Windows 7

  1. Note: Two or more firewalls running at the same time can conflict with each other. For more information, see Why you should ...
  2. Note: Two or more firewalls running at the same time can conflict with each other. How does a firewall help protect my computer? ...
  3. Note: Verify that there is no overlap between this range and IP addresses being used by other multicast servers on your network. ...
  4. Note: Windows Update might update itself automatically first when checking for other updates. Read our privacy statement ...
  5. Note: You have only removed the request from the list of pending requests stored in your web browser. This does not affect ...
  6. Note: You must enable the "Password must meet complexity requirements" policy setting for the password complexity setting ...
  7. Note: You should now add records to the zone or ensure that records are updated dynamically. You can then verify name resolution ...
  8. Nothing can be read from or written to the Windows registry. Message Queuing may not be properly installed. Please reinstall ...
  9. NOTICE: Single notification receipts for multiple recipient transmissions cannot include cover pages as attachments, and ...
  10. Notification of policy change from LSA/SAM was processed without verifying PDC. Older security policy from this machine may ...
  11. Notifications for the scope %2 are not active. The event logging threshold for this scope was exceeded. No further events ...
  12. Notifications for the scope %2 were reactivated. The event logging threshold for this scope was exceeded. No further events ...
  13. Now that you have configured the server, you will need to add images. These images include a boot image (which is the bootable ...
  14. NPS applies settings to the connection request if all of the connection request policy conditions for the policy are matched. ...
  15. NPS applies settings to the connection request if all of the network policy conditions and constraints for the policy are ...
  16. NPS can log accounting data to a local text file, to a SQL Server database, or to both. NPS can also log to a SQL Server ...
  17. NPS cannot import templates from the remote computer because the remote computer does not support templates. Either install ...
  18. NPS cannot import templates from the remote computer because the remote computer is not an NPS server. Either install NPS ...
  19. NPS cannot import templates from the template configuration file because either the file is corrupted or it is not a valid ...
  20. NPS cannot import the configuration file because either the file is corrupted or it is not a valid NPS configuration file. ...
  21. NPS cannot import the configuration file because either the file is corrupted or it is not a valid NPS configuration file. ...
  22. NPS cannot import the configuration file because either the file is corrupted or it is not a valid NPS configuration file. ...
  23. NPS cannot log accounting information in the primary data store (%1). Because of this, NPS is now logging accounting information ...
  24. NPS cannot log accounting information in the primary data store (%1). Due to this logging failure, NPS will discard all connection ...
  25. NPS cannot log accounting information in the primary data store (%1). NPS will continue to process connection requests without ...
  26. NPS cannot log accounting information in the secondary data store (%1). Due to this logging failure, NPS will discard all ...
  27. NPS cannot log accounting information in the secondary data store (%1). NPS will continue to process connection requests ...
  28. NPS configured as a NAP health policy server processes connection requests and enforces NAP client health policy locally ...
  29. NPS configured as a RADIUS proxy forwards connection requests to other RADIUS servers that are members of a remote RADIUS ...
  30. NPS configured as a RADIUS server processes connection requests locally by performing authentication and authorization. To ...
  31. npsdb is variable that contains the new name of the new database. - The UI will declare the variable and initialize it based ...
  32. NSAP Network Service Access Point (NSAP) address record. Maps a DNS domain name to a single NSAP address of any supported ...
  33. NSAPPTR Network Service Access Point pointer (NSAP-PTR) record. The function of the NSAP-PTR record is similar to that of ...
  34. NSPI max connection limit for the user has reached. You need to do NSPI unbind on old connections before making new connections. ...
  35. NT image checksum (usually set at link time), as listed in the NT image header; it is a hash used to verify the image was ...
  36. NT image timestamp (usually set at link time), as listed in the NT image header; it is a used to identify the binary image ...
  37. NTFS compression is not supported for allocation unit sizes above 4096. Please select a smaller allocation unit size and ...
  38. NTFS file system is not supported on this device optimized for removal. To change the way this device is optimized, select ...
  39. NTFS Volume Serial Number : 1 Version : %2!d!.%3!d! Number Sectors : 4 Total Clusters : 5 Free Clusters : 6 Total Reserved ...
  40. NTLM client blocked audit: Audit outgoing NTLM authentication traffic that would be blocked. Target server: %1 Supplied user: ...
  41. NTLM client blocked: Outgoing NTLM authentication traffic to remote servers that is blocked. Target server: %1 Supplied user: ...
  42. NTLM Minimum Client Security Block: Calling process PID: %1 Calling Process Name: %2 Negotiated Security Flags: %3 Minimum ...
  43. NTLM Minimum Server Security Block: Calling process PID: %1 Calling Process Name: %2 Negotiated Security Flags: %3 Minimum ...
  44. NTLM server blocked audit: Audit Incoming NTLM Traffic that would be blocked Calling process PID: %1 Calling process name: ...
  45. NTLM server blocked in the domain audit: Audit NTLM authentication in this domain User: %1 Domain: %2 Workstation: %3 PID: ...
  46. NTLM server blocked in the domain: NTLM authentication in this domain that is blocked User: %1 Domain: %2 Workstation: %3 ...
  47. NTLM server blocked: Incoming NTLM traffic to servers that is blocked Calling process PID: %1 Calling process name: %2 Calling ...
  48. NTLMv2 authentication requires client computers to have the lmcompatibilitylevel registry value set to at least 3 (Emit only ...
  49. NtpClient was unable to set a domain peer to use a time source because of an unexpected error. NtpClient will try again in ...
  50. NtpClient was unable to set a domain peer to use as a time source because of discovery error. NtpClient will try again in ...
  51. NtpClient was unable to set a domain peer to use as a time source because of DNS resolution error on '%3'. NtpClient will ...
  52. NtpClient was unable to set a domain peer to use as a time source because of duplicate error on '%3'. The same time source ...
  53. NtpClient was unable to set a domain peer to use as a time source because of failure in establishing a trust relationship ...
  54. NtpClient was unable to set a manual peer to use as a time source because of an unexpected error. NtpClient will try again ...
  55. NtpClient was unable to set a manual peer to use as a time source because of DNS resolution error on '%3'. NtpClient will ...
  56. NtpClient was unable to set a manual peer to use as a time source because of duplicate error on '%3'. The same time source ...
  57. Null encapsulation allows you to require that the connection be authenticated, but does not provide integrity or privacy ...
  58. NULL value is not allowed for input stream and output stream sets. %1!ls! and %2!ls! are the supported input and output streams. ...
  59. Number of cache entries: %1!u! Estimated cloud size: %2!u! Number of registered names: %3!u! Throttled resolves: %4!I64u! ...
  60. Number of contiguous ProtectedSpaceExtents counted before looping back to the first ProtectedSpaceExtent of the current stripe. ...
  61. Number of days after which an event can be overwritten. Values are: 0 = Any entry can be overwritten when necessary.1.365 ...
  62. Number of distinct event providers that are enabled to ETW sessions; multiple instances of a provider are counted only once. ...
  63. Number of downstream Ports on the Hub, including those embedded in the Hub's silicon. Individual USBPorts are associated ...
  64. Number of hard resets issued by the controller. A hard reset returns the device to its initialization or 'boot-up' state. ...
  65. Number of input async framing errors. These can be caused by a noisy transmission line. Using a smaller packet size may help ...
  66. Number of input async overrun errors. These can be caused by the baud rate being faster than the computer can handle, or ...
  67. Number of input compression dictionary flushes. When the data can not be compressed, the compression dictionary is flushed ...
  68. Number of items that have been flushed from output cache but are still being used by outgoing responses so are still taking ...
  69. Number of kilobytes of virtual memory currently unused and available. For example, this may be calculated by adding the amount ...
  70. Number of kilobytes of virtual memory. For example, this may be calculated by adding the amount of total RAM to the amount ...
  71. Number of object property values containing Distinguished Names sent to outbound replication partners. DN-values, such as ...
  72. Number of object property values received from inbound replication partners that are Distinguished Names; i.e., that reference ...
  73. Number of objects looked at by outbound replication that were determined to have no updates that the outbound partner did ...
  74. Number of output compression dictionary flushes. When the data can not be compressed, the compression dictionary is flushed ...
  75. Number of read I/Os that are received by ReadyBoost. This counter includes all reads whether or not they were satisfied by ...