Windows 8

  1. The following filter was present when the Windows Filtering Platform Base Filtering Engine started. Provider Information: ...
  2. The following information is used to determine the inbound LAN Manager authentication level and whether LAN Manager hashes ...
  3. The following information is used to determine the LAN Manager authentication level used when making outbound connections. ...
  4. The following input is not recognized as an IP address or subnet: %1 Enter IP addresses using an X.X.X.X format and subnets ...
  5. The following input methods are available only on 32 bit processes. %sDo you want to include them in Default User Account? ...
  6. The following is a list of DiskShadow commands. For more information about a command, type the command name. All inputs in ...
  7. The following is a list of the driver packages that were not added to the server. Common causes for failed packages include ...
  8. The following is a list of unattend parameters that can be specified to install a new AD LDS instance (default values are ...
  9. The following iSCSI target has been detected with unrestricted access, with associated iSCSI initiator IQN specified as "*". ...
  10. The following key is in a registry hive that is not valid: "{0}". The key must be in one of the following hives: HKEY_LOCAL_MACHINE, ...
  11. The following key is not valid for a Group Policy registry setting: "{0}". The key must be in one of the following registry ...
  12. The following Language Interface Packs you are about to install contain a readme file which you can optionally review before ...
  13. The following Language Interface Packs you are about to install contain a readme file which you can optionally review before ...
  14. The following list contains the policies that can apply to this item. The policy at the top of the list has precedence and ...
  15. The following list displays the permissions that would be granted to the selected group or user, based solely on the permissions ...
  16. The following lists contain the policies that can be configured in the Certificate Path Validation and where they are configured. ...
  17. The following management tool could not be opened: {0}. Verify that {1} has been installed as part of Remote Server Administration ...
  18. The following module is providing the PSDrive in the current Windows PowerShell session: {0}. Therefore no modules were removed. ...
  19. The following name is not valid: "%1". To specify an object on a computer, use the following format: computer\item. To specify ...
  20. The following name or alias defined in $PSDefaultParameterValues for this cmdlet resolves to multiple parameters: {0}. The ...
  21. The following name, %1, contains an incorrect format for a character code. The name has not been entered in the WINS database.The ...
  22. The following name, %1, is too long. Valid NetBios names must not exceed 15 characters. The name has not been entered in ...
  23. The following namespace folders are associated with replicated folders. If a replicated folder is the last in the replication ...
  24. The following network characteristics have been detected for tunnel %1; Link latency : %2 milliseconds and Bandwidth: %3 ...
  25. The following network characteristics have been detected for tunnel %1; Link latency : %2 milliseconds and Bandwidth: %3 ...
  26. The following node ID is not valid, no longer exists, or was not created on the current thread: {0}. Ensure that all scope ...
  27. The following nodes in a failover cluster cannot be verified because the nodes are not available on the network, or because ...
  28. The following number of operations is waiting in the replication queue. The oldest operation has been waiting since the following ...
  29. The following object belonging to the local domain controller has been modified inappropriately on a writable domain controller. ...
  30. The following object could not inherit a security identifier (SID) from another object. Object: %1 Additional Data Error ...
  31. The following object was created on a remote directory service with an object name that already exists on the local directory ...
  32. The following object was renamed on a remote directory service with an object name that already exists on the local directory ...
  33. The following objects might represent the same object that was moved from two domain controllers in this domain to two different ...
  34. The following objects that you selected for universal group membership are from a mixed-mode domain. The membership will ...
  35. The following parent object was intended to be physically removed from the database. In preparation, child objects for this ...
  36. The following per profile settings were applied by Windows Firewall Profile: %1 Operational Mode: %2 Stealth Mode: %3 Block ...
  37. The following permissions determine who will have access to resources scoped by target resources. They will be in effect ...
  38. The following policy was active when the Windows Firewall started. Group Policy Applied: %1 Profile Used: %2 Operational ...
  39. The following policy was active when the Windows Firewall started. Group Policy applied: %1 Profile used: %2 Operational ...
  40. The following problems were found while verifying various important DN references. Note, that these problems can be reported ...
  41. The following programs depend on this version of Windows Media Format Runtime to run properly and must be removed before ...
  42. The following programs depend on Windows Media Player to run properly and must be removed before you roll back to a previous ...
  43. The following properties are available for this network adapter. Click the property you want to change on the left, and then ...
  44. The following property definition was %1: Name: %2 Type: %3 Global: %4 Secure: %5 Deprecated: %6 Applies To: %7 Possible ...
  45. The following protocols are supported by servers running Microsoft Routing and Remote Access. If you use a different remote ...
  46. The following provider context was present when the Windows Filtering Platform Base Filtering Engine started. Provider ID: ...
  47. The following provider context was present when the Windows Filtering Platform Base Filtering Engine started. Provider ID: ...
  48. The following provider was present when the Windows Filtering Platform Base Filtering Engine started. Provider ID: %1 Provider ...
  49. The following provider was present when the Windows Filtering Platform Base Filtering Engine started. Provider ID: %1 Provider ...
  50. The following RD Gateway servers are being managed by this snap-in console. To configure or manage a remote RD Gateway server, ...
  51. The following registry key on the namespace server is inconsistent with the metadata in Active Directory Domain Services ...
  52. The following registry value for logging overrides contains a number of characters that is not valid. Registry value: %1 ...
  53. The following replicated folders are associated with the namespace to be deleted. If a replicated folder is the last one ...
  54. The following reservations conflict with the configuration of MAC address filters (Reserved IP address, MAC address): {0}. ...
  55. The following resolutions are available to address the problems that were found. Additional resolutions will become available ...
  56. The following resource could not be downloaded: %5 Make sure that: - The file exists on the remote computer - Your computer ...
  57. The following rules define network connectivity requirements for the selected predefined group. Rules that are checked will ...
  58. The following saved state errors were reported: {0} The operation cannot proceed unless these errors are resolved. Do you ...
  59. The following scopes already exist on the partner server. These scopes will need to be deleted on the partner server before ...
  60. The following scopes will be added to failover relationship %1: %2. The configuration of these scopes on server %3 will be ...
  61. The following sections describe how much disk space is used by replicated folders and their associated staging folders and ...
  62. The following selector is not a key property of the resource accessed : %1. Use selectors that are key properties for the ...
  63. The following servers have compatibility problems. All the network adapters on these servers are being used. If you continue, ...
  64. The following servers in this deployment are not part of the server pool: {0} {1} The servers must be added to the server ...
  65. The following service has repeatedly stopped responding to service control requests: %1 Contact the service vendor or the ...
  66. The following service is taking more than %2 minutes to start and may have stopped responding: %1 Contact your system administrator ...
  67. The following service principal name, which is suitable for mutual authentication, was created for the following Directory ...
  68. The following services failed to start during a run level switch: %1 Please start the services manually and retry the run ...
  69. The following settings allow DCOM to locate the correct computer for this application. If you make more than one selection, ...
  70. The following settings have applied to this object. Within this category, settings nearest the top of the report are the ...
  71. The following settings were applied to the Windows Firewall at startup Current Profile: %1 IPsec SA Idle time: %2 IPsec preshared ...
  72. The following share names are already in use on the destination server {0}. The existing shares will be deleted and replaced ...
  73. The following shares are either shared using multiple names or have a shared subfolder that is not selected to be migrated. ...
  74. The following shares are either shared using multiple names or have a shared subfolder that is not selected to be migrated. ...
  75. The following site has no NTDS Site Settings child object. Site: %1 User Action Create an NTDS Site Settings object for this ...