Windows 8
- This operation is not supported on a clustered virtual machine. To perform this operation, remove the virtual machine from ...
- This operation may take a long time and will affect all users. Do you want to start the move now, or wait until the next ...
- This operation measures the memory performance of system memory by copying data from one memory buffer to another. SSE or ...
- This operation measures the performance of the system by decoding a file containing video and audio streams. The process ...
- This operation measures the performance of the system by decoding and/or encoding a file containing video and audio streams. ...
- This operation provides metrics on disk performance via a profiling mechanism. Sequential Read/Write and Random Read/Write ...
- This operation ran for too long and was canceled automatically. You can find detailed technical information in the Windows ...
- This operation retrieves owner-version maps from different WINS servers. It checks the consistency of the databases by ensuring ...
- This operation will add all the computer security principals from the Auth2 list of the RODC to the Allow list. Do you wish ...
- This operation will add all the security principals from the Auth2 list of the RODC to the Allow list. Do you wish to continue? ...
- This operation will add all user security principals from the Auth2 list of the RODC to the Allow list. Do you wish to continue? ...
- This operation will delete all user-defined policies and replace their references in Calendar-events and Schedules with Calendar ...
- This operation will delete member "{0}" from the replication group. All replicated folders in the replication group on this ...
- This operation will delete superscope %1 without deleting any child scopes. Are you sure you want to delete superscope %1? ...
- This operation will delete the namespace "{0}". Clients will no longer be able to access "{0}". Do you want to continue? ...
- This operation will delete the namespace {0}. Clients will no longer be able to access {0}. The underlying folder targets ...
- This operation will delete the replication group {0} and stop replicating the associated replicated folders. No replicated ...
- This operation will delete the selected folder from the namespace. All child folders will also be deleted. This operation ...
- This operation will delete the selected folders from the namespace. All child folders will also be deleted. This operation ...
- This operation will delete your index (including custom index locations and excluded locations) and completely re-build the ...
- This operation will immediately rebuild the index. Depending upon how many files you have, it can take as long as several ...
- This operation will make the volume available for use but the data on it may be corrupted or stale. If you have another disk ...
- This operation will move all the computer security principals from the Auth2 list of the RODC to the Allow list. Do you wish ...
- This operation will move all the security principals from the Auth2 list of the RODC to the Allow list. Do you wish to continue? ...
- This operation will move all user security principals from the Auth2 list of the RODC to the Allow list. Do you wish to continue? ...
- This operation will perform an authoritative recovery of your cluster. After recovering the cluster database, the Cluster ...
- This operation will remove the namespace server "{0}" from this namespace. If it is the only namespace server of this namespace, ...
- This operation will remove the selected folder target from this folder. If this is the last folder target, then the folder ...
- This operation will remove the selected folder targets from this folder. If all of the targets are selected, then the folder ...
- This operation will set the userIdentifier and/or groupIdentifier attribute of the active directory user/group to the provided ...
- This operation will set the userIdentifier and/or groupIdentifier attribute of the active directory user/group to the provided ...
- This operation will set the userIdentifier and/or groupIdentifier attribute of the ADLDS user/group to the provided value. ...
- This operation will set the userIdentifier and/or groupIdentifier attribute of the ADLDS user/group to the provided value. ...
- This operation will stop replicating the replicated folder "{0}" and will delete the replicated folder from the replication ...
- This operation will stop sharing the selected shares. Users will no longer be able to access files from these shared folders ...
- This option (recommended) reduces management and servicing by installing only what is needed to run most server roles and ...
- This option (recommended) reduces management and servicing by installing only what is needed to run most server roles and ...
- This option allows authenticated but unencrypted network packets to be sent while encryption is being negotiated. Compatible ...
- This option allows the computer to be trusted for delegation. Trusting the computer for delegation is a security-sensitive ...
- This option allows you to move the virtual machine without moving its virtual hard disks. The virtual machine's virtual hard ...
- This option allows you to specify locations to move the virtual hard disks and automatically move the other virtual machine ...
- This option audits both successful changes and failed attempts to system and configuration files, allowing you to determine ...
- This option audits successful changes to system and configuration files, allowing you to reconstruct events after the fact ...
- This option automatically creates a new instance of AD LDS that uses the default configuration and schema partitions. The ...
- This option compacts the file size of a virtual hard disk. The storage capacity of the virtual hard disk remains the same. ...
- This option configures two-way replication between two servers, such as a branch server and a hub (destination) server. This ...
- This option converts a virtual hard disk by copying the contents to a new virtual hard disk. The new virtual hard disk can ...
- This option copies a new unattended Setup answer file to an existing image. You can copy the answer file from an existing ...
- This option copies the contents of a supported Windows CD and associates a standard unattended Setup answer file with the ...
- This option creates a new instance of AD LDS that uses the configuration and schema partitions replicated from another instance ...
- This option creates a virtual hard disk that provides up to {0} GB of storage. This format is compatible with earlier versions ...
- This option deletes the member from the replication group and stops replicating the folder on the member. However, users ...
- This option deletes the member from the replication group, stops replicating the replicated folder on the member, and removes ...
- This option deletes the replication group and stops replicating the folder. However, users can still use the namespace to ...
- This option deletes the replication group, stops replicating the replicated folder, and removes the replicated folder from ...
- This option digitally signs all file and print traffic. This signing is processor intensive, so it is recommended only if ...
- This option does not need to be selected if you remotely manage this server using Remote Destkop Server for Remote Desktop ...
- This option enables higher-quality audio CDs, such as HDCDs, to play back at their full audio quality. The audio quality ...
- This option installs a complete installation of Windows Server, with some optional features available for installation remotely. ...
- This option is not available when the snap-in is targeted at a Read-only Domain Controller. You must connect to a writable ...
- This option is only available from the server console, and only if the server meets one of these conditions: - The server ...
- This option is recommended for most production scenarios. You should use a certificate issued by an external certification ...
- This option is recommended for small-scale deployments or test scenarios only. After installing the server, you must manually ...
- This option is recommended if you don't want to use SSL, or if you plan to request a certificate from a CA and import it ...
- This option is useful when a GUI is required for example, to provide backward compatibility for an application that cannot ...
- This option is useful when a GUI is required for example, to provide backward compatibility for an application that cannot ...
- This option moves the virtual machine's items to the destination computer by reusing the locations configured on the source ...
- This option requires a 24-bit audio device. If you experience sound or computer problems while playing audio CDs, clear this ...
- This option shares the replicated folder, applies shared folder permissions to new shared folders, and publishes the replicated ...
- This option specifies an upper bound for how long a client should wait before refreshing information retrieved from DHCPv6 ...
- This option specifies an upper bound for how long a client should wait before refreshing information retrieved from DHCPv6 ...
- This option stops replicating the replicated folder and deletes the replicated folder from the replication group. The replicated ...
- This option stops replicating the replicated folder, deletes the replicated folder from the replication group, and removes ...
- This package will no longer be placed on the computer's desktop of every user. It will continue to be installed for users ...
- This page is a backup of Trusted Platform Module (TPM) owner authorization information. Upon request, use the authorization ...