Windows 8.1

  1. Allows files to be automatically copied and maintained simultaneously on multiple servers. If this service is stopped, file ...
  2. Allows or Denies new TS Connections. The second parameter is optional, if specified and set to TRUE, then enables or disables ...
  3. Allows or Denies retrieving IP address of SessionDirectory according as whether Value is set to 1 or 0 respectively. The ...
  4. Allows programs to execute as a user that does not have Administrator access rights, but can still access resources accessible ...
  5. Allows programs to execute with only access to resources granted to open well-known groups, blocking access Administrator ...
  6. Allows programs to open data files in specified directories as if they were in the current directory. APPEND drive:]path[;. ...
  7. Allows rules created by local administrators to be merged with rules distributed through Group Policy. This setting can only ...
  8. Allows this computer to receive unicast responses to its outgoing multicast or broadcast messages. Note: This setting has ...
  9. Allows unrestricted network access for clients when the connection request matches the policy. Use this option for reporting ...
  10. Allows unrestricted network access until the specified date and time. After the specified date and time, health policy is ...
  11. Allows UPnP devices to be hosted on this computer. If this service is stopped, any hosted UPnP devices will stop functioning ...
  12. Allows users in other Directory environments that have federated trust relationships established with your enterprise's Active ...
  13. Allows users to connect interactively to a remote computer. Remote Desktop and Remote Desktop Session Host Server depend ...
  14. Allows you to analyze current systems settings against baseline settings that are stored in a database. The analysis results ...
  15. Allows you to configure a system with security settings stored in a database. The syntax of this command is: secedit /configure ...
  16. Allows you to export security settings stored in a database. The syntax of this command is: secedit /export /db filename ...
  17. Allows you to generate a rollback template with respect to a configuration template. The syntax of this command is: secedit ...
  18. Allows you to import a security template into a database so that the settings specified in the template can be applied to ...
  19. Allows you to set up an online responder based on the Online Certificate Status Protocol (OCSP) to provide revocation information ...
  20. Allows you to validate the syntax of a security template. The syntax of this command is: secedit /validate filename /cfg ...
  21. Also apply redirection policy to Windows 2000, Windows 2000 server, Windows XP, and Windows Server 2003 operating systems ...
  22. Also apply redirection policy to Windows 2000, Windows 2000 Server, Windows XP, and Windows Server 2003 operating systems. ...
  23. Also include the SCWAudit.inf security template. SCWAudit.inf sets System Access Control Lists (SACLS) in order to audit ...
  24. Also make sure that you're speaking into the correct microphone (if there are multiple microphones) and that it is connected ...
  25. Also, confirm that both the wireless network adapter and the wireless network access point are using the same encryption ...
  26. Alternatively, you may choose to disable the installer's rollback functionality. Disabling rollback prevents the installer ...
  27. Although Routing and Remote Access can authenticate connection requests, large networks that include multiple remote access ...
  28. Although the files were successfully added to the archive, Compressed (zipped) Folders was unable to completely remove the ...
  29. Although the Guid DNS name (%1) could not be resolved, the server name (%2) resolved to the IP address (%3) but was not pingable. ...
  30. Although the Guid DNS name (%1) couldn't be resolved, the server name (%2) resolved to the IP address (%3) and was pingable. ...
  31. Although the Guid DNS name (%1) resolved to the IP address (%2), the server name (%3) could not be resolved by DNS. Check ...
  32. Although the Guid DNS name (%1) resolved to the IP address (%2), the server name (%3) resolved to the IP address (%4) and ...
  33. Although the Guid DNS name (%1) resolved to the IP address (%2), which could not be pinged, the server name (%3) resolved ...
  34. Although these problems won't stop Hyper-V Server from installing, some applications or devices might not work in Hyper-V ...
  35. Although these problems won't stop Storage Server from installing, some applications or devices might not work in Storage ...
  36. Although we found a copy of Windows 8.1 for you to download, we couldn't find one that matches your current base language. ...
  37. Always fall back to Link-Local Multicast Name Resolution (LLMNR) and NetBIOS for any kind of name resolution error (least ...
  38. Always fall back to Link-Local Multicast Name Resolution (LLMNR) and NetBIOS for any kind of name resolution error (least ...
  39. Always fall back to Link-Local Multicast Name Resolution (LLMNR) and NetBIOS if the name does not exist in DNS or if the ...
  40. Always fall back to Link-Local Multicast Name Resolution (LLMNR) and NetBIOS if the name does not exist in DNS or if the ...
  41. Always prefer Certificate Revocation Lists (CRL) over Online Certificate Status Protocol (OCSP) responses (not recommended) ...
  42. America Online (AOL) might not function properly with this version of Windows. For information about a compatible version ...
  43. Amount of memory specified for virtual machine is {0}MB, maximum amount of memory can be assigned to virtual machine is {1}MB. ...
  44. AM_DVD_EVR_ONLY cannot be passed to RenderDvdVideoVolume if the graph builder's filter graph contains a renderer which is ...
  45. An %1 connection request was received from a remote client application, but none of the cipher suites supported by the client ...
  46. An abnormal error occurred during the WINS initialization. Check the application and system logs for information on the cause. ...
  47. An abstraction or emulation of a hardware entity, that may or may not be Realized in physical hardware. Any characteristics ...
  48. An abstraction or emulation of a hardware entity, that may or may not be realized in physical hardware. Any characteristics ...
  49. An access denied error occurred when registering scheduled job definition {0}. Try running Windows PowerShell with elevated ...
  50. An access denied error occurred while updating the scheduled job definition {0}. Try running Windows PowerShell with elevated ...
  51. An access point for a service. Access points are dependent in this relationship since they have no function without a corresponding ...
  52. An access to a user buffer failed at an "expected" point in time. This code is defined since the caller does not want to ...
  53. An access-denied assistance error is configured to send email to the file server administrator, but no email address is specified ...
  54. An Access-Request message was received from RADIUS client %1 with an Extensible Authentication Protocol (EAP) message but ...
  55. An Access-Request message was received from RADIUS client %1 without a Message-Authenticator attribute when a Message-Authenticator ...
  56. An account failed to log on. Subject: Security ID: %1 Account Name: %2 Account Domain: %3 Logon ID: %4 Logon Type: %11 Account ...
  57. An account for this domain and user could not be found. Check that the user has a valid user account in the specified domain. ...
  58. An account named "%1" could not be found in the domain name "%2". To make this server a read-only domain controller (RODC), ...
  59. An account named "%1" could not be found in the forest name "%2". To make this server a read-only domain controller (RODC), ...
  60. An account was logged off. Subject: Security ID: %1 Account Name: %2 Account Domain: %3 Logon ID: %4 Logon Type: %5 This ...
  61. An account was successfully logged on. Subject: Security ID: %1 Account Name: %2 Account Domain: %3 Logon ID: %4 Logon Type: ...
  62. An account was successfully logged on. Subject: Security ID: %1 Account Name: %2 Account Domain: %3 Logon ID: %4 Logon Type: ...
  63. An account with the name of the server has been found in the directory. In order to continue, you need to confirm that you ...
  64. An accurate clock enables administrators to better correlate audit events. Also, many security protocols use time to prevent ...
  65. An acquire is a request by the IPSEC driver to have IKE perform a task. The active acquire statistic includes the outstanding ...
  66. An action by your device manufacturer has disabled the experience for this device in Windows. Please contact the manufacturer ...
  67. An activation of a background task with entry point %2 and name %4 has been buffered because an instance of the task is already ...
  68. An Active Directory Domain Controller (AD DC) for the domain "%1" could not be contacted. Ensure that the domain name is ...
  69. An Active Directory domain controller for the domain "%1" could not be contacted. Ensure that the correct DNS domain name ...
  70. An Active Directory domain controller for the domain "%1" could not be contacted. Ensure that the DNS domain name is typed ...
  71. An Active Directory domain controller for the domain "%1" could not be contacted. Ensure that you supplied the correct DNS ...
  72. An Active Directory domain controller for the domain "%1" could not be contacted. The error was %2. Ensure that the correct ...
  73. An Active Directory domain controller for the domain "{0}" cannot be found. Make sure that the domain name is correct, and ...
  74. An Active Directory domain controller for the forest root domain "%1" could not be contacted. Ensure that the domain name ...
  75. An Active Directory domain controller for the forest root domain "%1" could not be contacted. Ensure that the domain name ...