Windows 8

  1. This feature allows users of this computer to request remote assistance from other users on the network. (Uses UPnP, SSDP, ...
  2. This feature allows you to distribute configurable settings (IP address, DHCP options) to clients based on certain conditions ...
  3. This feature cannot be enabled in the current image because the parent feature(s) are not installed. If you need this feature, ...
  4. This feature coordinates transactions that update transaction-protected resources, such as databases, message queues and ...
  5. This feature enables a Windows Domain Controller to act as a NIS Server and service requests from NIS Clients. (Uses RPC) ...
  6. This feature enables users to connect to projectors over wired or wireless networks to project presentations. (Uses WSDAPI) ...
  7. This feature enables users to logon to the network by means of the domain controller using the Kerberos authentication protocol. ...
  8. This feature includes Simple Network Management Protocol agents that monitor the activity in network devices and report to ...
  9. This feature installs the core components of MSMQ which enables you to perform basic Message queuing functions. This feature ...
  10. This feature is not compatible with password-protected screen savers. To use this feature, disable the password protection ...
  11. This feature is not supported in Windows 2000. To use other credentials on the selected server, cancel the wizard and restart ...
  12. This feature is only supported with servers running Windows Server 2008 R2 Enterprise or Windows Server 2008 R2 Datacenter. ...
  13. This feature is used for collaborating over a network to share documents, programs or your desktop with other people. (Uses ...
  14. This feature is used for load balancing Remote Desktop client connections between members of a Remote Desktop Gateway server ...
  15. This feature is used for sharing local files and printers with other users on the network. (Uses NetBIOS, LLMNR, SMB and ...
  16. This feature is used to maintain a secure channel between domain clients and a domain controller for authenticating users ...
  17. This feature is used to provide remote management capabilities for the Distributed File System (DFS). (Uses DCOM, WMI and ...
  18. This feature is used to replicate files among multiple servers keeping them in sync. It can be used with DFS-N to provide ...
  19. This feature manages authentication, authorization, auditing and accounting for network connection attempts sent by access ...
  20. This feature offers identity revocation services for PKI (certificate) based services such as secure e-mail smartcard logon, ...
  21. This feature performs TCP/IP configuration for DHCP clients, including dynamic assignments of IP addresses, specification ...
  22. This feed contains a DTD (Document Type Definition). DTDs are used to define a structure of a webpage. Internet Explorer ...
  23. This file cannot be played because the required video decoder is not working, is not installed, or is not supported. Try ...
  24. This file contains a virus or potentially unwanted software and cannot be opened. Due to the nature of this virus or potentially ...
  25. This file contains characters in Unicode format which will be lost if you save this file as an ANSI encoded text file. To ...
  26. This file does not have a program associated with it for performing this action. Please install a program or, if one is already ...
  27. This file does not have a valid digital signature that verifies its publisher. You should only install software from publishers ...
  28. This file does not have a valid digital signature that verifies its publisher. You should only run software from publishers ...
  29. This file does not have a valid digital signature that verifies its publisher. You should only run software from publishers ...
  30. This file does not have a valid digital signature that verifies its publisher. You should only save software from publishers ...
  31. This file does not have burn rights. If you obtained this file from an online store, go to the online store to get burn rights.%0 ...
  32. This file does not have sync rights. If you obtained this file from an online store, go to the online store to get sync rights. ...
  33. This file does not have sync rights. If you obtained this file from an online store, go to the online store to get sync rights.%0 ...
  34. This file is fragmented and is impacting the performance of Windows: File Name : %3 Friendly Name : %5 Version : %7 Thread ...
  35. This file is not one of the supported file types, which include .bmp, .jpg, .jpeg and .dib. Please close this dialog and ...
  36. This file is not one of the supported file types, which include .bmp, .jpg, .jpeg, and .dib. Please close this dialog and ...
  37. This file is open for modification in an unresolved transaction and may be opened for execute only by a transacted reader. ...
  38. This file management job is deprecated. Please check the configuration of the file management job and verify that it is up-to-date. ...
  39. This file management task will fail when run because it uses a classification property that no longer exists. Check the configuration ...
  40. This file might be in use or the file name might not be valid. Close any open programs, check the file name, and try again. ...
  41. This file might not be the right file type, or it might be corrupted. Please try another copy of the file or open a different ...
  42. This File Server is currently configured to not track last access time for files, therefore the last access time might be ...
  43. This file was blocked because it does not have a valid digital signature that verifies its publisher. What is a digital signature? ...
  44. This file was received over a connection that was not passkey-enabled. It might have been sent by someone other than the ...
  45. This folder already contains a folder named '%1'. If the files in the existing folder have the same name as files in the ...
  46. This folder already contains a folder named '%1'. Rename the folder you are trying to copy and then perform the operation ...
  47. This folder can't be customized. It is either marked as read-only, or your system administrator has disabled this functionality. ...
  48. This folder only supports a limited set of CreationCollisionOption values, including FailIfExists and GenerateUniqueName. ...
  49. This folder or one of its children has one or more property sheets open. The operation cannot continue until the property ...
  50. This folder or one of its children has one or more property sheets open. The zone cannot be deleted until all property sheets ...
  51. This folder or one of its children has one or more property sheets up. Please close the property sheet before continuing ...
  52. This folder supports transfer of any data file to this device. Files copied to this folder may not be usable on this device ...
  53. This forest functional level does not provide any new features over the Windows 2003 forest functional level. However, it ...
  54. This forest is operating at the highest possible functional level. For more information on forest functional levels, click ...
  55. This format supports virtual disks up to {0} TB and is resilient to consistency issues that might occur from power failures. ...
  56. This function can only be used if a program is running in the local console session. It cannot be used if a program is running ...
  57. This function can only be used if a program is running in the local console session. It cannot be used if the program is ...
  58. This function cannot be performed, because a registry key that corresponds to the function is corrupt or is not valid. Reinstall ...
  59. This function does not support GDI mirroring display devices because GDI mirroring display devices do not have any physical ...
  60. This function is not supported on the DHCP server you are administering. You must upgrade this DHCP server's software to ...
  61. This function is not supported on the telephony server you are administering. You must upgrade this telephony server's software ...
  62. This Global Catalog server no longer automatically covers site '%1' for forest '%2'. However, site '%1' is still (manually) ...
  63. This GPO is used to apply policies and settings required for IPAM to collect audit logs from domain controllers and Network ...
  64. This GPO is used to apply policies and settings required for IPAM to monitor, manage and collect event logs from DHCP servers ...
  65. This group includes the following conditions: called station ID, NAS identifier, NAS IP address, and NAS port type. The called ...
  66. This group includes the following conditions: called station ID, NAS identifier, NAS IP address, and NAS port type. The called ...
  67. This group includes the following conditions: Windows groups, user groups, machine groups. The Windows group condition specifies ...
  68. This group or user will not appear in the delegation list because it already has read access due to security filtering, as ...
  69. This group policy has no BitLocker Drive Encryption Data Recovery Agents defined directly on it. To define Data Recovery ...
  70. This group policy has no BitLocker Drive Encryption Network Unlock Certificate defined directly on it. To assign a Network ...
  71. This group policy has no Data Protection policies defined directly on it. To define a policy you can click on the Data Protection ...
  72. This group policy has no Data Protection Recovery Agents defined directly on it. To define Data Recovery Agents you can click ...
  73. This group policy has no Encrypting File System policies defined directly on it. To define a policy you can click on the ...
  74. This group policy has no Encrypting File System policies defined directly on it. To define a policy you can click on the ...
  75. This Group Policy object (GPO) was not found. It may have been recently created and has not yet completed replication, or ...