Windows 7
- User count check did not pass because error %1 occurred in function %2.%r%3%rMake sure that the domain that this computer ...
- User credentials does not have permission to perform this operation. The account used for this test must have network logon ...
- User credentials does not have permission to perform this operation. The account used for this test must have network logon ...
- User devices are logical devices that allow a computer system's users to input, view or hear data. The CIM_UserDevice class ...
- User initiated logoff: Subject: Security ID: %1 Account Name: %2 Account Domain: %3 Logon ID: %4 This event is generated ...
- User mode health monitoring has detected that the system is not being responsive. The Failover cluster virtual adapter has ...
- User mode health monitoring has detected that the system is not being responsive. The Failover cluster virtual adapter has ...
- User Name: %1 Domain: % %2 Request Type: %3 Logon Process: %4 Authentication Package: %5 Workstation Name: %6 Caller User ...
- User Principal Name (UPN) claim mapping is set to accept all domain suffixes from this account partner. This setting is not ...
- User profiles store settings for your desktop and other information related to your user account. You can create a different ...
- User Settings are applied to users regardless of which computer they log on to, and affect only the individual users for ...
- User Source Io Owner has exceed the Quota Threshold]% quota threshold for quota on Quota Path on server Server]. The quota ...
- User Source Io Owner has reached the quota limit for quota on Quota Path on server Server]. The quota limit is Quota Limit ...
- User Source Io Owner has reached the quota limit for quota on Quota Path on server Server]. The quota limit is Quota Limit ...
- User Time is the percentage of elapsed time that the process threads spent executing code in user mode. Applications, environment ...
- User Time is the percentage of elapsed time that this thread has spent executing code in user mode. Applications, environment ...
- User Time is the percentage of elapsed time the processor spends in the user mode. User mode is a restricted processing mode ...
- User {0} attempted to save {1} to {2} on the {3} server. This file is in the {4} file group, which is not permitted on the ...
- User {0} has exceeded the limit for the quota on {1} on server {2}. The quota limit is {3} MB, and {4} MB currently is in ...
- User {0} has exceeded the {1}% quota threshold for the quota on {2} on server {3}. The quota limit is {4} MB, and {5} MB ...
- User: %1!s! Domain: %2!s! Connected from: %3!s! Duration: %4!d! days %5!d! hours %6!d! mins %7!d! secs Restriction state: ...
- UserFileReads : %1 UserFileReadBytes : %2 UserDiskReads : %3 UserFileWrites : %4 UserFileWriteBytes : %5 UserDiskWrites : ...
- UserID is the value used by the SecurityService to represent identity. For an authentication service, the UserID may be the ...
- UserKeyAndCertFile - Data file containing user private keys and certificates to be archived. This can be any of the following: ...
- username% will no longer be able to log on, and all of %username%'s settings will be deleted. However, %username%'s files ...
- username, password Credentials for the user identity that should be impersonated when accessing the physical path for the ...
- Users browsing to your site or application could see some privileged information that is contained in the detailed error ...
- Users can connect to network resources by using RD Gateway. Network resources can include computers in an Active Directory ...
- Users can send scanned documents to an e-mail address. They can also receive an e-mail notification if this operation fails. ...
- Users connected to a shared folder or file are disconnected when you close the folder or file and may lose data. When possible, ...
- Users in the local domain can be authenticated to use all of the resources in the specified domain or only those resources ...
- Users in the local forest can be authenticated to use all of the resources in the specified forest or only those resources ...
- Users in the specified domain can be authenticated to use all of the resources in the local domain or only those resources ...
- Users in the specified forest can be authenticated to use all of the resources in the local forest or only those resources ...
- Users may lose data if disconnected without warning. When possible, notify users before disconnecting them. Do you want to ...
- Users on computers running NFS client software can access directories (called shares) on computers running Server for NFS ...
- Users that are members of the selected group or groups will be allowed or denied access based on the network policy Access ...
- user`u`user password]`User to Run As. Entering a for the password produces a prompt for the password. The password is not ...
- Uses routing information to determine the cost of a route from a specified site to another specified site or sites. The querysites ...
- Using a directory service to check the e-mail addresses of your message recipients may slow down the performance of your ...
- Using a PIN to encrypt the preshared key increases the security of your deployment. Users will need the PIN in order to install ...
- Using a server-based sign-up method, you can completely control the users sign-up experience via files on the server. The ...
- Using an account with a blank password as the AD LDS service account is a security risk. Do you want to continue using this ...
- Using automatic certificate requests, an administrator can specify which types of certificate can be automatically requested ...
- Using non-genuine %4 software may expose your computer to increased security risks including viruses, worms, and other malicious ...
- Using RemoteApp, you can access programs on a remote computer through Remote Desktop Services. Although the programs are ...
- Using servers for Internet browsing does not adhere to sound security practices because Internet browsing increases the exposure ...
- Using system protection on a drive that contains other shadow copies will cause older system restore points to be deleted ...
- Using system protection on a drive that contains system image backups will cause other shadow copies to be deleted faster ...
- Using the contrast control on your display, set the contrast as high as possible without losing the ability to see the wrinkles ...
- Using the controls on your display, set the brightness higher or lower until you can distinguish the shirt from the suit ...
- Using the DFS Management MMC snap-in, change the path of the staging folder for the replicated folder on the member in the ...
- Using the DFS Management MMC snap-in, change the path of the staging folder for the SYSVOL folder on this domain controller. ...
- Using the DFS Management MMC snap-in, change the staging folder for the replicated folder on the member in the replication ...
- Using the DFS Management MMC snap-in, change the staging folder for the replicated folder on this local computer in the replication ...
- Using the DFS Management MMC snap-in, delete the replicated folder from the local computer in the replication group . Add ...
- Using the DFS Management MMC snap-in, delete the replicated folder from the member in the replication group . Add the replicated ...
- Using the DFS Management MMC snap-in, delete the replicated folder from the member in the replication group . Add the replicated ...
- Using the Failover cluster Management UI, online the disk hosting the replicated folder from the member in the replication ...
- Using the following variables, you can create a format for automatically generating custom computer names for new installations: ...
- Using the same share name for both SMB-based and NFS-based access is not recommended because clients that support both protocols ...
- Using this wizard, you can create a Connection Manager profile that customizes Connection Manager for users of your service. ...
- Using TTL scoping is not recommended. By enabling TTL scoping, you sacrifice bandwidth in your network, since data will be ...
- Using Windows Internal Database will limit this AD RMS cluster to a single-server cluster. If you intend to join more servers ...
- Using Windows Media Center over a wireless network may result in inconsistent performance. For the highest quality, wire ...
- Using Windows System Resource Manager (WSRM) can help ensure equitable servicing of Web server traffic, especially when there ...
- Using your current location and calling card selection, dialing this number could result in a emergency services call to ...
- Using your keyboard or the numeric keypad on your Windows Media Center remote control, enter a channel number that you know ...
- Using your keyboard or the numeric keypad on your Windows Media Center remote control, enter a three-digit channel that you ...
- USN Commands Supported - createjournal Create a USN journal deletejournal Delete a USN journal enumdata Enumerate USN data ...
- USN Journal Records Accepted shows the number of update sequence number (USN) journal records that were processed by the ...
- USN Journal Records Read shows the number of update sequence number (USN) journal records that were read by the DFS Replication ...
- USN Journal Unread Percentage shows the percent of the update sequence number (USN) journal that has not yet been read and ...
- Usually, any well-known entry identifiers are replaced by their friendly shorthand form. Specifying /v as a command-line ...
- V3NT 1.3 upgrade and V3Pro 2000 Deluxe are incompatible with this version of Windows. For V3Pro 2000 Deluxe, you should install ...