Windows 8.1

  1. When %s logs onto this computer, should the operating system use the roaming profile or just the locally cached copy of the ...
  2. When a block of memory is allotted for future updates, such as the memory allocated to hold discretionary access control ...
  3. When a file location is specified, the authority information access extension requires that the AddToCertificateAia option ...
  4. When a file location is specified, the certificate revocation list distribution point extension supports only the AddToCertificateCdp, ...
  5. When a local path is specified, the certificate revocation list distribution point extension supports only the PublishToServer ...
  6. When a quota or file screening event generates incident reports, default report settings are used. To modify the default ...
  7. When a UNC network location is specified, the authority information access extension requires that the AddToCertificateAia ...
  8. When a UNC network location is specified, the certificate revocation list distribution point extension supports only the ...
  9. When a user is connected through this Connection Manager profile, Connection Manager displays an icon in the notification ...
  10. When a user logs on to a domain, a global catalog server is contacted to determine the universal group memberships of the ...
  11. When a website causes a failure or crash, Internet Explorer attempts to restore the site. It stops after two tries to avoid ...
  12. When adding a server (running the network location server using a self-signed certificate) to a cluster, point the network ...
  13. When adjusting the brightness on the next page, try to get the image to look like the sample image labeled Good brightness ...
  14. When adjusting the contrast on the next page, try to get the image to look like the sample image labeled Good contrast below. ...
  15. When Advanced Audit Policy Configuration settings are used, the "Audit: Force audit policy subcategory settings (Windows ...
  16. When all the DCs are not SP1 or above and you enable this feature there is a possibility that any authenticated user on this ...
  17. When an add-on, such as a toolbar, is installed on your computer, it becomes part of your browser and operating system. In ...
  18. When an HTTP location is specified, the authority information access extension supports only the AddToCertificateAia or the ...
  19. When an HTTP location is specified, the certificate revocation list distribution point extension supports only the AddToCertificateCdp, ...
  20. When an LDAP location is specified, the authority information access extension requires that the AddToCertificateAia option ...
  21. When an LDAP location is specified, the certificate revocation list distribution point extension supports the AddToCertificateCdp, ...
  22. When an object identifier begins with either the number 0 or the number 1, the second number must be in the range of 0 to ...
  23. When asking for client authentication, this server sends a list of trusted certificate authorities to the client. The client ...
  24. When attempting to filter RemoteApps, error converting the SDDL-format security descriptor for resource %2 to a binary-format ...
  25. When Chkdsk checks your disk drive for errors, it might save lost file fragments as files in your disk drive's root folder. ...
  26. When clearing volume flags that have been set using revert on close, the same combination of HIDDEN, READ ONLY, NO DRIVE ...
  27. When clients obtain an address, they are given DHCP options such as the IP addresses of routers (default gateways), DNS servers, ...
  28. When communicating with clients, AD RMS can use Secure Sockets Layer (SSL) to encrypt network traffic. For production deployments, ...
  29. When communicating with clients, the Secure Sockets Layer (SSL) protocol can be used to encrypt network traffic. Choose a ...
  30. When completing the pending VM preservation operation, a restore of the virtual machine '%1' could not be initiated: %3 (%4). ...
  31. When completing the pending VM preservation operation, a restore of the virtual machine '%1' failed: %3 (%4). (Virtual machine ...
  32. When Credential Roaming is disabled, the folders in which the user's credentials are stored are automatically removed from ...
  33. When Credential Roaming is enabled, the folders in which the user's credentials are stored are automatically added to the ...
  34. When disabling the Windows Feedback Forwarder group policy object on the organizational unit, an existing group policy object ...
  35. When enabled, installation options on the client computer are defined using the settings in the Windows Deployment Services ...
  36. When enabled, remote file access to this share will be encrypted. This secures the data against unauthorized access while ...
  37. When enabling a multisite deployment, the security groups configured in the DirectAccess Client Setup Wizard must not contain ...
  38. When enabling multisite, the security groups configured for DirectAccess clients must not contain Windows 7 computers. To ...
  39. When Fail-Over Only is already set for 'MPIO Disk3' and pathId 0000000077030000 is set to Active/Optimized, to set pathId ...
  40. When file and printer sharing is on, files and printers that you have shared from this computer can be accessed by people ...
  41. When forwarding events from local machine to itself, the query of the subscription can't contain target log of the subscription. ...
  42. When generating a cross realm referral from domain %1 the KDC was not able to find the suitable key to verify the ticket. ...
  43. When giving a presentation, your computer stays awake, system notifications are turned off, and the following settings are ...
  44. When going to a website with an address such as https://example.com, try adding the 'www' to the address, https://www.example.com. ...
  45. When going to a website with an address such as https://example.com, try adding the www to the address, https://www.example.com. ...
  46. When Group Policy is selecting a domain controller, it will use the option chosen below. There is a policy that might override ...
  47. When importing or removing a trusted publishing domain, all rights templates needs to be updated. Please exit the current ...
  48. When in 'Repeat' mode, items are played again after being played once. Repeat mode is currently off. Press OK or click Repeat ...
  49. When in 'Repeat' mode, items are played again after being played once. Repeat mode is currently on. Press OK or click Repeat ...
  50. When in 'Shuffle' mode, items are played in random order. Shuffle mode is currently off. Press OK or click Shuffle to turn ...
  51. When in 'Shuffle' mode, items are played in random order. Shuffle mode is currently on. Press OK or click Shuffle to turn ...
  52. When installing HP OpenView 3.0, do not install the included version of pcAnywhere. It installs a version of pcAnywhere that ...
  53. When installing this version of Visual Studio/InterDev, do not install Active Server Pages. If you install Active Server ...
  54. When Internet Connection Sharing is enabled, your LAN adapter will be set to use IP address %1. Your computer may lose connectivity ...
  55. When Internet Connection Sharing is enabled, your network adapter will be set to use IP address 192.168.0.1. This might cause ...
  56. When Internet Explorer navigates to a page which requires an ActiveX control or Java code that is not already on the machine, ...
  57. When is "NSEC3", optionally specify the NSEC3 "OptOut" Flag. Default is no OptOut. - When is "NSEC3", optionally specify ...
  58. When it runs out of the allocated set of RIDs, the domain controller {0} will not be able to generate RIDs for new objects. ...
  59. When media streaming is on, people and devices on the network can access pictures, music, and videos on this computer. This ...
  60. When network discovery is on, this computer can see other network computers and devices and is visible to other network computers. ...
  61. When Network Policy Server (NPS) is configured as a RADIUS proxy, remote RADIUS server responses received by NPS must be ...
  62. When NPS is configured as a RADIUS proxy, remote RADIUS server responses received by NPS must be valid. If responses are ...
  63. When password protected sharing is on, only people who have a user account and password on this computer can access shared ...
  64. When permissions on the Windows Search data directories are set incorrectly, the search service might not be able to access ...
  65. When playing WM Audio Professional content over an S/PDIF connection, some enhancements are not available, including visualizations, ...
  66. When policy is no longer applied, would you like to remove the group or the members added to the group? Choose 'Yes' to remove ...
  67. When preparing a new volume shadow copy for volume %2, the shadow copy storage on volume %3 could not be located in non-critical ...
  68. When preparing a new volume shadow copy for volume %2, the shadow copy storage on volume %3 did not have sufficiently large ...
  69. When preparing a new volume shadow copy for volume %2, the shadow copy storage on volume %3 did not have sufficiently large ...
  70. When problem reporting is turned off, your computer cannot send new reports or check for solutions to existing problems. ...
  71. When processing the topology for partition %1, a shortest-path with non-intersecting schedules was found. The path originated ...
  72. When proposed permissions are configured and audit logs are enabled, the difference between current permission and proposed ...
  73. When Public folder sharing is on, people on the network, including homegroup members, can access files in the Public folders. ...
  74. When reading e-mail messages from an IMAP account, a torn envelope icon indicates that only the message header has been downloaded. ...
  75. When reading newsgroup messages, a torn paper icon indicates that only the message header has been downloaded. A whole paper ...