Windows 8.1
- After you stop using Work Folders, you can delete the folder used by Work Folders on this PC. Files on your other devices ...
- After you subscribe to {0}, you can manage users' licenses from the dashboard. Click Cancel if you don't want to subscribe ...
- Age over 1. This program contains some material that many parents would find unsuitable for children under 1 year of age. ...
- Age over 10. This program contains some material that many parents would find unsuitable for children under 10 years of age. ...
- Age over 11. This program contains some material that many parents would find unsuitable for children under 11 years of age. ...
- Age over 12. This program contains some material that many parents would find unsuitable for children under 12 years of age. ...
- Age over 13. This program contains some material that many parents would find unsuitable for children under 13 years of age. ...
- Age over 14. This program contains some material that many parents would find unsuitable for children under 14 years of age. ...
- Age over 15. This program contains some material that many parents would find unsuitable for children under 15 years of age. ...
- Age over 16. This program contains some material that many parents would find unsuitable for children under 16 years of age. ...
- Age over 17. This program contains some material that many parents would find unsuitable for children under 17 years of age. ...
- Age over 18. This program contains some material that many parents would find unsuitable for children under 18 years of age. ...
- Age over 19. This program contains some material that many parents would find unsuitable for children under 19 years of age. ...
- Age over 2. This program contains some material that many parents would find unsuitable for children under 2 years of age. ...
- Age over 20. This program contains some material that many parents would find unsuitable for children under 20 years of age. ...
- Age over 21. This program contains some material that many parents would find unsuitable for children under 21 years of age. ...
- Age over 3. This program contains some material that many parents would find unsuitable for children under 3 years of age. ...
- Age over 4. This program contains some material that many parents would find unsuitable for children under 4 years of age. ...
- Age over 5. This program contains some material that many parents would find unsuitable for children under 5 years of age. ...
- Age over 6. This program contains some material that many parents would find unsuitable for children under 6 years of age. ...
- Age over 7. This program contains some material that many parents would find unsuitable for children under 7 years of age. ...
- Age over 8. This program contains some material that many parents would find unsuitable for children under 8 years of age. ...
- Age over 9. This program contains some material that many parents would find unsuitable for children under 9 years of age. ...
- Aggregates and uploads Application Telemetry information if opted-in to the Microsoft Customer Experience Improvement Program. ...
- AIWA TA Utility has a known compatibility issue with this version of Windows and might not run as expected. When you use ...
- Alert notifications are not available for Health Monitoring due to an error or an incomplete action, or a service has stopped ...
- Alert: Please be aware that your AD RMS super user {0} is enabled. It is okay to have your super user enabled if you are ...
- Alerts failed because of network failures or because the internal cache size was exceeded. If the problem persists, change ...
- Alerts for a content source with a local address are only supported for a fixed media drive type. Use the UNC name for remote ...
- Algorithm: %1 Key length: %2!d! bits KSP: %3 DNSKEY signature validity: %4!d! hours DS Signature validity: %5!d! hours Zone ...
- Algorithm: %1 Key length: %2!d! bits KSP: %3 DNSKEY signature validity: %4!d! hours DS signature validity: %5!d! hours Zone ...
- Algorithm: %1 Key length: %2!d! bits KSP: %3 DNSKEY signature validity: %4!d! hours DS Signature validity: %5!d! hours Zone ...
- Algorithm: %1 Key length: %2!d! bits KSP: %3 DNSKEY signature validity: %4!d! hours DS signature validity: %5!d! hours Zone ...
- Algorithm: %1 Key length: %2!d! bits KSP: %3 DNSKEY signature validity: %4!d! hours Replication: %5 Rollover state: %6 Active ...
- Algorithm: %1 Key length: %2!d! bits KSP: %3 DNSKEY signature validity: %4!d! hours Replication: %5 Rollover state: %6 Rollover ...
- Algorithm: %1 Key length: %2!d! bits KSP: %3 DNSKEY signature validity: %4!d! hours Replication: %5 Rollover state: %6 Rollover ...
- Alias (CNAME) Alias record. Indicates an alternate or alias DNS domain name for a name already specified in other resource ...
- Align text to both left and right margins, adding extra space between words as necessary. This creates a clean look along ...
- Aligning the nodes and sockets of a virtual machine to the hardware topology helps improve the performance of NUMA-aware ...
- All application directory partitions on this Active Directory domain controller will be removed. This domain controller holds ...
- All application directory partitions on this Active Directory domain controller will be removed. This domain controller holds ...
- All approved applications must have a path. For each application in the list marked with "[No path!]", either edit the item ...
- All authenticated incoming servers would be allowed to replicate. All existing authorization entries will be removed. Do ...
- All authentication sets have been deleted from the IPsec configuration on this computer. IPsec Phase: %1 Store Type: %2 ModifyingUser: ...
- All available "%1!s!" licenses for product "%2!s!" on Remote Desktop license server "%3!s!" have been removed. Use RD Licensing ...
- All available disks are dynamic disks and cannot be used to back up system volumes. Attach a basic disk to use for backups. ...
- All available storage in the new cluster has already been assigned to other clustered roles. Storage can only be shared between ...
- All bits of IP address "{0}" are set to 0, it can not be used for the domain controller virtual machine. Use a valid IP address. ...
- All bits of IP address "{0}" are set to 1, it can not be used for the domain controller virtual machine. Use a valid IP address. ...
- All CA servers are in one of the following states: 1. CA server cannot be reached. 2. CA server is busy with previous requests. ...
- All certificate authentication methods using the same certificate signing algorithm must be grouped together in each list. ...
- All certificate authentications using the same signing algorithm must have the same require health setting. You cannot specify ...
- All changes must be performed on the virtual desktop template before you recreate the virtual desktops in this collection. ...
- All connection security rules have been deleted from the IPsec configuration on this computer. Store Type: %1 ModifyingUser: ...
- All connections to the Global Catalog servers are unresponsive or there are fewer connections than are required to run the ...
- All connections to the new member will use a custom connection schedule. To set up a custom connection schedule, click Edit ...
- All connections to the new member will use the replication group schedule. To view the replication group schedule, click ...
- All crypto sets have been deleted from the IPsec configuration on this computer. IPsec Phase: %1 Store Type: %2 ModifyingUser: ...
- All data on the drives to be restored will be replaced with the data in the system image. Are you sure you want to continue? ...
- All data sent between the client and the server is protected by encryption based on the maximum key strength supported by ...
- All data sent between the client and the server is protected by encryption based on the server's maximum key strength. Clients ...
- All data sent between the client and the server uses Federal Information Processing Standard (FIPS) compliant algorithms ...
- All data sent from client to server is protected by encryption based on the maximum key strength supported by the client. ...
- All directory servers in the following site that can replicate the directory partition over this transport are currently ...
- All directory-enabled computers that access the Active Directory in the selected server's domain satisfy the following minimum ...
- All disks to be restored will be formatted and replaced with the layout and data in the system image. Are you sure you want ...
- All domain controllers have migrated successfully to the Global state (%s). Migration has reached a consistent state on all ...
- All domains configured for end-to-end authentication have been removed from the deployment. End-to-end authentication is ...
- All event subscription computer names must be unique. The following names are already in the list and will not be added again: ...
- All existing connections ({0}) will be deleted at the end of the New Topology Wizard so that the new topology can be created. ...
- All file management jobs, reports, and the classification schedule should be compatible with the Task Scheduler 2.0 API on ...
- All inbound replication connections for the partition %1 are disabled. Inbound replication of this partition cannot be performed. ...
- All incoming COM ports are in use. To assign a COM port to this Bluetooth device, you must first delete an existing incoming ...
- All information about which channels you access most frequently will be deleted if you turn off the Most Viewed filter in ...
- All Internet Explorer add-ons, such as ActiveX controls or toolbars, are turned off. Some webpages might not display correctly. ...