Windows Server 2008

  1. If a pre-existing computer object is used, please ensure that the computer object is in a Disabled state and that the user ...
  2. If a program or service uses a particular volume or device, add that volume or device to the list below, or click Autoconfigure ...
  3. If a resource cannot be brought online or taken offline in the number of milliseconds specified by the PendingTimeout property, ...
  4. If a terminal server cannot locate an activated license server with installed TS CALs before the grace period expires, the ...
  5. If a utility was provided by the application that installed the application directory partition, use that utility to remove ...
  6. If all the DCs are not SP1 or above and you enable this feature, there is a possibility that any user can view the password ...
  7. If an anti-spyware product is installed and functioning configure Security Center to stop monitoring anti-spyware status. ...
  8. If an application calls PlaySound with a SND_LOOP flag, the sound plays continuously until PlaySound is called with a NULL ...
  9. If an application calls the FindFirstFile API on a directory, and then attempts to remove that directory without first closing ...
  10. If an application passes an invalid window handle to the MessageBox API, and the lower 16 bits of that handle are NULL, Windows ...
  11. If an appropriate .adm file cannot be found, the console displays the registry key information in the report section "Extra ...
  12. If an appropriate .adm file cannot be found, the console displays the registry key information in the report section "Extra ...
  13. If an I/O error is returned which is not defined in the standard FsRtl filter, it is converted to the following error which ...
  14. If an Internet site tries to use scripting or ActiveX controls, a dialog box is displayed to notify you. You can add the ...
  15. If an MM error is returned which is not defined in the standard FsRtl filter, it is converted to one of the following errors ...
  16. If an open program is associated with this process, it will close and you will lose any unsaved data. If you end a system ...
  17. If any changes have been made to SYSVOL share during state transition from 'Redirected' to 'Prepared', Please robocopy the ...
  18. If any changes have been made to the SYSVOL share during the state transition from 'Prepared' to 'Redirected', please robocopy ...
  19. If any DC is unable to start migration then try manual polling. OR Run with option /CreateGlobalObjects. Migration can start ...
  20. If applicable, defines the COM CLSID associated with server implementation. Note: decoupled providers do not have an associated ...
  21. If BitLocker Drive Encryption blocks startup, you will need the recovery password to regain access to your protected files. ...
  22. If Command Extensions are enabled CALL changes as follows: CALL command now accepts labels as the target of the CALL. The ...
  23. If Command Extensions are enabled CHDIR changes as follows: The current directory string is converted to use the same case ...
  24. If Command Extensions are enabled DEL and ERASE change as follows: The display semantics of the /S switch are reversed in ...
  25. If Command Extensions are enabled ENDLOCAL changes as follows: If the corresponding SETLOCAL enable or disabled command extensions ...
  26. If Command Extensions are enabled GOTO changes as follows: GOTO command now accepts a target label of :EOF which transfers ...
  27. If Command Extensions are enabled IF changes as follows: IF /I string1 compare-op string2 command IF CMDEXTVERSION number ...
  28. If Command Extensions are enabled MKDIR changes as follows: MKDIR creates any intermediate directories in the path, if needed. ...
  29. If Command Extensions are enabled SET changes as follows: SET command invoked with just a variable name, no equal sign or ...
  30. If Command Extensions are enabled SETLOCAL changes as follows: SETLOCAL batch command now accepts optional arguments: ENABLEEXTENSIONS ...
  31. If Command Extensions are enabled the DATE command supports the /T switch which tells the command to just output the current ...
  32. If Command Extensions are enabled the POPD command will delete any temporary drive letter created by PUSHD when you POPD ...
  33. If Command Extensions are enabled the PROMPT command supports the following additional formatting characters: $+ zero or ...
  34. If Command Extensions are enabled the PUSHD command accepts network paths in addition to the normal drive letter and path. ...
  35. If Command Extensions are enabled the SHIFT command supports the /n switch which tells the command to start shifting at the ...
  36. If Command Extensions are enabled the TIME command supports the /T switch which tells the command to just output the current ...
  37. If Command Extensions are enabled, and running on the Windows platform, then the BREAK command will enter a hard coded breakpoint ...
  38. If Command Extensions are enabled, external command invocation through the command line or the START command changes as follows: ...
  39. If Command Extensions are enabled, the following additional forms of the FOR command are supported: FOR /D %variable IN (set) ...
  40. If Command Extensions are enabled, then there are several dynamic environment variables that can be expanded but which don't ...
  41. If conditions and constraints of the network policy match the connection request, the policy can either grant access or deny ...
  42. If data is not available or the data is not updated daily in the System Stability Report, ask your system administrator to ...
  43. If drive redirection is enabled for the remote program or remote desktop that you are accessing, you will be able to access ...
  44. If each pattern contains a band, select the pattern with the thinnest band Click Realignment. The selected pattern will shift ...
  45. If enabled (value = 4), the ComputerSystem can be reset via hardware (e.g. the power and reset buttons). If disabled (value ...
  46. If enabled (value = 4), the unitary computer system can be reset via hardware (e.g. the power and reset buttons). If disabled ...
  47. If enabled (value = 4), the UnitaryComputerSystem can be reset via hardware (e.g. the power and reset buttons). If disabled ...
  48. If enabled, all ASP scripts will access Windows Management services using the account under which IIS is run (most commonly ...
  49. If enabled, NPS evaluates this policy while processing connection requests. If disabled, NPS does not evalue this policy. ...
  50. If file locations are corrected during install, the uninstall program should attempt to find the file in its new location ...
  51. If Microsoft DHCP is running on this server click the check boxes to set the following options, if non-Microsoft DHCP is ...
  52. If Microsoft Terminal Services is installed on a computer with IE ESC enabled, the Terminal Services installation will automatically ...
  53. If necessary, the wizard will create a shared folder on the namespace server. To modify the settings of the shared folder, ...
  54. If new child domains were recently added to the specified forest, this forest might not have detected them yet. To ensure ...
  55. If no filter action in the following list matches your needs, click Add to create a new one. Select Use Add Wizard to create ...
  56. If only a single line connected, the server might not be configured to accept multi-link calls. to avoid unnecessary connection ...
  57. If open programs or processes are associated with this process tree, they will close and you will lose any unsaved data. ...
  58. If possible, use a media program that can convert the file before copying it. If you copy the file now, it will be stored ...
  59. If power was interrupted try again using the same restore point. If a system error or reset occurred, try choosing a different ...
  60. If print quality decreases when you are printing with color ink, clean the color print head. If quality doesn't improve, ...
  61. If problems are found, Startup Repair will fix them automatically. Your computer might restart several times during this ...
  62. If provided, the optional information entered on this page will only be used by Microsoft support professionals to help you ...
  63. If provider is configured for Per Local Initialization, then the Locale property refers to Locale's particular instantiation ...
  64. If provider is configured for Per User Initialization, then the User property refers to User's particular instantiation of ...
  65. If routing is enabled for a particular name suffix, all authentication requests in the local forest that use that suffix ...
  66. If routing is enabled for a particular name suffix, all authentication requests in the specified forest that use that suffix ...
  67. If routing is enabled for a particular name suffix, all authentication requests using that suffix are routed to the specified ...
  68. If selected, NAP-capable client computers that are denied full access to the network because they are not compliant with ...
  69. If session limit is reached or connection is broken, one of the following actions is taken: Disconnect - User is disconnected ...
  70. If set to true: once the file system is mounted, NFS requests are retried until the hosting system responds. If set to false: ...
  71. If set to true: retries are performed in the foreground. If set to false: if the first mount attempt fails, retries are performed ...
  72. If set, APIs that open OLE Structured Storage docfiles for writing (StgOpenStorageEx, etc.) will revert to passing FILE_SHARE_WRITE ...
  73. If the AD RMS cluster has been configured for SSL, you must import and configure the cluster's SSL certificate on this server. ...
  74. If the appearance of text on your preferred display is not satisfactory, you can select a different resolution. This may ...
  75. If the application was installed via on-demand installation by a file extension, this is the file extension that caused that ...