Windows 8.1

  1. Examples: To show all relevant properties for the subnets "123.56.15.0/24" and "123.56.16.0/24": dsget subnet "123.56.15 ...
  2. Examples: WBADMIN START RECOVERY -version:03/31/2005-09:00 -itemType:Volume -items:d: WBADMIN START RECOVERY -version:03/31/2005-09:00 ...
  3. EXAMPLES: WDSMCAST /progress /verbose /trace:trace.etl /Transfer-File /Server:MyWDSServer /Namespace:WindowsVista /Username:MyDomain\WDSAdmin ...
  4. Exceeded the maximum number of computer QoS policies. The computer QoS policy "%2" and subsequent computer QoS policies will ...
  5. Exceeded the maximum number of user QoS policies. The user QoS policy "%2" and subsequent user QoS policies will not be applied. ...
  6. Exceeded the maximum number(32) of Third Party EapHost processes. Running the current eap session in short lived Eap3Host ...
  7. Exception is raised while trying to remove cached secrets from local domain controller. Additional data: Exception value: ...
  8. EXCEPTION} Guard Page Exception A page of memory that marks the end of a data structure, such as a stack or an array, has ...
  9. Excessive low frequency noise. Make sure the microphone is not subjected to mechanical shocks and is not in the direct path ...
  10. Excluding certain files and locations can help speed up a scan, but may leave your computer less protected. To add multiple ...
  11. Exclusions are addresses or a range of addresses that are not distributed by the server. A delay is the time duration by ...
  12. EXEC Execute a script file on the local machine. This command is used to duplicate or restore data as part of a backup or ...
  13. Execute permissions are enabled on the Internet Information Services (IIS) virtual directory associated with the remote file ...
  14. Executes command in response to an event, see the Win32 SDK documentation for CreateProcess for more complete description ...
  15. Executing WPAD out of process improves security because the WPAD protocol involves the execution of script. Examples of clients ...
  16. Exempt a hardware type from filtering. Syntax: add filterexemption Parameters: hardware type - Hardware type (a number between ...
  17. Existing backup storage locations will be removed from the backup policy because the new storage location is of a different ...
  18. Existing restore points on the disk will be deleted and new restore points will not be created. You will not be able to use ...
  19. Existing server-specific accounting settings on Remote Access server %1!s! will be removed. The global settings for all entry ...
  20. Expand the list of responses. The responses to each question are displayed as a collapsed list to make the postings easier ...
  21. Expands the maximum size available on a virtual disk. Syntax: EXPAND VDISK MAXIMUM= MAXIMUM= Indicates the new virtual size ...
  22. Expected data for Software Restriction Policies cannot be found. Use the Group Policy Management Editor to reconfigure the ...
  23. Expedited Data Received} The network transport returned data to its client that was marked as expedited by the remote system. ...
  24. Expiration criteria for the expiration rule is not set. You must set at least one of expiration criteria for the expiration ...
  25. Expiry alert threshold to transition IP address to expiry due state has been updated to %1 days before expiry. Previous value: ...
  26. Expiry due for IPv4 address %1, managed by service %2, service instance %3, virtualization type %4, address space %5 and ...
  27. Expiry due for IPv6 address %1, managed by service %2, service instance %3, virtualization type %4, address space %5 and ...
  28. Export events from a log, log file, or using structured query to a file. Usage: wevtutil { epl | export-log } /OPTION:VALUE ...
  29. Export file groups to a file. The syntax of this command is: Filescrn Filegroup Export /File:PATH /Filegroup:FG_NAME /Remote:MACHINE ...
  30. Export of the NPS server configuration failed because you did not agree to export shared secrets. To export the NPS server ...
  31. Export of the NPS server configuration failed because you did not agree to export shared secrets. To export the NPS server ...
  32. Export templates to a file. The syntax of this command is: Dirquota Template Export /File:PATH /Template:TEMPLATE_NAME /Remote:MACHINE ...
  33. Export templates to a file. The syntax of this command is: Filescrn Template Export /File:PATH /Template:TEMPLATE_NAME /Remote:MACHINE ...
  34. Exporting a trust anchor without using authentication is insecure unless DNSSEC is active on %1, a trust anchor covering ...
  35. Exporting iSCSI Target settings in file '{0}'. This may take a long time. Configuration: Failover cluster '{1}': all resources ...
  36. Exporting iSCSI Target settings in file '{0}'. This may take a long time. Configuration: Failover cluster '{1}': all resources ...
  37. Exporting iSCSI Target settings in file '{0}'. This may take a long time. Configuration: Failover cluster '{1}': only resources ...
  38. Exporting settings to the migration store has been interrupted. Verify that the migration store location is available (for ...
  39. Exports update metadata (but not content files, approvals, or server settings) to an export package file. Then importing ...
  40. EXPOSE { | | } Expose the specified shadow copy in the specified location. It provides a convenient way to read information ...
  41. Exposes provider-specific settings in addition to computer-wide service configuration parameters and methods. There is a ...
  42. Express installation files provide faster download and installation on computers, but are larger and will increase download ...
  43. Extended Mode Negotiation Time is the number of milliseconds taken for the last extended mode security association negotiated. ...
  44. Extended Mode SAs That Used Impersonation is the number of extended mode security associations completed using impersonation ...
  45. Extended type definition has been skipped for the '{0}' type because its name did not match the value of the FormatTypeName ...
  46. Extends the time that Windows waits to turn off the display if you repeatedly turn on the display with the keyboard or mouse. ...
  47. Extends the volume or partition with focus, and its file system, into free (unallocated) space on a disk. Syntax: EXTEND ...
  48. Extension deferred processing until next synchronous foreground. Refer to a Resultant Set of Policy report for more information. ...
  49. Extension of the volume manager driver that manages software RAID volumes (spanned, striped, mirrored, RAID-5) on dynamic ...
  50. External Ethernet adapter %1 cannot be disconnected from virtual switch %2 ('%3') because the virtual switch is currently ...
  51. External load balancing for the cluster cannot be enabled because the external network adapter of the Remote Access server ...
  52. External network adapter settings are incorrect. When deploying Remote Access in an edge topology, the specified external ...
  53. External trust An external trust is a nontransitive trust between a domain and another domain outside the forest. A nontransitive ...
  54. Extracting file failed. It is most likely caused by low memory (low disk space for swapping file) or corrupted Cabinet file. ...
  55. F-Secure Anti-Virus, English, versions 4.x, 5.0, and 5.01 are incompatible with this version of Windows. For information ...
  56. Facilitates the running of interactive applications with additional administrative privileges. If this service is stopped, ...
  57. Fade animations on buttons and other controls in Windows, causes application compatibility regressions with some applications ...
  58. Fail Fast Exception} A fail fast exception occurred. Exception handlers will not be invoked and the process will be terminated ...
  59. Fail to delete {0}. The following resource properties are currently referencing it. Please remove the references and try ...
  60. Failback Policy: This clustered role will fail back automatically to its most preferred owner between the hours of {0} and ...
  61. Failed and pending requests (submission date) %2 - Expired and revoked certificates (expiration date) %3 - Extension table ...
  62. Failed saving one of the configuration stores on volume '%1' due to a disk-full error: If the disk is full, please clean ...
  63. Failed to access remote registry on '{0}'. Ensure that the remote registry service is running, and have remote administration ...
  64. Failed to access Test Disk {0}, or disk access latency of {1} milliseconds from node {2} is more than the acceptable limit ...
  65. Failed to acquire lock on node %1. This could be due to a different instance of orchestrator that owns the lock on this node. ...
  66. Failed to acquire Schema Version. This can be due to one of the following reasons: 1. The node is either missing or in the ...
  67. Failed to add a new node because the maximum number of nodes has already been reached on the cluster '{0}'. Please remove ...
  68. Failed to add attribute '%1' in namespace '%2' in to the element. This may be caused by namespace conflict and may be resolved ...
  69. Failed to add dedicated IP address '{0}' on node '{1}' interface '{2}'. Please enable debug output to see more details on ...
  70. Failed to add dedicated IP address because subnet mask is required to perform the operation. Please specify the subnet mask ...
  71. Failed to add dedicated IP address because the operation will be performed on more than one cluster node. Please specify ...
  72. Failed to add memory range starting at 2 for 3 bytes. This operation exceeded the maximum memory capacity of the operating ...
  73. Failed to add new port rule because the maximum number of port rules has already been reached. Please delete some port rules ...
  74. Failed to add node '{0}' with interface '{1}' to cluster '{2}'. Please enable debug output to see more details on the error. ...
  75. Failed to add node to NLB cluster because the interface specified on that node is already bound to NLB. Please use a different ...