Windows 8.1
- User Account Deleted: Target Account Name: %1 Target Domain: %2 Target Account ID: %3 Caller User Name: %4 Caller Domain: ...
- User Account Disabled: Target Account Name: %1 Target Domain: %2 Target Account ID: %3 Caller User Name: %4 Caller Domain: ...
- User account does not have permission to access this document. Try to open this document using another account or contact ...
- User account does not have permission to access to this document. Try to open this document using another account or contact ...
- User Account Enabled: Target Account Name: %1 Target Domain: %2 Target Account ID: %3 Caller User Name: %4 Caller Domain: ...
- User account has not been activated on this machine. Activate the user account on this machine and reopen this document. ...
- User account is not setup for digital rights management. Contact your system administrator to set up your account for digital ...
- User Account Locked Out: Target Account Name: %1 Target Account ID: %3 Caller Machine Name: %2 Caller User Name: %4 Caller ...
- User Account password set: Target Account Name: %1 Target Domain: %2 Target Account ID: %3 Caller User Name: %4 Caller Domain: ...
- User account restriction error. The possible reasons are that blank passwords not allowed, or that a policy restriction has ...
- User Account Unlocked: Target Account Name: %1 Target Domain: %2 Target Account ID: %3 Caller User Name: %4 Caller Domain: ...
- User accounts enable individual users to log on to the network and access network resources. To help secure your network, ...
- User accounts must have passwords. Any user account that you use to connect remotely must have a password. Also, if you are ...
- User accounts that have access to the virtual desktop collection will be automatically assigned a virtual desktop when they ...
- User authentication using Basic authentication scheme failed. Additional Data Unexpected error received from LogonUser %1: ...
- User Control Panel settings configure options that are manually configurable via the Windows Control Panel and affect only ...
- User count check did not pass because error %1 occurred in function %2.%r%3%rMake sure that the domain that this computer ...
- User credentials does not have permission to perform this operation. The account used for this test must have network logon ...
- User credentials does not have permission to perform this operation. The account used for this test must have network logon ...
- User devices are logical devices that allow a computer system's users to input, view or hear data. The CIM_UserDevice class ...
- User ID should be in this format: [email protected]. It can contain only letters, numbers, periods (.), hyphens (-), and ...
- User initiated logoff: Subject: Security ID: %1 Account Name: %2 Account Domain: %3 Logon ID: %4 This event is generated ...
- User mode health monitoring has detected that the system is not being responsive. The Failover cluster virtual adapter has ...
- User mode health monitoring has detected that the system is not being responsive. The Failover cluster virtual adapter has ...
- User Name: %1 Domain: % %2 Request Type: %3 Logon Process: %4 Authentication Package: %5 Workstation Name: %6 Caller User ...
- User profile disks can only be enabled on a temporary collection. The specified collection {0} is not a temporary collection. ...
- User profile disks enable users to store settings and folders in a central location. You can enable folder redirection and ...
- User profiles store settings for your desktop and other information related to your user account. You can create a different ...
- User Settings are applied to users regardless of which computer they log on to, and affect only the individual users for ...
- User Source Io Owner has exceed the Quota Threshold]% quota threshold for quota on Quota Path on server Server]. The quota ...
- User Source Io Owner has reached the quota limit for quota on Quota Path on server Server]. The quota limit is Quota Limit ...
- User Source Io Owner has reached the quota limit for quota on Quota Path on server Server]. The quota limit is Quota Limit ...
- User Time is the percentage of elapsed time that the process threads spent executing code in user mode. Applications, environment ...
- User Time is the percentage of elapsed time that this thread has spent executing code in user mode. Applications, environment ...
- User Time is the percentage of elapsed time the processor spends in the user mode. User mode is a restricted processing mode ...
- User {0} attempted to save {1} to {2} on the {3} server. This file is in the {4} file group, which is not permitted on the ...
- User {0} has exceeded the limit for the quota on {1} on server {2}. The quota limit is {3} MB, and {4} MB currently is in ...
- User {0} has exceeded the {1}% quota threshold for the quota on {2} on server {3}. The quota limit is {4} MB, and {5} MB ...
- User {0}${1}${2} can read/update/delete data from {3}${4} as both {5} and {6} databases have CrossDatabaseOwnershipChain ...
- User: %1!s! Domain: %2!s! Connected from: %3!s! Duration: %4!d! days %5!d! hours %6!d! mins %7!d! secs Restriction state: ...
- UserFileReads : %1 UserFileReadBytes : %2 UserDiskReads : %3 UserFileWrites : %4 UserFileWriteBytes : %5 UserDiskWrites : ...
- UserID is the value used by the SecurityService to represent identity. For an authentication service, the UserID may be the ...
- UserKeyAndCertFile - Data file containing user private keys and certificates to be archived. This can be any of the following: ...
- username% will no longer be able to log on, and all of %username%'s settings will be deleted. However, %username%'s files ...
- Users can connect to network resources by using RD Gateway. Network resources can include computers in an Active Directory ...
- Users can send scanned documents to an e-mail address. They can also receive an e-mail notification if this operation fails. ...
- Users connected to a shared folder or file are disconnected when you close the folder or file and may lose data. When possible, ...
- Users in the local domain can be authenticated to use all of the resources in the specified domain or only those resources ...
- Users in the local forest can be authenticated to use all of the resources in the specified forest or only those resources ...
- Users in the specified domain can be authenticated to use all of the resources in the local domain or only those resources ...
- Users in the specified forest can be authenticated to use all of the resources in the local forest or only those resources ...
- Users may lose data if disconnected without warning. When possible, notify users before disconnecting them. Do you want to ...
- Users might register DNS names that have special significance. By default, the Global Query Block List contains the strings ...
- Users on computers running NFS client software can access directories (called shares) on computers running Server for NFS ...
- Users that are members of the selected group or groups will be allowed or denied access based on the network policy Access ...
- Users will lose their updates if a newer version of the file with conflicting changes is replicated in from another replication ...
- Users will not be able to access shared folders by using the NFS protocol. The unused service will consume system resources ...
- Users will not be able to sync with this sync share using the encrypted HTTPS protocol. Users might be able to sync with ...
- user`u`user password]`User to Run As. Entering a for the password produces a prompt for the password. The password is not ...
- Uses routing information to determine the cost of a route from a specified site to another specified site or sites. The querysites ...
- Using a directory service to check the e-mail addresses of your message recipients may slow down the performance of your ...
- Using a PIN to encrypt the preshared key increases the security of your deployment. Users will need the PIN in order to install ...
- Using a test certificate in a production environment is not recommended for security reasons. This certificate should be ...
- Using an account with a blank password as the AD LDS service account is a security risk. Do you want to continue using this ...
- Using an API that is not part of the Windows SDK for Windows Store apps violates the Windows Store certification requirements. ...
- Using automatic certificate requests, an administrator can specify which types of certificate can be automatically requested ...
- Using Cluster-Aware Updating to update this failover cluster could cause downtime, because Automatic Updates may be concurrently ...
- Using only your voice, you can start programs, open menus, click buttons and other objects on the screen, dictate text into ...
- Using RemoteApp, you can access programs on a remote computer through Remote Desktop Services. Although the programs are ...
- Using system protection on a drive that contains other shadow copies will cause older system restore points to be deleted ...
- Using system protection on a drive that contains system image backups will cause other shadow copies to be deleted faster ...
- Using the contrast control on your display, set the contrast as high as possible without losing the ability to see the wrinkles ...
- Using the controls on your display, set the brightness higher or lower until you can distinguish the shirt from the suit ...
- Using the DFS Management MMC snap-in, change the path of the staging folder for the replicated folder on the member in the ...
- Using the DFS Management MMC snap-in, change the path of the staging folder for the SYSVOL folder on this domain controller. ...