Windows 8.1
- To use identity mapping, you must first configure the identity mapping source for this server. The source can be configured ...
- To use Internet Explorer Enhanced Configuration when all other users are logged on, under Users click On (Recommended) . ...
- To use Internet Explorer Enhanced Configuration when members of the local Administrators group are logged on, under Administrators ...
- To use IPsec, both the target and initiator must support it. The Microsoft iSCSI initiator supports IPsec. See your system ...
- To use netgroups for NFS permissions, you must first configure the netgroup source for this server. Configure the source ...
- To use RD Web Access, your computer must be running at least Internet Explorer 6.0 and a version of Remote Desktop Connection ...
- To use Remote Desktop connection authorization policies (RD CAPs) that are stored on a server that is running Network Policy ...
- To use SR-IOV on this computer, the BIOS must be updated because it contains incorrect information describing the hardware ...
- To use SR-IOV on this system, the system BIOS must be updated to allow Windows to control PCI Express. Contact your system ...
- To use storage tiers, the storage pool requires a minimum of one automatically allocated physical disk of each media type ...
- To use System Restore, you must specify which Windows installation to restore. Restart this computer, select an operating ...
- To use the hard drive for storing server folders, click Storage, and then click Server Folders. To use the hard drive for ...
- To use the hard drive for storing server folders, click Storage, and then click Server Folders. To use the hard drive to ...
- To use the hard drive to store server folders, click Storage, and then click Server Folders. To use the hard drive for Server ...
- To use the hard drive to store server folders, click Storage, and then click Server Folders. To use the hard drive for Server ...
- To use the hard drive to store server folders, click Storage, and then click Server Folders. To use the hard drive to increase ...
- To use the Language bar later, check "Show the Language bar on the desktop" in the Language Bar Settings dialog, which you ...
- To use the LUN, you must assign it to a server. You can assign the LUN locally to this server or to a cluster to which this ...
- To use the Persist switch parameter, the drive name must be supported by the operating system (for example, drive letters ...
- To use the product key you entered, start the installation on a computer that is running a genuine version of Windows.%0 ...
- To use these settings, you must be a computer administrator and you must use the bcdedit.exe file. For more information, ...
- To use this application, the URL for Sun's Java must be added to the Trusted Sites zone in Internet Explorer. Adding the ...
- To use this application, you must add the URL of the Biztalk Server to the Local Intranet zone in Internet Explorer. If you ...
- To use this application, you must ensure that the setting that allows browser extensions from companies other than Microsoft ...
- To use this application, you must install it from a CD, or you must add the install point to the Local Intranet zone in Internet ...
- To use this existing file, ensure that it has been copied to the folder %SystemRoot%\system32\dns on this server, and then ...
- To use this method, specify an e-mail recipient address, and on the Receipts tab of the Fax Properties sheet, verify SMTP ...
- To use this program or computer, you must first log on to an authentication website. Contact your network administrator for ...
- To use this program or PC, you must first log on to an authentication website. Contact your network administrator for assistance. ...
- To use this program, you need to install the latest updates for your computer. For information on installing updates, see ...
- To use this service, you must review and accept the following privacy statement and agreement. If you use this service, your ...
- To use this Web site, your computer must be running the Remote Desktop Connection (RDC) client. To continue, install the ...
- To use two-pass encoding, you must enable device control and setup an edit decision list (EDL) that has at least one entry.%0 ...
- To use, specify the same name and CHAP secret that was configured on the target for this initiator. The name will default ...
- To validate a set of servers, add the names of all the servers. To test an existing cluster, add the name of the cluster ...
- To verify the current multicast scope and optionally fix database. Repairs if necessary. Syntax: initiate reconcile Notes: ...
- To view a picture slide show, Microsoft Silverlight 4 or later must be installed on your computer. Click the link to install ...
- To view a video, Microsoft Silverlight 4 or later must be installed on your computer. Click the link to install the latest ...
- To view an attachment spread across multiple messages in a newsgroup, select the messages while holding down the Ctrl key. ...
- To view closed captions in Media Center Extender, enable closed captions (or subtitles) using the controls on your display. ...
- To view content on other homegroup computers, those computers must be turned on, on the same private network, and sharing ...
- To view details about a specific license server, you need administrator privileges on the license server. If the License ...
- To view events that have occurred on your computer, select the appropriate source, log or custom view node in the console ...
- To view information on the WINS server, you must either be a member of the WINS Users group or an administrator on the WINS ...
- To view or create Office 365 accounts for network users, go to the Users tab under the Users tab. To view or create distribution ...
- To view or install a certificate, select the certificate that you want to, and then click View Certificate. To import a certificate ...
- To view purchase information about the media you have selected, you must change your Privacy settings in Tools, Options. ...
- To view the repair results: 1. Open the Dashboard 2. Click Devices. 3. Click Client computer backup tasks. 4. Click Tools, ...
- To watch or record Pay-Per-View, follow the directions on the screen. You may also need to contact your TV service provider. ...
- To watch or record Pay-Per-View, follow the directions on the screen. You may need to use the remote control for your set-top ...
- To work with subscriptions, the Windows Event Collector Service must be running and configured. Do you want to start the ...
- to4: Configuring interface %1 with following parameters: ICS PrivateInterface = %2 AdvertiseDefaultRoute = %3 Advertises ...
- Toggle Keys causes a tone to sound when you press the CAPS LOCK, NUM LOCK, or SCROLL LOCK keys. The keyboard shortcut to ...
- Tombstones: Written = %1!10lu! Read = %2!10lu! Deleted = %3!10lu! Write Performance: Total = %4!10lu! Total Time = %5!10lu! ...
- Too many apps are running in the background. You'll need to stop an app before %s can run in the background and stay up to ...
- Too many concurrent static initializations are occurring. The number of such initializations currently active is given in ...
- Too many files are opened on a remote server. This error should only be returned by the Windows redirector on a remote drive. ...
- Too many other files are currently in use by 16-bit programs. Exit one or more 16-bit programs, or increase the value of ...
- Too many programs were found with the keyword {0}, so none of these programs will be recorded. The record settings for {0} ...
- Too many repair events have occurred in a short period of time. Temporarily suspending posting of further repair events. ...
- Too many simultaneous connections to the RD Gateway server can degrade server performance. To avoid degrading server performance, ...
- Too many USB hubs are connected together. A USB hub will not function when it's connected more than 5 hubs away from the ...
- Tools to record system events by using Event Tracing for Windows, and a tool to analyze performance data in a graphical user ...
- Top Directory Search returning {result} objects. Consider the use of paged searches or setting the maximum objects read per ...
- Top directory search visited {result} objects and consumed {cpu} percent CPU. The search may need a new index or an adjusted ...
- TOPICS IN THIS HELP FILE To display help for a topic, run "bcdedit /? " where is one of the following: bootdebug /bootdebug ...
- Total Bytes Received shows the total number of bytes received on the connection. The bytes received value includes file data ...
- Total bytes sent or received by '%1' is larger than what can fit inside of a 64-bit integer. Record and then reset the metric ...
- Total Bytes/sec is the rate the Server is reading and writing data to and from the files for the clients on this CPU. This ...
- Total DPC Rate is the combined rate at which deferred procedure calls (DPCs) are added to the DPC queues of all processors ...
- Total DPC Time is the average percentage of time that all processors spend receiving and servicing deferred procedure calls ...
- Total DPCs Queued/sec is the combined rate at which deferred procedure calls (DPCs) are added to the DPC queue of all processors ...
- Total Inbound Packets Dropped is the total number of inbound packets dropped by IPsec, since the computer was last started. ...
- Total Inbound Packets Received is the total number of inbound packets successfully processed by IPsec, since the computer ...
- Total Interrupt Time is the average percentage of time that all processors spend receiving and servicing hardware interrupts ...