Windows 8.1
- Wireless network association succeeded. Network Adapter: %1 Interface GUID: %2 Local MAC Address: %3 Network SSID: %4 BSS ...
- Wireless network is blocked due to connection failure. Network Adapter: %1 Interface GUID: %2 Connection Mode: %5 Profile ...
- Wireless Network Policy Administration. Manage WLAN AutoConfig settings and IEEE 802.1X Security Settings for IEEE 802.11 ...
- Wireless security failed. Network Adapter: %1 Interface GUID: %2 Local MAC Address: %3 Network SSID: %4 BSS Type: %5 Peer ...
- Wireless security started. Network Adapter: %1 Interface GUID: %2 Local MAC Address: %3 Network SSID: %4 BSS Type: %5 Authentication: ...
- Wireless security started. Network Adapter: %1 Interface GUID: %2 Local MAC Address: %3 Network SSID: %4 BSS Type: %5 Authentication: ...
- Wireless security stopped. Network Adapter: %1 Interface GUID: %2 Local MAC Address: %3 Network SSID: %4 BSS Type: %5 Security ...
- With a homegroup you can share libraries and devices with other people on this network. You can also stream media to devices ...
- With a homegroup, you can share files and printers with other computers on your home network. You can also stream media to ...
- With a local account, you won't sign in to Windows with your e-mail address. You will not be able to use advanced capabilities ...
- With Anywhere Access, network users can securely share and access files, run applications, and back up their devices from ...
- With BranchCache, clients can be configured to use a hosted cache. This firewall rule opens up the needed ports on the hosted ...
- With BranchCache, clients can be configured to use the hosted cache. This firewall rule opens up the needed ports on the ...
- With BranchCache, clients use HTTP to retrieve content from each other in the distributed mode, and from the hosted cache ...
- With BranchCache, clients use the WS Discovery protocol to lookup content availability on the local subnet. This firewall ...
- With IP address "{0}" ICT may not be able to connect to domain controller virtual machine. Please exit this wizard and re ...
- With Server for NFS, a Windows-based computer can act as a Network File System (NFS) server. Server for NFS enables a Windows-based ...
- With Software Restriction Policies, you can define a default security level and rules (exceptions to that default security ...
- With the '-d' apply_to switch, the basic format is: MPIODiskNumber LBPolicy Depending on the policy chosen, there may be ...
- With the appropriate group policy settings in place you can connect directly using either the computer name or the IP address. ...
- With this edition of Windows, settings for sharing libraries and devices with other computers in the homegroup are not available. ...
- With this option enabled, clients can only access application servers in the specified security groups. Clients can still ...
- With this option selected, DirectAccess client computers located on the Internet can connect to the internal network via ...
- With this setting enabled, all mobile computers in the specified security groups will be enabled as DirectAccess clients. ...
- With this setting enabled, end-to-end traffic is authenticated but not encrypted. This option is less secure. Authentication ...
- With User Name Mapping, you can create advanced group maps, which associate dissimilarly named Windows and UNIX groups. Advanced ...
- With User Name Mapping, you can create advanced user maps, which associate all dissimilarly named Windows and UNIX users. ...
- With User Name Mapping, you can create simple identity maps which automatically associate all identically named Windows and ...
- With Windows Media Center, you can watch and record TV on your computer. If both a standard TV signal and a digital TV antenna ...
- With Windows Server Backup you can schedule backups to run once a day or more often, and you can choose to back up the entire ...
- Within the scope of the instantiating Namespace, InstanceID opaquely and uniquely identifies an instance of this class. In ...
- Within the scope of the instantiating Namespace, InstanceID opaquely and uniquely identifies an instance of this class. In ...
- Within the scope of the instantiating Namespace, InstanceID opaquely and uniquely identifies an instance of this class. In ...
- Within the scope of the instantiating Namespace, InstanceID opaquely and uniquely identifies an instance of this class. In ...
- Within the scope of the instantiating Namespace, InstanceID opaquely and uniquely identifies an instance of this class. In ...
- Within the scope of the instantiating Namespace, InstanceID opaquely and uniquely identifies an instance of this class. In ...
- Within the scope of the instantiating Namespace, InstanceID opaquely and uniquely identifies an instance of this class. In ...
- Within the scope of the instantiating Namespace, InstanceID opaquely and uniquely identifies an instance of this class. In ...
- Within the scope of the instantiating Namespace, InstanceID opaquely and uniquely identifies an instance of this class. To ...
- Within the scope of the instantiating Namespace, InstanceID opaquely and uniquely identifies an instance of this class. To ...
- Without an inbound exception for the Key Management Service (TCP), the Volume Activation Tools will not be able to query ...
- Without an inbound exception for the Remote Management (RPC), the Volume Activation Tools will not be able to query or configure ...
- Without an inbound exception for the Windows Management Instrumentation (WMI), the Volume Activation Tools will not be able ...
- Without these updates, Hyper-V Server might not install properly and your computer might be more vulnerable to security threats. ...
- Without these updates, Storage Server might not install properly and your computer might be more vulnerable to security threats. ...
- Without these updates, Windows might not install properly and your computer might be more vulnerable to security threats. ...
- Witness deregistration has completed. Status: %1 Cluster share name: %4 Cluster share type: %2 Guidance: The client successfully ...
- Witness registration has completed. Status: %1 Cluster share name: %4 Cluster share type: %2 File server cluster address: ...
- Witness Service is requesting to move an SMB client (%1) that is optimized to connect to a specific SMB server for one or ...
- WLAN AutoConfig service failed to connect to a wireless network. Network Adapter: %2 Interface GUID: %1 Connection Mode: ...
- WLAN AutoConfig service has failed to start the hosted network. Error Code: %2 Error Message: %3 Interface GUID: %1 SSID: ...
- WLAN AutoConfig service has failed to stop the hosted network. Error Code: %2 Error Message: %3 Interface GUID: %1 SSID: ...
- WLAN AutoConfig service has successfully connected to a wireless network. Network Adapter: %2 Interface GUID: %1 Connection ...
- WLAN AutoConfig service has successfully disconnected from a wireless network. Network Adapter: %2 Interface GUID: %1 Connection ...
- WLAN AutoConfig service started a connection to a wireless network. Network Adapter: %2 Interface GUID: %1 Connection Mode: ...
- WLAN Security Settings: BSS Type %1, Authentication %2, Encryption %3, OneX Enabled %4, Eap Information - Type %5, Vendor ...
- WLBS_PORT_OVERLAP At least one of the port numbers in the specified port rule is currently listed in at least one other port ...
- WMI allows script-based management of numerous operating system components including disk drives, event logs, network adapter ...
- WMI caches provider registration objects to decrease overallexecution time. The substem will drop cache entries either through ...
- WMI filters can be linked to Group Policy objects (GPO). If a filter is linked to a GPO, then that GPO applies only to those ...
- WMI filters can be linked to Group Policy objects (GPO). If a filter is linked to a GPO, then that GPO applies only to those ...
- WMI interop namespace class "%1" has been overwritten. Some of the Interop scenarios might not work properly. Please issue ...
- WMI is used to apply DirectAccess settings on mobile computers in the specified security groups. You do not have sufficient ...
- WNP Keep Alive Detector resetting Idle Failed Interval. Last Idle-Succeeded interval %1 seconds is larger than Idle-Failed ...
- WNP Transport Layer received command for the %6 with Verb: %1, Trid: %2, Namespace: %3 containing %4 bytes of payload: %5. ...
- WNP Transport Layer received command when disconnected for the %6 with Verb: %1, Trid: %2, Namespace: %3 containing %4 bytes ...
- Word cannot save this document because the required encoding file, ieencode.dll, is missing. Please run Setup again, and ...
- WordPad does not support all of the features of this document's format. Some content might be missing or displayed improperly. ...
- WordPad was unable to open the URL. Check the URL and try again. If you continue to see this problem, you might not have ...
- Work Folders couldn't detect changed files using the USN change journal, so it's scanning all files for changes. No action ...
- Work Folders detected a conflict on an item and decided a conflict resolution. Concurrency conflict: %1; Source item name: ...
- Work Folders detected that an error occured that requires the database to be recreated. Database path: %1; Error code: %2 ...
- Work Folders is syncing your files in the background. Any files that you store in Work Folders will be uploaded to your organization. ...
- Work Folders provides a way to use work files from a variety of computers, including work and personal devices. You can use ...
- Work Folders sync stopped because the Enterprise ID for this PC was remotely revoked by the issuing authority. Access to ...