Windows 7
- This name suffix conflicts with name suffix in remote forest. Click Refresh button and try to edit the name suffix again. ...
- This name suffix is defined as a user principal name (UPN) suffix in the local forest: %1. Therefore, Windows routes all ...
- This name suffix is enabled for routing to the forest: %1. Therefore, Windows routes all authentication requests that use ...
- This namespace does not support the requested operation. Please upgrade all namespace servers for full functional support. ...
- This NC (%1) is supposed to be replicated to this server, but has not been replicated yet. This could be because the replica ...
- This network will appear in the list of wireless networks and will stay active until everyone disconnects from it. Give the ...
- This news posting contains no text. Many news groups do not consider this appropriate. Are you sure you would like to post ...
- This newsgroup software had been configured to access more than one news server. You can import one of these accounts at ...
- This node contains registry settings that do not correspond to an Administrative Template policy (e.g. they did not originate ...
- This note contains changes on pages that didn't load successfully. Rename the note to save these changes without affecting ...
- This object contains the data identifying either the initial load device (its key) or the boot service that requested the ...
- This object contains the data needed to find either the initial load device (its key) or the boot service to request the ...
- This object contains the data needed to find either the initial load device (its key) or the boot service to request the ...
- This object is not allowed to change its grandparent container. Moves are not forbidden on this object, but are restricted ...
- This object may not be moved across domain boundaries either because cross-domain moves for this class are disallowed, or ...
- This occurs if the current state of the virtual machine does not support shut down. For example, integration services might ...
- this one bit flag indicates whether or not the WBINVD instruction works properly,if this bit is not set we can not use S2, ...
- This operation can only be performed on the Naming Master. Please retry the operation after connecting to the Naming FSMO: ...
- This operation cannot be performed because one or more of the selected objects have active property sheets. Close the active ...
- This operation cannot be performed because the snap-in is connected to a Domain Controller that is not running Windows Server ...
- This operation cannot be performed on the cluster resource as it the quorum resource. You may not bring the quorum resource ...
- This operation cannot be started because a recovery operation is in progress. Wait until the ongoing operation completes ...
- This operation cannot be started because another operation is in progress. Wait until the ongoing operation completes or ...
- This operation has been cancelled due to restrictions in effect on this computer. Please contact your system administrator. ...
- This operation is not allowed on an invalid disk. The disk may be invalid because it is corrupted or failing, or it may be ...
- This operation is not allowed on the current boot, system or pagefile volume. It is also not allowed on any volume on a basic ...
- This operation is not supported by the remote Message Queuing service. For example, MQReceiveMessageByLookupId is not supported ...
- This operation may take a long time and will affect all users. Do you want to start the move now, or wait until the next ...
- This operation measures the memory performance of system memory by copying data from one memory buffer to another. SSE or ...
- This operation measures the performance of the system by decoding a file containing video and audio streams. The process ...
- This operation measures the performance of the system by decoding and/or encoding a file containing video and audio streams. ...
- This operation provides metrics on disk performance via a profiling mechanism. Sequential Read/Write and Random Read/Write ...
- This operation ran for too long and was canceled automatically. You can find detailed technical information in the Windows ...
- This operation retrieves owner-version maps from different WINS servers. It checks the consistency of the databases by ensuring ...
- This operation will add all the computer security principals from the Auth2 list of the RODC to the Allow list. Do you wish ...
- This operation will add all the security principals from the Auth2 list of the RODC to the Allow list. Do you wish to continue? ...
- This operation will add all user security principals from the Auth2 list of the RODC to the Allow list. Do you wish to continue? ...
- This operation will delete all user-defined policies and replace their references in Calendar-events and Schedules with Calendar ...
- This operation will delete member "{0}" from the replication group. All replicated folders in the replication group on this ...
- This operation will delete superscope %1 without deleting any child scopes. Are you sure you want to delete superscope %1? ...
- This operation will delete the namespace "{0}". Clients will no longer be able to access "{0}". Do you want to continue? ...
- This operation will delete the namespace {0}. Clients will no longer be able to access {0}. The underlying folder targets ...
- This operation will delete the replication group {0} and stop replicating the associated replicated folders. No replicated ...
- This operation will delete the selected folder from the namespace. All child folders will also be deleted. This operation ...
- This operation will delete the selected folders from the namespace. All child folders will also be deleted. This operation ...
- This operation will delete your index (including custom index locations and excluded locations) and completely re-build the ...
- This operation will immediately rebuild the index. Depending upon how many files you have, it can take as long as several ...
- This operation will make the volume available for use but the data on it may be corrupted or stale. If you have another disk ...
- This operation will move all the computer security principals from the Auth2 list of the RODC to the Allow list. Do you wish ...
- This operation will move all the security principals from the Auth2 list of the RODC to the Allow list. Do you wish to continue? ...
- This operation will move all user security principals from the Auth2 list of the RODC to the Allow list. Do you wish to continue? ...
- This operation will remove the namespace server "{0}" from this namespace. If it is the only namespace server of this namespace, ...
- This operation will remove the selected folder target from this folder. If this is the last folder target, then the folder ...
- This operation will remove the selected folder targets from this folder. If all of the targets are selected, then the folder ...
- This operation will stop replicating the replicated folder "{0}" and will delete the replicated folder from the replication ...
- This operation will stop sharing the selected shares. Users will no longer be able to access files from these shared folders ...
- This operation will stop sharing the selected shares. Users will no longer be able to access files from these shared folders ...
- This option allows authenticated but unencrypted network packets to be sent while encryption is being negotiated. Compatible ...
- This option allows the computer to be trusted for delegation. Trusting the computer for delegation is a security-sensitive ...
- This option audits both successful changes and failed attempts to system and configuration files, allowing you to determine ...
- This option audits successful changes to system and configuration files, allowing you to reconstruct events after the fact ...
- This option automatically creates a new instance of AD LDS that uses the default configuration and schema partitions. The ...
- This option configures two-way replication between two servers, such as a branch server and a hub (destination) server. This ...
- This option copies a new unattended Setup answer file to an existing image. You can copy the answer file from an existing ...
- This option copies the contents of a supported Windows CD and associates a standard unattended Setup answer file with the ...
- This option creates a new instance of AD LDS that uses the configuration and schema partitions replicated from another instance ...
- This option deletes all printers on this server, including shared printers, which prevents users from printing through this ...
- This option deletes the member from the replication group and stops replicating the folder on the member. However, users ...
- This option deletes the member from the replication group, stops replicating the replicated folder on the member, and removes ...
- This option deletes the replication group and stops replicating the folder. However, users can still use the namespace to ...
- This option deletes the replication group, stops replicating the replicated folder, and removes the replicated folder from ...
- This option digitally signs all file and print traffic. This signing is processor intensive, so it is recommended only if ...
- This option does not need to be selected if you remotely manage this server using Remote Destkop Server for Remote Desktop ...
- This option enables higher-quality audio CDs, such as HDCDs, to play back at their full audio quality. The audio quality ...
- This option increases compatibility with network equipment but is less secure because it does not provide integrity or privacy ...