Windows 8

  1. Microsoft Windows Server has detected that NTLM authentication is being used between clients and this server. This event ...
  2. Microsoft Windows Server has detected that NTLM authentication is presently being used between clients and this server. This ...
  3. Microsoft Windows Server includes Identity Management for UNIX, which facilitates populating and managing UNIX identity data ...
  4. Microsoft Windows Services for UNIX (SFU) is installed in this forest. Before proceeding, you need to apply Microsoft hotfix ...
  5. Microsoft Windows System Resource Manager (WSRM) enables you to assign computer resources through policies to multiple programs, ...
  6. Microsoft Windows WFP Built-in IPsec DoS Protection configuration provider used to identify filters added by IPsec Denial ...
  7. Microsoft Windows WFP Built-in TCP Templates provider used to identify filters added by TCP Template based configuration. ...
  8. Microsoft WordPad is a word processing program that you can use to create and edit text documents with rich formatting and ...
  9. Microsoft's implementation of an Host Credential Authorization Protocol (HCAP) server. This feature adds HCAP as an ISAPI ...
  10. Microsoft(R) Windows(R) Operating System Default Group Policy Restore Utility v5.1 Copyright (C) Microsoft Corporation. 1981-2003 ...
  11. Microsoft(R) Windows(TM) Directory Service Utilities Version 2.0 Copyright (C) Microsoft Corporation 1991-2002. All Rights ...
  12. Migration did not succeed. Destination location '%1' is on a Cluster Disk. Such a configuration is not supported, please ...
  13. Migration did not succeed. Mirror operation failed for the source VHD file '%1' to the destination file '%2': '%3'('%4'). ...
  14. Migration has not yet reached a consistent state on all domain controllers. State information might be stale due to Active ...
  15. Migration of a DHCP resource requires additional steps before and after migration to ensure it is successful. For more information, ...
  16. Migration was canceled by the user. You can attempt to manually complete the migration, or you can delete any partially migrated ...
  17. Migration will proceed to 'Prepared' state. The SYSVOL share will be changed to SYSVOL folder, which is replicated using ...
  18. Migration will proceed to 'Redirected' state. The SYSVOL share will be changed to SYSVOL_DFSR folder, which is replicated ...
  19. Mild depictions of violent actions involving cartoon-like situations and characters. May include violence where a character ...
  20. Minimum password age This security setting determines the period of time (in days) that a password must be used before the ...
  21. Minimum password length This security setting determines the least number of characters that a password for a user account ...
  22. Minimum RTO (msec) : %1!d! Initial Congestion Window (MSS) : %2!d! Congestion Control Provider : %3!s! Enable Congestion ...
  23. Miniport does not have any recommendation regarding the request to provide a functional VidPN given the current display adapter ...
  24. Miniport Return Packet Cycles/sec is the average rate, in cycles per second, at which an interface processed returning received ...
  25. Miniport RSS Indirection Table Change Cycles is the average rate, in cycles per second, at which an interface processed changing ...
  26. Miniport Send Cycles/sec is the average rate, in cycles per second, at which an interface processed transmitting packets. ...
  27. Mirrors the simple volume with focus to the specified disk. Syntax: ADD DISK= ALIGN= WAIT NOERR DISK= Specifies a disk, other ...
  28. Missed Mailslot Datagrams is the number of Mailslot Datagrams that have been discarded due to configuration or allocation ...
  29. Missed Server Announcements is the number of server announcements that have been missed due to configuration or allocation ...
  30. Missed Server List Requests is the number of requests to retrieve a list of browser servers that were received by this workstation, ...
  31. Missing either a VALUEON or VALUEOFF keyword. Policies using the unnamed registry value must have both VALUEON and VALUEOFF ...
  32. Missing NIS Domain. The NIS Domain assigned to the object could not be found in the Active Directory Domain Services. Assign ...
  33. MMC cannot create this view because it contains a Web browser control. Be sure Internet Explorer 5.0 or greater is installed. ...
  34. MMC cannot initialize because the MMC installation or a portion of the registry is corrupted. You can attempt to fix the ...
  35. MMC cannot initialize because the MMC installation or a portion of the registry is corrupted. You can attempt to fix the ...
  36. MMC cannot initialize the snap-in because the snap-in requires version %1!s! of the .Net Framework and version %2!s! is already ...
  37. MMC cannot open the file %1. This may be because the file does not exist, is not an MMC console, or was created by a later ...
  38. MMC could not enumerate existing services from the Service Control Manager. The service dependencies configuration list will ...
  39. mode`mode`trace_mode`Event Trace Session logger mode. For more information visit - http://go.microsoft.com/fwlink/?LinkID=136464 ...
  40. Modfies the ntdssettings object of the domain controller targeted by the "[DC]"parameter . Capabilities include Add or remove ...
  41. Modifications or transforms allow you to customize the package and are applied to the package in the order shown in the following ...
  42. Modified Page List Bytes is the amount of physical memory, in bytes, that is assigned to the modified page list. This memory ...
  43. Modifies or displays the replication authentication mode in use by an ADAM configuration set. SYNTAX /replauthmode DSA_LIST ...
  44. Modifies the specified 24-hour schedule. 1. wsrmc /Modify:Sched /i: /Force must be a valid XML file. /Force overrides time-stamp ...
  45. Modifies the specified Policy. 1. wsrmc /Modify:Pol /i: /Force must be a valid XML file. /Force overrides time-stamp checking. ...
  46. Modify an object label This privilege determines which user accounts can modify the integrity label of objects, such as files, ...
  47. Modify auto apply quotas. The syntax of this command is: Dirquota Autoquota Modify /Path:PATH /SourceTemplate:TEMPLATE /Apply:{None|All|Matching} ...
  48. Modify existing file groups. The syntax of this command is: Filescrn Filegroup Modify /Filegroup:FG_NAME /New-Filegroup:FG_NAME_NEW ...
  49. Modify existing file screen exceptions. The syntax of this command is: Filescrn Exception Modify /Path:PATH /Add-Filegroup:ADD_FG ...
  50. Modify existing file screen templates. The syntax of this command is: Filescrn Template Modify /Template:TEMPLATE_NAME /New-Template:TEMPLATE_NEW ...
  51. Modify existing file screens. The syntax of this command is: Filescrn Screen Modify /Path:PATH /SourceTemplate:TEMPLATE /Type:{Active|Passive} ...
  52. Modify existing quota templates. The syntax of this command is: Dirquota Template Modify /Template:TEMPLATE_NAME /New-Template:TEMPLATE_NEW ...
  53. Modify existing quotas. The syntax of this command is: Dirquota Quota Modify /Path:PATH /Limit:LIMIT[kb|mb|gb /Type:{Hard|Soft} ...
  54. Modify existing storage report jobs. The syntax of this command is: Storrept Reports Modify /Task:TASK /New-Task:NEW_TASK ...
  55. Modify firmware environment values This security setting determines who can modify firmware environment values. Firmware ...
  56. Modify the configuration of a log. Usage: wevtutil { sl | set-log } /OPTION:VALUE /OPTION:VALUE . String that uniquely identifies ...
  57. Modify the specified Calendar Event. 1. wsrmc /Modify:Cal /i: /Force must be a valid XML file. /Force overrides time-stamp ...
  58. Modify the specified Process Matching Criteria. 1. wsrmc /Modify:Pmc /i: /Force must be a valid XML file. /Force overrides ...
  59. Modify the wireless network security settings for "%ws" If you set up or own this network, you might be able to fix the problem ...
  60. Modify the wireless router or access point settings for "%ws" The settings on the wireless router or access point are incompatible ...
  61. Modify the wireless router or access point settings for "%ws" The wireless network adapter on this computer does not support ...
  62. Modify the wireless security settings for "%ws" The wireless network you are trying to connect to requires shared-key authentication, ...
  63. Modifying adapter settings will take some time. During this time the server cannot accept connections. Do you want to modify ...
  64. Modifying resource dependencies for DFS Replicated folder resources is not recommended. Instead, please use the DFS Management ...
  65. Module Manifest path '{0}' is not valid. The path argument must resolve to a single file in the file system with a '.psd1' ...
  66. Monitor available disk space to ensure sufficient space is available for expansion. Consider shutting down the virtual machine ...
  67. Monitor available disk space to ensure sufficient space is available for virtual hard disk expansion. Consider merging differencing ...
  68. monitor has gone from %4 state to %6 state on %8 at %9 on %10. The failure heuristic IDs for state change of %2 are %11. ...
  69. Monitor the performance of the RD Gateway server to determine the maximum number of connections that the RD Gateway server ...
  70. Monitors various sensors in order to expose data and adapt to system and user state. If this service is stopped or disabled, ...
  71. More channels were found but were not added to the TV Program Guide because they did not have enough information. You can ...
  72. More information cannot be added to the MIB because the resulting LLDP frame would exceed the link's Maximum Transmission ...
  73. More records remain to be enumerated! To enumerate ALL reissue the command with the \/Continue\ option. OR To enumerate remaining ...
  74. More than 20 percent of replication cycles have been missed for virtual machine '%1'. Replication might be encountering problems. ...
  75. More than one command with name '{0}' was found. Please start '{1}' with no parameters and type '{0}' to filter the results. ...