Windows 7
- Complete the logon process Start your web browser to view the sign-up page, and then follow the instructions to connect to ...
- Completing this wizard will delete all existing settings and security attributes in this GPO and replace them with the backup's ...
- Completing this wizard will delete all existing settings and security attributes in this Starter GPO and replace them with ...
- Completion is invoked when you type either of the two control characters. The completion function takes the path string to ...
- Complex networking devices often are chassis-based. These chassis allow for enhancement and/or augmentation of their base ...
- Component "%1" from writer "%2" is excluded from backup because it requires a volume that cannot be found on this system. ...
- Component "%1" from writer "%2" is excluded from backup, because it requires volume %3 which is not in the shadow copy set. ...
- Component '%1' setup failed to queue an operation for completion on the next computer restart. This is most likely due to ...
- Component Services (COM+ 1.0) are not installed on this computer. This installation requires Component Services in order ...
- Compose a new e-mail message by clicking New Mail on the toolbar. Reply to a message by selecting a message and clicking ...
- Compressed (LZH) Folders was unable to create the specified directory. Ensure that the directory does not already exist, ...
- Compressed (zipped) Folders was unable to create the specified directory. Ensure that the directory does not already exist, ...
- Compressed, image, and archive format files that contain other files, such as .zip, .cab, .iso, .wim, and .vhd. This category ...
- Compresses and decompresses audio data conforming to the ETSI-GSM (European Telecommunications Standards Institute-Groupe ...
- Compression can add to the processing overhead of filesystem operations. Enabling this setting will prevent access to and ...
- Computer ({0}) cannot be managed because it is running an operating system which is not supported by Share and Storage Management. ...
- Computer Account Changed: %1 Target Account Name: %2 Target Domain: %3 Target Account ID: %4 Caller User Name: %5 Caller ...
- Computer Account Created: New Account Name: %1 New Domain: %2 New Account ID: %3 Caller User Name: %4 Caller Domain: %5 Caller ...
- Computer Account Deleted: Target Account Name: %1 Target Domain: %2 Target Account ID: %3 Caller User Name: %4 Caller Domain: ...
- Computer Account Management This policy setting allows you to audit events generated by changes to computer accounts such ...
- Computer Control Panel settings configure options that are manually configurable via the Windows Control Panel and affect ...
- Computer is booting, SAC started and initialized. Use the "ch -?" command for information about using channels. Use the "?" ...
- Computer name %2 is not a valid computer name. It may contain illegal characters. Standard names contain letters (a-z, A-Z), ...
- Computer object %1 is already assigned to server %2 in site %3. Are you sure you want to change it to reference the new server ...
- Computer \%1 cannot be managed because the computer was not found on the network. It may be powered down or otherwise not ...
- Computer \%1 cannot be managed because the network is unreachable. Verify that your network cabling is securely attached. ...
- Computer \%1 cannot be managed. %2 Choose 'Connect to another computer' from the Action menu to manage a different computer. ...
- Computers running Windows 2000 Service Pack 4 or earlier must have clocks within 30 minutes of the selected server's clock. ...
- Computers that are running any version of the Remote Desktop Connection client can connect to this RD Session Host server. ...
- Computers will connect to this instance of AD LDS using specific ports on all of the IP addresses associated with this computer. ...
- Conditional forwarders are DNS servers that this server can use to resolve DNS queries for records in a specific domain. ...
- Config file expects {0} parameter's name in method '{1}', to be '{2}'. Same method in Test assembly has name '{3}'. Please ...
- ConfigChange If true, an event log entry is generated when an application pool recycles due to a change in its configuration. ...
- ConfigString Server\CertificationAuthority or for an https: connection: Enrollment Server URL or use a single minus sign ...
- Configuration APIs enable applications that are built using the .NET Framework to configure Windows Process Activation Model ...
- Configuration changes have been made to the system registry; however, the user session now active on the {0} connection will ...
- Configuration changes have been made to the system registry; however, the user sessions now active on the {0} connection ...
- Configuration completed successfully, but some server properties were not updated. Update these settings using Server properties ...
- Configuration completed. Microsoft Cluster Service is also installed on this machine, and this may prevent the proper operation ...
- Configuration directory %2 is missing, and disaster recovery must be performed. If there are existing indexes, they must ...
- Configuration error. Verify the device is configured correctly and the required certificates are available on the system. ...
- Configuration Error: This workstation's boot partition is not on the same partition as the system root. This product currently ...
- Configuration file syntax: Generic properties: Notification=NOTIFY_TYPE Must be the first line in the file. NOTIFY_TYPE is ...
- Configuration files and encryption keys already exist in the specified path. Do you want to overwrite with local files and ...
- Configuration for this non-standard map already exists. Old Key field number = '%1', Field separator = '%2', New Key field ...
- Configuration has changed. If this is an unexpected event you should review the settings as this may be the result of malware. ...
- Configuration information could not be read from the domain controller, either because the machine is unavailable, or access ...
- Configuration information relating to Telephony services appears to be corrupt. Please check the configuration of telephone ...
- Configuration of or installation to disks connected through iSCSI is only supported when Windows installation is started ...
- Configuration of security log for this session: Maximum Log Size (KB): %1 Action to take on reaching max log size: %2 Event ...
- Configuration path or url at which the configuration should be cleared. If not specified, defaults to server level configuration ...
- Configuration path or url at which the configuration should be locked. If not specified, defaults to server level configuration ...
- Configuration path or url at which the configuration should be migrated. If not specified, defaults to server level configuration ...
- Configuration path or url at which the configuration should be unlocked. If not specified, defaults to server level configuration ...
- Configuration path or url for under which the search is performed. If not specified, defaults to server level configuration ...
- Configuration settings indicate that this Active Directory Domain Controller should be installed in site %1, but this site ...
- Configuration settings indicate that this Active Directory Lightweight Directory Services instance should be installed in ...
- Configuration settings indicate that this Read-only Domain Controller should be installed in site %1, but this site doesn't ...
- Configuration setup for live migration failed on the destination node. Make sure that name of the virtual network is the ...
- Configuration took place on this machine which requires a restart to complete. Please restart the system before doing further ...
- configuration. The parameter of is . The service cannot recover from this error and will disable the in question until the ...
- Configure a license server for the Remote Desktop Session Host server. If you have an existing license server, use RD Session ...
- Configure a license server for the Remote Desktop Session Host server. If you have an existing license server, use RD Session ...
- Configure a Registry preference item for the registry value "{0}" in the "{1}" GPO in the {2} domain. {3}. Set the value ...
- Configure a Registry preference item for the registry value "{0}" in the GPO with ID {1} in the {2} domain. {3}. Set the ...
- Configure a registry-based policy setting for a list of registry values under the key "{0}" for the "{1}" GPO in the {2} ...
- Configure a registry-based policy setting for a list of registry values under the key "{0}" for the GPO with Id "{1}" in ...
- Configure a registry-based policy setting for the key "{0}" for the "{1}" GPO in the {2} domain. This setting will delete ...
- Configure a registry-based policy setting for the key "{0}" for the GPO with ID "{1}" in the {2} domain. This setting will ...
- Configure a registry-based policy setting for the registry value "{0}" for the "{1}" GPO in the {2} domain. Set the type ...
- Configure a registry-based policy setting for the registry value "{0}" for the "{1}" GPO in the {2} domain. This setting ...
- Configure a registry-based policy setting for the registry value "{0}" for the GPO with ID "{1}" in the {2} domain. Set the ...
- Configure a registry-based policy setting for the registry value "{0}" for the GPO with ID "{1}" in the {2} domain. This ...
- Configure a static IP address on the "%InterfaceName%" adapter Windows can't detect the settings for the network adapter. ...
- Configure access to all removable storage classes. This policy setting takes precedence over any individual removable storage ...