Windows 8.1

  1. To use identity mapping, you must first configure the identity mapping source for this server. The source can be configured ...
  2. To use Internet Explorer Enhanced Configuration when all other users are logged on, under Users click On (Recommended) . ...
  3. To use Internet Explorer Enhanced Configuration when members of the local Administrators group are logged on, under Administrators ...
  4. To use IPsec, both the target and initiator must support it. The Microsoft iSCSI initiator supports IPsec. See your system ...
  5. To use netgroups for NFS permissions, you must first configure the netgroup source for this server. Configure the source ...
  6. To use RD Web Access, your computer must be running at least Internet Explorer 6.0 and a version of Remote Desktop Connection ...
  7. To use Remote Desktop connection authorization policies (RD CAPs) that are stored on a server that is running Network Policy ...
  8. To use SR-IOV on this computer, the BIOS must be updated because it contains incorrect information describing the hardware ...
  9. To use SR-IOV on this system, the system BIOS must be updated to allow Windows to control PCI Express. Contact your system ...
  10. To use storage tiers, the storage pool requires a minimum of one automatically allocated physical disk of each media type ...
  11. To use System Restore, you must specify which Windows installation to restore. Restart this computer, select an operating ...
  12. To use the hard drive for storing server folders, click Storage, and then click Server Folders. To use the hard drive for ...
  13. To use the hard drive for storing server folders, click Storage, and then click Server Folders. To use the hard drive to ...
  14. To use the hard drive to store server folders, click Storage, and then click Server Folders. To use the hard drive for Server ...
  15. To use the hard drive to store server folders, click Storage, and then click Server Folders. To use the hard drive for Server ...
  16. To use the hard drive to store server folders, click Storage, and then click Server Folders. To use the hard drive to increase ...
  17. To use the Language bar later, check "Show the Language bar on the desktop" in the Language Bar Settings dialog, which you ...
  18. To use the LUN, you must assign it to a server. You can assign the LUN locally to this server or to a cluster to which this ...
  19. To use the Persist switch parameter, the drive name must be supported by the operating system (for example, drive letters ...
  20. To use the product key you entered, start the installation on a computer that is running a genuine version of Windows.%0 ...
  21. To use these settings, you must be a computer administrator and you must use the bcdedit.exe file. For more information, ...
  22. To use this application, the URL for Sun's Java must be added to the Trusted Sites zone in Internet Explorer. Adding the ...
  23. To use this application, you must add the URL of the Biztalk Server to the Local Intranet zone in Internet Explorer. If you ...
  24. To use this application, you must ensure that the setting that allows browser extensions from companies other than Microsoft ...
  25. To use this application, you must install it from a CD, or you must add the install point to the Local Intranet zone in Internet ...
  26. To use this existing file, ensure that it has been copied to the folder %SystemRoot%\system32\dns on this server, and then ...
  27. To use this method, specify an e-mail recipient address, and on the Receipts tab of the Fax Properties sheet, verify SMTP ...
  28. To use this program or computer, you must first log on to an authentication website. Contact your network administrator for ...
  29. To use this program or PC, you must first log on to an authentication website. Contact your network administrator for assistance. ...
  30. To use this program, you need to install the latest updates for your computer. For information on installing updates, see ...
  31. To use this service, you must review and accept the following privacy statement and agreement. If you use this service, your ...
  32. To use this Web site, your computer must be running the Remote Desktop Connection (RDC) client. To continue, install the ...
  33. To use two-pass encoding, you must enable device control and setup an edit decision list (EDL) that has at least one entry.%0 ...
  34. To use, specify the same name and CHAP secret that was configured on the target for this initiator. The name will default ...
  35. To validate a set of servers, add the names of all the servers. To test an existing cluster, add the name of the cluster ...
  36. To verify the current multicast scope and optionally fix database. Repairs if necessary. Syntax: initiate reconcile Notes: ...
  37. To view a picture slide show, Microsoft Silverlight 4 or later must be installed on your computer. Click the link to install ...
  38. To view a video, Microsoft Silverlight 4 or later must be installed on your computer. Click the link to install the latest ...
  39. To view an attachment spread across multiple messages in a newsgroup, select the messages while holding down the Ctrl key. ...
  40. To view closed captions in Media Center Extender, enable closed captions (or subtitles) using the controls on your display. ...
  41. To view content on other homegroup computers, those computers must be turned on, on the same private network, and sharing ...
  42. To view details about a specific license server, you need administrator privileges on the license server. If the License ...
  43. To view events that have occurred on your computer, select the appropriate source, log or custom view node in the console ...
  44. To view information on the WINS server, you must either be a member of the WINS Users group or an administrator on the WINS ...
  45. To view or create Office 365 accounts for network users, go to the Users tab under the Users tab. To view or create distribution ...
  46. To view or install a certificate, select the certificate that you want to, and then click View Certificate. To import a certificate ...
  47. To view purchase information about the media you have selected, you must change your Privacy settings in Tools, Options. ...
  48. To view the repair results: 1. Open the Dashboard 2. Click Devices. 3. Click Client computer backup tasks. 4. Click Tools, ...
  49. To watch or record Pay-Per-View, follow the directions on the screen. You may also need to contact your TV service provider. ...
  50. To watch or record Pay-Per-View, follow the directions on the screen. You may need to use the remote control for your set-top ...
  51. To work with subscriptions, the Windows Event Collector Service must be running and configured. Do you want to start the ...
  52. to4: Configuring interface %1 with following parameters: ICS PrivateInterface = %2 AdvertiseDefaultRoute = %3 Advertises ...
  53. Toggle Keys causes a tone to sound when you press the CAPS LOCK, NUM LOCK, or SCROLL LOCK keys. The keyboard shortcut to ...
  54. Tombstones: Written = %1!10lu! Read = %2!10lu! Deleted = %3!10lu! Write Performance: Total = %4!10lu! Total Time = %5!10lu! ...
  55. Too many apps are running in the background. You'll need to stop an app before %s can run in the background and stay up to ...
  56. Too many concurrent static initializations are occurring. The number of such initializations currently active is given in ...
  57. Too many files are opened on a remote server. This error should only be returned by the Windows redirector on a remote drive. ...
  58. Too many other files are currently in use by 16-bit programs. Exit one or more 16-bit programs, or increase the value of ...
  59. Too many programs were found with the keyword {0}, so none of these programs will be recorded. The record settings for {0} ...
  60. Too many repair events have occurred in a short period of time. Temporarily suspending posting of further repair events. ...
  61. Too many simultaneous connections to the RD Gateway server can degrade server performance. To avoid degrading server performance, ...
  62. Too many USB hubs are connected together. A USB hub will not function when it's connected more than 5 hubs away from the ...
  63. Tools to record system events by using Event Tracing for Windows, and a tool to analyze performance data in a graphical user ...
  64. Top Directory Search returning {result} objects. Consider the use of paged searches or setting the maximum objects read per ...
  65. Top directory search visited {result} objects and consumed {cpu} percent CPU. The search may need a new index or an adjusted ...
  66. TOPICS IN THIS HELP FILE To display help for a topic, run "bcdedit /? " where is one of the following: bootdebug /bootdebug ...
  67. Total Bytes Received shows the total number of bytes received on the connection. The bytes received value includes file data ...
  68. Total bytes sent or received by '%1' is larger than what can fit inside of a 64-bit integer. Record and then reset the metric ...
  69. Total Bytes/sec is the rate the Server is reading and writing data to and from the files for the clients on this CPU. This ...
  70. Total DPC Rate is the combined rate at which deferred procedure calls (DPCs) are added to the DPC queues of all processors ...
  71. Total DPC Time is the average percentage of time that all processors spend receiving and servicing deferred procedure calls ...
  72. Total DPCs Queued/sec is the combined rate at which deferred procedure calls (DPCs) are added to the DPC queue of all processors ...
  73. Total Inbound Packets Dropped is the total number of inbound packets dropped by IPsec, since the computer was last started. ...
  74. Total Inbound Packets Received is the total number of inbound packets successfully processed by IPsec, since the computer ...
  75. Total Interrupt Time is the average percentage of time that all processors spend receiving and servicing hardware interrupts ...