Windows 10

  1. This feature cannot be enabled in the current image because the parent feature(s) are not installed. If you need this feature, ...
  2. This feature coordinates transactions that update transaction-protected resources, such as databases, message queues and ...
  3. This feature enables users to connect to projectors over wired or wireless networks to project presentations. (Uses WSDAPI) ...
  4. This feature includes Simple Network Management Protocol agents that monitor the activity in network devices and report to ...
  5. This feature is used for collaborating over a network to share documents, programs or your desktop with other people. (Uses ...
  6. This feature is used for sharing local files and printers with other users on the network. (Uses NetBIOS, LLMNR, SMB and ...
  7. This feature is used to maintain a secure channel between domain clients and a domain controller for authenticating users ...
  8. This feature manages authentication, authorization, auditing and accounting for network connection attempts sent by access ...
  9. This feed contains a DTD (Document Type Definition). DTDs are used to define a structure of a webpage. Internet Explorer ...
  10. This file can't be protected because your administrator has blocked encryption of this file format. Contact your administrator ...
  11. This file can't be re-protected because your administrator has blocked encryption of this file format. Contact your administrator ...
  12. This file contains a security vulnerability, which has been fixed in more recent versions of the Bing Maps SDK. http://g ...
  13. This file contains a virus or potentially unwanted software and cannot be opened. Due to the nature of this virus or potentially ...
  14. This file contains characters in Unicode format which will be lost if you save this file as an ANSI encoded text file. To ...
  15. This file contains equations that need to be converted with an equation filter. This may pose a security risk if the file ...
  16. This file defines a simplified implementation of the ICRA vocabulary for use in legacy PICS-based systems. The full version ...
  17. This file does not have a program associated with it for performing this action. Please install a program or, if one is already ...
  18. This file does not have a valid digital signature that verifies its publisher. You should only install software from publishers ...
  19. This file does not have a valid digital signature that verifies its publisher. You should only run software from publishers ...
  20. This file does not have a valid digital signature that verifies its publisher. You should only run software from publishers ...
  21. This file does not have a valid digital signature that verifies its publisher. You should only save software from publishers ...
  22. This file does not have burn rights. If you obtained this file from an online store, go to the online store to get burn rights.%0 ...
  23. This file does not have sync rights. If you obtained this file from an online store, go to the online store to get sync rights. ...
  24. This file does not have sync rights. If you obtained this file from an online store, go to the online store to get sync rights.%0 ...
  25. This file is fragmented and is impacting the performance of Windows: File Name : %3 Friendly Name : %5 Version : %7 Thread ...
  26. This file is in a location outside your local network. Files from locations you don't recognize can harm your PC. If you ...
  27. This file is in a location outside your local network. Files from locations you don't recognize can harm your PC. Only open ...
  28. This file is in a location outside your local network. Files from locations you don't recognize can harm your PC. Only open ...
  29. This file is in a location outside your local network. Files from locations you don't recognize can harm your PC. Only run ...
  30. This file is in a location outside your local network. Files from locations you don't recognize can harm your PC. Only run ...
  31. This file is in a location outside your local network. Files from locations you don't recognize can harm your PC. Only run ...
  32. This file is in a location outside your local network. Files from locations you don't recognize can harm your PC. Only save ...
  33. This file is not one of the supported file types, which include .bmp, .jpg, .jpeg and .dib. Please close this dialog and ...
  34. This file is not one of the supported file types, which include .bmp, .jpg, .jpeg, and .dib. Please close this dialog and ...
  35. This file is open for modification in an unresolved transaction and may be opened for execute only by a transacted reader. ...
  36. This file management job is deprecated. Please check the configuration of the file management job and verify that it is up-to-date. ...
  37. This file might be in use or the file name might not be valid. Close any open programs, check the file name, and try again. ...
  38. This file might not be the right file type, or it might be corrupted. Please try another copy of the file or open a different ...
  39. This file was blocked because it does not have a valid digital signature that verifies its publisher. What is a digital signature? ...
  40. This file was received over a connection that was not passkey-enabled. It might have been sent by someone other than the ...
  41. This filter prevents port scanning. This many times means there are no listeners. If debugging ensure your scenario has one. ...
  42. This folder already contains a folder named '%1'. If the files in the existing folder have the same name as files in the ...
  43. This folder already contains a folder named '%1'. Rename the folder you are trying to copy and then perform the operation ...
  44. This folder can't be customized. It is either marked as read-only, or your system administrator has disabled this functionality. ...
  45. This folder can't be used because it was wiped by your organization. Delete the wiped folder or choose another location. ...
  46. This folder only supports a limited set of CreationCollisionOption values, including FailIfExists and GenerateUniqueName. ...
  47. This folder or one of its children has one or more property sheets up. Please close the property sheet before continuing ...
  48. This folder supports transfer of any data file to this device. Files copied to this folder may not be usable on this device ...
  49. This forest is operating at the highest possible functional level. For more information on forest functional levels, click ...
  50. This form is being submitted using e-mail. Submitting this form will reveal your e-mail address to the recipient, and will ...
  51. This format is exclusively for shared virtual hard disks, and enables backup of VM groups using shared virtual disks. It ...
  52. This format is for shared virtual hard disks only, and enables backup of virtual machine groups using shared virtual hard ...
  53. This format supports virtual disks up to {0} TB and is resilient to consistency issues that might occur from power failures. ...
  54. This function can only be used if a program is running in the local console session. It cannot be used if a program is running ...
  55. This function can only be used if a program is running in the local console session. It cannot be used if the program is ...
  56. This function does not support GDI mirroring display devices because GDI mirroring display devices do not have any physical ...
  57. This function is not supported. Use the Capabilities function to determine which functions and messages the driver supports. ...
  58. This Global Catalog server no longer automatically covers site '%1' for forest '%2'. However, site '%1' is still (manually) ...
  59. This group policy has no BitLocker Drive Encryption Data Recovery Agents defined directly on it. To define Data Recovery ...
  60. This group policy has no BitLocker Drive Encryption Network Unlock Certificate defined directly on it. To assign a Network ...
  61. This group policy has no Data Protection policies defined directly on it. To define a policy you can click on the Data Protection ...
  62. This group policy has no Data Protection Recovery Agents defined directly on it. To define Data Recovery Agents you can click ...
  63. This group policy has no Encrypting File System policies defined directly on it. To define a policy you can click on the ...
  64. This group policy has no Encrypting File System policies defined directly on it. To define a policy you can click on the ...
  65. This Group Policy Object will have no effect on the location of this folder. Any existing redirection will continue to apply ...
  66. This Group Policy setting lets users turn off the performance optimization so that the TIFF IFilter will perform OCR for ...
  67. This hard disk space is formatted with an unsupported version of the NTFS file system. Please back up any data you have on ...
  68. This hard disk supports space limits for each user, so a single user cannot fill the entire disk. Click this button to view ...
  69. This helps find and stop malware from installing or running on your PC. You can turn this off temporarily, but if it's off ...
  70. This host is not configured to allow migrations. This means that virtual machines or their storage cannot be moved to or ...
  71. This IAccessible has two (or more) child elements that cannot be distingished by their property values, these elements will ...
  72. This identifies the state of the optional feature. It shows if the Optional feature is enabled, disabled, absent or unknown ...
  73. This idle task reorganizes the cache files used to display the start menu. It is enabled only when the cache files are not ...
  74. This image already has a Windows edition installed. There cannot be more than one installed Windows edition in an image. ...
  75. This includes only connections that have been authenticated by using IPsec. Connections will be secured using the settings ...