Windows 8

  1. Authentication methods specify how trust is established between computers. These authentication methods are offered and accepted ...
  2. authentication requires an explicit user name and password. Specify the user name and password by using the -Credential parameter ...
  3. Authentication Ticket Request Failed: User Name: %1 Supplied Realm Name: %2 Service Name: %3 Ticket Options: %4 Failure Code: ...
  4. Authentication Ticket Request: User Name: %1 Supplied Realm Name: %2 User ID: %3 Service Name: %4 Service ID: %5 Ticket Options: ...
  5. Authentication type '{0}' is invalid without credential. Only following authentication type are allowed without credential, ...
  6. AuthenticationType - Specify one of the following client authentication methods while adding a URL %1 - %2 %3 - %4 %5 - %6 ...
  7. AuthIP Main Mode Negotiation Time is the number of milliseconds taken for the last Authenticated IP main mode security association ...
  8. AuthIP Quick Mode Negotiation Time is the number of milliseconds taken for the last Authenticated IP quick mode security ...
  9. Authorization entries should have distinct tags for primary servers with virtual machines that are not part of the same security ...
  10. Authorization failed User name: %1 Origin IP address (REMOTE_ADDR): %2 Origin IP address (HTTP_X_FORWARDED_FOR): %3 Error ...
  11. Authorization failed User name: %1 Source: %2 Error message: %3 Destination user name: %4 Destination computer: %5 Port: ...
  12. AuthType: ISCSI_NO_AUTH_TYPE = 0, No iSCSI in-band authentication is used ISCSI_CHAP_AUTH_TYPE = 1, One way CHAP (Target ...
  13. Auto Select scans your channels, enables the ones that have a signal, and then saves any changes. This process will affect ...
  14. Auto-Cast. Starts the transmission automatically when a client requests the image. Then, as other clients request the same ...
  15. Autochk cannot run due to an error caused by a recently installed software package. Use the system restore feature from the ...
  16. AutoComplete remembers entries in web forms, like the one you just typed. In the future, it can list suggestions as you type. ...
  17. Autoconfigured address limit has been reached. No further autoconfigured addresses will be added until the interface is reconnected. ...
  18. Autoconfigured route limit has been reached. No further autoconfigured routes will be added until the interface is reconnected. ...
  19. Automated System Recovery failed the shadow copy, because a selected critical volume is located on a cluster shared disk. ...
  20. Automates and simplifies the issuance and management of Microsoft software volume licenses for a variety of scenarios and ...
  21. Automatic backup will periodically back up the WMI repository to a pre-defined file. Backup only occurs when there is a change ...
  22. Automatic certificate enrollment for %1 failed to contact the active directory (%2). %3 Enrollment will not be performed. ...
  23. Automatic configuration may override manual settings. To ensure the use of manual settings, disable automatic configuration. ...
  24. Automatic configuration of Windows Deployment Services is not supported on this version of Windows. Try configuring Windows ...
  25. Automatic Maintenance was delayed. Maintenance tasks will run at the next scheduled time, or you can start maintenance now. ...
  26. Automatic remediation for antispyware signatures failed. Windows could not update signatures for Windows Defender. Failure ...
  27. Automatic remediation for Windows Security Center service failed. Windows could not turn on Windows Security Center service. ...
  28. Automatic remediation for Windows Security Center service succeeded. Windows Security Center service was turned on successfully. ...
  29. Automatic string Id generation logic can only support 16 event providers. Beyond that, string Ids must be explicitly assigned ...
  30. Automatic unlock is disabled on volume %1!s!. NOTE: An associated External Key protector was created on this data volume ...
  31. Automatic unlocking is the only way to unlock this drive. Add another unlocking method before removing automatic unlocking. ...
  32. Automatic wireless network configuration is disabled on this computer The setting may be disabled because another program ...
  33. Automatically correct the problem by installing DNS Server service on this computer. This will also configure the IP settings ...
  34. Automatically download media information from the Internet and join the Customer Experience Improvement Program to send data ...
  35. Automation job error data added. Error: %6, Command: %3, Target: %4, ID: %1, Parent: %2, Message: %7, Action: %8, Exception: ...
  36. Available (%1.0f MB) Amount of memory (including Standby and Free memory) that is immediately available for use by processes, ...
  37. Available Bytes is the amount of physical memory, in bytes, immediately available for allocation to a process or for system ...
  38. Available command line switches: /quiet - Unattended mode (no user interaction). /norestart - Do not restart the system when ...
  39. Available features: (Features marked with can be downloaded but cannot be installed on this computer) {0} Use Ctrl+C to copy ...
  40. Available KBytes is the amount of physical memory, in Kilobytes, immediately available for allocation to a process or for ...
  41. Available MBytes is the amount of physical memory, in Megabytes, immediately available for allocation to a process or for ...
  42. Available space may run out on the physical disk that stores the snapshot files. If this occurs, no additional disk operations ...
  43. Available space may run out on the physical disk that stores the snapshot files. If this occurs, no additional disk operations ...
  44. Available Threads is the number of server threads on this CPU not currently working on requests from a client. The server ...
  45. Available: Amount of memory (including Standby and Free memory) that is immediately available for use by processes, drivers, ...
  46. Average length of time the Security Descriptor propagator spends waiting for exclusive access to Data Base elements during ...
  47. Average number of I/O requests processed by the server per second. The server does not necessarily send a response for each ...
  48. Average seconds per operation is a good indicator of disk activity and health. An I/O is expected to take under .015 ms on ...
  49. Average time to display the Sort context sub-menu which is viewed in File Explorer after right-clicking and selecting Sort. ...
  50. Average time to display the View context sub-menu which is viewed in File Explorer after right-clicking and selecting View. ...
  51. Avg number of ms between the current frame and the start frame of an ISO transfer when scheduled. For device instances only. ...
  52. Avg Response Time shows the average response time to the referral requests that were processed by the DFS Namespace service. ...
  53. Avg Response Time shows the average response time to the requests to one API that were processed by the DFS Namespace service. ...
  54. Avg. Disk Queue Length is the average number of both read and write requests that were queued for the selected disk during ...
  55. Avg. Disk Read Queue Length is the average number of read requests that were queued for the selected disk during the sample ...
  56. Avg. Disk Write Queue Length is the average number of write requests that were queued for the selected disk during the sample ...
  57. Avoid alignment inconsistencies between virtual blocks and physical disk sectors on dynamic virtual hard disks or differencing ...
  58. Avoid enabling virtual machines configured with virtual Fibre Channel adapters to allow live migrations when there are fewer ...
  59. Avoid using VHD-format differencing virtual hard disks on virtual machines that run server workloads in a production environment. ...
  60. Avoid using virtual hard disks with a sector size less than the sector size of the physical storage that stores the virtual ...
  61. B A T C H R E C U R S I O N exceeds STACK limits Recursion Count=%1!d!, Stack Usage=%2!d! percent B A T C H PROCESSING IS ...
  62. b wireless networks do not have the capacity to provide the Windows Media Center experience on the Media Center Extender. ...
  63. b%b%b%b-d domain Specify a domain other than the default domain. -x Dump the map nickname translation table. -h server Send ...
  64. b%b%b%b-k Print keys as well as values. -d domain Specify a domain other than the default domain. -x Dump the map nickname ...
  65. b%b%b%b-k Print keys as well as values. -x Dump the map nickname translation table. -h server Send request to specified server. ...
  66. Back up files and directories This user right determines which users can bypass file and directory, registry, and other persistent ...
  67. Back up your files immediately to prevent information loss, and then contact the computer manufacturer to determine if you ...
  68. Back up your important files, applications, or entire server to a locally attached device or a network share using Windows ...
  69. Background Intelligent Transfer Service (BITS) asynchronously transfers files in the foreground or background, controls the ...
  70. Background Intelligent Transfer Service (BITS) asynchronously transfers files in the foreground or background, controls the ...
  71. Background Intelligent Transfer Services (BITS) server extension cleanup for the virtual directory %1 and the unique identifier ...
  72. Background optimizations (prefetching) took longer to complete, resulting in a performance degradation in the system start ...
  73. Backlog calculations cannot be performed because an error occurred while the reporting mechanism attempted to retrieve version ...
  74. Backlog calculations cannot be performed because DFS Replication encountered the following error while accessing the Windows ...
  75. Backup configuration of the server. Syntax: backup Parameters: path - The path. Examples: backup path = c:\windows\system32\dhcp\backup ...