Windows 7
- Lists file screening audit events on the server. Use this report to identify users or applications that violate screening ...
- Lists files by file group. Use this report to observe file group usage patterns and to quickly identify file groups that ...
- Lists files by the value of a property. Use this report to understand usage patterns on the server and to quickly identify ...
- Lists files by the values of a particular classification property. Use this report to observe file classification usage patterns. ...
- Lists files by users who own them. Use this report to understand usage patterns on the server and to quickly identify users ...
- Lists files that appear to be duplicates (files with same name, size and last modified time). Use this report to quickly ...
- Lists files that appear to be duplicates (files with the same size and last modified time) Use this report to quickly identify ...
- Lists files that appear to be duplicates (files with the same size and last modified time). Use this report to quickly identify ...
- Lists files that are a specified size or larger. Use this report to quickly identify the files that are consuming the most ...
- Lists files that are of a specified size or larger. Use this report to quickly identify the files that are consuming the ...
- Lists files that have been accessed most recently. Use this report to identify frequently used data that needs to be highly ...
- Lists files that have been accessed most recently. Use this report to identify frequently used data that needs to be highly ...
- Lists files that have not been accessed recently. Use this report to quickly identify files that can be either deleted or ...
- Lists files that have not been accessed recently. Use this report to quickly identify stale files that can be either deleted ...
- Lists files that have not been accessed recently. Use this report to quickly identify stale files that can be either deleted ...
- Lists files that were acted on by the classification policy. Use this report to understand how files were classified by the ...
- Lists large files. Use this report to quickly identify the files that are consuming the most disk space on the server. These ...
- Lists the calendar events that are scheduled between the specified date range. wsrmc /Get:CalView /Sd: /Ed: /Sd Specifies ...
- Lists the director and actors in the current movie or show. Selecting a name displays the other movies and shows the actor ...
- Lists the quotas that exceed a certain disk space usage level. Use this report to quickly identify quotas that may be exceeded ...
- Lists the quotas that exceed a certain disk space usage level. Use this report to quickly identify quotas that may soon be ...
- Lists the status of all client machines that remotely log data to this machine. wsrmc /Get:AccClients /o: /y /o Saves the ...
- Lists the usage of volume resources for shadow copies. Use this report to identify inconsistencies in diff area configuration ...
- Lists the virtual sites on the machine. This command can be used to find a specific site by using its identifier or url, ...
- Lists tm and tx objects Usage: ktmutil tx list Lists all transactions ktmutil tx list {TmGuid} Lists transactions in a tm ...
- Lists types of files that cannot be used offline. This setting lets you exclude certain types of files from automatic and ...
- LLMNR name resolution is used to resolve a single-label, unqualified name. It is attempted only if DNS name resolution failed ...
- Load and unload device drivers This user right determines which users can dynamically load and unload device drivers or other ...
- loadBalancerCapabilities If set to HttpLevel and the application pool is stopped, HTTP.sys will return an HTTP 503 error. ...
- Loading a backup destination catalog must be done before doing an asynchronous operation with an engine reference. Try creating ...
- LoadMXF -s storeFilename -v -i inputFilename where: -s storeFilename - the filename of the store. If not specified, the default ...
- loadUserProfile This setting specifies whether IIS loads the user profile for an application pool identity. When this value ...
- Local administrative pages cannot be displayed. Message Queuing may not be properly installed. Please reinstall Message Queuing ...
- Local certificate revocations lists for Online Responder Array members could not be synchronized with the Array controller. ...
- Local forest root domain: %1 Because some of the local name suffixes already exist in the specified forest (or a forest that ...
- Local Group Policy Objects are stored on the local computer. Use the Browse button to select one of the Group Policy Objects. ...
- Local Link Multicast Name Resolution (LLMNR) is a secondary name resolution protocol. Queries are sent over the Local Link, ...
- Local security could not be started because an error occurred during initialization. The error code returned is %1. THE SYSTEM ...
- Local security could not be started because the user accounts database (NET.ACC) was missing or corrupted, and no usable ...
- Local security could not be started because the user accounts database (NET.ACC) was missing or corrupted, and no usable ...
- Local Session Key} A user session key was requested for a local RPC connection. The session key returned is a constant value ...
- LocalFirewallRules %1!s! LocalConSecRules %2!s! InboundUserNotification %3!s! RemoteManagement %4!s! UnicastResponseToMulticast ...
- Locate and install driver software (recommended) Windows will guide you through the process of installing driver software ...
- Locate the centering and sizing controls for your TV. If you do not have these controls, select Back and go to the next adjustment. ...
- Locate the RGB color balance control for your display. If your monitor has a color temperature setting, set it to 6500k, ...
- Locates security errors (or those possibly security related) and performs the initial diagnosis of the problem. Optional ...
- Location of Offline Files cache on the local computer. This is the directory under which the locally-cached file copies exist. ...
- Location sensors can detect your computer's current location. Once a location sensor is enabled, all programs and users on ...
- Location sensors can detect your computer's current location. Once a location sensor is enabled, all programs and users on ...
- Lock pages in memory This security setting determines which accounts can use a process to keep data in physical memory, which ...
- Lock the configuration section at a particular level so that its settings cannot be overridden at lower levels. If the identifier ...
- Lockdown Tool You never had any version of the IIS lockdown tool installed on the previous operating system. As a result, ...
- Locked table. This record could not be applied during synchronization since the table was locked by another user. Resubmit ...
- Log "{0}" could not be read to completion due to the following error. This may have occurred because the log was cleared ...
- Log Bytes Generated per second is the rate at which data is added to the log. This is different from Log Bytes Write per ...
- Log Checkpoint Depth as a % of Target is an expression of the current checkpoint depth in terms of a percentage of the checkpoint ...
- Log Files Generated Prematurely represents the total number of log files generated by an instance since that instance was ...
- Log Files Generated represents the total number of log files generated by an instance since that instance was last initialized. ...
- Log Generation Checkpoint Depth Max represents the maximum allowable amount of work, in count of log files, that may be redone ...
- Log Generation Checkpoint Depth represents the amount of work, in count of log files, that will need to be redone or undone ...
- Log Generation Checkpoint Depth Target represents the ideal target for the amount of work, in count of log files, that may ...
- Log Generation Loss Resiliency Depth represents the amount of work, in count of log files, that may be lost while still allowing ...
- Log on as a batch job This security setting allows a user to be logged on by means of a batch-queue facility and is provided ...
- Log on as a service This security setting allows a security principal to log on as a service. Services can be configured ...
- Log on locally Determines which users can log on to the computer. Important Modifying this setting may affect compatibility ...
- Log on to %s locally as an administrator, install IP from the Network Connections folder, and then run this wizard again. ...
- Log Record Stalls/sec is the number of log records that cannot be added to the log buffers per second because they are full. ...
- Log represents any type of event, error or informational register or chronicle. The object describes the existence of the ...
- Log sequence numbers for this instance have almost been completely consumed. The current log generation is %4 which is approaching ...
- Log Threads Waiting is the number of threads waiting for their data to be written to the log in order to complete an update ...
- Log Writes/sec is the number of times the log buffers are written to the log file(s) per second. If this number approaches ...
- Logging Agent provides support for logging statistics from clients that receive multicast broadcast or advertising content ...
- Logging could not be disabled for the following RD Gateway event: "%1". The following error occurred: "%2". To resolve this ...
- Logging could not be enabled for the following RD Gateway event: "%1". The following error occurred: "%2". To resolve this ...
- Logging off is required after changing the Administrator account name. Some tasks may not work until you log off and log ...