Windows 8.1

  1. User Account Deleted: Target Account Name: %1 Target Domain: %2 Target Account ID: %3 Caller User Name: %4 Caller Domain: ...
  2. User Account Disabled: Target Account Name: %1 Target Domain: %2 Target Account ID: %3 Caller User Name: %4 Caller Domain: ...
  3. User account does not have permission to access this document. Try to open this document using another account or contact ...
  4. User account does not have permission to access to this document. Try to open this document using another account or contact ...
  5. User Account Enabled: Target Account Name: %1 Target Domain: %2 Target Account ID: %3 Caller User Name: %4 Caller Domain: ...
  6. User account has not been activated on this machine. Activate the user account on this machine and reopen this document. ...
  7. User account is not setup for digital rights management. Contact your system administrator to set up your account for digital ...
  8. User Account Locked Out: Target Account Name: %1 Target Account ID: %3 Caller Machine Name: %2 Caller User Name: %4 Caller ...
  9. User Account password set: Target Account Name: %1 Target Domain: %2 Target Account ID: %3 Caller User Name: %4 Caller Domain: ...
  10. User account restriction error. The possible reasons are that blank passwords not allowed, or that a policy restriction has ...
  11. User Account Unlocked: Target Account Name: %1 Target Domain: %2 Target Account ID: %3 Caller User Name: %4 Caller Domain: ...
  12. User accounts enable individual users to log on to the network and access network resources. To help secure your network, ...
  13. User accounts must have passwords. Any user account that you use to connect remotely must have a password. Also, if you are ...
  14. User accounts that have access to the virtual desktop collection will be automatically assigned a virtual desktop when they ...
  15. User authentication using Basic authentication scheme failed. Additional Data Unexpected error received from LogonUser %1: ...
  16. User Control Panel settings configure options that are manually configurable via the Windows Control Panel and affect only ...
  17. User count check did not pass because error %1 occurred in function %2.%r%3%rMake sure that the domain that this computer ...
  18. User credentials does not have permission to perform this operation. The account used for this test must have network logon ...
  19. User credentials does not have permission to perform this operation. The account used for this test must have network logon ...
  20. User devices are logical devices that allow a computer system's users to input, view or hear data. The CIM_UserDevice class ...
  21. User ID should be in this format: [email protected]. It can contain only letters, numbers, periods (.), hyphens (-), and ...
  22. User initiated logoff: Subject: Security ID: %1 Account Name: %2 Account Domain: %3 Logon ID: %4 This event is generated ...
  23. User mode health monitoring has detected that the system is not being responsive. The Failover cluster virtual adapter has ...
  24. User mode health monitoring has detected that the system is not being responsive. The Failover cluster virtual adapter has ...
  25. User Name: %1 Domain: % %2 Request Type: %3 Logon Process: %4 Authentication Package: %5 Workstation Name: %6 Caller User ...
  26. User profile disks can only be enabled on a temporary collection. The specified collection {0} is not a temporary collection. ...
  27. User profile disks enable users to store settings and folders in a central location. You can enable folder redirection and ...
  28. User profiles store settings for your desktop and other information related to your user account. You can create a different ...
  29. User Settings are applied to users regardless of which computer they log on to, and affect only the individual users for ...
  30. User Source Io Owner has exceed the Quota Threshold]% quota threshold for quota on Quota Path on server Server]. The quota ...
  31. User Source Io Owner has reached the quota limit for quota on Quota Path on server Server]. The quota limit is Quota Limit ...
  32. User Source Io Owner has reached the quota limit for quota on Quota Path on server Server]. The quota limit is Quota Limit ...
  33. User Time is the percentage of elapsed time that the process threads spent executing code in user mode. Applications, environment ...
  34. User Time is the percentage of elapsed time that this thread has spent executing code in user mode. Applications, environment ...
  35. User Time is the percentage of elapsed time the processor spends in the user mode. User mode is a restricted processing mode ...
  36. User {0} attempted to save {1} to {2} on the {3} server. This file is in the {4} file group, which is not permitted on the ...
  37. User {0} has exceeded the limit for the quota on {1} on server {2}. The quota limit is {3} MB, and {4} MB currently is in ...
  38. User {0} has exceeded the {1}% quota threshold for the quota on {2} on server {3}. The quota limit is {4} MB, and {5} MB ...
  39. User {0}${1}${2} can read/update/delete data from {3}${4} as both {5} and {6} databases have CrossDatabaseOwnershipChain ...
  40. User: %1!s! Domain: %2!s! Connected from: %3!s! Duration: %4!d! days %5!d! hours %6!d! mins %7!d! secs Restriction state: ...
  41. UserFileReads : %1 UserFileReadBytes : %2 UserDiskReads : %3 UserFileWrites : %4 UserFileWriteBytes : %5 UserDiskWrites : ...
  42. UserID is the value used by the SecurityService to represent identity. For an authentication service, the UserID may be the ...
  43. UserKeyAndCertFile - Data file containing user private keys and certificates to be archived. This can be any of the following: ...
  44. username% will no longer be able to log on, and all of %username%'s settings will be deleted. However, %username%'s files ...
  45. Users can connect to network resources by using RD Gateway. Network resources can include computers in an Active Directory ...
  46. Users can send scanned documents to an e-mail address. They can also receive an e-mail notification if this operation fails. ...
  47. Users connected to a shared folder or file are disconnected when you close the folder or file and may lose data. When possible, ...
  48. Users in the local domain can be authenticated to use all of the resources in the specified domain or only those resources ...
  49. Users in the local forest can be authenticated to use all of the resources in the specified forest or only those resources ...
  50. Users in the specified domain can be authenticated to use all of the resources in the local domain or only those resources ...
  51. Users in the specified forest can be authenticated to use all of the resources in the local forest or only those resources ...
  52. Users may lose data if disconnected without warning. When possible, notify users before disconnecting them. Do you want to ...
  53. Users might register DNS names that have special significance. By default, the Global Query Block List contains the strings ...
  54. Users on computers running NFS client software can access directories (called shares) on computers running Server for NFS ...
  55. Users that are members of the selected group or groups will be allowed or denied access based on the network policy Access ...
  56. Users will lose their updates if a newer version of the file with conflicting changes is replicated in from another replication ...
  57. Users will not be able to access shared folders by using the NFS protocol. The unused service will consume system resources ...
  58. Users will not be able to sync with this sync share using the encrypted HTTPS protocol. Users might be able to sync with ...
  59. user`u`user password]`User to Run As. Entering a for the password produces a prompt for the password. The password is not ...
  60. Uses routing information to determine the cost of a route from a specified site to another specified site or sites. The querysites ...
  61. Using a directory service to check the e-mail addresses of your message recipients may slow down the performance of your ...
  62. Using a PIN to encrypt the preshared key increases the security of your deployment. Users will need the PIN in order to install ...
  63. Using a test certificate in a production environment is not recommended for security reasons. This certificate should be ...
  64. Using an account with a blank password as the AD LDS service account is a security risk. Do you want to continue using this ...
  65. Using an API that is not part of the Windows SDK for Windows Store apps violates the Windows Store certification requirements. ...
  66. Using automatic certificate requests, an administrator can specify which types of certificate can be automatically requested ...
  67. Using Cluster-Aware Updating to update this failover cluster could cause downtime, because Automatic Updates may be concurrently ...
  68. Using only your voice, you can start programs, open menus, click buttons and other objects on the screen, dictate text into ...
  69. Using RemoteApp, you can access programs on a remote computer through Remote Desktop Services. Although the programs are ...
  70. Using system protection on a drive that contains other shadow copies will cause older system restore points to be deleted ...
  71. Using system protection on a drive that contains system image backups will cause other shadow copies to be deleted faster ...
  72. Using the contrast control on your display, set the contrast as high as possible without losing the ability to see the wrinkles ...
  73. Using the controls on your display, set the brightness higher or lower until you can distinguish the shirt from the suit ...
  74. Using the DFS Management MMC snap-in, change the path of the staging folder for the replicated folder on the member in the ...
  75. Using the DFS Management MMC snap-in, change the path of the staging folder for the SYSVOL folder on this domain controller. ...