Windows 7

  1. Lists file screening audit events on the server. Use this report to identify users or applications that violate screening ...
  2. Lists files by file group. Use this report to observe file group usage patterns and to quickly identify file groups that ...
  3. Lists files by the value of a property. Use this report to understand usage patterns on the server and to quickly identify ...
  4. Lists files by the values of a particular classification property. Use this report to observe file classification usage patterns. ...
  5. Lists files by users who own them. Use this report to understand usage patterns on the server and to quickly identify users ...
  6. Lists files that appear to be duplicates (files with same name, size and last modified time). Use this report to quickly ...
  7. Lists files that appear to be duplicates (files with the same size and last modified time) Use this report to quickly identify ...
  8. Lists files that appear to be duplicates (files with the same size and last modified time). Use this report to quickly identify ...
  9. Lists files that are a specified size or larger. Use this report to quickly identify the files that are consuming the most ...
  10. Lists files that are of a specified size or larger. Use this report to quickly identify the files that are consuming the ...
  11. Lists files that have been accessed most recently. Use this report to identify frequently used data that needs to be highly ...
  12. Lists files that have been accessed most recently. Use this report to identify frequently used data that needs to be highly ...
  13. Lists files that have not been accessed recently. Use this report to quickly identify files that can be either deleted or ...
  14. Lists files that have not been accessed recently. Use this report to quickly identify stale files that can be either deleted ...
  15. Lists files that have not been accessed recently. Use this report to quickly identify stale files that can be either deleted ...
  16. Lists files that were acted on by the classification policy. Use this report to understand how files were classified by the ...
  17. Lists large files. Use this report to quickly identify the files that are consuming the most disk space on the server. These ...
  18. Lists the calendar events that are scheduled between the specified date range. wsrmc /Get:CalView /Sd: /Ed: /Sd Specifies ...
  19. Lists the director and actors in the current movie or show. Selecting a name displays the other movies and shows the actor ...
  20. Lists the quotas that exceed a certain disk space usage level. Use this report to quickly identify quotas that may be exceeded ...
  21. Lists the quotas that exceed a certain disk space usage level. Use this report to quickly identify quotas that may soon be ...
  22. Lists the status of all client machines that remotely log data to this machine. wsrmc /Get:AccClients /o: /y /o Saves the ...
  23. Lists the usage of volume resources for shadow copies. Use this report to identify inconsistencies in diff area configuration ...
  24. Lists the virtual sites on the machine. This command can be used to find a specific site by using its identifier or url, ...
  25. Lists tm and tx objects Usage: ktmutil tx list Lists all transactions ktmutil tx list {TmGuid} Lists transactions in a tm ...
  26. Lists types of files that cannot be used offline. This setting lets you exclude certain types of files from automatic and ...
  27. LLMNR name resolution is used to resolve a single-label, unqualified name. It is attempted only if DNS name resolution failed ...
  28. Load and unload device drivers This user right determines which users can dynamically load and unload device drivers or other ...
  29. loadBalancerCapabilities If set to HttpLevel and the application pool is stopped, HTTP.sys will return an HTTP 503 error. ...
  30. Loading a backup destination catalog must be done before doing an asynchronous operation with an engine reference. Try creating ...
  31. LoadMXF -s storeFilename -v -i inputFilename where: -s storeFilename - the filename of the store. If not specified, the default ...
  32. loadUserProfile This setting specifies whether IIS loads the user profile for an application pool identity. When this value ...
  33. Local administrative pages cannot be displayed. Message Queuing may not be properly installed. Please reinstall Message Queuing ...
  34. Local certificate revocations lists for Online Responder Array members could not be synchronized with the Array controller. ...
  35. Local forest root domain: %1 Because some of the local name suffixes already exist in the specified forest (or a forest that ...
  36. Local Group Policy Objects are stored on the local computer. Use the Browse button to select one of the Group Policy Objects. ...
  37. Local Link Multicast Name Resolution (LLMNR) is a secondary name resolution protocol. Queries are sent over the Local Link, ...
  38. Local security could not be started because an error occurred during initialization. The error code returned is %1. THE SYSTEM ...
  39. Local security could not be started because the user accounts database (NET.ACC) was missing or corrupted, and no usable ...
  40. Local security could not be started because the user accounts database (NET.ACC) was missing or corrupted, and no usable ...
  41. Local Session Key} A user session key was requested for a local RPC connection. The session key returned is a constant value ...
  42. LocalFirewallRules %1!s! LocalConSecRules %2!s! InboundUserNotification %3!s! RemoteManagement %4!s! UnicastResponseToMulticast ...
  43. Locate and install driver software (recommended) Windows will guide you through the process of installing driver software ...
  44. Locate the centering and sizing controls for your TV. If you do not have these controls, select Back and go to the next adjustment. ...
  45. Locate the RGB color balance control for your display. If your monitor has a color temperature setting, set it to 6500k, ...
  46. Locates security errors (or those possibly security related) and performs the initial diagnosis of the problem. Optional ...
  47. Location of Offline Files cache on the local computer. This is the directory under which the locally-cached file copies exist. ...
  48. Location sensors can detect your computer's current location. Once a location sensor is enabled, all programs and users on ...
  49. Location sensors can detect your computer's current location. Once a location sensor is enabled, all programs and users on ...
  50. Lock pages in memory This security setting determines which accounts can use a process to keep data in physical memory, which ...
  51. Lock the configuration section at a particular level so that its settings cannot be overridden at lower levels. If the identifier ...
  52. Lockdown Tool You never had any version of the IIS lockdown tool installed on the previous operating system. As a result, ...
  53. Locked table. This record could not be applied during synchronization since the table was locked by another user. Resubmit ...
  54. Log "{0}" could not be read to completion due to the following error. This may have occurred because the log was cleared ...
  55. Log Bytes Generated per second is the rate at which data is added to the log. This is different from Log Bytes Write per ...
  56. Log Checkpoint Depth as a % of Target is an expression of the current checkpoint depth in terms of a percentage of the checkpoint ...
  57. Log Files Generated Prematurely represents the total number of log files generated by an instance since that instance was ...
  58. Log Files Generated represents the total number of log files generated by an instance since that instance was last initialized. ...
  59. Log Generation Checkpoint Depth Max represents the maximum allowable amount of work, in count of log files, that may be redone ...
  60. Log Generation Checkpoint Depth represents the amount of work, in count of log files, that will need to be redone or undone ...
  61. Log Generation Checkpoint Depth Target represents the ideal target for the amount of work, in count of log files, that may ...
  62. Log Generation Loss Resiliency Depth represents the amount of work, in count of log files, that may be lost while still allowing ...
  63. Log on as a batch job This security setting allows a user to be logged on by means of a batch-queue facility and is provided ...
  64. Log on as a service This security setting allows a security principal to log on as a service. Services can be configured ...
  65. Log on locally Determines which users can log on to the computer. Important Modifying this setting may affect compatibility ...
  66. Log on to %s locally as an administrator, install IP from the Network Connections folder, and then run this wizard again. ...
  67. Log Record Stalls/sec is the number of log records that cannot be added to the log buffers per second because they are full. ...
  68. Log represents any type of event, error or informational register or chronicle. The object describes the existence of the ...
  69. Log sequence numbers for this instance have almost been completely consumed. The current log generation is %4 which is approaching ...
  70. Log Threads Waiting is the number of threads waiting for their data to be written to the log in order to complete an update ...
  71. Log Writes/sec is the number of times the log buffers are written to the log file(s) per second. If this number approaches ...
  72. Logging Agent provides support for logging statistics from clients that receive multicast broadcast or advertising content ...
  73. Logging could not be disabled for the following RD Gateway event: "%1". The following error occurred: "%2". To resolve this ...
  74. Logging could not be enabled for the following RD Gateway event: "%1". The following error occurred: "%2". To resolve this ...
  75. Logging off is required after changing the Administrator account name. Some tasks may not work until you log off and log ...