Windows 8.1

  1. Boot Program Policy: Known client PXE prompt policy: %s New client PXE prompt policy: %s Allow N12 for new clients: %s Reset ...
  2. BOOT SECTOR Boot Sector type applies to entries that contain bootsector in the form of a file. Currently there are no additional ...
  3. Boot-time synchronization of this link was skipped because the source was taking too long returning updates. Another sync ...
  4. Bootcode is only available for FAT, FAT32, and NTFS volumes. A different filesystem appears to be in use on this volume. ...
  5. Bootmgr failed to obtain the BitLocker volume master key from the TPM because Secure Boot configuration changed unexpectedly. ...
  6. bootsect {/help|/nt60|/nt52} {SYS|ALL| :} /force /mbr Boot sector restoration tool Bootsect.exe updates the master boot code ...
  7. bootsect {/help|/nt60|/nt52} {SYS|ALL| :} /force /mbr Boot sector restoration tool Bootsect.exe updates the master boot code ...
  8. Boris RED v2.0 has a known compatibility issue with this version of Windows and might not run as expected. Boris RED 2.0 ...
  9. Both copies of the file have changed. To change the update action, click the file with the right mouse button. To update, ...
  10. Both L2TP and IKEv2 are configured to use a certificate. If a preshared key is currently configured for L2TP/IKEv2 it will ...
  11. Both L2TP and IKEv2 are configured to use a preshared key. Certificates currently configured for L2TP/IKEv2 will be overwritten, ...
  12. Both the "Do not store certificates in the CA database" option on the Server tab and the "Publish certificate in Active Directory" ...
  13. Both the Windows Audio and the Windows Audio End Point Builder services must be running for audio to work correctly. Atleast ...
  14. Both the WS_SECURITY_PROPERTY_ALGORITHM_SUITE_NAME and the WS_SECURITY_PROPERTY_ALGORITHM_SUITE properties were specified. ...
  15. Both this domain and the specified domain This option creates a trust relationship in the local domain and a corresponding ...
  16. Both this domain and the specified domain This option creates trust relationships in both the local and the specified domains. ...
  17. Both Value and SecondValue parameters should not be null for a member of type "{0}". Specify a non-null value for one of ...
  18. Both VssCopyBackup and VssFullBackup cannot be specified. Choose to create VSS full backups if you are not using any other ...
  19. BPA scan on {0} found {1} errors in your system. Open Server Manager, click the Essentials tab, and view additional details ...
  20. BPA scan on {0} found {1} warnings in your system. Open Server Manager, click the Essentials tab, and view additional details ...
  21. BranchCache cannot initialize the local cache at location %1. Error: %2 %3 Possible reasons are that the local cache directory ...
  22. BranchCache cannot publish the content at location %1. Error: %2 %3 This might be because the publication directory location ...
  23. BranchCache cannot publish the content with content-id: %2 because the publication cache size was exceeded or the disk does ...
  24. BranchCache cannot start because another application or service is listening on TCP port %1 (HTTP). BranchCache expects incoming ...
  25. BranchCache Configuration # - pushd BranchCache set service status=%1!s! %2!s! set cachesize size=%3!s! percent=%4!s! set ...
  26. BranchCache enables computers in a branch office to cache files downloaded from this share, and then allows the files to ...
  27. BranchCache for Network Files provides support for BranchCache on this file server. BranchCache is a wide area network (WAN) ...
  28. BranchCache installs the services required to configure this computer as either a hosted cache server or a BranchCache-enabled ...
  29. BranchCache tried to offer content to the Hosted Cache server on %1, but the request timed out. The Hosted Cache server might ...
  30. BranchCache tried to offer content to the Hosted Cache server on %1, but there was an error connecting to the Hosted Cache ...
  31. BranchCache: Hosted cache could not be authenticated using the provisioned SSL certificate. Domain name of the hosted cache: ...
  32. BranchCache: Received an incorrectly formatted response while discovering availability of content. IP address of the client ...
  33. BranchCache: The hosted cache sent an incorrectly formatted response to the client's message to offer it data. Domain name ...
  34. BranchCache: The message to the hosted cache offering it data is incorrectly formatted. IP address of the client that sent ...
  35. BreachDescription is a free-form string providing more information if the SecurityBreach property indicates that a breach ...
  36. Break and Continue statements are not supported in a Windows PowerShell Workflow. Instead, use an 'if' statement to control ...
  37. BREAK READWRITE NOREVERTID BREAK is relevant only for hardware shadow copies after import. The shadow copy disk provided ...
  38. Breaks the mirrored volume with focus into two simple volumes. Syntax: BREAK DISK= NOKEEP NOERR DISK= Specifies a disk that ...
  39. Bridge Adapter %2]: The bridge could not determine the network adapter's link speed. The network adapter will not be used. ...
  40. Bridge Adapter %2]: The bridge could not determine the network adapter's MAC address. The network adapter will not be used. ...
  41. Bridge Adapter %2]: The bridge could not modify the network adapter's packet filter. The network adapter will not function ...
  42. Bridge Adapter %2]: The bridge could not retrieve the network adapter's description string. The network adapter will not ...
  43. Brings selected offline volume to the online state. Syntax: ONLINE VOLUME NOERR NOERR For scripting only. When an error is ...
  44. Brings selected online disk to the offline state. Syntax: OFFLINE DISK NOERR NOERR For scripting only. When an error is encountered, ...
  45. Brings selected online volume to the offline state. Syntax: OFFLINE VOLUME NOERR NOERR For scripting only. When an error ...
  46. Brings the selected offline disk to the online state. Syntax: ONLINE DISK NOERR NOERR For scripting only. When an error is ...
  47. Browse before asking. If you have a common question about a product, chances are good that there is already an answer in ...
  48. Browse for a signed file to use as a reference for the rule. Use the slider to select which properties define the rule; as ...
  49. Browse the library for items to add to your playlist. You can add items by dropping them onto the playlist name in the Navigation ...
  50. Browse the tree in Available items to find the files or folders that you want to recover. Click an item in the tree or under ...
  51. BSS type not allowed - The connection mode setting (any network, infrastructure or ad hoc only) doesn't match the requirements ...
  52. Buffer returns the requested Descriptor information. If the Descriptor does not exist, the contents of the Buffer are undefined. ...
  53. Build Scatter Gather Cycles/sec is the average rate, in cycles per second, at which NDIS processed building Scatter Gather ...
  54. Build Scatter Gather List Calls/sec is the average rate, in incidents per second, at which NDIS received a request from an ...
  55. Build the executable files and drivers for the processor architecture where you want to install them. See links below for ...
  56. Burn files in groups and individual files can't be edited or removed after burning. The disc will also work on most computers. ...
  57. Burns a disc image to a CD, DVD, Blu-ray, or removable drive. The new disc or drive will contain the same folders and files ...
  58. By allowing this RemoteApp program to run with any command-line parameter, your server may be vulnerable to malicious software. ...
  59. By choosing yes, you will have access to the latest online troubleshooters and receive notifications for solutions to known ...
  60. By default all objects in IPAM lie under built-in Global Access Scope. All user defined Access Scopes are children of Global ...
  61. By default the managed DHCP and DNS servers are arranged by their network interface address in /16 subnets for IPv4 and /48 ...
  62. By default, all client computers connected to the server are backed up to the server. When a client computer becomes unavailable, ...
  63. By default, all Cluster Shared Volume paths used by currently selected roles will be copied, along with the underlying storage, ...
  64. By default, CAU checks that only accounts with local administrator privileges have write access to the hotfix root folder ...
  65. By default, clients can receive security updates from Microsoft Update. If additional sources are required for your deployment, ...
  66. By default, clients can receive security updates from Microsoft Update. If additional sources are required for your deployment, ...
  67. By default, connections to wireless networks from your computer can be accessed by anyone with a user account on the computer ...
  68. By default, DirectAccess requires IPsec authentication and encryption between the DirectAccess client and server. In addition, ...
  69. By default, DNS uses the parent domain name when creating a Mail Exchange record. You can specify a host or child name, but ...
  70. By default, most drivers and services that did not come preinstalled with Windows are not started in Safe Mode. They should ...
  71. By default, only share permissions are set on this folder. To control local access permissions to this folder or objects ...
  72. By default, property values that have already been set are ignored during classification. To enable this rule to re-evaluate ...
  73. By default, Remote Desktop clients connect to network resources remotely through port 3389. Specify whether to use port 3389 ...
  74. By default, Remote Desktop Services clients connect to network resources remotely through port 3389, the port used for Remote ...
  75. By default, Room Calibration assumes a directional microphone with unspecified frequency response. Check the box below if ...