Windows 8
- Setup was unable to detect your Extender on the network. The following program on this computer might prevent your Extender ...
- Setup was unable to determine whether Microsoft iSCSI Software Target or Microsoft iSCSI Software VDS/VSS providers are installed ...
- Setup was unable to find your Extender on the network. This issue might be caused by a configuration problem with your network, ...
- Setup was unable to install or update the default certificate templates. Ensure you have write permissions on the "Certificate ...
- Setup will attempt to turn on NX during installation. If your processor doesn't support NX, the installation will be cancelled ...
- SetUpdateInformation requires that you specify a WriteActivationMode or ReadActivationMode. These modes determine when the ...
- Several items from the following location have failed to play: %s Do you want to remove all items in that location from the ...
- Several items from the following location have failed to play: %s Do you want to remove files that cannot be found in that ...
- Several navigation nodes that define the scope of this view are no longer available. Adjust the scope of this view before ...
- Severity=Info DHCPV6 Relay Agent has discarded a packet received on the local interface with IP address %1. The packet had ...
- Severity=Warning DHCPV6R has discarded a packet received on the local interface with IP address %1. The packet had a hop-count ...
- Shadow copies allow users to view the contents of shared folders as the contents existed at previous points in time. For ...
- Shadow Copies of Shared Folders provides point-in-time copies of files that are located on shared resources, such as a file ...
- Shadow copy "%1" was deleted during storage report generation. Volume "%2" might be configured with inadequate shadow copy ...
- Shadow copy '%1' was deleted during storage report generation. Volume '%2' might be configured with inadequate shadow copy ...
- Shadow copy context and options cannot be changed at this point. Use RESET to reset DiskShadow to its original state, or ...
- Shadow copy creation failed for volume "%1" after retrying for %2 minutes because other shadow copies were being created. ...
- Shadow copy creation failed for volume "%1" with error %2. The volume might be configured with inadequate shadow copy storage ...
- Shadow copy creation failed for volume '%1' with error %2. The volume might be configured with inadequate shadow copy storage ...
- Shadow Copy ID: %1 Original Volume: (%2)%3 Shadow Copy Volume: %4 Originating Machine: %5 Service Machine: %6 Provider: '%7' ...
- Shadow Copy Storage association For volume: (%1)%2 Shadow Copy Storage volume: (%3)%4 Used Shadow Copy Storage space: %5 ...
- Share name that you entered may not be accessible from some MS-DOS workstations. Are you sure you want to use this share ...
- Share permissions provide a level of access control for a shared folder. NTFS permissions control local access to files and ...
- Share {0} for folder {1} only has unresolved local users or groups. The application was unable to delete the share, so the ...
- Shared data cannot be updated because selection data was not updated on selection change. The snap-in might not be calling ...
- Shared files are files that other people in your home or office have access to. They might include documents, photos, music, ...
- Shared secret between the Remote Access server and the specified external RADIUS server which is required for successful ...
- Shared secret between the Remote Access server and the specified external RADIUS server which is required for successful ...
- Shared secret between the Remote Access server and the specified external RADIUS server which is required for successful ...
- Shared secret between the VPN server and the specified external RADIUS server. Note that the secret is specified in clear ...
- Shared storage must be specified in a clustered environment. Specify a Cluster Shared Volume or shared folder and retry the ...
- Sharing is authorized because your firewall has been turned off. If you are concerned about privacy on this network, turn ...
- Shim which intercepts the ShowWindow API call and fixes the problem due to tabbed browsing architecture changes in IE. The ...
- Short file names (8 characters with 3-character extensions) are required for some 16-bit applications running on client computers, ...
- Shortcuts policy allows an administrator to manage shortcuts of any type that can be configured manually on a computer, including ...
- should be in the following forms: group@domain or domain\group user@domain or domain\user FQDN of the user or group A string ...
- Should the public and private key pair, and the certificate be exported to a password protected PFX file and the private ...
- show dscp type=]ipsecauthenticated|ipsecunauthenticated|icmpv6|filtered|default Displays IPsec DoS Protection DSCP marking ...
- show interface type=]public|internal Displays IPsec DoS Protection interface configuration. Parameters: Tag Value type - ...
- show ratelimit type=]ipsecauthenticated|ipsecunauthenticated|ipsecunauthenticatedperip| icmpv6|filtered|default Displays ...
- show state publicprefix= / internalprefix= / Displays all state entries inside IPsec DoS Protection that match specified ...
- ShowCursor will display the cursor if the count is >= 0, this shim will force ShowCursor to act as a toggle rather than a ...
- SHOWISM can very useful for locating improperly configured sites. This operation cannot be executed remotely. As the KCC ...
- Shows the current SSTP Certificate configuration Friendly name - Certificate Friendly name Display name - Display Friendly ...
- Shows the idle timeout and network outage time values for IKEv2 client connections. idletimeout - Shows the idle timeout ...
- Shows the IKEv2 Security Association's expiration controls. saexpirytime - Shows the SA expiry value in minutes for IKEv2 ...
- Shows the mobility support of IKEv2 based remote access clients. ENABLED - Support mobility of remote access clients DISABLED ...
- Shuffling refreshes the music on your device by replacing the existing music files with new ones. Do you want to continue? ...
- Shut down the system This security setting determines which users who are logged on locally to the computer can shut down ...
- Shut down the virtual machine and convert the chain of VHD-format differencing virtual hard disks to the VHDX format or merge ...
- Shut down the virtual machine and convert the VHD-format dynamic virtual hard disk to a VHDX-format virtual hard disk or ...
- Shut down the virtual machine and use Hyper-V Manager to remove the SCSI controller from the virtual machine. Then, restart ...
- Shutdown: Allow system to be shut down without having to log on This security setting determines whether a computer can be ...
- Shutdown: Clear virtual memory pagefile This security setting determines whether the virtual memory pagefile is cleared when ...
- SID filtering is enabled for this trust. Only SIDs from the trusted domain will be accepted for authorization data returned ...
- SID filtering is not enabled for this trust. All SIDs presented in an authentication request from this domain will be honored. ...
- SID History was added to an account. Subject: Security ID: %6 Account Name: %7 Account Domain: %8 Logon ID: %9 Target Account: ...
- SIDs were filtered. Target Account: Security ID: %1 Account Name: %2 Account Domain: %3 Trust Information: Trust Direction: ...
- Signal strength from "%ws" is low This could be caused by the computer being too far away from the wireless router or access ...
- Signals Windows when an application is attempting to listen on an interface and has opted in for edge traversing traffic. ...
- Signature (SIG) Cryptographic signature (SIG) record. Authenticates a resource record set of a particular type, class, and ...
- Signature validation cannot be performed on modules loaded by COM, so the object will not be created. The object is likely ...
- Significant data loss might occur if the virtual machine encounters a problem and a recent backup does not exist. This impacts ...
- Signing Certificate is automatically updated by OCSP Responder Service. CA Configuration ID: %1 New Signing Certificate Hash: ...
- Signing Certificate was automatically updated by the OCSP Responder Service. CA Configuration ID: %1 New Signing Certificate ...
- Simple Network Management Protocol (SNMP) includes agents that monitor the activity in network devices and report to the ...
- Simple Network Management Protocol (SNMP) Service includes agents that monitor the activity in network devices and report ...
- Simple TCP/IP Services supports the following TCP/IP services: Character Generator, Daytime, Discard, Echo and Quote of the ...
- Simulating a failure could cause the clustered role to be moved to another node in the cluster, and this could interrupt ...
- Since an MSMQ 1.0 primary site controller owns the queue, you must manually delete the queue from the MSMQ 1.0 site (use ...
- Since the SQL instance name does not already exist in the registry and the WID role service is not installed, the instance ...
- Since these permissions propagate to all child objects, making this change will require more storage and time to evaluate. ...
- Since you have specified the RPC/HTTP proxy echo only option (-E), the endpoint/interface you have specified will be ignored ...
- Since your system administrator requires a log to be maintained of all Remote Assistance sessions, Remote Assistance will ...
- Single-root I/O virtualization (SR-IOV) requires specific hardware. It also might require drivers to be installed in the ...