Windows 10

  1. Administrator recovered system from CrashOnAuditFail. LSA will now accept non-administrative logons. Some auditable activity ...
  2. Administrator recovered system from CrashOnAuditFail. Users who are not administrators will now be allowed to log on. Some ...
  3. Administrator rights are required to install modules in '{0}'. Log on to the computer with an account that has Administrator ...
  4. Administrators have complete access to the computer and can make any desired changes. Based on notification settings, administrators ...
  5. Administrators have complete access to the computer and can make any desired changes. Based on notification settings, administrators ...
  6. Administrators have complete control over the PC. They can change any settings and access all of the files and programs stored ...
  7. Administrators use the Computer Configuration node in Group Policy to set policies that are applied to computers, regardless ...
  8. Administrators use the User Configuration node in Group Policy to set policies that are applied to users, regardless of which ...
  9. Administrators use this extension to specify scripts that are run when the user logs on or off the computer. Scripts run ...
  10. Administrators use this extension to specify scripts that are to run during computer startup or shutdown. Scripts run in ...
  11. Advanced Audit Policy Configuration settings can be used to provide detailed control over audit policies, identify attempted ...
  12. Advanced options: /DUMP - Dump a provisioning blob's contents from /PROVISION - Provision a computer account in the domain ...
  13. Advanced print server properties cannot be displayed. You may be viewing the settings of a computer running a previous version ...
  14. Advanced settings cannot be displayed at this time because %1 is accessing the same information. Please close the %1 window(s) ...
  15. Advanced settings cannot be displayed at this time because the system must first be rebooted before any configuration changes ...
  16. After backing up your data you can attempt to run chkdsk /f to repair minor errors. Do not run chkdsk /f on the drive unless ...
  17. After backup is complete, please shut down the computer and repair or replace the faulty hard disk. Follow the instructions ...
  18. After deleting this item the application that created this item may no longer be able to use the information stored in it. ...
  19. After receiving an async logout from the target, attempt to relogin the session failed. Error status is given in the dump ...
  20. After restarting, your PC won't be joined to %1. You'll need to sign in with another user account, such as the one you entered ...
  21. After restoring from backup media, an error occurred when attempting to create the restore marker file. This file must be ...
  22. After restoring from backup media, an error occurred when attempting to delete the restore marker file. This file must be ...
  23. After SQL Server setup completes you will need to install service packs before running SQL Server on this version of Windows. ...
  24. After you connect, your work or school might collect information about you. It might also install or remove apps, change ...
  25. After you convert a disk to dynamic, you can only use Windows 2000 and later versions of Windows on any volume of that disk. ...
  26. After you convert these disks to dynamic, you will not be able to start installed operating systems from any volume on these ...
  27. After you create the install image, you can add it to a Windows Deployment Services server to deploy to client computers. ...
  28. After you finish updating to %1!s!, your personal settings, files, and user accounts will all still be there, but you'll ...
  29. After you have backed up your computer, you should contact your computer manufacturer or other hardware technical support ...
  30. After you leave the domain, you will need to know the password of the local administrator account to log in to your computer. ...
  31. After you leave the domain, you will need to know the password of the local Administrator account to log onto this computer. ...
  32. After you log on, you can add this server to your Favorites and return to it easily. The FTP server will use the e-mail address ...
  33. After you raise the domain functional level, it is possible that you may not be able to reverse it. For more information ...
  34. After you raise the forest functional level, it is possible that you may not be able to reverse it. For more information ...
  35. After you reach the limit, your apps will let you know when there's new info waiting for you, but your tiles won't update. ...
  36. After you stop using Work Folders, you can delete the folder used by Work Folders on this PC. Files on your other devices ...
  37. AIWA TA Utility has a known compatibility issue with this version of Windows and might not run as expected. When you use ...
  38. Alerts failed because of network failures or because the internal cache size was exceeded. If the problem persists, change ...
  39. Alerts for a content source with a local address are only supported for a fixed media drive type. Use the UNC name for remote ...
  40. Align text to both left and right margins, adding extra space between words as necessary. This creates a clean look along ...
  41. Aligning the nodes and sockets of a virtual machine to the hardware topology helps improve the performance of NUMA-aware ...
  42. All authenticated incoming servers would be allowed to replicate. All existing authorization entries will be removed. Do ...
  43. All authentication sets have been deleted from the IPsec configuration on this computer. IPsec Phase: %1 Store Type: %2 ModifyingUser: ...
  44. All certificate authentication methods using the same certificate signing algorithm must be grouped together in each list. ...
  45. All certificate authentications using the same signing algorithm must have the same require health setting. You cannot specify ...
  46. All connection security rules have been deleted from the IPsec configuration on this computer. Store Type: %1 ModifyingUser: ...
  47. All crypto sets have been deleted from the IPsec configuration on this computer. IPsec Phase: %1 Store Type: %2 ModifyingUser: ...
  48. All data on the drives to be restored will be replaced with the data in the system image. Are you sure you want to continue? ...
  49. All data sent between the client and the server is protected by encryption based on the maximum key strength supported by ...
  50. All data sent between the client and the server is protected by encryption based on the server's maximum key strength. Clients ...
  51. All data sent between the client and the server uses Federal Information Processing Standard (FIPS) compliant algorithms ...
  52. All data sent from client to server is protected by encryption based on the maximum key strength supported by the client. ...
  53. All directory servers in the following site that can replicate the directory partition over this transport are currently ...
  54. All disks to be restored will be formatted and replaced with the layout and data in the system image. Are you sure you want ...
  55. All event subscription computer names must be unique. The following names are already in the list and will not be added again: ...
  56. All inbound replication connections for the partition %1 are disabled. Inbound replication of this partition cannot be performed. ...
  57. All incoming COM ports are in use. To assign a COM port to this Bluetooth device, you must first delete an existing incoming ...
  58. All Internet Explorer add-ons, such as ActiveX controls or toolbars, are turned off. Some webpages might not display correctly. ...
  59. All main mode rules have been deleted from the IPsec configuration on this computer. Store Type: %1 ModifyingUser: %2 ModifyingApplication: ...
  60. All notification of policy changes from LSA/SAM were ignored by policy engine because it timed out to wait for PDC synchronization. ...
  61. All of Active Directory Domain Services's LDAP send queues are full. This can be caused by clients that continue to send ...
  62. All of Active Directory Lightweight Directory Services's LDAP send queues are full. This can be caused by clients that continue ...
  63. All pending data has been replicated. Access the virtual machine on the Replica server and choose the Failover task in the ...
  64. All pending data has been replicated. Access the virtual machine on the replica server and choose the Failover task in the ...
  65. All pending data has been replicated. Some failover steps did not complete successfully. To complete failover, access the ...
  66. All pending data has been replicated. You can now start the virtual machine on the Replica server. However, reverse replication ...
  67. All pool disks failed to read the configuration or returned corrupt data for virtual disk %1. As a result the virtual disk ...
  68. All privileges that may be required to perform the operation whether currently held or not. This may be a subset or all of ...
  69. All problems preventing updates to the Active Directory Domain Services database have been cleared. New updates to the Active ...
  70. All problems preventing updates to the Active Directory Lightweight Directory Services database have been cleared. New updates ...
  71. All Recovery Points will be removed. Cancel Failover will no longer be available. You can choose to resume the replication ...
  72. All rules have been deleted from the Windows Firewall configuration on this computer. Store Type: %1 ModifyingUser: %2 ModifyingApplication: ...
  73. All search results are filtered out because they might contain adult content. Link id=0]Change your SafeSearch setting[/Link ...
  74. All statically used varying variables in fragment shader need a corresponding variable of the same type in the vertex shader ...
  75. All system changes since the backup was taken, including any programs or drivers installed or uninstalled, will be undone. ...