Windows 10
- If your PC isn't running well, resetting it might help. This lets you choose to keep your files or remove them, and then ...
- If your phone company provided only one phone number and SPID for each ISDN line, select channel 1 for that line, and type ...
- If your phone company provided only one phone number for each ISDN line, select channel 1 for that line, and type the phone ...
- If your phone company provided only one subaddress and phone number for each ISDN line, select logical terminal 1 for that ...
- If your server is running Windows Server 2008 R2, in the Security Information section of Server Summary , click Configure ...
- If your server is running Windows Server 2012, click Configure this local server to open the Local Server configuration page. ...
- If your user names and passwords are lost, damaged, or destroyed then you can use this backup to restore them. You can also ...
- Ignoring UNC Hardening Configuration Entry: Unable to parse UNC Path. UNC Path: %2 UNC Hardening Configuration: %4 Guidance: ...
- Ignoring UNC Hardening Configuration Entry: Unsupported registry value type. Registry Value Path: %2@%4 Registry Value Type: ...
- Ignoring UNC Hardening Configuration Entry: Unsupported UNC Path. UNC Path: %2 UNC Hardening Configuration: %4 Guidance: ...
- Ignoring UNC Hardening Configuration Property: Unsupported property name. UNC Path: %2 UNC Hardening Configuration: %4 Property ...
- Ignoring UNC Hardening Configuration Property: Unsupported property name. UNC Path: %2 UNC Hardening Configuration: %4 Property ...
- Ignoring UNC Hardening Configuration Property: Unsupported property value. UNC Path: %2 UNC Hardening Configuration: %4 Property ...
- IKE failed to find valid machine certificate. Contact your Network Security Administrator about installing a valid certificate ...
- IKE negotiation failed because the machine certificate used does not have a private key. IPsec certificates require a private ...
- IKE security association establishment failed because peer could not authenticate. The certificate trust could not be established. ...
- IKE security association establishment failed because peer sent invalid proposal. Mode: %1 Filter: %2 Attribute: %3 Expected ...
- IKE security association negotiation failed. Mode: %1 Filter: %2 Peer Identity: %3 Failure Point: %4 Failure Reason: %5 Extra ...
- IKEv1 Main Mode Negotiation Time is the number of milliseconds taken for the last IKEv1 main mode security association negotiated. ...
- IKEv1 Quick Mode Negotiation Time is the number of milliseconds taken for the last IKEv1 quick mode security association ...
- IKEv2 Main Mode Negotiation Time is the number of milliseconds taken for the last IKEv2 main mode security association negotiated. ...
- IKEv2 Quick Mode Negotiation Time is the number of milliseconds taken for the last IKEv2 quick mode security association ...
- Illegal network control block (NCB) buffer length on SEND DATAGRAM, SEND BROADCAST, ADAPTER STATUS, or SESSION STATUS. The ...
- Illegal System DLL Relocation} The system DLL %hs was relocated in memory. The application will not run properly. The relocation ...
- Illegal System DLL Relocation} The system DLL %hs was relocated in memory. The application will not run properly. The relocation ...
- Image download is complete for a single URL: notification id %1], resource id %2], local path %3], error code %4], flags ...
- Image reference "%s": The image "%s" defines both Scale and TargetSize qualifiers; only one qualifier can be defined at a ...
- Image reference "%s": The image "%s" has an ABGR value " X" at position (%d, %d) that is not valid for a high-contrast white ...
- Image reference "%s": The image "%s" has an ABGR value " X" at position (%d, %d) that is not valid. The pixel must be white ...
- Image reference "%s": The image must define at least one variant without a TargetSize qualifier. It must define a Scale qualifier ...
- Image Relocated} An image file could not be mapped at the address specified in the image file. Local fixups must be performed ...
- Image Relocated} An image file was mapped at a different address from the one specified in the image file but fixups will ...
- Image Space is the virtual address space in use by the images being executed by the process. This is the sum of all the address ...
- Image Space is the virtual address space in use by the images being executed by the process. This is the sum of all the address ...
- Image Space is the virtual address space in use by the images being executed by the process. This is the sum of all the address ...
- Image Space is the virtual address space in use by the images being executed by the process. This is the sum of all the address ...
- Image Space is the virtual address space in use by the images being executed by the process. This is the sum of all the address ...
- Image Space is the virtual address space in use by the images being executed by the process. This is the sum of all the address ...
- Image Space is the virtual address space in use by the images being executed by the process. This is the sum of all the address ...
- Image Space is the virtual address space in use by the images being executed by the process. This is the sum of all the address ...
- Image Space is the virtual address space in use by the selected image with this protection. Executable memory is memory that ...
- Image Space is the virtual address space in use by the selected image with this protection. Execute Write Copy is memory ...
- Image Space is the virtual address space in use by the selected image with this protection. Execute/Read Only memory is memory ...
- Image Space is the virtual address space in use by the selected image with this protection. Execute/Read/Write memory is ...
- Image Space is the virtual address space in use by the selected image with this protection. No Access protection prevents ...
- Image Space is the virtual address space in use by the selected image with this protection. Read Only protection prevents ...
- Image Space is the virtual address space in use by the selected image with this protection. Read/Write protection allows ...
- Image Space is the virtual address space in use by the selected image with this protection. Write Copy protection is used ...
- image`i`*`Specifies the provider image path. The matching PDB will be located in the Symbol Server. Multiple paths can be ...
- Immediate steps Because a disk failure will cause you to lose all programs, files and documents on the disk, you should back ...
- Impersonate a client after authentication Assigning this privilege to a user allows programs running on behalf of that user ...
- Implements stealth-mode filtering by silently dropping all incoming packets for which TCP does not have a listening endpoint. ...
- Implements the File Server Resource Manager protocol for management of storage resources. It controls the management of quotas, ...
- Implements the SMB 1.x (CIFS) protocol. This protocol provides connectivity to network resources on pre-Windows Vista servers ...
- Import failed because a virtual machine with the same identifier already exists. Select a new identifier and try the import ...
- Import failed because the import was called from a different WMI namespace then the export file was generated from. Call ...
- Import failed because the source file '%1' and the destination file '%2' are different file types. Please check the order ...
- Import failed because the source path is not specified for destination resource path '%1'. Please try to run the import again ...
- Import failed to configure network connection for network card '%1'. You must modify the connection of all affected network ...
- Import failed. Number of parameters supplied for resource paths are not consistent. You should have a SourceResourcePath ...
- Import failed. Unable to find virtual machine import files under location '%1'. You can import a virtual machine only if ...
- Import failed. Unable to search import files under location '%3'. Error: %1 (%2). You can import a virtual machine only if ...
- Import failed. You need to have admin rights to import this Virtual machine since AllowFullScsiCommandSet property is set ...
- Important! Do not press OK until all transforms are added and ordered correctly. For more information, right-click on the ...
- IMPORTANT: "netsh firewall" is deprecated; use "netsh advfirewall firewall" instead. For more information on using "netsh ...
- Important: adding this website to the Trusted sites zone will lower the security settings for all content from this web site ...
- Important: adding this website to the Trusted sites zone, will lower the security settings for all content from this website ...
- Important: After the upgrade is finished, remove the external drive and keep it in a safe place. You'll need this drive if ...
- IMPORTANT: Command executed successfully. However, "netsh firewall" is deprecated; use "netsh advfirewall firewall" instead. ...
- Important: To prevent data loss, you must have a way to recover BitLocker encryption keys. If you do not allow both recovery ...
- Importing a policy will overwrite all of the current Windows Firewall with Advanced Security policy. If you wish to save ...
- Importing policies may take several minutes or longer. Canceling this process or closing this program before import finishes ...
- Importing this list will replace your old list. Additionally, importing malicious Allow/Block lists can effectively disable ...
- Imports a foreign disk group into the local computer's online disk group. Syntax: IMPORT NOERR NOERR For scripting only. ...
- Impression Id: %1{ImpressionId}. %2{AttributeName} attribute in namespace %3{Namespace} with value %4{Value} encountered ...