Windows 8.1

  1. Specify the percentage of memory that Hyper-V should try to reserve as a buffer. Hyper-V uses the percentage and the current ...
  2. Specify the Replica server name to use to replicate this virtual machine. If the Replica server is on a failover cluster, ...
  3. Specify the Server Manager data refresh period (in minutes) Setting the refresh interval too low results in very frequent ...
  4. Specify the super user group name in the format [email protected]. The group that you specify must be an Active Directory ...
  5. Specify the text and image that will appear in the Network Access Protection user interface on client computers. For more ...
  6. Specify the time that elapsed since the last idle state promotion or demotion before idle states may be promoted or demoted ...
  7. Specify the upper busy threshold that must be met before increasing the number of cores/packages that are unparked (in percentage). ...
  8. Specify the user groups that will be associated with this session collection. Users who are members of these groups can connect ...
  9. Specify user authentication methods or a health certificate to use during IPsec negotiations. Those higher in the list are ...
  10. Specify when a new key is generated. If you select both options, a new key is generated when the first threshold is reached. ...
  11. Specify where to save each type of storage report: Incident reports - generated automatically when a user exceeds a quota ...
  12. Specify whether connection requests are processed locally, are forwarded to remote RADIUS servers for authentication, or ...
  13. Specify whether content protected using this template may be revoked. Revocation denies permission to open such content based ...
  14. Specify whether selected DirectAccess users can authenticate with a user name and password when OTP authentication is enabled. ...
  15. Specify whether the clustered role will automatically fail back to the most preferred owner (which is set on the General ...
  16. Specify whether the Core Cluster Resource Group will automatically fail back to the most preferred owner (which is set on ...
  17. Specify whether this entry point can be accessed by client computers running Windows 7. Access for these clients must be ...
  18. Specify whether to enable or disable access to local client devices and resources in your remote session for clients that ...
  19. Specify whether to enable or disable access to local client devices and resources in your remote session for clients that ...
  20. Specify whether to enable or disable client device redirection for clients that connect through RD Gateway, and then select ...
  21. Specify whether to send an e-mail message or run a script when the criteria specified on the Define a Filter page are met. ...
  22. Specify whether to use local Internet Protocol security (IPsec) policy on this computer. If local IPsec policy is not used, ...
  23. Specify whether to use Remote Desktop connection authorization policies (RD CAPs) stored on the local or central server that ...
  24. Specify which e-mail domains are trusted. If AD RMS needs to expand group membership across forests, licensing to security ...
  25. Specify which e-mail domains or user accounts to allow or block when issuing licenses from this AD RMS cluster. To specify ...
  26. Specify which users and groups have rights to work with content protected using this template. Some rights are not used in ...
  27. Specifying a lower setting for this virtual machine might prevent it from starting when other virtual machines are running ...
  28. Specifying an asterisk (*) applies the selected filtering mode to all users in all domains. This will permanently remove ...
  29. Specifying PassThru returns the DAMgmtServers object which contains the list of changes to the management server list and ...
  30. Specifying PassThru returns the Remote Access object which contains the entire Remote Access (DirectAccess and VPN) configuration. ...
  31. Specifying this parameter enables IPv6 address assignment for VPN and specifies the prefix to use for the addressing.If Null ...
  32. Specifying this parameter indicates that static pool IPv4 addressing should be enabled. The parameter contains an IP address ...
  33. Specifying this parameter indicates that the health details for the specified ComputerName/Cluster or EntryPoint should be ...
  34. Specifying this parameter indicates that the health for the entire cluster needs to be retrieved. If both cluster and ComputerName ...
  35. Specifying this parameter indicates that the Network location server is present on a different server and represents the ...
  36. Specifying this switch parameter indicates that Directaccess should be deployed behind a NAT. In a single network adapter ...
  37. Speech Recognition encountered an error. Please restart Speech Recognition to ensure that you can continue to use Speech ...
  38. Speech recognition in the selected language cannot be initialized because this language is unsupported on your system. Please ...
  39. Speech Recognition will continue to run so that you can continue speaking to your computer. Click here to not show this reminder ...
  40. Speech Recognition will use the updated settings the next time it starts. Ensure that the recognizer language matches the ...
  41. Speech Training is not configured properly. Please go to the Speech Recognition Control Panel, click on Advanced Options ...
  42. Spell checking provider returned error indexes out of the string boundaries. This indicates that the provider either has ...
  43. Spinlock acquires/sec is the rate of spinlock acquisitions. It includes the basic spinlocks, queued spinlocks, in-stack queued ...
  44. Spinlock contentions/sec is the rate of spinlock contentions. It includes the basic spinlocks, queued spinlocks, in-stack ...
  45. Spinlock spins/sec is the rate of spinlock spins. It includes the spins to acquire basic spinlocks, queued spinlocks, in-stack ...
  46. Split IO/Sec reports the rate at which I/Os to the disk were split into multiple I/Os. A split I/O may result from requesting ...
  47. Split-Scope is configured successfully. The Scope configured on the Added DHCP Server is in the deactivated state. It needs ...
  48. Splitting DHCP scope between multiple DHCP servers can increase fault tolerance. With a split-scope configuration, if one ...
  49. Spn check for SMB/SMB2 fails. Subject: Security ID: %1 Account Name: %2 Account Domain: %3 Logon ID: %4 SPN: SPN Name: %5 ...
  50. SPNs are used to locate the service account. Duplicate SPNs cause the Key Distribution Center (KDC) to return a failure because ...
  51. Spotlight on Active Directory requires the latest Visual Basic 5.0 run-time files (Msvbvm50.exe) in order to run properly. ...
  52. SPSS for Windows 10 has a known compatibility issue with this version of Windows and might not run as expected. The program ...
  53. SQL log configuration: - Connection = %1!s! Description = %2!s! Accounting = %3!s! Authentication = %4!s! Periodic accounting ...
  54. SQL Server 2000 Analysis Services sp2 and below is not supported by this version of Windows. Please apply sp3 after installation ...
  55. SQL Server 2000 Analysis Services sp3 and below is not supported by this version of Windows. Please apply sp4 after installation ...
  56. SQL Server 2000 English Query sp2 and below is not supported by this version of Windows. Please apply sp3 after installation ...
  57. SQL Server 2000 English Query sp3 and below is not supported by this version of Windows. Please apply sp4 after installation ...
  58. SQL Server 2000 sp2 and below is not supported by this version of Windows. Please apply sp3 after installation of SQL Server ...
  59. SQL Server 2000 sp3 and below is not supported by this version of Windows. Please apply sp4 after installation of SQL Server ...
  60. SR-IOV can only be configured when the virtual switch is created. An external virtual switch with SR-IOV enabled cannot be ...
  61. SR-IOV cannot be used on this computer because the processor does not support second level address translation (SLAT). For ...
  62. SR-IOV cannot be used on this network adapter as the device or device driver does not support SR-IOV. If the network adapter ...
  63. SR-IOV cannot be used on this network adapter as the PCI Express hardware does not support Access Control Services (ACS). ...
  64. SR-IOV cannot be used on this network adapter as there are not enough PCI Express BAR resources available. This may be due ...
  65. SR-IOV cannot be used on this system as it is reporting that there is no PCI Express Bus. Contact your system manufacturer ...
  66. SR-IOV cannot be used on this system as the PCI Express hardware does not support Access Control Services (ACS) at any root ...
  67. SSL (TLS 1.0) will be used for server authentication as well as for encrypting all data transferred between the server and ...
  68. SSL AcquireCredentialsHandle - (EnabledProtocols %2) (ClientCert %3) (EnableRevertToSelfClientCertificate %4) (CipherConfig ...
  69. SSL AcquireCredentialsHandle failed - (%7) (EnabledProtocols %2) (ClientCert %3) (EnableRevertToSelfClientCertificate %4) ...
  70. SSL AcquireCredentialsHandle failed - (%8) (EnabledProtocols %2) (ClientCert %3) (EnableRevertToSelfClientCertificate %4) ...
  71. SSL AcquireCredentialsHandle returned - (%7) Credential Handle(%5:%6) (EnabledProtocols %2) (ClientCert %3) (EnableRevertToSelfClientCertificate ...
  72. SSL AcquireCredentialsHandle returned - (%8) Credential Handle(%6:%7) (EnabledProtocols %2) (ClientCert %3) (EnableRevertToSelfClientCertificate ...
  73. SSL Binding '{0}:{1}:' has a certificate that has expired. The certificate has thumbprint '{3}' and is located in store '{2}'. ...
  74. SSL Binding '{0}:{1}:' has a certificate that will expire in 75 days. The certificate has thumbprint '{3}' and is located ...
  75. SSL certificates are used to encrypt communications between Remote Desktop Services clients and RD Gateway servers. The self-signed ...