Windows 8.1
- Format version: %1!d! CSid: %2!s! LinkIndex: 3!08x!.%4!08x! LinkFileNtfsID: 5!08x!.%6!08x! CSFileNtfsID: 7!08x!.%8!08x! CSChecksum: ...
- FORMAT volume /FS:file-system /V:label /Q /L /A:size /C /I:state /X /P:passes /S:state FORMAT volume /V:label /Q /F:size ...
- FORMAT volume /Q volume Specifies the drive letter (followed by a colon), mount point, or volume name. /FS:filesystem Specifies ...
- FORMAT volume /Q volume Specifies the drive letter (followed by a colon), mount point, or volume name. /FS:filesystem Specifies ...
- Formats the specified volume for use with Windows. Syntax: FORMAT FS= REVISION= | RECOMMENDED LABEL= UNIT= QUICK COMPRESS ...
- Formatting this volume erases all data on it. Back up any data that you want to keep before formatting this volume. Do you ...
- Formatting this volume will erase all data on it. Back up any data you want to keep before formatting. Do you want to continue? ...
- format`f`bin|bincirc|csv|tsv|sql`Specifies the log format for the data collector. For SQL database format, you must use the ...
- Forwarders are servers that can resolve DNS queries not answered by this server. Forward queries for names in the following ...
- Forwarding is disabled on the internal network adapter. This might prevent remote clients from accessing internal network ...
- Forwarding is not enabled on the external adapter. This might prevent remote client traffic from reaching the internal network. ...
- Found application %1!s! from policy %2!s! which matches the cached script. It was in the original list of applications gathered ...
- Found application %1!s! from policy %2!s! which matches the cached script. It will be added to the client's list of managed ...
- Found duplicate IP address {4} on node {0} adapter {1} and node {2} adapter {3}. This may be intentional, since adapter {1} ...
- Found duplicate IP address {4} on node {0} adapter {1} and node {2} adapter {3}. This may be intentional, since both adapters ...
- Found duplicate physical address {4} on node {0} adapter {1} and node {2} adapter {3}. This may be intentional, since adapter ...
- Found duplicate physical address {4} on node {0} adapter {1} and node {2} adapter {3}. This may be intentional, since both ...
- Found Exchange Server(s) in the forest. Domain rename is supported only if Exchange server version is Exchange 2003 SP1 and ...
- Found one or more existing clone configuration files. A new clone configuration file cannot be generated. To prevent cloning ...
- found that this app was already running and was unable to stop it. Please make sure that the app is not launched and rerun ...
- Found the application for the cached script in the policy logging database, querying Active Directory for its current state. ...
- Fragment Re-assembly Failures is the number of failures detected by the IP reassembly algorithm, such as time outs, errors, ...
- Fragmentation Failures is the number of IP datagrams that were discarded because they needed to be fragmented at but could ...
- Fragments Created/sec is the rate, in incidents per second, at which IP datagram fragments were generated as a result of ...
- Fragments Received/sec is the rate, in incidents per second, at which IP fragments that need to be reassembled at this entity ...
- Frame Bytes Re-Sent/sec is the rate at which data bytes are re-sent by the computer. This counter only counts the bytes in ...
- Frame Bytes Received/sec is the rate at which data bytes are received by the computer. This counter only counts the frames ...
- Frame Bytes Rejected/sec is the rate at which data bytes are rejected. This counter only counts the bytes in data frames ...
- Frame Bytes Sent/sec is the rate at which data bytes are sent by the computer. This counter only counts the bytes in frames ...
- Frame Bytes/sec is the rate at which data bytes are processed by the computer. This counter is the sum of data frame bytes ...
- Frames Re-Sent/sec is the rate at which data frames (packets) are re-sent by the computer. This counter only counts the frames ...
- Frames Received/sec is the rate at which data frames are received by the computer. This counter only counts the frames (packets) ...
- Frames Rejected/sec is the rate at which data frames are rejected. This counter only counts the frames (packets) that carry ...
- Frames Sent/sec is the rate at which data frames are sent by the computer. This counter only counts the frames (packets) ...
- Frames/sec is the rate at which data frames (or packets) are processed by the computer. This counter is the sum of data frames ...
- Framework %1 is no longer explicitly installed but remains implicitly installed because packages still depend on it. Windows ...
- Free & Zero Page List Bytes is the amount of physical memory, in bytes, that is assigned to the free and zero page lists. ...
- Free (%1.0f MB) Memory that is not currently in use, and that will be repurposed first when processes, drivers, or the operating ...
- Free form string providing more information if the ErrorType property is set to 1, \"Other\". If not set to 1, this string ...
- Free Megabytes displays the unallocated space, in megabytes, on the disk drive in megabytes. One megabyte is equal to 1,048,576 ...
- Free System Page Table Entries is the number of page table entries not currently in used by the system. This counter displays ...
- Free up some space on volume '{0}' or consider relocating one or more replicated folders to another volume. Optionally, consider ...
- Free: Memory that does not contain any valuable data, and that will be used first when processes, drivers or the operating ...
- From %1 to %2 Naming Context: %3 The replication generated an error (%4!ld!): %5 The failure occurred at %6. The last success ...
- From an elevated command prompt, run the following command: gpupdate /force This will force application of the server settings. ...
- From this snap-in you can view and change configuration settings for the Active Directory Rights Management Services (AD ...
- FSINFO Commands Supported - drives List all drives driveType Query drive type for a drive ntfsInfo Query NTFS specific volume ...
- FSRM configuration on volume %s, including its quota configuration, file screen configuration, and file screen audit logs ...
- FSRM global configuration, including template definitions, file group definitions, classification properties and rules, file ...
- FSRM reports, classification and file management logs repository, including any scheduled, incident, and on-demand reports ...
- FSRM was unable to create or access the shadow copy for the volumes mounted at {0} (volume names {1}). Possible causes include ...
- FTP does not encrypt or encode passwords or data before sending them to the server. To protect the security of your passwords ...
- FTP Server provides infrastructure to create an FTP site where users can upload and download files using the FTP protocol ...
- Full access to the system. Do not use this account unless full access is required, and you are certain the process cannot ...
- Full Installation Package Includes installation of Internet Explorer 11. Use for installation from another program or for ...
- Full memory dumps are not allowed for systems with more than 2GB of memory. Please contact Microsoft Support for information ...
- Full sync of partition %1 is in progress. Please be patient. This step may take many hours on a large partition. You can ...
- Fully qualified path name for the log file. If file does not exist, it will be created. If directory does not exist, file ...
- Games should not be played by people under 12; parental/caregivers' guidance for people between 12 and 18 (not including ...
- Gamma defines the mathematical relationship between the red, green, and blue color values that are sent to the display and ...
- General Account Database Change: Type of change: %1 Object Type: %2 Object Name: %3 Object ID: %4 Caller User Name: %5 Caller ...
- General Global Parameters - Default Hop Limit : %1!s! hops Neighbor Cache Limit : %2!s! entries per interface Route Cache ...
- Generate a report detailing the status of local hardware resources, system response times, and processes on the local computer ...
- Generate a report detailing the status of local hardware resources, system response times, and processes on the local computer. ...
- generate a script to retrieve and recover keys (default behavior if multiple matching recovery candidates are found, or if ...
- Generate on-demand storage report jobs. The syntax of this command is: Storrept Reports Generate /Task:TASK /Nowait Storrept ...
- Generate security audits This security setting determines which accounts can be used by a process to add entries to the security ...
- Generates current license usage reportScope Type can have following values:1 = Domain, 2 = Organizational Unit, 3 = All trusted ...
- Generates hashes that uniquely identify file versions stored in shared folders on this server. Client computers on which ...
- Generation 2 virtual machines are not supported as a virtual desktop template. Select a valid Generation 1 virtual machine ...
- Generic application '%1' could not be brought online (with error '%2') during an attempt to create the process. Possible ...
- Generic IKEv1, AuthIP, and IKEv2 is the set of Internet Protocol security (IPsec) Internet Key Exchange Version 1 (IKEv1), ...
- Generic Routing Encapsulation is used for encapsulation of an arbitrary network layer protocol over another arbitrary network ...
- Generic service '%1' could not be brought online (with error '%2') during an attempt to open the service. Possible causes ...
- Generic service '%1' could not be brought online (with error '%2') during an attempt to start the service. Possible cause: ...