Windows 10
- Administrator recovered system from CrashOnAuditFail. LSA will now accept non-administrative logons. Some auditable activity ...
- Administrator recovered system from CrashOnAuditFail. Users who are not administrators will now be allowed to log on. Some ...
- Administrator rights are required to install modules in '{0}'. Log on to the computer with an account that has Administrator ...
- Administrators have complete access to the computer and can make any desired changes. Based on notification settings, administrators ...
- Administrators have complete access to the computer and can make any desired changes. Based on notification settings, administrators ...
- Administrators have complete control over the PC. They can change any settings and access all of the files and programs stored ...
- Administrators use the Computer Configuration node in Group Policy to set policies that are applied to computers, regardless ...
- Administrators use the User Configuration node in Group Policy to set policies that are applied to users, regardless of which ...
- Administrators use this extension to specify scripts that are run when the user logs on or off the computer. Scripts run ...
- Administrators use this extension to specify scripts that are to run during computer startup or shutdown. Scripts run in ...
- Advanced Audit Policy Configuration settings can be used to provide detailed control over audit policies, identify attempted ...
- Advanced options: /DUMP - Dump a provisioning blob's contents from /PROVISION - Provision a computer account in the domain ...
- Advanced print server properties cannot be displayed. You may be viewing the settings of a computer running a previous version ...
- Advanced settings cannot be displayed at this time because %1 is accessing the same information. Please close the %1 window(s) ...
- Advanced settings cannot be displayed at this time because the system must first be rebooted before any configuration changes ...
- After backing up your data you can attempt to run chkdsk /f to repair minor errors. Do not run chkdsk /f on the drive unless ...
- After backup is complete, please shut down the computer and repair or replace the faulty hard disk. Follow the instructions ...
- After deleting this item the application that created this item may no longer be able to use the information stored in it. ...
- After receiving an async logout from the target, attempt to relogin the session failed. Error status is given in the dump ...
- After restarting, your PC won't be joined to %1. You'll need to sign in with another user account, such as the one you entered ...
- After restoring from backup media, an error occurred when attempting to create the restore marker file. This file must be ...
- After restoring from backup media, an error occurred when attempting to delete the restore marker file. This file must be ...
- After SQL Server setup completes you will need to install service packs before running SQL Server on this version of Windows. ...
- After you connect, your work or school might collect information about you. It might also install or remove apps, change ...
- After you convert a disk to dynamic, you can only use Windows 2000 and later versions of Windows on any volume of that disk. ...
- After you convert these disks to dynamic, you will not be able to start installed operating systems from any volume on these ...
- After you create the install image, you can add it to a Windows Deployment Services server to deploy to client computers. ...
- After you finish updating to %1!s!, your personal settings, files, and user accounts will all still be there, but you'll ...
- After you have backed up your computer, you should contact your computer manufacturer or other hardware technical support ...
- After you leave the domain, you will need to know the password of the local administrator account to log in to your computer. ...
- After you leave the domain, you will need to know the password of the local Administrator account to log onto this computer. ...
- After you log on, you can add this server to your Favorites and return to it easily. The FTP server will use the e-mail address ...
- After you raise the domain functional level, it is possible that you may not be able to reverse it. For more information ...
- After you raise the forest functional level, it is possible that you may not be able to reverse it. For more information ...
- After you reach the limit, your apps will let you know when there's new info waiting for you, but your tiles won't update. ...
- After you stop using Work Folders, you can delete the folder used by Work Folders on this PC. Files on your other devices ...
- AIWA TA Utility has a known compatibility issue with this version of Windows and might not run as expected. When you use ...
- Alerts failed because of network failures or because the internal cache size was exceeded. If the problem persists, change ...
- Alerts for a content source with a local address are only supported for a fixed media drive type. Use the UNC name for remote ...
- Align text to both left and right margins, adding extra space between words as necessary. This creates a clean look along ...
- Aligning the nodes and sockets of a virtual machine to the hardware topology helps improve the performance of NUMA-aware ...
- All authenticated incoming servers would be allowed to replicate. All existing authorization entries will be removed. Do ...
- All authentication sets have been deleted from the IPsec configuration on this computer. IPsec Phase: %1 Store Type: %2 ModifyingUser: ...
- All certificate authentication methods using the same certificate signing algorithm must be grouped together in each list. ...
- All certificate authentications using the same signing algorithm must have the same require health setting. You cannot specify ...
- All connection security rules have been deleted from the IPsec configuration on this computer. Store Type: %1 ModifyingUser: ...
- All crypto sets have been deleted from the IPsec configuration on this computer. IPsec Phase: %1 Store Type: %2 ModifyingUser: ...
- All data on the drives to be restored will be replaced with the data in the system image. Are you sure you want to continue? ...
- All data sent between the client and the server is protected by encryption based on the maximum key strength supported by ...
- All data sent between the client and the server is protected by encryption based on the server's maximum key strength. Clients ...
- All data sent between the client and the server uses Federal Information Processing Standard (FIPS) compliant algorithms ...
- All data sent from client to server is protected by encryption based on the maximum key strength supported by the client. ...
- All directory servers in the following site that can replicate the directory partition over this transport are currently ...
- All disks to be restored will be formatted and replaced with the layout and data in the system image. Are you sure you want ...
- All event subscription computer names must be unique. The following names are already in the list and will not be added again: ...
- All inbound replication connections for the partition %1 are disabled. Inbound replication of this partition cannot be performed. ...
- All incoming COM ports are in use. To assign a COM port to this Bluetooth device, you must first delete an existing incoming ...
- All Internet Explorer add-ons, such as ActiveX controls or toolbars, are turned off. Some webpages might not display correctly. ...
- All main mode rules have been deleted from the IPsec configuration on this computer. Store Type: %1 ModifyingUser: %2 ModifyingApplication: ...
- All notification of policy changes from LSA/SAM were ignored by policy engine because it timed out to wait for PDC synchronization. ...
- All of Active Directory Domain Services's LDAP send queues are full. This can be caused by clients that continue to send ...
- All of Active Directory Lightweight Directory Services's LDAP send queues are full. This can be caused by clients that continue ...
- All pending data has been replicated. Access the virtual machine on the Replica server and choose the Failover task in the ...
- All pending data has been replicated. Access the virtual machine on the replica server and choose the Failover task in the ...
- All pending data has been replicated. Some failover steps did not complete successfully. To complete failover, access the ...
- All pending data has been replicated. You can now start the virtual machine on the Replica server. However, reverse replication ...
- All pool disks failed to read the configuration or returned corrupt data for virtual disk %1. As a result the virtual disk ...
- All privileges that may be required to perform the operation whether currently held or not. This may be a subset or all of ...
- All problems preventing updates to the Active Directory Domain Services database have been cleared. New updates to the Active ...
- All problems preventing updates to the Active Directory Lightweight Directory Services database have been cleared. New updates ...
- All Recovery Points will be removed. Cancel Failover will no longer be available. You can choose to resume the replication ...
- All rules have been deleted from the Windows Firewall configuration on this computer. Store Type: %1 ModifyingUser: %2 ModifyingApplication: ...
- All search results are filtered out because they might contain adult content. Link id=0]Change your SafeSearch setting[/Link ...
- All statically used varying variables in fragment shader need a corresponding variable of the same type in the vertex shader ...
- All system changes since the backup was taken, including any programs or drivers installed or uninstalled, will be undone. ...