Windows 8

  1. This setting puts clustered roles (including virtual machines) in priority order, so that higher priority roles can be started ...
  2. This share is required for the machine to act properly as a domain controller. Removing it will cause a loss of functionality ...
  3. This share is required for the machine to act properly as a domain controller. Removing it will cause a loss of functionality ...
  4. This share is required for the machine to act properly as a domain controller. Removing it will cause a loss of functionality ...
  5. This share was created for administrative purposes only. The share will reappear when the Server service is stopped and restarted ...
  6. This share was created for administrative purposes only. The share will reappear when the Server service is stopped and restarted ...
  7. This share was created for administrative purposes only. The share will reappear when the Server service is stopped and restarted ...
  8. This shared folder is on a highly available volume, so it is accessed as a highly available shared folder. To access the ...
  9. This shim causes the process to which it is applied to try to relaunch itself as an elevated user. It is intended to be used ...
  10. This shim fails calls to RemoveDirectory() when called with a path matching the one specified in the shim command-line. Only ...
  11. This shim hooks MoveFileA and MoveFileW API mostly used by set ups and instead copies the file. Using copy will avoid moving ...
  12. This shim is to fix applications that request the default audio device but are better suited for the default communications ...
  13. This shim is written for the applications which are installing a service which had dependency on some service in the OS which ...
  14. This shim will hook calls to RtlReportException and return Status_Not_Supported. This in effect will turn off the silent ...
  15. This shim will strip out specified flags from the lpFileSystemFlags parameter on the return from GetVolumeInformationA/W. ...
  16. This shutdown was initiated by the legacy API InitiateSystemShutdown. For full shutdown information applications should use ...
  17. This site is a foreign site. A foreign site represents a group of computers that run other messaging systems (called foreign ...
  18. This smart card could not be used. Additional details may be available in the system event log. Please report this error ...
  19. This snap-in allows you to edit Group Policy Objects which can be linked to a Site, Domain, or Organizational Unit in Active ...
  20. This snap-in allows you to view the Resultant Set of Policy for a user on a computer. The snap-in can be used to view policy ...
  21. This snap-in console file (%1) was saved with an earlier version of Microsoft Management Console (MMC). Do you want to update ...
  22. This snap-in console file (%1) was saved with an earlier version of Microsoft Management Console (MMC). Do you want to update ...
  23. This snap-in hosts extension snap-ins that are used for managing highly available cluster roles and features. Do not add ...
  24. This snap-in is not responding. To return to MMC and check the status of the snap-in, click Cancel. If you choose to end ...
  25. This snap-in manages the Background Intelligent Transfer Server (BITS) server extension for Internet Information Services ...
  26. This snap-in performed a non-valid operation and has been unloaded. To continue working with this snap-in, restart MMC or ...
  27. This snapin may not be used with this edition of %WINDOWS_SHORT%. To manage user accounts for this computer, use the User ...
  28. This snapshot operation cannot continue because a transactional resource manager cannot be frozen in its current state. Please ...
  29. This software is licensed under the agreement below. During the installation process, Windows Media Player will contact a ...
  30. This source does not have a frame rate of 30 fps. Therefore, it is not possible to apply the inverse telecine filter to the ...
  31. This specific permission is set using a more generic Access Control Entry (for example, Full Control) on the overall object. ...
  32. This startup service took longer than expected to startup, resulting in a performance degradation in the system start up ...
  33. This step will place the destination number that you will be dialing into the calling card sequence. When dialing the destination ...
  34. This storage pool contains one or more virtual disks that are not in a healthy state. Removing this physical disk now can ...
  35. This success level status indicates that the transaction state already exists for the registry sub-tree, but that a transaction ...
  36. This success level status indicates that the transaction state already exists for the registry sub-tree, but that a transaction ...
  37. This switch parameter when specified indicates that the IPsec root certificate specified is an intermediate root certificate ...
  38. This system has a problem with the system I/O remapping hardware, and has been configured to allow the use of SR-IOV. Assigning ...
  39. This system has a security vulnerability in the platform. As a precaution, the ability to use SR-IOV has been disabled. If ...
  40. This system has a security vulnerability in the system I/O remapping hardware. As a precaution, the ability to use SR-IOV ...
  41. This system is configured for Token-based activation only. Use slmgr.vbs /fta to initiate Token-based activation, or slmgr.vbs ...
  42. This target domain was earlier merged into another NIS domain in AD. target domain = '%1', NIS domain in AD = '%2'. Migrate ...
  43. This task adjusts the start type for firewall-triggered services when the start type of the Base Filtering Engine (BFE) is ...
  44. This task automatically wakes the computer and then puts it to sleep when automatic wake is turned on for a Windows SideShow-compatible ...
  45. This task is part of the Windows Server Customer Experience Improvement Program. Please do not manually delete this task. ...
  46. This task provides system data for the clock, power source, wireless network strength, and volume on a Windows SideShow-compatible ...
  47. This task requires that the user account specified has Log on as batch job rights. For more information about setting this ...
  48. This template is active - it is currently in use in the NPS console and Templates Management locations shown below. You must ...
  49. This test checks the health of DNS settings for the whole enterprise. Sub tests can be run individually using the switches ...
  50. This test checks the health of DNS settings on a DC. It just gathers data for the DnsValidationEnterprise test, so it doesn't ...
  51. This test checks to see if there are any operation errors in the file replication system (FRS). Failing replication of the ...
  52. This test has been omitted because it verifies attributes when the cluster contains multiple nodes. If your cluster contains ...
  53. This test page briefly demonstrates the printer's ability to print graphics and text, and it provides technical information ...
  54. This test requires more than one node. If your cluster contains more than one node, or you intend to create a cluster with ...
  55. This test requires more than one node. If your cluster contains more than one node, please run validation tests again with ...
  56. This test verifys that certain system references are intact for the FRS and Replication infrastructure across all objects ...
  57. This theme uses an RSS feed for its desktop background. Would you like to subscribe to the feed and configure it to automatically ...
  58. This tool allows you to enable Windows Error Reporting to automatically send descriptions of problems on this server to Microsoft. ...
  59. This tool allows you to participate in the Customer Experience Improvement Program. For more information about this program, ...
  60. This tool is deprecated and may be removed in future releases of Windows. Please use the Windows PowerShell cmdlets in the ...
  61. This tool only supports signing 50 different files at a time. Reduce the number of files on the command line and try again. ...
  62. This tool reports detailed information about the DirectX components and drivers installed on your system. It lets you test ...
  63. This tool runs an assessment job. usage: axe JobFile /Timeout sec /NoPublish /PublishPath Directory /RemoveRestart /DisplayLog ...
  64. This tool runs an energy assessment within a job file in either battery rundown mode or diagnostics mode. usage: EnergyJob ...
  65. This tool runs as an AXE workload in an energy efficiency job and is intended to add idle time between other workloads. usage: ...
  66. This tool will allow you to configure the Accounts Database to enable additional encryption, further protecting the database ...
  67. This tool will gather information about the interaction of the programs and hardware running on this computer for analysis. ...
  68. This topology requires three or more members in the replication group. In this topology, spoke members are connected to one ...
  69. This trust is forest transitive. Users from indirectly trusted domains within the enterprise may authenticate in the trusting ...
  70. This trust is transitive. Users from indirectly trusted domains within the enterprise may authenticate in the trusting domain. ...
  71. This trusted publishing domain certificate file is not valid. Try to export the certificate file from the trusted cluster ...
  72. This trusted publishing domain has been imported successfully. However, its private key is not internally managed. Please ...
  73. This Trusted User Domain certificate file is not valid. Try exporting the certificate file from the cluster for which this ...
  74. This type of assignment is not supported. Only variable names (i.e.: $variable) may be used as the target of an assignment ...
  75. This type of disk is associated in a parent-child relationship with another disk that you want to leave intact. You can make ...