Windows 8.1
- Examples: To show all relevant properties for the subnets "123.56.15.0/24" and "123.56.16.0/24": dsget subnet "123.56.15 ...
- Examples: WBADMIN START RECOVERY -version:03/31/2005-09:00 -itemType:Volume -items:d: WBADMIN START RECOVERY -version:03/31/2005-09:00 ...
- EXAMPLES: WDSMCAST /progress /verbose /trace:trace.etl /Transfer-File /Server:MyWDSServer /Namespace:WindowsVista /Username:MyDomain\WDSAdmin ...
- Exceeded the maximum number of computer QoS policies. The computer QoS policy "%2" and subsequent computer QoS policies will ...
- Exceeded the maximum number of user QoS policies. The user QoS policy "%2" and subsequent user QoS policies will not be applied. ...
- Exceeded the maximum number(32) of Third Party EapHost processes. Running the current eap session in short lived Eap3Host ...
- Exception is raised while trying to remove cached secrets from local domain controller. Additional data: Exception value: ...
- EXCEPTION} Guard Page Exception A page of memory that marks the end of a data structure, such as a stack or an array, has ...
- Excessive low frequency noise. Make sure the microphone is not subjected to mechanical shocks and is not in the direct path ...
- Excluding certain files and locations can help speed up a scan, but may leave your computer less protected. To add multiple ...
- Exclusions are addresses or a range of addresses that are not distributed by the server. A delay is the time duration by ...
- EXEC Execute a script file on the local machine. This command is used to duplicate or restore data as part of a backup or ...
- Execute permissions are enabled on the Internet Information Services (IIS) virtual directory associated with the remote file ...
- Executes command in response to an event, see the Win32 SDK documentation for CreateProcess for more complete description ...
- Executing WPAD out of process improves security because the WPAD protocol involves the execution of script. Examples of clients ...
- Exempt a hardware type from filtering. Syntax: add filterexemption Parameters: hardware type - Hardware type (a number between ...
- Existing backup storage locations will be removed from the backup policy because the new storage location is of a different ...
- Existing restore points on the disk will be deleted and new restore points will not be created. You will not be able to use ...
- Existing server-specific accounting settings on Remote Access server %1!s! will be removed. The global settings for all entry ...
- Expand the list of responses. The responses to each question are displayed as a collapsed list to make the postings easier ...
- Expands the maximum size available on a virtual disk. Syntax: EXPAND VDISK MAXIMUM= MAXIMUM= Indicates the new virtual size ...
- Expected data for Software Restriction Policies cannot be found. Use the Group Policy Management Editor to reconfigure the ...
- Expedited Data Received} The network transport returned data to its client that was marked as expedited by the remote system. ...
- Expiration criteria for the expiration rule is not set. You must set at least one of expiration criteria for the expiration ...
- Expiry alert threshold to transition IP address to expiry due state has been updated to %1 days before expiry. Previous value: ...
- Expiry due for IPv4 address %1, managed by service %2, service instance %3, virtualization type %4, address space %5 and ...
- Expiry due for IPv6 address %1, managed by service %2, service instance %3, virtualization type %4, address space %5 and ...
- Export events from a log, log file, or using structured query to a file. Usage: wevtutil { epl | export-log } /OPTION:VALUE ...
- Export file groups to a file. The syntax of this command is: Filescrn Filegroup Export /File:PATH /Filegroup:FG_NAME /Remote:MACHINE ...
- Export of the NPS server configuration failed because you did not agree to export shared secrets. To export the NPS server ...
- Export of the NPS server configuration failed because you did not agree to export shared secrets. To export the NPS server ...
- Export templates to a file. The syntax of this command is: Dirquota Template Export /File:PATH /Template:TEMPLATE_NAME /Remote:MACHINE ...
- Export templates to a file. The syntax of this command is: Filescrn Template Export /File:PATH /Template:TEMPLATE_NAME /Remote:MACHINE ...
- Exporting a trust anchor without using authentication is insecure unless DNSSEC is active on %1, a trust anchor covering ...
- Exporting iSCSI Target settings in file '{0}'. This may take a long time. Configuration: Failover cluster '{1}': all resources ...
- Exporting iSCSI Target settings in file '{0}'. This may take a long time. Configuration: Failover cluster '{1}': all resources ...
- Exporting iSCSI Target settings in file '{0}'. This may take a long time. Configuration: Failover cluster '{1}': only resources ...
- Exporting settings to the migration store has been interrupted. Verify that the migration store location is available (for ...
- Exports update metadata (but not content files, approvals, or server settings) to an export package file. Then importing ...
- EXPOSE { | | } Expose the specified shadow copy in the specified location. It provides a convenient way to read information ...
- Exposes provider-specific settings in addition to computer-wide service configuration parameters and methods. There is a ...
- Express installation files provide faster download and installation on computers, but are larger and will increase download ...
- Extended Mode Negotiation Time is the number of milliseconds taken for the last extended mode security association negotiated. ...
- Extended Mode SAs That Used Impersonation is the number of extended mode security associations completed using impersonation ...
- Extended type definition has been skipped for the '{0}' type because its name did not match the value of the FormatTypeName ...
- Extends the time that Windows waits to turn off the display if you repeatedly turn on the display with the keyboard or mouse. ...
- Extends the volume or partition with focus, and its file system, into free (unallocated) space on a disk. Syntax: EXTEND ...
- Extension deferred processing until next synchronous foreground. Refer to a Resultant Set of Policy report for more information. ...
- Extension of the volume manager driver that manages software RAID volumes (spanned, striped, mirrored, RAID-5) on dynamic ...
- External Ethernet adapter %1 cannot be disconnected from virtual switch %2 ('%3') because the virtual switch is currently ...
- External load balancing for the cluster cannot be enabled because the external network adapter of the Remote Access server ...
- External network adapter settings are incorrect. When deploying Remote Access in an edge topology, the specified external ...
- External trust An external trust is a nontransitive trust between a domain and another domain outside the forest. A nontransitive ...
- Extracting file failed. It is most likely caused by low memory (low disk space for swapping file) or corrupted Cabinet file. ...
- F-Secure Anti-Virus, English, versions 4.x, 5.0, and 5.01 are incompatible with this version of Windows. For information ...
- Facilitates the running of interactive applications with additional administrative privileges. If this service is stopped, ...
- Fade animations on buttons and other controls in Windows, causes application compatibility regressions with some applications ...
- Fail Fast Exception} A fail fast exception occurred. Exception handlers will not be invoked and the process will be terminated ...
- Fail to delete {0}. The following resource properties are currently referencing it. Please remove the references and try ...
- Failback Policy: This clustered role will fail back automatically to its most preferred owner between the hours of {0} and ...
- Failed and pending requests (submission date) %2 - Expired and revoked certificates (expiration date) %3 - Extension table ...
- Failed saving one of the configuration stores on volume '%1' due to a disk-full error: If the disk is full, please clean ...
- Failed to access remote registry on '{0}'. Ensure that the remote registry service is running, and have remote administration ...
- Failed to access Test Disk {0}, or disk access latency of {1} milliseconds from node {2} is more than the acceptable limit ...
- Failed to acquire lock on node %1. This could be due to a different instance of orchestrator that owns the lock on this node. ...
- Failed to acquire Schema Version. This can be due to one of the following reasons: 1. The node is either missing or in the ...
- Failed to add a new node because the maximum number of nodes has already been reached on the cluster '{0}'. Please remove ...
- Failed to add attribute '%1' in namespace '%2' in to the element. This may be caused by namespace conflict and may be resolved ...
- Failed to add dedicated IP address '{0}' on node '{1}' interface '{2}'. Please enable debug output to see more details on ...
- Failed to add dedicated IP address because subnet mask is required to perform the operation. Please specify the subnet mask ...
- Failed to add dedicated IP address because the operation will be performed on more than one cluster node. Please specify ...
- Failed to add memory range starting at 2 for 3 bytes. This operation exceeded the maximum memory capacity of the operating ...
- Failed to add new port rule because the maximum number of port rules has already been reached. Please delete some port rules ...
- Failed to add node '{0}' with interface '{1}' to cluster '{2}'. Please enable debug output to see more details on the error. ...
- Failed to add node to NLB cluster because the interface specified on that node is already bound to NLB. Please use a different ...