Windows 8.1

  1. First, make sure that the mandatory extension has been installed on the host and install the extension if necessary. Then, ...
  2. First, you can choose to have Windows Media Center adjust its settings based on information you provide about your display ...
  3. Fix the component that is using the compatibility fix and ensure the app doesn't rely on compatibility fixes for its functionality. ...
  4. Fix this problem by not overlapping this replicated folder with an FRS replica set. That is, do not replicate the same local ...
  5. Fix this problem by pointing the replicated folder to a valid local path using the DFS Management snap-in or the Dfsradmin.exe ...
  6. Fix-ups necessary for conversion could not be applied. The short name for a file specified in the file's $SYSPREPSFN stream ...
  7. Fixes for known API differences between Win9x and NT: SetWindowsHookEx, SetWindowLong, RegisterClass, ChangeDisplaySettings/ChangeDisplaySettingsEx, ...
  8. Flags indicating specific options for the search. The values are: 0 - None. 1 - Only search certificates with Server EKU. ...
  9. Flick gestures are pen shortcuts that you use to perform common actions, such as copy, paste, page down, and undo. Learn ...
  10. Floating Emulations/sec is the rate of floating emulations performed by the system. This counter displays the difference ...
  11. Floppy Disk Error} While accessing a floppy disk, the track address from the sector ID field was found to be different than ...
  12. Flow control statements such as Break, Continue, Return, Exit, and Throw are not allowed in restricted language mode or a ...
  13. Fluke Protocol Inspector installs drivers that are incompatible with this version of Windows. For more information, contact ...
  14. Folder management properties enable you to manage folders based on the values of the properties that you assign to the folders. ...
  15. Folder Options policy allows an administrator to configure Windows file types, folder options, offline files, view options ...
  16. Folder Redirection configuration is being controlled by WMI configuration class Win32_FolderRedirectionUserConfiguration. ...
  17. Folder target {0} was not added to the replication group because the replication group has multiple replicated folders. To ...
  18. Folder target {0} was not removed from the replication group because the replication group has multiple replicated folders. ...
  19. Folders policy allows an administrator to create nested folders or to cascade delete folders and/or their contents, with ...
  20. Folders that are encrypted with Encrypting File System, on a network location, or on a drive that doesn't use the NTFS file ...
  21. Follow the instructions below for the remote control button that is displayed. If your remote control doesn't have this button, ...
  22. Following an in-place upgrade or migration of server {0}, Remote Access settings (DirectAccess and RRAS) cannot be imported ...
  23. Following are the connectivity checks made using UDP on port 3343 from network interfaces on node {0} to network interfaces ...
  24. Following is a summary of the Split-Scope configuration Wizard's progress, including any errors it encountered while setting ...
  25. Following is the summary of warnings and errors encountered by File Replication Service while polling the Domain Controller ...
  26. Following scopes will be removed from the failover relationship %1: %2. These scopes will be deleted from partner server ...
  27. Following successful promotion of the domain controller, restart your computer. Then allow dynamic updates to these zones ...
  28. Font name. For TrueType Fonts and TrueType Collections if NULL the installer registers the font after reading the correct ...
  29. For a domain member computer, use the DHCP MMC snap-in to authorize this server in Active Directory Domain Services. For ...
  30. For a given disk claimed by MSDSM, the load balance policy levels have the following order of precendence: 1. The policy ...
  31. For a ProtectedSpaceExtent that is allocated to a VolumeSet, (i.e. is named in a CIM_VolumeSetBasedOnPSExtent association), ...
  32. For a user account to have access to a RemoteApp program, the user account must have access to both the RemoteApp program ...
  33. For a Windows 2003 cluster, the Copy Cluster Roles Wizard cannot check whether a disk has mount points. For any disk that ...
  34. For accounting statistics the object consists of the following properties. A separate instance of the object is outputted ...
  35. For added security, you can require users to press Ctrl+Alt+Delete before signing in. This guarantees that the authentic ...
  36. For additional details or to enable users to connect across the Internet, see the Work Folders deployment content on the ...
  37. For additional information, double-click a permission entry. To modify a permission entry, select the entry and click Edit ...
  38. For additional information, double-click an audit entry. To modify an audit entry, select the entry and click Edit (if available). ...
  39. For advanced tasks, you can log on to the VM host using Administrator as user name and the password that you specified at ...
  40. For assigned applications, whether or not a lightweight install or an actual install is performed 1 = This is not an assigned ...
  41. For best results, write as many sentences as possible. If you want to stop before you reach the end of the group of sentences, ...
  42. For best results, write as many sentences as possible. If you want to stop before you reach the end of the group of sentences, ...
  43. For better speech recognition, make sure that the microphone is positioned correctly, that you are speaking in a quiet environment, ...
  44. For certificate-based authentication of users and computers the client computers must use CAs registered in the Active Directory ...
  45. For certificate-based authentication of users and computers, along with CAs that are registered in Active Directory, the ...
  46. For clients to connect to this RD Gateway server, you must manually distribute the root certificate of the RD Gateway server ...
  47. For complete terms and conditions governing the use of this product, see the license agreements, which can be found in online ...
  48. For Counter '%1', bad descriptionID %2!u!( 2!x!) was specified. descriptionID attribute is required, and must be globally ...
  49. For Counter '%1', bad nameID %2!u!( 2!x!) was specified. nameID attribute is required, and must be globally unique. In addition, ...
  50. For CounterSet '%1', bad descriptionID %2!u!( 2!x!) was specified. descriptionID attribute is required, and must be globally ...
  51. For CounterSet '%1', bad nameID %2!u!( 2!x!) was specified. nameID attribute is required, and must be globally unique. In ...
  52. For daily management tasks, it is recommended to use the dashboard from a client computer that is connected to the server. ...
  53. For directory paths, indicates if the operation is to apply to the entire directory tree or only to the directory entry itself. ...
  54. For each failed over virtual machine, use the Complete-VMFailover cmdlet in Windows PowerShell to remove the recovery snapshots ...
  55. For each selected item, Windows will check for problems and send you a message if problems are found. How does Action Center ...
  56. For each selected item, Windows will check for problems and send you a message if problems are found. How does Action Center ...
  57. For each spoke member, review the required and optional hub members. Click Edit to change the required hub member or change ...
  58. For element with Id %1!u!( 1!x!), under '%2', attribute 'aggregate' is not allowed since the parent counterSet has either ...
  59. For element with Id %1!u!( 1!x!), under '%2', attribute 'baseID' is required. Here is the list of counter types that require ...
  60. For element with Id %1!u!( 1!x!), under '%2', attribute 'multiCounterID' is required, and the counter referenced by that ...
  61. For element with Id %1!u!( 1!x!), under '%2', attributes 'perfTimeID' and 'perfFreqID' are required, and the counters referenced ...
  62. For encryption and decryption of messages, both a public key and a private key are required. You must provide the password ...
  63. For encryption and decryption of messages, both a public key and a private key are required. You must supply a password for ...
  64. For enhanced security, you can configure RD Gateway for use with ISA Server or a non-Microsoft product to perform secure ...
  65. For event '%1', with Id %2!u!( 2!x!), a property insert in the event message is referencing a non-existent property. Event ...
  66. For event '%1', with Id %2!u!( 2!x!), level must be specified and it should be one of Critical, Error, Warning, or Informational, ...
  67. For event '%1', with Id %2!u!( 2!x!), Opcode '%3' is global, and its value collides with that of local Opcode '%4' of the ...
  68. For failover clusters, Hyper-V Replica requires the use of a Hyper-V Replica Broker name instead of an individual server ...
  69. For file access across network domains to function properly, each UNIX user or group identity should map to a Windows user ...
  70. For Group Policy based provisioning, create the GPOs for each domain in the list using the Windows PowerShell cmdlet "Invoke-IpamGpoProvisioning" ...
  71. For help solving this problem with additional wireless software, contact the manufacturer of the wireless hardware or your ...
  72. For help solving this problem with additional wireless software, contact the manufacturer of the wireless hardware or your ...
  73. For HTTP header authentication, either WS_SSL_TRANSPORT_SECURITY_BINDING must also be included in the security description ...
  74. For information about how to give the built-in Administrators group permission to log on as a batch job, see "Give the built-in ...
  75. For information about this operation please see the following directory on the target machine(s): %windir%\security\msscw\Logs ...