Windows 10

  1. This connection is configured to validate the identity of the access server, but Windows cannot verify the digital certificate ...
  2. This connection requires security features that are not available on this platform. For information, contact customer support. ...
  3. This connection was automatically generated by the Active Directory Domain Services. Changes to this connection will be overwritten ...
  4. This connection was automatically generated by the Active Directory Domain Services. Changes to this connection will be overwritten. ...
  5. This connection was configured to use a data encryption strength that is not supported by the installed software. The security ...
  6. This console file was saved with a previous version of the IP Security Monitor snap-in that is not compatible with the current ...
  7. This content is managed by your organization, but the destination isn't. If you continue, this action will be noted. Paste ...
  8. This Control Panel cannot be run without Internet Explorer Version 5 or greater. Please install a newer version of Internet ...
  9. This copy of the AOL software was intended for use on earlier versions of the Windows operating system. Please click 'Continue' ...
  10. This copy of the AOL software was intended for use on earlier versions of the Windows operating system. You may be unable ...
  11. This copy of the CompuServe software was intended for use on earlier versions of the Windows operating system. Please click ...
  12. This copy of the CompuServe software was intended for use on earlier versions of the Windows operating system. You may be ...
  13. This copy of this app has expired. Your PC might be vulnerable to malware. To continue using this app, contact your security ...
  14. This copy of this app will expire in %1 days. To continue using this app to help protect your PC, contact your security administrator. ...
  15. This copy of this app will expire within a day. To continue using this app to help protect your PC, contact your security ...
  16. This copy of Windows is not genuine. To receive the full protection of this program, you must verify that your copy of Windows ...
  17. This counter displays the number of net user and new local groups evaluations per second when performing a non-transitive ...
  18. This counter displays the number of new groups encountered per second when performing a transitive membership evaluation. ...
  19. This counter displays the number of universal group membership evaluations per second on a global catalog domain controller ...
  20. This counter represents the last replication latency in seconds. It is the time taken for the delta to be applied on the ...
  21. This counter represents the number of packets from the external NIC that enter the virtual switch on the virtual switch processor. ...
  22. This counter represents the number of packets from the external NIC that enter the virtual switch per second on the virtual ...
  23. This counter represents the number of packets from the VM/host that enter the virtual switch on the virtual switch processor. ...
  24. This counter represents the number of packets from the VM/host that enter the virtual switch per second on the virtual switch ...
  25. This counter represents the total bytes received over the network for the virtual machine since the virtual machine management ...
  26. This counter represents the total bytes sent and received over the network for the virtual machine during the resynchronize ...
  27. This counter represents the total bytes sent over the network for the virtual machine since the virtual machine management ...
  28. This counter represents the total number of dropped packets by switch extensions in the incoming direction of the network ...
  29. This counter represents the total number of dropped packets by switch extensions in the outgoing direction of the network ...
  30. This counter represents the total number of dropped packets by the switch extensions in the incoming direction of the virtual ...
  31. This counter represents the total number of dropped packets by the switch extensions in the outgoing direction of the virtual ...
  32. This counter represents the total number of dropped packets per second by switch extensions in the incoming direction of ...
  33. This counter represents the total number of dropped packets per second by switch extensions in the outgoing direction of ...
  34. This counter represents the total number of dropped packets per second by the switch extensions in the incoming direction ...
  35. This counter represents the total number of dropped packets per second by the switch extensions in the outgoing direction ...
  36. This counter represents the total number of dropped packets per second in the incoming direction of the virtual switch port. ...
  37. This counter represents the total number of dropped packets per second in the outgoing direction of the virtual switch port. ...
  38. This counter represents the total number of packet dropped per second by the virtual switch extensions in the incoming direction. ...
  39. This counter represents the total number of packet dropped per second by the virtual switch extensions in the outgoing direction. ...
  40. This counter set displays information about server shares that are being accessed by the client using SMB protocol version ...
  41. This counter tracks the number of armored Authentication Service (AS) requests that are being processed by the Key Distribution ...
  42. This counter tracks the number of armored ticket-granting service (TGS) requests that are being processed by the Key Distribution ...
  43. This counter tracks the number of Authentication Service (AS) requests explicitly requesting claims that are being processed ...
  44. This counter tracks the number of Authentication Service (AS) requests that are being processed by the Key Distribution Center ...
  45. This counter tracks the number of claims-aware ticket-granting service (TGS) requests that are being processed by the Key ...
  46. This counter tracks the number of constrained delegation (S4U2Proxy) TGS requests that are being processed by the Key Distribution ...
  47. This counter tracks the number of constrained delegation (S4U2Proxy) TGS requests that are being processed by the Key Distribution ...
  48. This counter tracks the number of context handles in use by a given process. Context handles are associated with security ...
  49. This counter tracks the number of credential handles in use by a given process. Credential handles are handles to pre-existing ...
  50. This counter tracks the number of Kerberos requests that a read-only domain controller (RODC) forwards to its hub, per second. ...
  51. This counter tracks the number of NTLM authentications processed per second for the AD on this DC or for local accounts on ...
  52. This counter tracks the number of Secure Sockets Layer (SSL) client-side reconnect handshakes that are being processed per ...
  53. This counter tracks the number of Secure Sockets Layer (SSL) entries that are currently stored in the secure channel (Schannel) ...
  54. This counter tracks the number of Secure Sockets Layer (SSL) entries that are currently stored in the secure channel (Schannel) ...
  55. This counter tracks the number of Secure Sockets Layer (SSL) full client-side handshakes that are being processed per second. ...
  56. This counter tracks the number of Secure Sockets Layer (SSL) full server-side handshakes that are being processed per second. ...
  57. This counter tracks the number of Secure Sockets Layer (SSL) server-side reconnect handshakes that are being processed per ...
  58. This counter tracks the number of service asserted identity (S4U2Self) TGS requests that are explicitly requesting claims. ...
  59. This counter tracks the number of ticket-granting service (TGS) requests that are being processed by the Key Distribution ...
  60. This creates a bootable media on the target drive. Remove the drive after the build is done to avoid booting from the resulting ...
  61. This cross-ref has a non-standard dNSRoot attribute. Cross-ref DN: %2 nCName attribute (Partition name): %1 Bad dNSRoot attribute: ...
  62. This cross-ref has an invalid nETBIOSName attribute. Cross-ref DN: %2 nCName attribute (Partition name): %1 Bad nETBIOSName ...
  63. This custom selection is currently selected in another application. Change the selection in the other application before ...
  64. This data collector set collects Active Directory related data on your local system. The data to be collected includes registry ...
  65. This data collector set collects LAN service related data on your local system. The data to be collected includes wired debug ...
  66. This data collector set collects network related data on your local system. The data to be collected includes network component ...
  67. This data collector set collects wireless service related data on your local system. The data to be collected includes wireless ...
  68. This data is available only if the Group Policy Modeling simulation is processed on a domain controller with Q816453 installed. ...
  69. This data is only used to improve handwriting recognition and text prediction results for languages without IMEs on this ...
  70. This data was generated the last time the user executed the Add/Remove Programs control panel applet. To ensure that this ...
  71. This database couldn't be created because no template file was selected. To Open an Existing Database Right click on the ...
  72. This destination already contains a folder named '%1'. If any files have the same names, you will be asked if you want to ...
  73. This destination already contains a folder named '%1'. If any files have the same names, you will be asked if you want to ...
  74. This device can display pictures, but you must add them to the library before the pictures can be synchronized to the device. ...
  75. This device can not eject at this time as there will be no remaining power sources (batteries) to keep the computer running ...