Windows 8.1

  1. This name suffix conflicts with name suffix in remote forest. Click Refresh button and try to edit the name suffix again. ...
  2. This name suffix is defined as a user principal name (UPN) suffix in the local forest: %1. Therefore, Windows routes all ...
  3. This name suffix is enabled for routing to the forest: %1. Therefore, Windows routes all authentication requests that use ...
  4. This namespace does not support the requested operation. Please upgrade all namespace servers for full functional support. ...
  5. This NC (%1) is supposed to be replicated to this server, but has not been replicated yet. This could be because the replica ...
  6. This news posting contains no text. Many news groups do not consider this appropriate. Are you sure you would like to post ...
  7. This newsgroup software had been configured to access more than one news server. You can import one of these accounts at ...
  8. This NFS share resource cannot be copied because the NFS Share resource type is no longer supported. Instead, the NFS share ...
  9. This node contains registry settings that do not correspond to an Administrative Template policy. For example, they did not ...
  10. This note contains changes on pages that didn't load successfully. Rename the note to save these changes without affecting ...
  11. This object contains the data identifying either the initial load device (its key) or the boot service that requested the ...
  12. This object contains the data needed to find either the initial load device (its key) or the boot service to request the ...
  13. This object contains the data needed to find either the initial load device (its key) or the boot service to request the ...
  14. This object is not allowed to change its grandparent container. Moves are not forbidden on this object, but are restricted ...
  15. This object may not be moved across domain boundaries either because cross-domain moves for this class are disallowed, or ...
  16. This object uses a property definition that is deprecated. You must change it to use a non-deprecated property definition. ...
  17. This occurs if the current state of the virtual machine does not support shut down. For example, integration services might ...
  18. This operation can only be performed on the Naming Master. Please retry the operation after connecting to the Naming FSMO: ...
  19. This operation cannot be performed because one or more of the selected objects have active property sheets. Close the active ...
  20. This operation cannot be performed because the snap-in is connected to a Domain Controller that is not running Windows Server ...
  21. This operation cannot be started because a recovery operation is in progress. Wait until the ongoing operation completes ...
  22. This operation completed, but no trust anchors were added because all of the trust anchors received were either invalid, ...
  23. This operation could not be completed because the DNS server has been configured with DNSSEC features disabled. Enable DNSSEC ...
  24. This operation could not be completed because the DNS server listed as the current key master for this zone is down or misconfigured. ...
  25. This operation has been cancelled due to restrictions in effect on this computer. Please contact your system administrator. ...
  26. This operation has failed for the record, as it conflicts with an existing record in the IPAM database. Please retry by providing ...
  27. This operation has failed for the record, as it has dependencies on other records or does not exist in the system anymore. ...
  28. This operation is disallowed as it could result in an administration account being disabled, deleted or unable to logon. ...
  29. This operation is not allowed on an invalid disk. The disk may be invalid because it is corrupted or failing, or it may be ...
  30. This operation is not allowed on the current boot, system or pagefile volume. It is also not allowed on any volume on a basic ...
  31. This operation is not supported on a clustered virtual machine. To perform this operation, remove the virtual machine from ...
  32. This operation may take a long time and will affect all users. Do you want to start the move now, or wait until the next ...
  33. This operation measures the memory performance of system memory by copying data from one memory buffer to another. SSE or ...
  34. This operation measures the performance of the system by decoding a file containing video and audio streams. The process ...
  35. This operation measures the performance of the system by decoding and/or encoding a file containing video and audio streams. ...
  36. This operation provides metrics on disk performance via a profiling mechanism. Sequential Read/Write and Random Read/Write ...
  37. This operation ran for too long and was canceled automatically. You can find detailed technical information in the Windows ...
  38. This operation retrieves owner-version maps from different WINS servers. It checks the consistency of the databases by ensuring ...
  39. This operation will add all the computer security principals from the Auth2 list of the RODC to the Allow list. Do you wish ...
  40. This operation will add all the security principals from the Auth2 list of the RODC to the Allow list. Do you wish to continue? ...
  41. This operation will add all user security principals from the Auth2 list of the RODC to the Allow list. Do you wish to continue? ...
  42. This operation will delete member "{0}" from the replication group. All replicated folders in the replication group on this ...
  43. This operation will delete superscope %1 without deleting any child scopes. Are you sure you want to delete superscope %1? ...
  44. This operation will delete the namespace "{0}". Clients will no longer be able to access "{0}". Do you want to continue? ...
  45. This operation will delete the namespace {0}. Clients will no longer be able to access {0}. The underlying folder targets ...
  46. This operation will delete the replication group {0} and stop replicating the associated replicated folders. No replicated ...
  47. This operation will delete the selected folder from the namespace. All child folders will also be deleted. This operation ...
  48. This operation will delete the selected folders from the namespace. All child folders will also be deleted. This operation ...
  49. This operation will delete your index (including custom index locations and excluded locations) and completely re-build the ...
  50. This operation will export the database and create a clone. It can take a long time to complete and any replication will ...
  51. This operation will export the database and create a clone. It can take a long time to complete and any replication will ...
  52. This operation will immediately rebuild the index. Depending upon how many files you have, it can take as long as several ...
  53. This operation will import the database and clone DFSR. It can take a long time to complete. Use Get-DfsrCloneState or DFSR ...
  54. This operation will import the database and clone DFSR. It can take a long time to complete. Use Get-DfsrCloneState or DFSR ...
  55. This operation will make the volume available for use but the data on it may be corrupted or stale. If you have another disk ...
  56. This operation will move all the computer security principals from the Auth2 list of the RODC to the Allow list. Do you wish ...
  57. This operation will move all the security principals from the Auth2 list of the RODC to the Allow list. Do you wish to continue? ...
  58. This operation will move all user security principals from the Auth2 list of the RODC to the Allow list. Do you wish to continue? ...
  59. This operation will perform an authoritative recovery of your cluster. After recovering the cluster database, the Cluster ...
  60. This operation will remove the computer and all of its memberships and connections. Computer: {0} Replication group: "{1} ...
  61. This operation will remove the computer and all of its memberships and connections. Computer: {0} Replication group: "{1}" ...
  62. This operation will remove the connection from the replication group. First computer: {1} Second computer: {2} Replication ...
  63. This operation will remove the connection from the replication group. First computer: {1} Second computer: {2} Replication ...
  64. This operation will remove the namespace server "{0}" from this namespace. If it is the only namespace server of this namespace, ...
  65. This operation will remove the selected folder target from this folder. If this is the last folder target, then the folder ...
  66. This operation will remove the selected folder targets from this folder. If all of the targets are selected, then the folder ...
  67. This operation will set the userIdentifier and/or groupIdentifier attribute of the active directory user/group to the provided ...
  68. This operation will set the userIdentifier and/or groupIdentifier attribute of the active directory user/group to the provided ...
  69. This operation will set the userIdentifier and/or groupIdentifier attribute of the ADLDS user/group to the provided value. ...
  70. This operation will set the userIdentifier and/or groupIdentifier attribute of the ADLDS user/group to the provided value. ...
  71. This operation will stop replicating the replicated folder "{0}" and will delete the replicated folder from the replication ...
  72. This operation will stop sharing the selected shares. Users will no longer be able to access files from these shared folders ...
  73. This option (recommended) reduces management and servicing by installing only what is needed to run most server roles and ...
  74. This option (recommended) reduces management and servicing by installing only what is needed to run most server roles and ...
  75. This option allows authenticated but unencrypted network packets to be sent while encryption is being negotiated. Compatible ...