Windows 8.1
- Changing the Primary Domain DNS name of this computer to "%1" failed. The name will remain "%2". Please check if "%1" is ...
- Changing the scan server name might disable actions you have selected for this scan process. If you change this name, we ...
- Changing the start IP address, end IP address, network ID or prefix length for an IP address block will reset its utilization ...
- Changing the transaction isolation level from 'Serialized' or 'Any' requires that all components called from this component ...
- Changing this setting does not affect Fibre Channel ports that have already been configured. To apply a new setting to an ...
- Changing this setting does not affect network adapters that have already been configured. To apply a new setting to an existing ...
- Changing to Node Majority quorum configuration is not allowed at this time, as it will cause the cluster to lose quorum and ...
- Changing virtualization for a process may lead to undesired results including loss of data. You should do this only for debugging. ...
- Channel management commands: ch List all channels. Status Legend: (AB) A: Channel operational status 'A' = Channel is active. ...
- Channel property %1!s! contains invalid value. The value has invalid type, is outside of valid range, can't be updated or ...
- Channels at endpoint at URL: %3 have reached maximum number of created messages which is %4 per channel. This event was encountered ...
- Channels were found but not added to the Guide because they lack channel data. To review them, go to Tasks > Settings > TV ...
- CHAP secrets, CHAP passwords and IPSEC preshared keys can be specified as a text string or as a sequence of hexadecimal values. ...
- Characters "\/:*?"<>|[]+=;," are not allowed in the namespace name. The namespace name should also have at least one character ...
- Check below if you want to help make Microsoft software and services even better by sending Windows Media Center usage data ...
- Check connectivity between Web Application Proxy and the AD FS servers. If the problem persists, consider running the Install-WebApplicationProxy ...
- Check for latest components via Automatic Version Synchronization (if you installed the IEAK from the Internet, AVS must ...
- Check for network connectivity and service related problems. For troubleshooting RPC issues see and for additional troubleshooting ...
- Check for network connectivity problems, for troubleshooting RPC issues see and for additional troubleshooting information, ...
- Check for relevant errors in the Windows Event Viewer. 2. Ensure that OTP is configured correctly in the Remote Access Management ...
- Check for relevant errors in the Windows Event Viewer. 2. Ensure that OTP is configured correctly in the Remote Access Management ...
- Check for updates from %1!s!, instead of from your system admin (this will turn off automatically when updates are done). ...
- Check if the application installs a WHQL signed FS Filter driver and an ELAM driver This task will never be displayed to ...
- Check network status and change settings, set preferences for sharing files and computers, configure Internet display and ...
- Check that Machine Account (AD only) and DSA objects have replicated. Use /objectdn: with /n: to specify an additional object ...
- Check that the version of the license server supports issuing licenses to the Remote Desktop Session Host server. The license ...
- Check that you have network connectivity between the Remote Desktop Session Host server and the license server. Also check ...
- Check the account(s) for which you would like to use signature '%s'. Only one signature may be selected for an account, and ...
- Check the button to use 16 bit MCIAVI code in preference to 32 bit code. This provides the highest level of compatibility, ...
- Check the columns that you would like visible in this view. Use the Move Up and Move Down buttons to reorder the columns ...
- Check the following: Do you have the correct permissions on the remote computer? Is the remote computer turned on, and is ...
- Check the server for indications of an authenticated attack. If an attack is detected, use mitigation measures to stop it. ...
- Check the spelling of the cluster name. Otherwise, there might be a problem with your network. Make sure the cluster nodes ...
- Check the spelling of the name. Otherwise, there might be a problem with your network. To try to identify and resolve network ...
- Check the status of the following services on the RD Connection Broker server: Remote Desktop Connection Broker, Windows ...
- Check the Windows event log for event 12008 to identify the application. Check the Kerberos configuration on the domain controller ...
- Check to see if the Machine Account has the proper information. Use /RecreateMachineAccount to attempt a repair if the local ...
- Check to see that the disk and drive are connected properly, make sure that the disk is not read-only, and then try again. ...
- Check your Internet connection and try again. To always be able to open this file, even if you aren't connected to the Internet, ...
- Check your Internet connection and try again. To avoid this problem in the future, you can make the file available offline. ...
- Check your Internet connection and try again. To avoid this problem in the future, you can make the files available offline. ...
- Check your wireless network settings Make sure your computer is in range of "%ws" and that the network settings match the ...
- Check your wireless security type View your wireless security settings to verify that the correct security type is selected. ...
- Checkpoint creation failed for '%1' because an invalid backup type for the app consistent checkpoint has been specified. ...
- Checks if the TS is allowed to request CALs from license server based on the the license server security group policy on ...
- Checks that every metadata row in the database has corresponding content stored in the file system. If content is missing ...
- Checks whether each DSA is advertising itself, and whether it is advertising itself as having the capabilities of a DSA. ...
- Checks whether License Server is a member of Terminal Server License Servers group at domain controller of given domainIf ...
- Checks whether License Server is published in Active Directory or not.If license server is published, it shall be automatically ...
- Checks whether the given Terminal Server is allowed to request CALs from the License Server based on group policy - License ...
- Chkdsk cannot dismount the volume because it is a system drive or there is an active paging file on it. Would you like to ...
- Chkdsk cannot run because the volume is in use by another process. Chkdsk may run if this volume is dismounted first. ALL ...
- Chkdsk cannot run because the volume is in use by another process. Would you like to schedule this volume to be checked the ...
- Chkdsk is copying last valid VAT at block %1 to the end of the volume. This will revert the volume to its state at %2:%3 ...
- Chkdsk is running on media that does not support writes in place. On such media chkdsk operation is limited to verifying ...
- Chkdsk scan speed is being throttled to reduce impact on system and application performance. Given the number of files and ...
- Chkdsk was executed in read-only mode. A volume snapshot was not used. Extra errors and warnings may be reported as the volume ...
- Chobit 3D has a known compatibility issue with this version of Windows. For an update that is compatible with this version ...
- Choose "Microsoft Open License Program" if your company purchases Microsoft products through the Open License program. You ...
- Choose "Microsoft Select or Microsoft Enterprise Agreement" if your company purchases Microsoft products through either the ...
- Choose "This is my new computer" this time. - Follow the instructions to complete the wizard and import the saved profile ...
- Choose a different and valid certificate for authentication with this network.%rIf this is not helpful, contact your network ...
- Choose a different location or free up %1 of space on this drive. Work Folders can't use the last few gigabytes of free space ...
- Choose a folder-naming format based on whether you have to maintain user folder compatibility or want to support identical ...
- Choose a location other than the failing disk so that you can access the instructions later. For example, save to a CD, USB ...
- Choose a location that's on a fixed or removable drive, such as a hard drive or microSD card. You can't choose a network ...
- Choose a name and location for this virtual machine. The name is displayed in Hyper-V Manager. We recommend that you use ...
- Choose a new password for this user account. This password will replace the old one; everything else about the user account ...
- Choose a password that will be easy for you to remember but hard for others to guess. If you forget, we'll show the hint. ...
- Choose between running all tests or running selected tests. The tests examine the Cluster Configuration, Hyper-V Configuration, ...
- Choose how you want the user accounts on your old PC to get transferred to user accounts on your new PC. To create a new ...
- Choose the action to display or apply by default when potential threats with the following alert levels are detected. What ...
- Choose the power settings that you want for your computer. The changes you make to the settings on this page apply to all ...
- Choose the settings for the scan ticket. A scan ticket includes the description and processing information of a scan job. ...
- Choose the size of your desktop for interacting with the virtual machine. Drag the slider all the way to the right to use ...