Windows 8.1
- Hyper-V Time Synchronization failed to connect to virtual machine '%1' because the version does not match the version expected ...
- Hyper-V uses default locations to store virtual hard disk files and virtual machine configuration files, unless you specify ...
- Hyper-V Volume Shadow Copy Requestor connected to virtual machine '%1' is using the most recent version (Virtual machine ...
- Hyper-V Volume Shadow Copy Requestor connected to virtual machine '%1', but the version does not match the version expected ...
- Hyper-V Volume Shadow Copy Requestor failed to connect to virtual machine '%1' because the version does not match the version ...
- Hyper-V VSS writer cannot identify the virtual machine with ID '%1'. Please check if there are any corrupt or invalid configuration ...
- Hyper-V was unable to perform this operation because the RemoteFX 3D video adapter already exists on this virtual machine. ...
- Hyper-V will reserve disk space equal to the amount of memory used by the virtual machine when it is running so that memory ...
- I agree that I will manually remove the licenses from the source license server. I understand that if I continue to use the ...
- I agree to discontinue using the source license server as a license server with the same licenses that I am migrating. I ...
- I have an antivirus program that I'll monitor myself Choose this option if your antivirus program cannot report status to ...
- I need help with my computer. Would you please use Windows Remote Assistance to connect to my computer so you can help me? ...
- I understand that I am choosing to restore client computer backups, and that doing so may overwrite existing backups. I understand ...
- I understand that if I disable the hosted email integration, the server will be unable to manage the hosted email accounts. ...
- I understand that music copied from CDs is protected by law, including US and International copyright laws, and that I am ...
- I understand that music ripped from CDs is protected by law, including US and International copyright laws, and that I am ...
- I understand that this wizard might permanently delete existing backup data while attempting to repair the computer backup ...
- I want to restore my Internet security settings myself This option will highlight which Internet settings are not at their ...
- I'll turn on %1 myself The publisher has not provided Windows a way to turn on and update the app. Choosing this option will ...
- I'll turn on and update %1 myself The publisher has not provided Windows a way to turn on and update the app. Choosing this ...
- I/O was attempted on a section object that has been floated as a result of a transaction ending. There is no valid data. ...
- I64i! bytes could not be recovered because of bad clusters on the backup image. You can retry the recovery operation using ...
- I64i! bytes could not be written to the recovered volume because of bad clusters on the volume (%2). Run CHKDSK /R on the ...
- Iashlpr initialization failed: %1, so DHCP server cannot talk to NPS server. It could be that IAS service is not started. ...
- ICACLS name /save aclfile /T /C /L /Q stores the DACLs for the files and folders that match the name into aclfile for later ...
- ICACLS name /save aclfile /T /C stores the DACLs for the files and folders that match the name into aclfile for later use ...
- ICC profile information: size = %1 bytes, version = %2, class = '%3', data color space = '%4', profile connection space = ...
- Id = %1!lu! Name = %2!s! Description = %3!s! Version = %4!s! Vendor name = %5!s! Registration date = %6!s! Initialized = ...
- Id = %1; ClientMachine = %2; User = %3; ClientProcessId = %4; Component = %5; Operation = %6; ResultCode = %7; PossibleCause ...
- ID Process is the unique identifier of this process. ID Process numbers are reused, so they only identify a process for the ...
- Id that is globally unique to each instance of each adapter. This is the value reported by the MSiSCSI_HBAInformation class. ...
- ID Thread is the unique identifier of this thread. ID Thread numbers are reused, so they only identify a thread for the lifetime ...
- Identifiers issued by a government for purposes of identifying an individual over time, such as a driver's license number, ...
- IDENTIFIERS Many of the Bcdedit commands require identifiers. An identifier uniquely identifies entries contained in the ...
- Identifies the available character sets for the output of text related to managing the Printer. Strings provided in this ...
- Identifies the available languages for strings used by the Printer for the output of management information. The strings ...
- Identifies the current language being used by the Printer for management. The language listed in the CurrentNaturalLanguage ...
- Identifies the event within the NT Eventlog logfile. This is specific to the logfile and is used together with the logfile ...
- Identifies the event. This is specific to the source that generated the event log entry, and is used, together with SourceName, ...
- Identifies the GPO that contains this Policy Object.A client-side extension obtains this value fromPGROUP_POLICY_OBJECT->lpDSPath. ...
- Identifies the networks to which the computer has connected, collects and stores properties for these networks, and notifies ...
- Identities allow multiple people to use Windows Mail without sharing a common inbox. To create an identity, click the File ...
- Identity federation support for AD RMS cannot be configured until the files that support its use are added. To add identity ...
- Identity federation support for AD RMS is already configured on this computer. Please remove it by using the Uninstall-ADRMS ...
- Identity Federation Support leverages federated trust relationships between your organization and other organizations to ...
- Identity Management for UNIX cannot find the computer. Verify that the computer exists on the network and is functioning ...
- Identity Management for UNIX cannot find the directory {0}. Verify that the path and directory names are correct, and then ...
- Identity Management for UNIX cannot use the specified encryption key. For more information about encryption keys, see "Encryption ...
- Identity Management for UNIX cannot use the specified port number. The port number must be an integer from 1 through 65535. ...
- Idle Break Events/sec is the average rate, in incidents per second, at which the processor wakes from idle. This counter ...
- Idle power management features on Hyper-V logical processor %2 are disabled due to a firmware problem. Check with the computer ...
- Idle power management features on processor %1 are disabled due to a firmware problem. Check with the computer manufacturer ...
- Idle power management features on processor %2 in group %1 are disabled due to a firmware problem. Check with the computer ...
- Idle time is a good indicator of disk activity. Disk subsystems sustain various I/O rates and the Idle counter normalized ...
- Idx - Interface (NIC) index used by the system Supp - Interface (NIC) supports TCP chimney offload Atmpt - System has attempted ...
- Idx - Interface (NIC) index used by the system Supp - Interface (NIC) supports TCP RSC Atmpt - System has attempted TCP RSC ...
- If %s is found on the end-user's computer, it will be configured with the settings underlined in green in this property sheet. ...
- If 'Relay DHCP packets' is not enabled on at least one interface assigned to the IPv4 DHCP Relay Agent routing protocol, ...
- If 'Relay DHCP packets' is not enabled on at least one interface assigned to the IPv6 DHCPv6 Relay Agent routing protocol, ...
- If 'Remote access server' is not selected, then the server cannot support virtual private network (VPN) or dial-up connections. ...
- If /D was NOT specified on the command line, then when CMD.EXE starts, it looks for the following REG_SZ/REG_EXPAND_SZ registry ...
- If a client computer is not running the latest version of RDC, the user will be unable to connect to internal network resources ...
- If a clustered role is configured to use the current drive letter, changing the drive letter can cause that clustered role ...
- If a clustered role is configured to use the current drive letter, changing the drive letter can cause that role to fail. ...
- If a clustered role is configured to use the disk, assigning the disk to another role can cause that clustered role to fail. ...
- If a domain controller becomes unavailable, client computers that are using the SYSVOL folder of the domain controller might ...
- If a domain controller that is running on a VM does not comply with the recommended best practice guidelines, the Active ...
- If a driver was provided, make sure it is designed to work with Windows for 32-bit systems. If you do not have an appropriate ...
- If a driver was provided, make sure it is designed to work with Windows for ARM-based systems. If you do not have an appropriate ...
- If a driver was provided, make sure it is designed to work with Windows for Itanium-based systems. If you do not have an ...
- If a driver was provided, make sure it is designed to work with Windows for x64-based systems. If you do not have an appropriate ...
- If a file is signed, the wizard will create a rule using the publisher's signature and attributes of the signed file. If ...
- If a file is signed, the wizard will create a rule using the publisher's signature and the attributes of the signed file. ...
- If a firewall is in use on the failover cluster nodes, configure a firewall rule to allow the coordinator computer to restart ...
- If a host name is assigned for port 80 on the default website, you may not be able to connect to some Windows Server Essentials ...