Windows 8

  1. Credential Validation This policy setting allows you to audit events generated by validation tests on user account logon ...
  2. CredSSP authentication allows the server to accept user credentials from a remote computer. If you enable CredSSP authentication ...
  3. CredSSP authentication allows the user credentials on this computer to be sent to a remote computer. If you use CredSSP authentication ...
  4. Critical Directory Service System objects cannot be deleted during tree delete operations. The tree delete may have been ...
  5. Critical error %2 occurred, and the index was shut down. The system is probably low on resources. Free up resources and restart ...
  6. Critical Windows Media Center files that are required for video playback have been corrupted and this content cannnot be ...
  7. Critical Windows Media Center files that are required for video playback have been corrupted and this content cannnot be ...
  8. Critical Windows Media Center files that are required for video playback have been replaced. Press the button to renew the ...
  9. Critical Windows Media Center files that are required for video playback have been replaced. To restore these files, return ...
  10. CRM recovery has failed because MS-DTC thinks that the previous instance of this application is still connected. This is ...
  11. CRM recovery has failed because the device is not ready. This is a temporary condition which can occur during cluster failover. ...
  12. CRM Worker custom components require a transaction. You can correct this problem using the Component Services administrative ...
  13. Crops the image by the specified Left, Top, Right, and Bottom margins. Left - Set the Left property to the left margin (in ...
  14. Cryptographic Operation failed. Cryptographic Parameters: OperationType: %1 Provider Name: %2 Key Name: %3 Key Type: %4 Algorithm ...
  15. Cryptographic operation. Subject: Security ID: %1 Account Name: %2 Account Domain: %3 Logon ID: %4 Cryptographic Parameters: ...
  16. Cryptographic policy settings allows you to specify which asymmetric keys, hash algorithms, and cryptographic service providers ...
  17. CSTORE: Gathering list of scripts from packages removed before (mm/dd/yyyy hh:mm:ss) %02d/%02d/%04d %02d:%02d:%02d for deletion. ...
  18. CSV Directory Exchange General Parameters = -i Turn on Import Mode (The default is Export) -f filename Input or Output filename ...
  19. CTLObject - Identifies the CTL to verify: %1 - read AuthRoot CAB and matching certificates from the URL cache. Use %5 to ...
  20. Current % Kernel mode Time shows the percentage of the sample interval that the processes in the Job object spent executing ...
  21. Current % Processor Time shows the percentage of the sample interval that the processes in the Job object spent executing ...
  22. Current % User mode Time shows the percentage of the sample interval that the processes in the Job object spent executing ...
  23. Current async message was dropped by async dispatcher, because there is a new message which will override the current one. ...
  24. Current Bandwidth is an estimate of the current bandwidth of the network interface in bits per second (BPS). For interfaces ...
  25. Current Clients is the instantaneous count of the clients being serviced by this CPU. The server actively balances the client ...
  26. Current Commands counter indicates the number of pending commands from the local computer to all destination servers. If ...
  27. Current Disk Queue Length is the number of requests outstanding on the disk at the time the performance data is collected. ...
  28. Current Group Policy settings allow only critical volume (containing operating system components and system state) backups. ...
  29. Current Group Policy settings allow only critical volume backups (volumes containing operating system components and system ...
  30. Current Group Policy settings allow only critical volume backups (volumes containing operating system components and system ...
  31. Current Group Policy settings prevent you from using a device with removable storage such as DVD drives to store backups. ...
  32. Current information about advanced features supported by this Certification Authority is not available from the domain controller. ...
  33. Current leaf index entry of length 3 is at depth 2 which is different from other leaf index entry which has a depth of 1. ...
  34. Current settings for this certificate template allow a client to submit a certificate request using any subject name and ...
  35. Current State Entries is the number of state entries in the table. A state entry is a pair of IPv6 addresses that is authorized ...
  36. Current thread is impersonating a user token. Server channels do not support using thread tokens with Windows integrated ...
  37. Current value of configuration parameters that control MAC address based filtering: Note: MAC address based filtering is ...
  38. Current Windows account Recommended for use on machines that you own. This type of account stays valid the longest. Your ...
  39. Currently the archived data is being displayed. To switch to the current view, save this console and close this snap-in. ...
  40. Currently, a password is not required for the local Administrator account. We recommend that you use the net user command-line ...
  41. Currently, a password is required before Windows can resume from the screen saver. If the screen saver activates while the ...
  42. Currently, no TV signal is detected for this channel. The channel may be temporarily off the air, or you may need to adjust ...
  43. Currently, no TV signal is detected for this channel. The channel may be temporarily off the air, or you may need to adjust ...
  44. Currently, the local Administrator password is blank, which might lead to security issues. We recommend that you press Ctrl+Alt+Delete, ...
  45. Currently, this hardware device is not connected to the computer.%s To fix this problem, reconnect this hardware device to ...
  46. CurrentProfile' cannot be used to configure a Group Policy Object (GPO) store. Use 'DomainProfile', 'PrivateProfile', 'PublicProfile', ...
  47. Custom actions perform additional configuration tasks on client computers. You can designate each custom action to run at ...
  48. Custom attribute '{0}' and extended attribute '{1}' cannot both be specified. They apply to the same directory attribute. ...
  49. Custom Custom settings. - To change the settings, click Custom Level. - To use the recommended settings, click Default Level. ...
  50. Custom delegation privileges already exist on this object for the selected security principal. If you continue, you can change ...
  51. Custom dynamic link libraries are being loaded for every application. The system administrator should review the list of ...
  52. Custom naming rules lets you customize the automatically generated account name for new computers. %First, %Last, %Username, ...
  53. CUSTOM TYPES A custom type identifies the data format and meaning of a value that is not represented by a friendly type name ...
  54. Customer Experience Improvement Program cannot access the registry. Verify that you have the appropriate permissions to manage ...
  55. Customer Experience Improvement Program data was successfully consolidated into files that will be sent to Microsoft for ...
  56. Customize playback, privacy, and online store settings. Select this option if you want to review or change your settings ...
  57. d! backups were successfully deleted, but %2!d! had additional information in the log above. %3!d! backups were not deleted. ...
  58. d! GPOs were successfully backed up, but %2!d! had additional information in the log above. %3!d! GPOs were not backed up. ...
  59. d! GPOs were successfully imported, but %2!d! had additional information in the log above. %3!d! GPOs were not imported. ...
  60. d! GPOs were successfully linked to this OU, but %2!d! had additional information in the log above. %3!d! GPOs were not linked. ...
  61. d! GPOs were successfully restored, but %2!d! had additional information in the log above. %3!d! GPOs were not restored. ...
  62. d! of the files have sync copies that are inaccessible. These files will not be updated until the sync copies are accessible ...
  63. d! of the folders are contained within other folders in the Briefcase. These folders will not be updated. To update these ...
  64. d! Problem: Missing Expected Value Base Object: %2 Base Object Description: "DC Account Object" Value Object Attribute Name: ...
  65. d! Problem: Missing Expected Value Base Object: %2 Base Object Description: "DC Account Object" Value Object Attribute Name: ...
  66. d! Problem: Missing Expected Value Base Object: %2 Base Object Description: "DSA Object" Value Object Attribute Name: %3 ...
  67. d! Problem: Missing Expected Value Base Object: %2 Base Object Description: "Server Object" Value Object Attribute: %3 Value ...
  68. d! Problem: Missing Expected Value Base Object: %2 Base Object Description: "SYSVOL FRS Member Object" Value Object Attribute ...
  69. d! Problem: Missing Expected Value Base Object: %2 Base Object Description: "SYSVOL FRS Member Object" Value Object Attribute ...
  70. d! Problem: Not enough master NCs DSA Object: %2 Recommended Action: Every DSA object should have 3 Master NCs (Partitions). ...
  71. d! Starter GPO backups were successfully deleted, but %2!d! had additional information in the log above. %3!d! Starter GPO ...
  72. d! Starter GPOs were successfully backed up, but %2!d! had additional information in the log above. %3!d! Starter GPOs were ...
  73. d! Starter GPOs were successfully copied, but %2!d! had additional information in the log above. %3!d! Starter GPOs were ...
  74. d! Starter GPOs were successfully deleted, but %2!d! had additional information in the log above. %3!d! Starter GPOs were ...
  75. d! Starter GPOs were successfully restored, but %2!d! had additional information in the log above. %3!d! Starter GPOs were ...