Windows 7

  1. Complete the logon process Start your web browser to view the sign-up page, and then follow the instructions to connect to ...
  2. Completing this wizard will delete all existing settings and security attributes in this GPO and replace them with the backup's ...
  3. Completing this wizard will delete all existing settings and security attributes in this Starter GPO and replace them with ...
  4. Completion is invoked when you type either of the two control characters. The completion function takes the path string to ...
  5. Complex networking devices often are chassis-based. These chassis allow for enhancement and/or augmentation of their base ...
  6. Component "%1" from writer "%2" is excluded from backup because it requires a volume that cannot be found on this system. ...
  7. Component "%1" from writer "%2" is excluded from backup, because it requires volume %3 which is not in the shadow copy set. ...
  8. Component '%1' setup failed to queue an operation for completion on the next computer restart. This is most likely due to ...
  9. Component Services (COM+ 1.0) are not installed on this computer. This installation requires Component Services in order ...
  10. Compose a new e-mail message by clicking New Mail on the toolbar. Reply to a message by selecting a message and clicking ...
  11. Compressed (LZH) Folders was unable to create the specified directory. Ensure that the directory does not already exist, ...
  12. Compressed (zipped) Folders was unable to create the specified directory. Ensure that the directory does not already exist, ...
  13. Compressed, image, and archive format files that contain other files, such as .zip, .cab, .iso, .wim, and .vhd. This category ...
  14. Compresses and decompresses audio data conforming to the ETSI-GSM (European Telecommunications Standards Institute-Groupe ...
  15. Compression can add to the processing overhead of filesystem operations. Enabling this setting will prevent access to and ...
  16. Computer ({0}) cannot be managed because it is running an operating system which is not supported by Share and Storage Management. ...
  17. Computer Account Changed: %1 Target Account Name: %2 Target Domain: %3 Target Account ID: %4 Caller User Name: %5 Caller ...
  18. Computer Account Created: New Account Name: %1 New Domain: %2 New Account ID: %3 Caller User Name: %4 Caller Domain: %5 Caller ...
  19. Computer Account Deleted: Target Account Name: %1 Target Domain: %2 Target Account ID: %3 Caller User Name: %4 Caller Domain: ...
  20. Computer Account Management This policy setting allows you to audit events generated by changes to computer accounts such ...
  21. Computer Control Panel settings configure options that are manually configurable via the Windows Control Panel and affect ...
  22. Computer is booting, SAC started and initialized. Use the "ch -?" command for information about using channels. Use the "?" ...
  23. Computer name %2 is not a valid computer name. It may contain illegal characters. Standard names contain letters (a-z, A-Z), ...
  24. Computer object %1 is already assigned to server %2 in site %3. Are you sure you want to change it to reference the new server ...
  25. Computer \%1 cannot be managed because the computer was not found on the network. It may be powered down or otherwise not ...
  26. Computer \%1 cannot be managed because the network is unreachable. Verify that your network cabling is securely attached. ...
  27. Computer \%1 cannot be managed. %2 Choose 'Connect to another computer' from the Action menu to manage a different computer. ...
  28. Computers running Windows 2000 Service Pack 4 or earlier must have clocks within 30 minutes of the selected server's clock. ...
  29. Computers that are running any version of the Remote Desktop Connection client can connect to this RD Session Host server. ...
  30. Computers will connect to this instance of AD LDS using specific ports on all of the IP addresses associated with this computer. ...
  31. Conditional forwarders are DNS servers that this server can use to resolve DNS queries for records in a specific domain. ...
  32. Config file expects {0} parameter's name in method '{1}', to be '{2}'. Same method in Test assembly has name '{3}'. Please ...
  33. ConfigChange If true, an event log entry is generated when an application pool recycles due to a change in its configuration. ...
  34. ConfigString Server\CertificationAuthority or for an https: connection: Enrollment Server URL or use a single minus sign ...
  35. Configuration APIs enable applications that are built using the .NET Framework to configure Windows Process Activation Model ...
  36. Configuration changes have been made to the system registry; however, the user session now active on the {0} connection will ...
  37. Configuration changes have been made to the system registry; however, the user sessions now active on the {0} connection ...
  38. Configuration completed successfully, but some server properties were not updated. Update these settings using Server properties ...
  39. Configuration completed. Microsoft Cluster Service is also installed on this machine, and this may prevent the proper operation ...
  40. Configuration directory %2 is missing, and disaster recovery must be performed. If there are existing indexes, they must ...
  41. Configuration error. Verify the device is configured correctly and the required certificates are available on the system. ...
  42. Configuration Error: This workstation's boot partition is not on the same partition as the system root. This product currently ...
  43. Configuration file syntax: Generic properties: Notification=NOTIFY_TYPE Must be the first line in the file. NOTIFY_TYPE is ...
  44. Configuration files and encryption keys already exist in the specified path. Do you want to overwrite with local files and ...
  45. Configuration for this non-standard map already exists. Old Key field number = '%1', Field separator = '%2', New Key field ...
  46. Configuration has changed. If this is an unexpected event you should review the settings as this may be the result of malware. ...
  47. Configuration information could not be read from the domain controller, either because the machine is unavailable, or access ...
  48. Configuration information relating to Telephony services appears to be corrupt. Please check the configuration of telephone ...
  49. Configuration of or installation to disks connected through iSCSI is only supported when Windows installation is started ...
  50. Configuration of security log for this session: Maximum Log Size (KB): %1 Action to take on reaching max log size: %2 Event ...
  51. Configuration path or url at which the configuration should be cleared. If not specified, defaults to server level configuration ...
  52. Configuration path or url at which the configuration should be locked. If not specified, defaults to server level configuration ...
  53. Configuration path or url at which the configuration should be migrated. If not specified, defaults to server level configuration ...
  54. Configuration path or url at which the configuration should be unlocked. If not specified, defaults to server level configuration ...
  55. Configuration path or url for under which the search is performed. If not specified, defaults to server level configuration ...
  56. Configuration settings indicate that this Active Directory Domain Controller should be installed in site %1, but this site ...
  57. Configuration settings indicate that this Active Directory Lightweight Directory Services instance should be installed in ...
  58. Configuration settings indicate that this Read-only Domain Controller should be installed in site %1, but this site doesn't ...
  59. Configuration setup for live migration failed on the destination node. Make sure that name of the virtual network is the ...
  60. Configuration took place on this machine which requires a restart to complete. Please restart the system before doing further ...
  61. configuration. The parameter of is . The service cannot recover from this error and will disable the in question until the ...
  62. Configure a license server for the Remote Desktop Session Host server. If you have an existing license server, use RD Session ...
  63. Configure a license server for the Remote Desktop Session Host server. If you have an existing license server, use RD Session ...
  64. Configure a Registry preference item for the registry value "{0}" in the "{1}" GPO in the {2} domain. {3}. Set the value ...
  65. Configure a Registry preference item for the registry value "{0}" in the GPO with ID {1} in the {2} domain. {3}. Set the ...
  66. Configure a registry-based policy setting for a list of registry values under the key "{0}" for the "{1}" GPO in the {2} ...
  67. Configure a registry-based policy setting for a list of registry values under the key "{0}" for the GPO with Id "{1}" in ...
  68. Configure a registry-based policy setting for the key "{0}" for the "{1}" GPO in the {2} domain. This setting will delete ...
  69. Configure a registry-based policy setting for the key "{0}" for the GPO with ID "{1}" in the {2} domain. This setting will ...
  70. Configure a registry-based policy setting for the registry value "{0}" for the "{1}" GPO in the {2} domain. Set the type ...
  71. Configure a registry-based policy setting for the registry value "{0}" for the "{1}" GPO in the {2} domain. This setting ...
  72. Configure a registry-based policy setting for the registry value "{0}" for the GPO with ID "{1}" in the {2} domain. Set the ...
  73. Configure a registry-based policy setting for the registry value "{0}" for the GPO with ID "{1}" in the {2} domain. This ...
  74. Configure a static IP address on the "%InterfaceName%" adapter Windows can't detect the settings for the network adapter. ...
  75. Configure access to all removable storage classes. This policy setting takes precedence over any individual removable storage ...