Windows 7

  1. When you specify one or more NAP-enabled scopes, NPS evaluates client health and performs authorization for client computers ...
  2. When you try to specify one set of rights for all users or groups, you are not allowed to specify array of rights inside ...
  3. When you use a remote shared folder as the storage destination for scheduled backups, each backup will erase the previous ...
  4. When you use InfoCenter, you can view information about the currently playing media, but your computer must be connected ...
  5. When you use recommended settings or install updates only, some information is sent to Microsoft. The information is not ...
  6. When you use recommended settings or install updates only, some information is sent to Microsoft. The information is not ...
  7. When you visit a website that contains content from another provider, such as a map, advertisement, or web measurement tools, ...
  8. When you visit multiple websites that contain content from the same provider, such as a map, advertisement, or web measurement ...
  9. When you want to generate a unique key for each application, either manually specify an assigned validation key or select ...
  10. When your computer is online, Windows can automatically check for important updates and install them using these settings. ...
  11. When your computer wakes from sleep, no one can access your data without entering the correct password to unlock the computer. ...
  12. When your computer wakes from sleep, no one can access your data without entering the correct password to unlock the computer. ...
  13. Whenever you audit start and stop events, Active Directory Certificate Services must calculate a cryptographic hash of the ...
  14. Where a storage extent must be accessed through a media access device, this relationship is described by the CIM_MediaPresent ...
  15. Where do you want to recover the system state to of this backup of the Active Directory database, registry, and SYSVOL state? ...
  16. where Is the path to a file to be created or loaded. Is the password to protect the invitation. Is the computer name or IP ...
  17. Where to get one: If you didn't purchase an Easy Transfer Cable with your computer, you can order one on the web or buy one ...
  18. Whether this power budget is writeable. If this is false, then saving an instance with a modified CurrentBudget will fail ...
  19. While attempting to publish the printer to the Active Directory directory service, Printbrm.exe (the Printer Migration Wizard ...
  20. While attempting to publish the printer to the Active Directory directory service, the print spooler could not create or ...
  21. While attempting to publish the printer to the Active Directory directory service, the print spooler could not create or ...
  22. While attempting to publish the printer to the Active Directory directory service, the print spooler could not create print ...
  23. While attempting to publish the printer to the Active Directory directory service, the print spooler could not find the appropriate ...
  24. While attempting to publish the printer to the Active Directory directory service, the print spooler could not find the appropriate ...
  25. While attempting to publish the printer to the Active Directory directory service, the print spooler could not find the appropriate ...
  26. While attempting to publish the printer to the Active Directory directory service, the print spooler failed to create or ...
  27. While attempting to publish the printer to the Active Directory directory service, Windows failed to publish property %1 ...
  28. While attempting to remove the printer from the Active Directory directory service, the print spooler failed to delete print ...
  29. While attempting to remove the printer from the Active Directory directory service, Windows failed to delete print queue ...
  30. While canceling job "%2", BITS was unable to remove some temporary files. To recover disk space, delete the files listed ...
  31. While canceling job "%2", BITS was unable to remove some temporary files. To recover disk space, delete the temporary files. ...
  32. While copying group membership, the group object for the primary group ID was not found. Instead, the domain Users group ...
  33. While disk resource '%1' was being brought online, access to one or more volumes failed with error '%2'. Run the Validate ...
  34. While files from the Internet can be useful, some files can potentially harm your computer. If you do not trust the source, ...
  35. While files from the Internet can be useful, some files can potentially harm your computer. If you do not trust the source, ...
  36. While files from the Internet can be useful, some files can potentially harm your computer. If you do not trust the source, ...
  37. While files from the Internet can be useful, some files can potentially harm your computer. If you do not trust the source, ...
  38. While files from the Internet can be useful, this file type can potentially harm your computer. If you do not trust the source, ...
  39. While files from the Internet can be useful, this file type can potentially harm your computer. If you do not trust the source, ...
  40. While files from the Internet can be useful, this file type can potentially harm your computer. If you do not trust the source, ...
  41. While files from the Internet can be useful, this file type can potentially harm your computer. If you do not trust the source, ...
  42. While files from the Internet can be useful, this file type can potentially harm your computer. If you do not trust the source, ...
  43. While files from the Internet can be useful, this file type can potentially harm your computer. Only install software from ...
  44. While files from the Internet can be useful, this file type can potentially harm your computer. Only run software from publishers ...
  45. While files from the Internet can be useful, this file type can potentially harm your computer. Only run software from publishers ...
  46. While files from the Internet can be useful, this file type can potentially harm your computer. Only run software from publishers ...
  47. While files from the Internet can be useful, this file type can potentially harm your computer. Only run software from publishers ...
  48. While interacting with the encryption system, an unexpected error occurred. Without encryption, Remote Assistance can't work ...
  49. While logging audit events for the following object, the directory service reached the maximum number of audit events that ...
  50. While Printbrm.exe (the Printer Migration Wizard or the command-line tool) was restoring a print queue from backup, the following ...
  51. While processing a change to the DNS Host Name for an object, the Service Principal Name values could not be kept in sync. ...
  52. While processing a TGS request for the target server %1, the account %2 did not have a suitable key for generating a Kerberos ...
  53. While processing a TGS request for the target server %1, the account %2 did not have a suitable key for generating a Kerberos ...
  54. While processing Active Directory Domain Services event logging overrides, the number of overrides located exceeded the maximum ...
  55. While processing Active Directory Lightweight Directory Services event logging overrides, the number of overrides located ...
  56. While processing an AS request for target service %1, the account %2 did not have a suitable key for generating a Kerberos ...
  57. While processing an AS request for target service %1, the account %2 did not have a suitable key for generating a Kerberos ...
  58. While processing of an Active Directory Domain Services replication request, the Active Directory Domain Services attempted ...
  59. While processing of an Active Directory Lightweight Directory Services replication request, the Active Directory Lightweight ...
  60. While processing security descriptor propagation, the directory service failed to write a new security descriptor for object. ...
  61. While replicating changes from a source directory service, a request to delete the following critical system object was detected. ...
  62. While replicating changes from a source directory service, a request to delete the following critical system object was detected. ...
  63. While replicating the following schema object, a conflict was detected with the following existing attribute. Schema object: ...
  64. While replicating the following schema object, a conflict was detected with the following existing schema class. Schema object: ...
  65. While restoring a print queue from backup, Printbrm.exe (the Printer Migration Wizard or the command-line tool) failed to ...
  66. While restoring a print queue from backup, Printbrm.exe (the Printer Migration Wizard or the command-line tool) failed to ...
  67. While restoring a print queue from backup, Printbrm.exe (the Printer Migration Wizard or the command-line tool) failed to ...
  68. While rolling back the index, the Windows Search Service encountered the following error: . Index files were not moved from ...
  69. While searching for an index, Active Directory Domain Services detected that a new index is needed for the following attribute. ...
  70. While searching for an index, Active Directory Lightweight Directory Services detected that a new index is needed for the ...
  71. While transferring %1, BITS encountered error %2 using %3 as the HTTP proxy server. This may indicate a problem with the ...
  72. While transferring %1, BITS encountered error %7 using %6 as the HTTP proxy server. The web server or proxy server does not ...
  73. While transmitting or receiving data, the server encountered a network error. Occassional errors are expected, but large ...
  74. While uninstalling service '%1', the registry key 'HKLM\SOFTWARE\Microsoft\Windows Media Player NSS\3.0' was not deleted ...
  75. While using your smartcard over a VPN connection, the Kerberos subsystem encountered an error. Typically, this indicates ...