possibility that any user can view the password ...
- If an anti-spyware product is installed and functioning configure Security Center to stop monitoring anti-spyware status. ...
- If an application calls PlaySound with a SND_LOOP flag, the sound plays continuously until PlaySound is called with a NULL ...
- If an application calls the FindFirstFile API on a directory, and then attempts to remove that directory without first closing ...
- If an application passes an invalid window handle to the MessageBox API, and the lower 16 bits of that handle are NULL, Windows ...
- If an appropriate .adm file cannot be found, the console displays the registry key information in the report section "Extra ...
- If an appropriate .adm file cannot be found, the console displays the registry key information in the report section "Extra ...
- If an I/O error is returned which is not defined in the standard FsRtl filter, it is converted to the following error which ...
- If an Internet site tries to use scripting or ActiveX controls, a dialog box is displayed to notify you. You can add the ...
- If an MM error is returned which is not defined in the standard FsRtl filter, it is converted to one of the following errors ...
- If an open program is associated with this process, it will close and you will lose any unsaved data. If you end a system ...
- If any changes have been made to SYSVOL share during state transition from 'Redirected' to 'Prepared', Please robocopy the ...
- If any changes have been made to the SYSVOL share during the state transition from 'Prepared' to 'Redirected', please robocopy ...
- If any DC is unable to start migration then try manual polling. OR Run with option /CreateGlobalObjects. Migration can start ...
- If applicable, defines the COM CLSID associated with server implementation. Note: decoupled providers do not have an associated ...
- If BitLocker Drive Encryption blocks startup, you will need the recovery password to regain access to your protected files. ...
- If Command Extensions are enabled CALL changes as follows: CALL command now accepts labels as the target of the CALL. The ...
- If Command Extensions are enabled CHDIR changes as follows: The current directory string is converted to use the same case ...
- If Command Extensions are enabled DEL and ERASE change as follows: The display semantics of the /S switch are reversed in ...
- If Command Extensions are enabled ENDLOCAL changes as follows: If the corresponding SETLOCAL enable or disabled command extensions ...
- If Command Extensions are enabled GOTO changes as follows: GOTO command now accepts a target label of :EOF which transfers ...
- If Command Extensions are enabled IF changes as follows: IF /I string1 compare-op string2 command IF CMDEXTVERSION number ...
- If Command Extensions are enabled MKDIR changes as follows: MKDIR creates any intermediate directories in the path, if needed. ...
- If Command Extensions are enabled SET changes as follows: SET command invoked with just a variable name, no equal sign or ...
- If Command Extensions are enabled SETLOCAL changes as follows: SETLOCAL batch command now accepts optional arguments: ENABLEEXTENSIONS ...
- If Command Extensions are enabled the DATE command supports the /T switch which tells the command to just output the current ...
- If Command Extensions are enabled the POPD command will delete any temporary drive letter created by PUSHD when you POPD ...
- If Command Extensions are enabled the PROMPT command supports the following additional formatting characters: $+ zero or ...
- If Command Extensions are enabled the PUSHD command accepts network paths in addition to the normal drive letter and path. ...
- If Command Extensions are enabled the SHIFT command supports the /n switch which tells the command to start shifting at the ...
- If Command Extensions are enabled the TIME command supports the /T switch which tells the command to just output the current ...
- If Command Extensions are enabled, and running on the Windows platform, then the BREAK command will enter a hard coded breakpoint ...
- If Command Extensions are enabled, external command invocation through the command line or the START command changes as follows: ...
- If Command Extensions are enabled, the following additional forms of the FOR command are supported: FOR /D %variable IN (set) ...
- If Command Extensions are enabled, then there are several dynamic environment variables that can be expanded but which don't ...
- If conditions and constraints of the network policy match the connection request, the policy can either grant access or deny ...
- If data is not available or the data is not updated daily in the System Stability Report, ask your system administrator to ...
- If drive redirection is enabled for the remote program or remote desktop that you are accessing, you will be able to access ...
- If each pattern contains a band, select the pattern with the thinnest band Click Realignment. The selected pattern will shift ...
- If enabled (value = 4), the ComputerSystem can be reset via hardware (e.g. the power and reset buttons). If disabled (value ...
- If enabled (value = 4), the unitary computer system can be reset via hardware (e.g. the power and reset buttons). If disabled ...
- If enabled (value = 4), the UnitaryComputerSystem can be reset via hardware (e.g. the power and reset buttons). If disabled ...
- If enabled, all ASP scripts will access Windows Management services using the account under which IIS is run (most commonly ...
- If enabled, NPS evaluates this policy while processing connection requests. If disabled, NPS does not evalue this policy. ...
- If file locations are corrected during install, the uninstall program should attempt to find the file in its new location ...
- If Microsoft DHCP is running on this server click the check boxes to set the following options, if non-Microsoft DHCP is ...
- If Microsoft Terminal Services is installed on a computer with IE ESC enabled, the Terminal Services installation will automatically ...
- If necessary, the wizard will create a shared folder on the namespace server. To modify the settings of the shared folder, ...
- If new child domains were recently added to the specified forest, this forest might not have detected them yet. To ensure ...
- If no filter action in the following list matches your needs, click Add to create a new one. Select Use Add Wizard to create ...
- If only a single line connected, the server might not be configured to accept multi-link calls. to avoid unnecessary connection ...
- If open programs or processes are associated with this process tree, they will close and you will lose any unsaved data. ...
- If possible, use a media program that can convert the file before copying it. If you copy the file now, it will be stored ...
- If power was interrupted try again using the same restore point. If a system error or reset occurred, try choosing a different ...
- If print quality decreases when you are printing with color ink, clean the color print head. If quality doesn't improve, ...
- If problems are found, Startup Repair will fix them automatically. Your computer might restart several times during this ...
- If provided, the optional information entered on this page will only be used by Microsoft support professionals to help you ...
- If provider is configured for Per Local Initialization, then the Locale property refers to Locale's particular instantiation ...
- If provider is configured for Per User Initialization, then the User property refers to User's particular instantiation of ...
- If routing is enabled for a particular name suffix, all authentication requests in the local forest that use that suffix ...
- If routing is enabled for a particular name suffix, all authentication requests in the specified forest that use that suffix ...
- If routing is enabled for a particular name suffix, all authentication requests using that suffix are routed to the specified ...
- If selected, NAP-capable client computers that are denied full access to the network because they are not compliant with ...
- If session limit is reached or connection is broken, one of the following actions is taken: Disconnect - User is disconnected ...
- If set to true: once the file system is mounted, NFS requests are retried until the hosting system responds. If set to false: ...
- If set to true: retries are performed in the foreground. If set to false: if the first mount attempt fails, retries are performed ...
- If set, APIs that open OLE Structured Storage docfiles for writing (StgOpenStorageEx, etc.) will revert to passing FILE_SHARE_WRITE ...
- If the AD RMS cluster has been configured for SSL, you must import and configure the cluster's SSL certificate on this server. ...
- If the appearance of text on your preferred display is not satisfactory, you can select a different resolution. This may ...
- If the application was installed via on-demand installation by a file extension, this is the file extension that caused that ...