Windows 8.1

  1. This server is not configured. To configure this server, right-click the server, and then click Configure Server. You must ...
  2. This server is the owner of the following FSMO role, but does not consider it valid. For the partition which contains the ...
  3. This server is the owner of the following FSMO role, but does not consider it valid. For the partition which contains the ...
  4. This server may not be registered in a domain for which this operation is supported. Alternatively, you may not have permissions ...
  5. This server only has an IPv4 address on the external adapter, but the server cluster has an IPv6 address on the external ...
  6. This server only has an IPv4 address on the external adapter. Other servers in the cluster have only IPv6 addresses on the ...
  7. This server only has an IPv4 address on the internal adapter, but the server cluster has an IPv6 address on the internal ...
  8. This server only has an IPv4 address on the internal adapter. Other servers in the cluster have only IPv6 addresses on the ...
  9. This server only has an IPv6 address on the external adapter, but the server cluster has an IPv4 address on the external ...
  10. This server only has an IPv6 address on the external adapter. Other servers in the cluster have only IPv4 addresses on the ...
  11. This server only has an IPv6 address on the internal adapter, but the server cluster has an IPv4 address on the internal ...
  12. This server only has an IPv6 address on the internal adapter. Other servers in the cluster have only IPv4 addresses on the ...
  13. This server was unable to find the minimum specified number of connections to Active Directory Domain Services (AD DS) global ...
  14. This service caused a delay during hybrid-sleep: File Name : %3 Friendly Name : %5 Version : %7 Total Time : %8ms Degradation ...
  15. This service caused a delay in the system shutdown process: File Name : %3 Friendly Name : %5 Version : %7 Total Time : %8ms ...
  16. This service contains catalog and content sync to allow download metadata and binaries of update packages to the WSUS. This ...
  17. This service contains catalog and content sync to allow download metadata and binaries of update packages to the WSUS. This ...
  18. This service delivers network notifications (e.g. interface addition/deleting etc) to user mode clients. Stopping this service ...
  19. This service enforces legacy IPsec policies created through the IP Security Policies snap-in or the command-line tool "netsh ...
  20. This service hosts the DS Role Server used for DC promotion, demotion, and cloning. If this service is disabled, these operations ...
  21. This service implements the hypertext transfer protocol (HTTP). If this service is disabled, any services that explicitly ...
  22. This service is a stub for Windows Parental Control functionality that existed in Vista. It is provided for backward compatibility ...
  23. This service is responsible for loading and unloading user profiles. If this service is stopped or disabled, users will no ...
  24. This service is used to protect data through the Group Data Protection API. It is also used to support a number of system ...
  25. This service logs unique client access requests, in the form of IP addresses and user names, of installed products and roles ...
  26. This service manages events and event logs. It supports logging events, querying events, subscribing to events, archiving ...
  27. This service manages mobile broadband (GSM CDMA) data card/embedded module adapters and connections by auto-configuring the ...
  28. This service manages persistent subscriptions to events from remote sources that support WS-Management protocol. This includes ...
  29. This service manages the certificates used by Windows Server Update Services Server, such as create certificates, sign cab ...
  30. This service opens custom printer dialog boxes and handles notifications from a remote print server or a printer. If you ...
  31. This service performs IEEE 802.1X authentication on Ethernet interfaces. The Wired AutoConfig (dot3svc) Service is responsible ...
  32. This service performs networking tasks associated with configuration and maintenance in homegroups. In order to view the ...
  33. This service profile installs an L2TP/IPsec connection that requires a preshared key. Your current system configuration does ...
  34. This service profile installs an L2TP/IPsec connection that requires a preshared key. Your current system configuration does ...
  35. This service provides a Web Service interface to instances of the directory service (AD DS and AD LDS) that are running locally ...
  36. This service provides support for the Program Compatibility Assistant (PCA). PCA monitors programs installed and run by the ...
  37. This service provides support for viewing, sending and deletion of system-level problem reports for the Problem Reports and ...
  38. This service provides the ability to discover, manage, and monitor storage devices using management interfaces that conform ...
  39. This service publishes a machine name using the Peer Name Resolution Protocol. Configuration is managed via the netsh context ...
  40. This service publishes a machine name using the Peer Name Resolution Protocol. Configuration is managed via the netsh context ...
  41. This service runs in the same process as the service control manager. Therefore, the service control manager cannot take ...
  42. This service spools print jobs and handles interaction with the printer. If you turn off this service, you won't be able ...
  43. This service syncs files with the Work Folders server, enabling you to use the files on any of the PCs and devices on which ...
  44. This service, running on domain controllers, enables users to log on to the network using the Kerberos authentication protocol. ...
  45. This services monitors the current location of the system and manages geo-fences (a geographical location with associated ...
  46. This session '{0}' has Remote Debugging turned on. Remote debugging is not supported in Windows PowerShell Web Access. Use ...
  47. This setting allows you to audit the results of access requests to target resources without affecting the current system. ...
  48. This setting allows you to enable or disable randomization of the scheduled scan start time and the scheduled definition ...
  49. This setting cannot be enabled because the listener settings have been deleted. Use Remote Desktop Session Host Configuration ...
  50. This setting is not compatible with computers running Windows 2000 Service Pack 1 or earlier. Apply Group Policy objects ...
  51. This setting is used by Credential Manager during Backup/Restore. No accounts should have this privilege, as it is only assigned ...
  52. This setting puts clustered roles (including virtual machines) in priority order, so that higher priority roles can be started ...
  53. This share is required for the machine to act properly as a domain controller. Removing it will cause a loss of functionality ...
  54. This share is required for the machine to act properly as a domain controller. Removing it will cause a loss of functionality ...
  55. This share is required for the machine to act properly as a domain controller. Removing it will cause a loss of functionality ...
  56. This share was created for administrative purposes only. The share will reappear when the Server service is stopped and restarted ...
  57. This share was created for administrative purposes only. The share will reappear when the Server service is stopped and restarted ...
  58. This share was created for administrative purposes only. The share will reappear when the Server service is stopped and restarted ...
  59. This shared folder is on a highly available volume, so it is accessed as a highly available shared folder. To access the ...
  60. This shim causes the process to which it is applied to try to relaunch itself as an elevated user. It is intended to be used ...
  61. This shim fails calls to RemoveDirectory() when called with a path matching the one specified in the shim command-line. Only ...
  62. This shim hooks MoveFileA and MoveFileW API mostly used by set ups and instead copies the file. Using copy will avoid moving ...
  63. This shim is to fix applications that request the default audio device but are better suited for the default communications ...
  64. This shim is written for the applications which are installing a service which had dependency on some service in the OS which ...
  65. This shim will hook calls to RtlReportException and return Status_Not_Supported. This in effect will turn off the silent ...
  66. This shim will strip out specified flags from the lpFileSystemFlags parameter on the return from GetVolumeInformationA/W. ...
  67. This shutdown was initiated by the legacy API InitiateSystemShutdown. For full shutdown information applications should use ...
  68. This site is requesting a password or a personal certificate. Do you want to connect to this site using your personal credentials? ...
  69. This smart card could not be used. Additional details may be available in the system event log. Please report this error ...
  70. This snap-in allows you to edit Group Policy Objects which can be linked to a Site, Domain, or Organizational Unit in Active ...
  71. This snap-in allows you to view the Resultant Set of Policy for a user on a computer. The snap-in can be used to view policy ...
  72. This snap-in console file (%1) was saved with an earlier version of Microsoft Management Console (MMC). Do you want to update ...
  73. This snap-in console file (%1) was saved with an earlier version of Microsoft Management Console (MMC). Do you want to update ...
  74. This snap-in hosts extension snap-ins that are used for managing highly available cluster roles and features. Do not add ...
  75. This snap-in is not responding. To return to MMC and check the status of the snap-in, click Cancel. If you choose to end ...