Windows 10

  1. User Account Control is turned on, but you must restart your PC for the change to take effect. How does User Account Control ...
  2. User Account Control: Allow UIAccess applications to prompt for elevation without using the secure desktop. This policy setting ...
  3. User Account Control: Behavior of the elevation prompt for administrators in Admin Approval Mode This policy setting controls ...
  4. User Account Control: Behavior of the elevation prompt for standard users This policy setting controls the behavior of the ...
  5. User Account Control: Detect application installations and prompt for elevation This policy setting controls the behavior ...
  6. User Account Control: Only elevate executable files that are signed and validated This policy setting enforces public key ...
  7. User Account Control: Only elevate UIAccess applications that are installed in secure locations This policy setting controls ...
  8. User Account Control: Switch to the secure desktop when prompting for elevation This policy setting controls whether the ...
  9. User Account Control: Turn on Admin Approval Mode This policy setting controls the behavior of all User Account Control (UAC) ...
  10. User Account Control: Use Admin Approval Mode for the built-in Administrator account This policy setting controls the behavior ...
  11. User Account Control: Virtualize file and registry write failures to per-user locations This policy setting controls whether ...
  12. User Account Created: New Account Name: %1 New Domain: %2 New Account ID: %3 Caller User Name: %4 Caller Domain: %5 Caller ...
  13. User Account Deleted: Target Account Name: %1 Target Domain: %2 Target Account ID: %3 Caller User Name: %4 Caller Domain: ...
  14. User Account Disabled: Target Account Name: %1 Target Domain: %2 Target Account ID: %3 Caller User Name: %4 Caller Domain: ...
  15. User account does not have permission to access this document. Try to open this document using another account or contact ...
  16. User account does not have permission to access to this document. Try to open this document using another account or contact ...
  17. User Account Enabled: Target Account Name: %1 Target Domain: %2 Target Account ID: %3 Caller User Name: %4 Caller Domain: ...
  18. User account has not been activated on this machine. Activate the user account on this machine and reopen this document. ...
  19. User account is not setup for digital rights management. Contact your system administrator to set up your account for digital ...
  20. User Account Locked Out: Target Account Name: %1 Target Account ID: %3 Caller Machine Name: %2 Caller User Name: %4 Caller ...
  21. User Account password set: Target Account Name: %1 Target Domain: %2 Target Account ID: %3 Caller User Name: %4 Caller Domain: ...
  22. User account restriction error. The possible reasons are that blank passwords not allowed, or that a policy restriction has ...
  23. User Account Unlocked: Target Account Name: %1 Target Domain: %2 Target Account ID: %3 Caller User Name: %4 Caller Domain: ...
  24. User accounts must have passwords. Any user account that you use to connect remotely must have a password. Also, if you are ...
  25. User authentication using Basic authentication scheme failed. Additional Data Unexpected error received from LogonUser %1: ...
  26. User credentials does not have permission to perform this operation. The account used for this test must have network logon ...
  27. User credentials does not have permission to perform this operation. The account used for this test must have network logon ...
  28. User devices are logical devices that allow a computer system's users to input, view or hear data. The CIM_UserDevice class ...
  29. User initiated logoff: Subject: Security ID: %1 Account Name: %2 Account Domain: %3 Logon ID: %4 This event is generated ...
  30. User Manager provides the runtime components required for multi-user interaction. If this service is stopped, some applications ...
  31. User Name: %1 Domain: % %2 Request Type: %3 Logon Process: %4 Authentication Package: %5 Workstation Name: %6 Caller User ...
  32. User profiles store settings for your desktop and other information related to your user account. You can create a different ...
  33. User Source Io Owner has exceed the Quota Threshold]% quota threshold for quota on Quota Path on server Server]. The quota ...
  34. User Source Io Owner has reached the quota limit for quota on Quota Path on server Server]. The quota limit is Quota Limit ...
  35. User Source Io Owner has reached the quota limit for quota on Quota Path on server Server]. The quota limit is Quota Limit ...
  36. User Time is the percentage of elapsed time that the process threads spent executing code in user mode. Applications, environment ...
  37. User Time is the percentage of elapsed time that this thread has spent executing code in user mode. Applications, environment ...
  38. User Time is the percentage of elapsed time the processor spends in the user mode. User mode is a restricted processing mode ...
  39. User {0}${1}${2} can read/update/delete data from {3}${4} as both {5} and {6} databases have CrossDatabaseOwnershipChain ...
  40. User: %1!s! Domain: %2!s! Connected from: %3!s! Duration: %4!d! days %5!d! hours %6!d! mins %7!d! secs Restriction state: ...
  41. UserFileReads : %1 UserFileReadBytes : %2 UserDiskReads : %3 UserFileWrites : %4 UserFileWriteBytes : %5 UserDiskWrites : ...
  42. UserID is the value used by the SecurityService to represent identity. For an authentication service, the UserID may be the ...
  43. UserKeyAndCertFile - Data file containing user private keys and certificates to be archived. This can be any of the following: ...
  44. username% will no longer be able to log on, and all of %username%'s settings will be deleted. However, %username%'s files ...
  45. Users can send scanned documents to an e-mail address. They can also receive an e-mail notification if this operation fails. ...
  46. Users in the local domain can be authenticated to use all of the resources in the specified domain or only those resources ...
  47. Users in the local forest can be authenticated to use all of the resources in the specified forest or only those resources ...
  48. Users in the specified domain can be authenticated to use all of the resources in the local domain or only those resources ...
  49. Users in the specified forest can be authenticated to use all of the resources in the local forest or only those resources ...
  50. Users on computers running NFS client software can access directories (called shares) on computers running Server for NFS ...
  51. user`u`user password]`User to Run As. Entering a for the password produces a prompt for the password. The password is not ...
  52. Uses routing information to determine the cost of a route from a specified site to another specified site or sites. The querysites ...
  53. Using an account with a blank password as the AD LDS service account is a security risk. Do you want to continue using this ...
  54. Using an API that is not part of the Windows SDK for Windows Phone Store apps violates the Windows Phone Store certification ...
  55. Using an API that is not part of the Windows SDK for Windows Store apps violates the Windows Store certification requirements. ...
  56. Using automatic certificate requests, an administrator can specify which types of certificate can be automatically requested ...
  57. Using only your voice, you can start programs, open menus, click buttons and other objects on the screen, dictate text into ...
  58. Using system protection on a drive that contains other shadow copies will cause older system restore points to be deleted ...
  59. Using system protection on a drive that contains system image backups will cause other shadow copies to be deleted faster ...
  60. Using the contrast control on your display, set the contrast as high as possible without losing the ability to see the wrinkles ...
  61. Using the controls on your display, set the brightness higher or lower until you can distinguish the shirt from the suit ...
  62. Using your current location and calling card selection, dialing this number could result in a emergency services call to ...
  63. Usn : %1!I64d! File name : %2!.*ws! File name length : %3!d! Reason : 4!08x!: %5!s! Time stamp : %6!s! File attributes : ...
  64. Usn : %1!I64d! Reason : 2!08x!: %3!s! File ID : %4!s! Parent file ID : %5!s! Source info : 6!08x!: %7!s! Major version : ...
  65. USN Commands Supported - createjournal Create a USN journal deletejournal Delete a USN journal enumdata Enumerate USN data ...
  66. USN Journal ID : 1!016I64x! First USN : %2!I64d! Next USN : %3!I64d! Start USN : %4!I64d! Min major version : Supported=%5!d!, ...
  67. Usn,File name,File name length,Reason #,Reason,Time stamp,File attributes #,File attributes,File ID,Parent file ID,Source ...
  68. Usually, any well-known entry identifiers are replaced by their friendly shorthand form. Specifying /v as a command-line ...
  69. V3NT 1.3 upgrade and V3Pro 2000 Deluxe are incompatible with this version of Windows. For V3Pro 2000 Deluxe, you should install ...
  70. Valid commands: load Loads a Filter driver unload Unloads a Filter driver filters Lists the Filters currently registered ...
  71. Valid MAC address needs to be specified for failover network adapter setting data for virtual machine '%1'. Assign the static ...
  72. Validate that the scan ticket settings will work for the scanner. This will not associate the scan ticket with a scanner. ...
  73. Validation of diff area files began. Volume GUID: %1 Guidance: When a volume is mounted, the volume snapshot driver reads ...
  74. Validation of diff area files completed. Number of Diff Areas: %2 Guidance: When a volume is mounted, the volume snapshot ...
  75. Validation of diff area files encountered an error. Error: %2 Volume GUID: %1 Guidance: When a volume is mounted, the volume ...