Windows 8

  1. This operation is not supported on a clustered virtual machine. To perform this operation, remove the virtual machine from ...
  2. This operation may take a long time and will affect all users. Do you want to start the move now, or wait until the next ...
  3. This operation measures the memory performance of system memory by copying data from one memory buffer to another. SSE or ...
  4. This operation measures the performance of the system by decoding a file containing video and audio streams. The process ...
  5. This operation measures the performance of the system by decoding and/or encoding a file containing video and audio streams. ...
  6. This operation provides metrics on disk performance via a profiling mechanism. Sequential Read/Write and Random Read/Write ...
  7. This operation ran for too long and was canceled automatically. You can find detailed technical information in the Windows ...
  8. This operation retrieves owner-version maps from different WINS servers. It checks the consistency of the databases by ensuring ...
  9. This operation will add all the computer security principals from the Auth2 list of the RODC to the Allow list. Do you wish ...
  10. This operation will add all the security principals from the Auth2 list of the RODC to the Allow list. Do you wish to continue? ...
  11. This operation will add all user security principals from the Auth2 list of the RODC to the Allow list. Do you wish to continue? ...
  12. This operation will delete all user-defined policies and replace their references in Calendar-events and Schedules with Calendar ...
  13. This operation will delete member "{0}" from the replication group. All replicated folders in the replication group on this ...
  14. This operation will delete superscope %1 without deleting any child scopes. Are you sure you want to delete superscope %1? ...
  15. This operation will delete the namespace "{0}". Clients will no longer be able to access "{0}". Do you want to continue? ...
  16. This operation will delete the namespace {0}. Clients will no longer be able to access {0}. The underlying folder targets ...
  17. This operation will delete the replication group {0} and stop replicating the associated replicated folders. No replicated ...
  18. This operation will delete the selected folder from the namespace. All child folders will also be deleted. This operation ...
  19. This operation will delete the selected folders from the namespace. All child folders will also be deleted. This operation ...
  20. This operation will delete your index (including custom index locations and excluded locations) and completely re-build the ...
  21. This operation will immediately rebuild the index. Depending upon how many files you have, it can take as long as several ...
  22. This operation will make the volume available for use but the data on it may be corrupted or stale. If you have another disk ...
  23. This operation will move all the computer security principals from the Auth2 list of the RODC to the Allow list. Do you wish ...
  24. This operation will move all the security principals from the Auth2 list of the RODC to the Allow list. Do you wish to continue? ...
  25. This operation will move all user security principals from the Auth2 list of the RODC to the Allow list. Do you wish to continue? ...
  26. This operation will perform an authoritative recovery of your cluster. After recovering the cluster database, the Cluster ...
  27. This operation will remove the namespace server "{0}" from this namespace. If it is the only namespace server of this namespace, ...
  28. This operation will remove the selected folder target from this folder. If this is the last folder target, then the folder ...
  29. This operation will remove the selected folder targets from this folder. If all of the targets are selected, then the folder ...
  30. This operation will set the userIdentifier and/or groupIdentifier attribute of the active directory user/group to the provided ...
  31. This operation will set the userIdentifier and/or groupIdentifier attribute of the active directory user/group to the provided ...
  32. This operation will set the userIdentifier and/or groupIdentifier attribute of the ADLDS user/group to the provided value. ...
  33. This operation will set the userIdentifier and/or groupIdentifier attribute of the ADLDS user/group to the provided value. ...
  34. This operation will stop replicating the replicated folder "{0}" and will delete the replicated folder from the replication ...
  35. This operation will stop sharing the selected shares. Users will no longer be able to access files from these shared folders ...
  36. This option (recommended) reduces management and servicing by installing only what is needed to run most server roles and ...
  37. This option (recommended) reduces management and servicing by installing only what is needed to run most server roles and ...
  38. This option allows authenticated but unencrypted network packets to be sent while encryption is being negotiated. Compatible ...
  39. This option allows the computer to be trusted for delegation. Trusting the computer for delegation is a security-sensitive ...
  40. This option allows you to move the virtual machine without moving its virtual hard disks. The virtual machine's virtual hard ...
  41. This option allows you to specify locations to move the virtual hard disks and automatically move the other virtual machine ...
  42. This option audits both successful changes and failed attempts to system and configuration files, allowing you to determine ...
  43. This option audits successful changes to system and configuration files, allowing you to reconstruct events after the fact ...
  44. This option automatically creates a new instance of AD LDS that uses the default configuration and schema partitions. The ...
  45. This option compacts the file size of a virtual hard disk. The storage capacity of the virtual hard disk remains the same. ...
  46. This option configures two-way replication between two servers, such as a branch server and a hub (destination) server. This ...
  47. This option converts a virtual hard disk by copying the contents to a new virtual hard disk. The new virtual hard disk can ...
  48. This option copies a new unattended Setup answer file to an existing image. You can copy the answer file from an existing ...
  49. This option copies the contents of a supported Windows CD and associates a standard unattended Setup answer file with the ...
  50. This option creates a new instance of AD LDS that uses the configuration and schema partitions replicated from another instance ...
  51. This option creates a virtual hard disk that provides up to {0} GB of storage. This format is compatible with earlier versions ...
  52. This option deletes the member from the replication group and stops replicating the folder on the member. However, users ...
  53. This option deletes the member from the replication group, stops replicating the replicated folder on the member, and removes ...
  54. This option deletes the replication group and stops replicating the folder. However, users can still use the namespace to ...
  55. This option deletes the replication group, stops replicating the replicated folder, and removes the replicated folder from ...
  56. This option digitally signs all file and print traffic. This signing is processor intensive, so it is recommended only if ...
  57. This option does not need to be selected if you remotely manage this server using Remote Destkop Server for Remote Desktop ...
  58. This option enables higher-quality audio CDs, such as HDCDs, to play back at their full audio quality. The audio quality ...
  59. This option installs a complete installation of Windows Server, with some optional features available for installation remotely. ...
  60. This option is not available when the snap-in is targeted at a Read-only Domain Controller. You must connect to a writable ...
  61. This option is only available from the server console, and only if the server meets one of these conditions: - The server ...
  62. This option is recommended for most production scenarios. You should use a certificate issued by an external certification ...
  63. This option is recommended for small-scale deployments or test scenarios only. After installing the server, you must manually ...
  64. This option is recommended if you don't want to use SSL, or if you plan to request a certificate from a CA and import it ...
  65. This option is useful when a GUI is required for example, to provide backward compatibility for an application that cannot ...
  66. This option is useful when a GUI is required for example, to provide backward compatibility for an application that cannot ...
  67. This option moves the virtual machine's items to the destination computer by reusing the locations configured on the source ...
  68. This option requires a 24-bit audio device. If you experience sound or computer problems while playing audio CDs, clear this ...
  69. This option shares the replicated folder, applies shared folder permissions to new shared folders, and publishes the replicated ...
  70. This option specifies an upper bound for how long a client should wait before refreshing information retrieved from DHCPv6 ...
  71. This option specifies an upper bound for how long a client should wait before refreshing information retrieved from DHCPv6 ...
  72. This option stops replicating the replicated folder and deletes the replicated folder from the replication group. The replicated ...
  73. This option stops replicating the replicated folder, deletes the replicated folder from the replication group, and removes ...
  74. This package will no longer be placed on the computer's desktop of every user. It will continue to be installed for users ...
  75. This page is a backup of Trusted Platform Module (TPM) owner authorization information. Upon request, use the authorization ...