Windows 8.1
- First, make sure that the mandatory extension has been installed on the host and install the extension if necessary. Then, ...
- First, you can choose to have Windows Media Center adjust its settings based on information you provide about your display ...
- Fix the component that is using the compatibility fix and ensure the app doesn't rely on compatibility fixes for its functionality. ...
- Fix this problem by not overlapping this replicated folder with an FRS replica set. That is, do not replicate the same local ...
- Fix this problem by pointing the replicated folder to a valid local path using the DFS Management snap-in or the Dfsradmin.exe ...
- Fix-ups necessary for conversion could not be applied. The short name for a file specified in the file's $SYSPREPSFN stream ...
- Fixes for known API differences between Win9x and NT: SetWindowsHookEx, SetWindowLong, RegisterClass, ChangeDisplaySettings/ChangeDisplaySettingsEx, ...
- Flags indicating specific options for the search. The values are: 0 - None. 1 - Only search certificates with Server EKU. ...
- Flick gestures are pen shortcuts that you use to perform common actions, such as copy, paste, page down, and undo. Learn ...
- Floating Emulations/sec is the rate of floating emulations performed by the system. This counter displays the difference ...
- Floppy Disk Error} While accessing a floppy disk, the track address from the sector ID field was found to be different than ...
- Flow control statements such as Break, Continue, Return, Exit, and Throw are not allowed in restricted language mode or a ...
- Fluke Protocol Inspector installs drivers that are incompatible with this version of Windows. For more information, contact ...
- Folder management properties enable you to manage folders based on the values of the properties that you assign to the folders. ...
- Folder Options policy allows an administrator to configure Windows file types, folder options, offline files, view options ...
- Folder Redirection configuration is being controlled by WMI configuration class Win32_FolderRedirectionUserConfiguration. ...
- Folder target {0} was not added to the replication group because the replication group has multiple replicated folders. To ...
- Folder target {0} was not removed from the replication group because the replication group has multiple replicated folders. ...
- Folders policy allows an administrator to create nested folders or to cascade delete folders and/or their contents, with ...
- Folders that are encrypted with Encrypting File System, on a network location, or on a drive that doesn't use the NTFS file ...
- Follow the instructions below for the remote control button that is displayed. If your remote control doesn't have this button, ...
- Following an in-place upgrade or migration of server {0}, Remote Access settings (DirectAccess and RRAS) cannot be imported ...
- Following are the connectivity checks made using UDP on port 3343 from network interfaces on node {0} to network interfaces ...
- Following is a summary of the Split-Scope configuration Wizard's progress, including any errors it encountered while setting ...
- Following is the summary of warnings and errors encountered by File Replication Service while polling the Domain Controller ...
- Following scopes will be removed from the failover relationship %1: %2. These scopes will be deleted from partner server ...
- Following successful promotion of the domain controller, restart your computer. Then allow dynamic updates to these zones ...
- Font name. For TrueType Fonts and TrueType Collections if NULL the installer registers the font after reading the correct ...
- For a domain member computer, use the DHCP MMC snap-in to authorize this server in Active Directory Domain Services. For ...
- For a given disk claimed by MSDSM, the load balance policy levels have the following order of precendence: 1. The policy ...
- For a ProtectedSpaceExtent that is allocated to a VolumeSet, (i.e. is named in a CIM_VolumeSetBasedOnPSExtent association), ...
- For a user account to have access to a RemoteApp program, the user account must have access to both the RemoteApp program ...
- For a Windows 2003 cluster, the Copy Cluster Roles Wizard cannot check whether a disk has mount points. For any disk that ...
- For accounting statistics the object consists of the following properties. A separate instance of the object is outputted ...
- For added security, you can require users to press Ctrl+Alt+Delete before signing in. This guarantees that the authentic ...
- For additional details or to enable users to connect across the Internet, see the Work Folders deployment content on the ...
- For additional information, double-click a permission entry. To modify a permission entry, select the entry and click Edit ...
- For additional information, double-click an audit entry. To modify an audit entry, select the entry and click Edit (if available). ...
- For advanced tasks, you can log on to the VM host using Administrator as user name and the password that you specified at ...
- For assigned applications, whether or not a lightweight install or an actual install is performed 1 = This is not an assigned ...
- For best results, write as many sentences as possible. If you want to stop before you reach the end of the group of sentences, ...
- For best results, write as many sentences as possible. If you want to stop before you reach the end of the group of sentences, ...
- For better speech recognition, make sure that the microphone is positioned correctly, that you are speaking in a quiet environment, ...
- For certificate-based authentication of users and computers the client computers must use CAs registered in the Active Directory ...
- For certificate-based authentication of users and computers, along with CAs that are registered in Active Directory, the ...
- For clients to connect to this RD Gateway server, you must manually distribute the root certificate of the RD Gateway server ...
- For complete terms and conditions governing the use of this product, see the license agreements, which can be found in online ...
- For Counter '%1', bad descriptionID %2!u!( 2!x!) was specified. descriptionID attribute is required, and must be globally ...
- For Counter '%1', bad nameID %2!u!( 2!x!) was specified. nameID attribute is required, and must be globally unique. In addition, ...
- For CounterSet '%1', bad descriptionID %2!u!( 2!x!) was specified. descriptionID attribute is required, and must be globally ...
- For CounterSet '%1', bad nameID %2!u!( 2!x!) was specified. nameID attribute is required, and must be globally unique. In ...
- For daily management tasks, it is recommended to use the dashboard from a client computer that is connected to the server. ...
- For directory paths, indicates if the operation is to apply to the entire directory tree or only to the directory entry itself. ...
- For each failed over virtual machine, use the Complete-VMFailover cmdlet in Windows PowerShell to remove the recovery snapshots ...
- For each selected item, Windows will check for problems and send you a message if problems are found. How does Action Center ...
- For each selected item, Windows will check for problems and send you a message if problems are found. How does Action Center ...
- For each spoke member, review the required and optional hub members. Click Edit to change the required hub member or change ...
- For element with Id %1!u!( 1!x!), under '%2', attribute 'aggregate' is not allowed since the parent counterSet has either ...
- For element with Id %1!u!( 1!x!), under '%2', attribute 'baseID' is required. Here is the list of counter types that require ...
- For element with Id %1!u!( 1!x!), under '%2', attribute 'multiCounterID' is required, and the counter referenced by that ...
- For element with Id %1!u!( 1!x!), under '%2', attributes 'perfTimeID' and 'perfFreqID' are required, and the counters referenced ...
- For encryption and decryption of messages, both a public key and a private key are required. You must provide the password ...
- For encryption and decryption of messages, both a public key and a private key are required. You must supply a password for ...
- For enhanced security, you can configure RD Gateway for use with ISA Server or a non-Microsoft product to perform secure ...
- For event '%1', with Id %2!u!( 2!x!), a property insert in the event message is referencing a non-existent property. Event ...
- For event '%1', with Id %2!u!( 2!x!), level must be specified and it should be one of Critical, Error, Warning, or Informational, ...
- For event '%1', with Id %2!u!( 2!x!), Opcode '%3' is global, and its value collides with that of local Opcode '%4' of the ...
- For failover clusters, Hyper-V Replica requires the use of a Hyper-V Replica Broker name instead of an individual server ...
- For file access across network domains to function properly, each UNIX user or group identity should map to a Windows user ...
- For Group Policy based provisioning, create the GPOs for each domain in the list using the Windows PowerShell cmdlet "Invoke-IpamGpoProvisioning" ...
- For help solving this problem with additional wireless software, contact the manufacturer of the wireless hardware or your ...
- For help solving this problem with additional wireless software, contact the manufacturer of the wireless hardware or your ...
- For HTTP header authentication, either WS_SSL_TRANSPORT_SECURITY_BINDING must also be included in the security description ...
- For information about how to give the built-in Administrators group permission to log on as a batch job, see "Give the built-in ...
- For information about this operation please see the following directory on the target machine(s): %windir%\security\msscw\Logs ...