Windows 8
- Security for reference tracking can be provided if authentication is used and that the default impersonation level is not ...
- Security group %1!s! in %2!s! cannot be used because it is already associated with a %3!s! client GPO. Remove %1!s! from ...
- Security group %1!s! in %2!s! cannot be used because it is already associated with a Windows 7 client GPO in %3!s!. Remove ...
- Security Handshake between local and remote endpoints '%2' did not complete in '%1' seconds, node terminating the connection ...
- Security identifier (SID) filtering is disabled. This is a security risk. For more information about SID filtering and how ...
- Security information on the binding is as follows: SPN Requested: %1 Authn Service: %2!d! Authn Level: %3!d! Authz Service: ...
- Security must be initialized before any interfaces are marshalled or unmarshalled. It cannot be changed once initialized. ...
- Security on object changed: Object Server: %1 Object Type: %2 Object Name: %3 Handle ID: %4 Process ID: %5 Image File Name: ...
- Security or firewall settings might be blocking the connection Security policy settings or firewall settings on this computer ...
- Security settings could not be applied to the folder %1. To prevent unauthorized access to the folder, you should manually ...
- Security settings could not be applied to the shared folder %1. To prevent unauthorized access to the folder, you should ...
- Security Stats: - Security Context: Create = %1!10lu! Free = %2!10lu! Timeout = %3!10lu! Queue Length = %4!10lu! Queued = ...
- Security updates have been installed and require this computer to be restarted. Please close all applications and restart ...
- See additional information about disk space under the informational section in the "Amount of disk space used by replicated ...
- See also: dsadd computer /? - help for adding a computer to the directory. dsadd contact /? - help for adding a contact to ...
- See also: dsadd computer /? - help for adding a computer to the directory. dsadd contact /? - help for adding a contact to ...
- See also: dsget - describes parameters that apply to all commands. dsget computer - displays properties of computers in the ...
- See also: dsget - describes parameters that apply to all commands. dsget computer - displays properties of computers in the ...
- See also: dsget - describes parameters that apply to all commands. dsget computer - displays properties of computers in the ...
- See also: dsget - describes parameters that apply to all commands. dsget computer - displays properties of computers in the ...
- See also: dsget - describes parameters that apply to all commands. dsget computer - displays properties of computers in the ...
- See also: dsmod computer /? - help for modifying an existing computer in the directory. dsmod contact /? - help for modifying ...
- See also: dsmod computer /? - help for modifying an existing computer in the directory. dsmod contact /? - help for modifying ...
- See also: dsquery computer /? - help for finding computers in the directory. dsquery contact /? - help for finding contacts ...
- See also: dsquery computer /? - help for finding computers in the directory. dsquery contact /? - help for finding contacts ...
- See if we have secure channels from all of the DC's in the domain the domains specified by /testdomain:. /nositerestriction ...
- Segment Load} A virtual DOS machine (VDM) is loading, unloading, or moving an MS-DOS or Win16 program segment image. An exception ...
- Segments Received/sec is the rate at which segments are received, including those received in error. This count includes ...
- Segments Retransmitted/sec is the rate at which segments are retransmitted, that is, segments transmitted containing one ...
- Segments Sent/sec is the rate at which segments are sent, including those on current connections, but excluding those containing ...
- Select a certificate from the following list and then click "Register" to register it in Active Directory Domain Services. ...
- Select a certificate template used to enroll the certificate used by the Remote Access server to sign OTP certificate enrollment ...
- Select a computer naming format for new client computers, and set the location in the directory service where client computer ...
- Select a contact from the contact list below. Your contact will be able to connect to you securely without using a password. ...
- Select a cover page template, and type a subject line and note if required by the template. This information is automatically ...
- Select a hard disk drive with enough free space to temporarily store files you're burning to a disc. The drive might need ...
- Select a key from the list. The listed keys are the keys available on the target computer matching the search criteria. You ...
- Select a language below to get started. Only languages that are currently installed and can be personalized are listed. What ...
- Select a line on your ISDN adapter, and type its multiple subscriber numbers, as provided by your phone company. After entering ...
- Select a line on your ISDN adapter. Then, select each channel, and type its phone number and SPID, as provided by your phone ...
- Select a line on your ISDN adapter. Then, select each channel, and type its phone number, as provided by your phone company. ...
- Select a line on your ISDN adapter. Then, select each logical terminal, and type its subaddress and phone number Repeat for ...
- Select a reference member that has the most up-to-date files. Files on this member will be used to compare files on other ...
- Select a server on which to mount the virtual hard disk (VHD). If you select a VHD file from a network share, that share ...
- Select a server to use as a baseline for this security policy. You can apply this policy to the selected server or to any ...
- Select a service provider. If you do not have a membership with the provider you select, the wizard will help you create ...
- Select a service provider. If you do not have a membership with the provider you select, the wizard will help you create ...
- Select a Starter GPO cabinet (CAB) file to load into this domain's Starter GPO store. Check the version comparison table ...
- Select a VPN server from the list below. You might choose a server closest to your current location, or a server closest ...
- Select Add Channel to enter the name and channel number for a standard TV channel that is missing from the Guide. To add ...
- Select an Active Directory Domain Controller from the list below by either name or site. (You can refresh the list by either ...
- Select an assessment tile using the up and down arrows, then click the Add button on that tile to add an instance of it to ...
- Select an existing file encryption certificate or create a new one. If you have already encrypted files, you can update them ...
- Select an image to apply to the selected computers. If you do not select an image here, you can choose images for individual ...
- Select an item below to configure NPS as a RADIUS server, Network Access Protection (NAP) policy server, or RADIUS proxy. ...
- Select an item below to create, configure, and manage templates. All templates can be exported to or imported from other ...
- Select an offline VHD file on which Windows Server 2012 is already installed, and from which you want to remove roles and ...
- Select an offline VHD file on which Windows Server 2012 is already installed, and on which you want to install roles and ...
- Select at least one supported Windows authentication method. If you select both methods, users that use either method will ...
- Select certain built-in and custom fields and group them, in order to create meaningful view of logical grouping based on ...
- Select certain built-in and custom fields and group them, in order to create meaningful view of logical grouping based on ...
- Select certain built-in and custom fields and group them, in order to create meaningful view of logical grouping based on ...
- Select Configure Accounting if you want to run the Accounting Configuration Wizard. The wizard allows you to choose between ...
- Select EAP types to use with PEAP. The authentication type determines the kind of credentials that NPS can accept from client ...
- Select Enable to automatically synchronize passwords in the Windows to UNIX direction for all NIS accounts that have been ...
- Select how long Server for NFS will wait for clients to reclaims locks when Server for NFS recovers from a disruption in ...
- Select how long you would like to keep your download history. You can also purge your download history by clicking 'Clear ...
- Select how to resolve the following error codes that may be returned for this system health validator and its associated ...
- Select one of the following options, depending on whether you want to replicate domain data over the network from an existing ...
- Select one of these options to determine which action Windows Firewall with Advanced Security will take for the incoming ...
- Select one or more networks for virtual machines to use for live migration. Use the buttons to list them in order from most ...
- Select one or more sync conflicts. Then click Resolve to view the details of each conflict and decide how to resolve them. ...
- Select one or more volumes to store your backups. Use multiple volumes in different disks if you want to store backups offsite. ...
- Select one preferred network Windows Help and Support can provide more information about how to prevent your computer from ...
- Select one preferred network Windows Help and Support can provide more information about how to prevent your computer from ...