Windows 8.1
- This configuration cannot be changed while the virtual machine is running. To perform this operation, close the wizard and ...
- This configuration does not allow access to the host operating system through this network adapter. Make sure remote access ...
- This configuration does not allow access to the management operating system through this network adapter. Make sure remote ...
- This configuration may result in unexpected storage Quality of Service behavior for the differencing virtual hard disk, as ...
- This configuration might cause overall CPU utilization to be higher than necessary. Networking performance might not be optimal ...
- This configuration will only be saved to IPAM server. To commit the settings on DHCP server, right click on the IP address ...
- This configuration will only be saved to IPAM server. To commit the settings on DNS server, right click on the IP address ...
- This connected cluster ({0}) does not have the enabled CAU clustered role. This is required to start a Self-Updating Run ...
- This connection is configured to validate the identity of the access server, but Windows cannot verify the digital certificate ...
- This connection request has been cancelled due to Remote Desktop Connection Broker service stop. Remote Desktop Connection ...
- This connection request has resulted in a successful session logon (User successfully logged on to the end point). Remote ...
- This connection request has timed out. User could not log on to the end point within the alloted time. Remote Desktop Connection ...
- This connection requires security features that are not available on this platform. For information, contact customer support. ...
- This connection was automatically generated by the Active Directory Domain Services. Changes to this connection will be overwritten ...
- This connection was automatically generated by the Active Directory Domain Services. Changes to this connection will be overwritten. ...
- This connection was configured to use a data encryption strength that is not supported by the installed software. The security ...
- This console file was saved with a previous version of the IP Security Monitor snap-in that is not compatible with the current ...
- This console file was saved with a previous version of the snapin and is not compatible. The settings could not be restored. ...
- This contact has been modified in both Windows Contacts and your Hotmail Address Book, and the items below have conflicting ...
- This content cannot be played because critical files that are required for video playback have been corrupted. To restore ...
- This Control Panel cannot be run without Internet Explorer Version 5 or greater. Please install a newer version of Internet ...
- This copy of the AOL software was intended for use on earlier versions of the Windows operating system. Please click 'Continue' ...
- This copy of the AOL software was intended for use on earlier versions of the Windows operating system. You may be unable ...
- This copy of the CompuServe software was intended for use on earlier versions of the Windows operating system. Please click ...
- This copy of the CompuServe software was intended for use on earlier versions of the Windows operating system. You may be ...
- This copy of this app has expired. Your PC might be vulnerable to malware. To continue using this app, contact your security ...
- This copy of this app will expire in %1 days. To continue using this app to help protect your PC, contact your security administrator. ...
- This copy of this app will expire within a day. To continue using this app to help protect your PC, contact your security ...
- This copy of Windows is not genuine. To receive the full protection of this program, you must verify that your copy of Windows ...
- This could be because your username and password are incorrect, or because a username and password are not required. Check ...
- This counter displays latency in seconds between the time a complete iSCSI I/O request is received and when its response ...
- This counter displays the number of net user and new local groups evaluations per second when performing a non-transitive ...
- This counter displays the number of new groups encountered per second when performing a transitive membership evaluation. ...
- This counter displays the number of universal group membership evaluations per second on a global catalog domain controller ...
- This counter represents the last replication latency in seconds. It is the time taken for the delta to be applied on the ...
- This counter represents the number of packets from the external NIC that enter the virtual switch on the virtual switch processor. ...
- This counter represents the number of packets from the external NIC that enter the virtual switch per second on the virtual ...
- This counter represents the number of packets from the VM/host that enter the virtual switch on the virtual switch processor. ...
- This counter represents the number of packets from the VM/host that enter the virtual switch per second on the virtual switch ...
- This counter represents the total bytes received over the network for the virtual machine since the virtual machine management ...
- This counter represents the total bytes sent and received over the network for the virtual machine during the resynchronize ...
- This counter represents the total bytes sent over the network for the virtual machine since the virtual machine management ...
- This counter represents the total number of dropped packets by switch extensions in the incoming direction of the network ...
- This counter represents the total number of dropped packets by switch extensions in the outgoing direction of the network ...
- This counter represents the total number of dropped packets by the switch extensions in the incoming direction of the virtual ...
- This counter represents the total number of dropped packets by the switch extensions in the outgoing direction of the virtual ...
- This counter represents the total number of dropped packets per second by switch extensions in the incoming direction of ...
- This counter represents the total number of dropped packets per second by switch extensions in the outgoing direction of ...
- This counter represents the total number of dropped packets per second by the switch extensions in the incoming direction ...
- This counter represents the total number of dropped packets per second by the switch extensions in the outgoing direction ...
- This counter represents the total number of dropped packets per second in the incoming direction of the virtual switch port. ...
- This counter represents the total number of dropped packets per second in the outgoing direction of the virtual switch port. ...
- This counter represents the total number of packet dropped per second by the virtual switch extensions in the incoming direction. ...
- This counter represents the total number of packet dropped per second by the virtual switch extensions in the outgoing direction. ...
- This counter set displays information about server shares that are being accessed by the client using SMB protocol version ...
- This counter tracks the number of armored Authentication Service (AS) requests that are being processed by the Key Distribution ...
- This counter tracks the number of armored ticket-granting service (TGS) requests that are being processed by the Key Distribution ...
- This counter tracks the number of Authentication Service (AS) requests explicitly requesting claims that are being processed ...
- This counter tracks the number of Authentication Service (AS) requests that are being processed by the Key Distribution Center ...
- This counter tracks the number of claims-aware ticket-granting service (TGS) requests that are being processed by the Key ...
- This counter tracks the number of constrained delegation (S4U2Proxy) TGS requests that are being processed by the Key Distribution ...
- This counter tracks the number of constrained delegation (S4U2Proxy) TGS requests that are being processed by the Key Distribution ...
- This counter tracks the number of context handles in use by a given process. Context handles are associated with security ...
- This counter tracks the number of credential handles in use by a given process. Credential handles are handles to pre-existing ...
- This counter tracks the number of Kerberos requests that a read-only domain controller (RODC) forwards to its hub, per second. ...
- This counter tracks the number of NTLM authentications processed per second for the AD on this DC or for local accounts on ...
- This counter tracks the number of Secure Sockets Layer (SSL) client-side reconnect handshakes that are being processed per ...
- This counter tracks the number of Secure Sockets Layer (SSL) entries that are currently stored in the secure channel (Schannel) ...
- This counter tracks the number of Secure Sockets Layer (SSL) entries that are currently stored in the secure channel (Schannel) ...
- This counter tracks the number of Secure Sockets Layer (SSL) full client-side handshakes that are being processed per second. ...
- This counter tracks the number of Secure Sockets Layer (SSL) full server-side handshakes that are being processed per second. ...
- This counter tracks the number of Secure Sockets Layer (SSL) server-side reconnect handshakes that are being processed per ...
- This counter tracks the number of service asserted identity (S4U2Self) TGS requests that are explicitly requesting claims. ...
- This counter tracks the number of ticket-granting service (TGS) requests that are being processed by the Key Distribution ...
- This cross-ref has a non-standard dNSRoot attribute. Cross-ref DN: %2 nCName attribute (Partition name): %1 Bad dNSRoot attribute: ...