Windows 8.1

  1. When Remote Access is deployed in multiple domains, it is recommended to use FQDNs to ensure consistent name resolution, ...
  2. When Remote Access is deployed with a single network adapter, specify virtual IP (VIP) addresses and dedicated IP (DIP) addresses ...
  3. When replying to a message in a newsgroup, first select the message to which you're replying. Then click Reply Group to post ...
  4. When restoring a system image from this volume, the disks on your computer cannot be formatted to match the layout of the ...
  5. When RunAs is enabled in a Windows PowerShell session configuration, the Windows security model cannot enforce a security ...
  6. When scheduling a daily synchronization from Microsoft Update, the synchronization start time will have a random offset up ...
  7. When searching for a control, Internet Explorer will first try the location specified in the CODEBASE attribute of the HTML ...
  8. When selected, all prestaged devices in the forest are displayed. When unselected, only prestaged devices in the local domain ...
  9. When set to true, AM Service will not initiate definition update on start-up, regardless of whether an Engine is present ...
  10. When set, Windows Defender will check for new signatures before running a scan. If new signatures are found they will be ...
  11. When several bus and/or connection data widths are possible, the NegotiatedDataWidth property defines the one in use between ...
  12. When several bus and/or connection speeds are possible, the NegotiatedSpeed property defines the one in use between the devices. ...
  13. When shutting down, the virtual machine management service timed out waiting for a pending VM preservation operation to complete. ...
  14. When signed in as administrator, you can let users control how apps use their location and help Microsoft improve its location ...
  15. When snapshot volume %1 was restarted in the system, the restart failed. The volume is no longer found in the system. Try ...
  16. When software (an ActiveX control) is signed, it is possible to tell who published it. Do you want to allow signed software ...
  17. When specifying channel property 'WS_CHANNEL_PROPERTY_HTTP_PROXY_SETTING_MODE' to 'WS_HTTP_PROXY_SETTING_MODE_CUSTOM', channel ...
  18. When specifying multiple certificate authentication proposals, all the certificate proposals with the same signing method ...
  19. When specifying the executable that you want to trace, you must specify a full path to the executable and not just a filename. ...
  20. When specifying tunnel endpoints in both IPv4 and IPv6, a tunnel endpoint may not be dynamic for one address family and explicit ...
  21. When starting a VM preservation operation, a save of the virtual machine '%1' could not be initiated: %3 (%4). (Virtual machine ...
  22. When sufficient hardware resources are not available, the security associations are not offloaded and are handled in software ...
  23. When the cluster starts and this setting is enabled, the clustered role will be restarted on the last node on which it was ...
  24. When the clusterResourceGroupName parameter is null, so must be the clusterResourceName and clusterNetworkNames parameters. ...
  25. When the clusterResourceGroupName parameter is null, the clusterResourceName and clusterNetworkNames parameters must also ...
  26. When the ConfigurationChangesPollingIntervalSec value is high, any changes that you make are not propagated in a timely manner, ...
  27. When the Copy Cluster Roles Wizard was run, it could not access all the nodes in the new cluster. This means that duplicate ...
  28. When the installation has ended (successfully or not), please click the Finish button or the Cancel button. DO NOT CLICK ...
  29. When the job is executing or has terminated without error, then this method returns no CIM_Error instance. However, if the ...
  30. When the media access device supports multiple individual media, this property defines the maximum number which can be supported ...
  31. When the Print Spooler service isn't running, you may not be able to install printers, connect to a network printer, or print ...
  32. When the Remote Access server is configured with two network adapters, the internal and external adapters should be configured ...
  33. When the runspace is set to use the current thread, the apartment state in the invocation settings must match that of the ...
  34. When the schema master role and the domain naming master role are held by the same domain controller, administration of these ...
  35. When the system time is set incorrectly, features that rely on time measurement such as Product Activation, malware scanners, ...
  36. When the user clicks Help in the browser menu bar, and then clicks Online Support, the user navigates to the URL you specify ...
  37. When the value of property {0} is removed, the value of its related property {1} will be removed also. Are you sure you want ...
  38. When the Windows Search service is forcibly shut down while performing maintenance, searches might fail or return incomplete ...
  39. When there is no activity on a Remote Web Access page for {0} minutes, it becomes inactive. To continue browsing Remote Web ...
  40. When this backup was created, only selected files or folders from volume {0} were included in the backup. If you continue, ...
  41. When this backup was created, only selected files or folders from volumes ({0}) were included in the backup. If you proceed, ...
  42. When this check box is selected, this app will alert all users if spyware or other potentially unwanted software attempts ...
  43. When this computer discards an incomplete data transmission because the entire transmission required more time than allowed, ...
  44. When this computer discards an incomplete data transmission because the entire transmission required more time than allowed, ...
  45. When this computer discards data it has received due to a problematic header, it will reply to the sender with a "bad header" ...
  46. When this computer discards data it has received due to a problematic header, it will reply to the sender with a bad header ...
  47. When this computer's ability to process incoming data cannot keep up with the rate of a transmission, data will be dropped ...
  48. When this network is disconnected, you can't reach network devices and resources. However, your system administrator can ...
  49. When this option is cleared, a team created in the guest operating system will lose connectivity if one of the physical network ...
  50. When this parameter is specified the cmdlet returns the Remote Access RADIUS server object representing the RADIUS server ...
  51. When this setting is enabled, the DFS Namespace server will use fully qualified domain names (FQDN) in referrals. When this ...
  52. When this setting is enabled, this clustered role will automatically be started when the cluster is started. To prevent automatic ...
  53. When trying to update a password, this return status indicates that the value provided as the current password is not correct. ...
  54. When trying to update a password, this return status indicates that the value provided for the new password contains values ...
  55. When trying to update a password, this status indicates that some password update rule has been violated. For example, the ...
  56. When users can define the subject alternate name to be included within a certificate, they can specify an identity other ...
  57. When using a cascading RealTimeStylus configuration, the parent RealTimeStylus object must be created with a valid control ...
  58. When using both AH and ESP protocols in a qmsecmethods proposal, the same integrity value must be used for both protocols. ...
  59. When using Enterprise Certification Authorities, both Authenticated and Anonymous certificate templates need to be set at ...
  60. When using fixed provisioning and storage layouts other than simple, the virtual disk consumes more free space than the size ...
  61. When using the cmdlet New-Item to create a new rights template, the optional parameter "name" and its value "{0}" are not ...
  62. When using the Mastered format, you can only burn once to this kind of disc. If you want to add files to this disc more than ...
  63. When using thin provisioning, you can create a virtual disk that is larger than the amount of free space in the storage pool. ...
  64. When using this command, do not specify both the /PackagePath and /PackageName options. Re-enter the command, specifying ...
  65. When using WS_SSL_TRANSPORT_SECURITY_BINDING on the server, localCertCredential must be NULL. The server certificate must ...
  66. When using your IMAP account, does it take a while for changes made on one computer to show up on another computer? To resynchronize ...
  67. When viewing or setting load balance policies with the '-d' switch, the MPIO disk number is used to address the disk. For ...
  68. When Windows detects that an application has operated in an incompatible manner, it applies a compatibility fix that causes ...
  69. When WINS replicated with its partners, one of the partners showed there was more data that actually existed. WINS adjusted ...
  70. When working offline on a slow connection, you can work online again by pressing the "Work online" button in File Explorer. ...
  71. When you activate this user account, the {0} account that is assigned to it will also be activated if a license is available. ...
  72. When you apply a template to existing file screens, the current properties of the template overwrite all properties of the ...
  73. When you apply a template to existing quotas, the current properties of the template overwrite all properties of the quotas. ...
  74. When you apply an auto apply quota to existing quotas, the current auto apply quota template properties overwrite all properties ...
  75. When you are prompted for the credentials to connect to your server, type Administrator in the User Name text box, and then ...