Windows 8
- User Source Io Owner has exceed the Quota Threshold]% quota threshold for quota on Quota Path on server Server]. The quota ...
- User Source Io Owner has reached the quota limit for quota on Quota Path on server Server]. The quota limit is Quota Limit ...
- User Source Io Owner has reached the quota limit for quota on Quota Path on server Server]. The quota limit is Quota Limit ...
- User Time is the percentage of elapsed time that the process threads spent executing code in user mode. Applications, environment ...
- User Time is the percentage of elapsed time that this thread has spent executing code in user mode. Applications, environment ...
- User Time is the percentage of elapsed time the processor spends in the user mode. User mode is a restricted processing mode ...
- User {0} attempted to save {1} to {2} on the {3} server. This file is in the {4} file group, which is not permitted on the ...
- User {0} has exceeded the limit for the quota on {1} on server {2}. The quota limit is {3} MB, and {4} MB currently is in ...
- User {0} has exceeded the {1}% quota threshold for the quota on {2} on server {3}. The quota limit is {4} MB, and {5} MB ...
- User: %1!s! Domain: %2!s! Connected from: %3!s! Duration: %4!d! days %5!d! hours %6!d! mins %7!d! secs Restriction state: ...
- UserFileReads : %1 UserFileReadBytes : %2 UserDiskReads : %3 UserFileWrites : %4 UserFileWriteBytes : %5 UserDiskWrites : ...
- UserKeyAndCertFile - Data file containing user private keys and certificates to be archived. This can be any of the following: ...
- username% will no longer be able to log on, and all of %username%'s settings will be deleted. However, %username%'s files ...
- Users browsing to your site or application could see some privileged information that is contained in the detailed error ...
- Users can connect to network resources by using RD Gateway. Network resources can include computers in an Active Directory ...
- Users can send scanned documents to an e-mail address. They can also receive an e-mail notification if this operation fails. ...
- Users connected to a shared folder or file are disconnected when you close the folder or file and may lose data. When possible, ...
- Users in the local domain can be authenticated to use all of the resources in the specified domain or only those resources ...
- Users in the local forest can be authenticated to use all of the resources in the specified forest or only those resources ...
- Users in the specified domain can be authenticated to use all of the resources in the local domain or only those resources ...
- Users in the specified forest can be authenticated to use all of the resources in the local forest or only those resources ...
- Users may lose data if disconnected without warning. When possible, notify users before disconnecting them. Do you want to ...
- Users might register DNS names that have special significance. By default, the Global Query Block List contains the strings ...
- Users on computers running NFS client software can access directories (called shares) on computers running Server for NFS ...
- Users that are members of the selected group or groups will be allowed or denied access based on the network policy Access ...
- Users will lose their updates if a newer version of the file with conflicting changes is replicated in from another replication ...
- Users will not be able to access shared folders by using the NFS protocol. The unused service will consume system resources ...
- user`u`user password]`User to Run As. Entering a for the password produces a prompt for the password. The password is not ...
- Uses routing information to determine the cost of a route from a specified site to another specified site or sites. The querysites ...
- Using a PIN to encrypt the preshared key increases the security of your deployment. Users will need the PIN in order to install ...
- Using a test certificate in a production environment is not recommended for security reasons. This certificate should be ...
- Using an account with a blank password as the AD LDS service account is a security risk. Do you want to continue using this ...
- Using automatic certificate requests, an administrator can specify which types of certificate can be automatically requested ...
- Using Cluster-Aware Updating to update this failover cluster could cause downtime, because Automatic Updates may be concurrently ...
- Using only your voice, you can start programs, open menus, click buttons and other objects on the screen, dictate text into ...
- Using RemoteApp, you can access programs on a remote computer through Remote Desktop Services. Although the programs are ...
- Using system protection on a drive that contains other shadow copies will cause older system restore points to be deleted ...
- Using system protection on a drive that contains system image backups will cause other shadow copies to be deleted faster ...
- Using the contrast control on your display, set the contrast as high as possible without losing the ability to see the wrinkles ...
- Using the controls on your display, set the brightness higher or lower until you can distinguish the shirt from the suit ...
- Using the DFS Management MMC snap-in, change the path of the staging folder for the replicated folder on the member in the ...
- Using the DFS Management MMC snap-in, change the path of the staging folder for the SYSVOL folder on this domain controller. ...
- Using the DFS Management MMC snap-in, change the staging folder for the replicated folder on the member in the replication ...
- Using the DFS Management MMC snap-in, change the staging folder for the replicated folder on this local computer in the replication ...
- Using the DFS Management MMC snap-in, delete the replicated folder from the local computer in the replication group . Add ...
- Using the DFS Management MMC snap-in, delete the replicated folder from the member in the replication group . Add the replicated ...
- Using the DFS Management MMC snap-in, delete the replicated folder from the member in the replication group . Add the replicated ...
- Using the Failover cluster Management UI, online the disk hosting the replicated folder from the member in the replication ...
- Using the following variables, you can create a format for automatically generating custom computer names for new installations: ...
- Using the same share name for both SMB-based and NFS-based access is not recommended because clients that support both protocols ...
- Using the settings below, you can modify the IP/Ports for HTTP and UDP transports. Note: Both RPC-HTTP and HTTP transport ...
- Using this switch parameter indicates that computer certificate authentication is to be disabled. Disabling this setting ...
- Using this wizard, you can create a Connection Manager profile that customizes Connection Manager for users of your service. ...
- Using TTL scoping is not recommended. By enabling TTL scoping, you sacrifice bandwidth in your network, since data will be ...
- Using Windows Media Center over a wireless network may result in inconsistent performance. For the highest quality, wire ...
- Using your current location and calling card selection, dialing this number could result in a emergency services call to ...
- Using your keyboard or the numeric keypad on your Windows Media Center remote control, enter a channel number that you know ...
- Using your keyboard or the numeric keypad on your Windows Media Center remote control, enter a three-digit channel that you ...
- USN Commands Supported - createjournal Create a USN journal deletejournal Delete a USN journal enumdata Enumerate USN data ...
- USN Journal Records Accepted shows the number of update sequence number (USN) journal records that were processed by the ...
- USN Journal Records Read shows the number of update sequence number (USN) journal records that were read by the DFS Replication ...
- USN Journal Unread Percentage shows the percent of the update sequence number (USN) journal that has not yet been read and ...
- Usually, any well-known entry identifiers are replaced by their friendly shorthand form. Specifying /v as a command-line ...
- Utilization status of IP address range %1, Managed by service- %2, Service instance - %3, Owner - %4 has changed to %5 from ...
- v2 Generate or delete hashes for servers running at least Windows Server 2012. If neither -v1 or -v2 is specified, hashes ...
- V3NT 1.3 upgrade and V3Pro 2000 Deluxe are incompatible with this version of Windows. For V3Pro 2000 Deluxe, you should install ...
- Valid commands: load Loads a Filter driver unload Unloads a Filter driver filters Lists the Filters currently registered ...
- Valid MAC address needs to be specified for failover network adapter setting data for virtual machine '%1'. Assign the static ...
- Valid values for intervals are whole numbers in the following ranges: for days, from 0 through 99999; for hours, from 0 through ...
- Validate startup settings used by services and drivers, including the Cluster service, cluster storage, Cluster Shared Volumes, ...
- Validate that all nodes have identical graphics processing units (GPUs) and that each node has a GPU that supports RemoteFX ...
- Validate that cluster resources are online, and list the cluster resources that are running in separate resource monitors. ...
- Validate that none of the nodes currently requires a reboot (as part of a software update) and that each node is configured ...
- Validate that settings and configuration required by Cluster Shared Volumes are present. This test can only be run with an ...
- Validate that the network listeners are running on all the servers. If certificate-based authentication is configured, also ...