Windows 8.1

  1. This configuration cannot be changed while the virtual machine is running. To perform this operation, close the wizard and ...
  2. This configuration does not allow access to the host operating system through this network adapter. Make sure remote access ...
  3. This configuration does not allow access to the management operating system through this network adapter. Make sure remote ...
  4. This configuration may result in unexpected storage Quality of Service behavior for the differencing virtual hard disk, as ...
  5. This configuration might cause overall CPU utilization to be higher than necessary. Networking performance might not be optimal ...
  6. This configuration will only be saved to IPAM server. To commit the settings on DHCP server, right click on the IP address ...
  7. This configuration will only be saved to IPAM server. To commit the settings on DNS server, right click on the IP address ...
  8. This connected cluster ({0}) does not have the enabled CAU clustered role. This is required to start a Self-Updating Run ...
  9. This connection is configured to validate the identity of the access server, but Windows cannot verify the digital certificate ...
  10. This connection request has been cancelled due to Remote Desktop Connection Broker service stop. Remote Desktop Connection ...
  11. This connection request has resulted in a successful session logon (User successfully logged on to the end point). Remote ...
  12. This connection request has timed out. User could not log on to the end point within the alloted time. Remote Desktop Connection ...
  13. This connection requires security features that are not available on this platform. For information, contact customer support. ...
  14. This connection was automatically generated by the Active Directory Domain Services. Changes to this connection will be overwritten ...
  15. This connection was automatically generated by the Active Directory Domain Services. Changes to this connection will be overwritten. ...
  16. This connection was configured to use a data encryption strength that is not supported by the installed software. The security ...
  17. This console file was saved with a previous version of the IP Security Monitor snap-in that is not compatible with the current ...
  18. This console file was saved with a previous version of the snapin and is not compatible. The settings could not be restored. ...
  19. This contact has been modified in both Windows Contacts and your Hotmail Address Book, and the items below have conflicting ...
  20. This content cannot be played because critical files that are required for video playback have been corrupted. To restore ...
  21. This Control Panel cannot be run without Internet Explorer Version 5 or greater. Please install a newer version of Internet ...
  22. This copy of the AOL software was intended for use on earlier versions of the Windows operating system. Please click 'Continue' ...
  23. This copy of the AOL software was intended for use on earlier versions of the Windows operating system. You may be unable ...
  24. This copy of the CompuServe software was intended for use on earlier versions of the Windows operating system. Please click ...
  25. This copy of the CompuServe software was intended for use on earlier versions of the Windows operating system. You may be ...
  26. This copy of this app has expired. Your PC might be vulnerable to malware. To continue using this app, contact your security ...
  27. This copy of this app will expire in %1 days. To continue using this app to help protect your PC, contact your security administrator. ...
  28. This copy of this app will expire within a day. To continue using this app to help protect your PC, contact your security ...
  29. This copy of Windows is not genuine. To receive the full protection of this program, you must verify that your copy of Windows ...
  30. This could be because your username and password are incorrect, or because a username and password are not required. Check ...
  31. This counter displays latency in seconds between the time a complete iSCSI I/O request is received and when its response ...
  32. This counter displays the number of net user and new local groups evaluations per second when performing a non-transitive ...
  33. This counter displays the number of new groups encountered per second when performing a transitive membership evaluation. ...
  34. This counter displays the number of universal group membership evaluations per second on a global catalog domain controller ...
  35. This counter represents the last replication latency in seconds. It is the time taken for the delta to be applied on the ...
  36. This counter represents the number of packets from the external NIC that enter the virtual switch on the virtual switch processor. ...
  37. This counter represents the number of packets from the external NIC that enter the virtual switch per second on the virtual ...
  38. This counter represents the number of packets from the VM/host that enter the virtual switch on the virtual switch processor. ...
  39. This counter represents the number of packets from the VM/host that enter the virtual switch per second on the virtual switch ...
  40. This counter represents the total bytes received over the network for the virtual machine since the virtual machine management ...
  41. This counter represents the total bytes sent and received over the network for the virtual machine during the resynchronize ...
  42. This counter represents the total bytes sent over the network for the virtual machine since the virtual machine management ...
  43. This counter represents the total number of dropped packets by switch extensions in the incoming direction of the network ...
  44. This counter represents the total number of dropped packets by switch extensions in the outgoing direction of the network ...
  45. This counter represents the total number of dropped packets by the switch extensions in the incoming direction of the virtual ...
  46. This counter represents the total number of dropped packets by the switch extensions in the outgoing direction of the virtual ...
  47. This counter represents the total number of dropped packets per second by switch extensions in the incoming direction of ...
  48. This counter represents the total number of dropped packets per second by switch extensions in the outgoing direction of ...
  49. This counter represents the total number of dropped packets per second by the switch extensions in the incoming direction ...
  50. This counter represents the total number of dropped packets per second by the switch extensions in the outgoing direction ...
  51. This counter represents the total number of dropped packets per second in the incoming direction of the virtual switch port. ...
  52. This counter represents the total number of dropped packets per second in the outgoing direction of the virtual switch port. ...
  53. This counter represents the total number of packet dropped per second by the virtual switch extensions in the incoming direction. ...
  54. This counter represents the total number of packet dropped per second by the virtual switch extensions in the outgoing direction. ...
  55. This counter set displays information about server shares that are being accessed by the client using SMB protocol version ...
  56. This counter tracks the number of armored Authentication Service (AS) requests that are being processed by the Key Distribution ...
  57. This counter tracks the number of armored ticket-granting service (TGS) requests that are being processed by the Key Distribution ...
  58. This counter tracks the number of Authentication Service (AS) requests explicitly requesting claims that are being processed ...
  59. This counter tracks the number of Authentication Service (AS) requests that are being processed by the Key Distribution Center ...
  60. This counter tracks the number of claims-aware ticket-granting service (TGS) requests that are being processed by the Key ...
  61. This counter tracks the number of constrained delegation (S4U2Proxy) TGS requests that are being processed by the Key Distribution ...
  62. This counter tracks the number of constrained delegation (S4U2Proxy) TGS requests that are being processed by the Key Distribution ...
  63. This counter tracks the number of context handles in use by a given process. Context handles are associated with security ...
  64. This counter tracks the number of credential handles in use by a given process. Credential handles are handles to pre-existing ...
  65. This counter tracks the number of Kerberos requests that a read-only domain controller (RODC) forwards to its hub, per second. ...
  66. This counter tracks the number of NTLM authentications processed per second for the AD on this DC or for local accounts on ...
  67. This counter tracks the number of Secure Sockets Layer (SSL) client-side reconnect handshakes that are being processed per ...
  68. This counter tracks the number of Secure Sockets Layer (SSL) entries that are currently stored in the secure channel (Schannel) ...
  69. This counter tracks the number of Secure Sockets Layer (SSL) entries that are currently stored in the secure channel (Schannel) ...
  70. This counter tracks the number of Secure Sockets Layer (SSL) full client-side handshakes that are being processed per second. ...
  71. This counter tracks the number of Secure Sockets Layer (SSL) full server-side handshakes that are being processed per second. ...
  72. This counter tracks the number of Secure Sockets Layer (SSL) server-side reconnect handshakes that are being processed per ...
  73. This counter tracks the number of service asserted identity (S4U2Self) TGS requests that are explicitly requesting claims. ...
  74. This counter tracks the number of ticket-granting service (TGS) requests that are being processed by the Key Distribution ...
  75. This cross-ref has a non-standard dNSRoot attribute. Cross-ref DN: %2 nCName attribute (Partition name): %1 Bad dNSRoot attribute: ...