Windows 8.1

  1. Results of synchronization are logged automatically. To log intermediate steps in synchronization retries, select the Enable ...
  2. resume - Resume cluster operations after a previous suspend command for the specified cluster. start - Start cluster operations ...
  3. Resume cluster operation control on all remoted-control-enabled nodes. NumNodes returns the number of nodes respond to the ...
  4. Resume cluster operation control. This method will fail when called on instances of objects that represent remote nodes. ...
  5. RESUME LOADER The following types apply to entries for the resume loader. For information about data formats for these types, ...
  6. Resume Maker Deluxe 7.0 has a known compatibility issue with this version of Windows and might not run as expected. This ...
  7. Resumes replication for the volume. Volume must be in auto recovery state and replication stopped on the volume due to auto ...
  8. Resynchronization failed for VM '%1'. Resynchronization needs to be started again. If this error occurs repeatedly, you can ...
  9. Resynchronization is already scheduled for virtual machine '%1'. To modify the schedule, cancel the existing scheduled task, ...
  10. Resynchronization is scheduled for {0}. You can start resynchronization immediately by using the Resume Replication task ...
  11. Resynchronization of the virtual machine '%1' was cancelled for extended replication because it requires resynchronization ...
  12. Resynchronization of the virtual machine '%1' was cancelled for extended replication because it requires resynchronization ...
  13. Resynchronization process requires significant storage and processing resources. It is recommended to schedule resynchronization ...
  14. Resynchronization requires significant storage, processing, and network resources. We recommend running this process during ...
  15. Retain application log This security setting determines the number of days' worth of events to be retained for the application ...
  16. Retain security log This security setting determines the number of days' worth of events to be retained for the security ...
  17. Retain system log This security setting determines the number of days' worth of events to be retained for the system log ...
  18. Retention method for application log This security setting determines the "wrapping" method for the application log. If you ...
  19. Retention method for security log This security setting determines the "wrapping" method for the security log. If you do ...
  20. Retention method for system log This security setting determines the "wrapping" method for the system log. If you do not ...
  21. Retries inactive subscription by attempting to reactivate all or specified event sources by establishing a connection and ...
  22. Retrieves a structural representation of the object's security descriptor. The method returns an integer value that can be ...
  23. Retrieves a structural representation of the object's security descriptor. The method returns an integer value that can be ...
  24. Retrieves a structural representation of the service's security descriptor. The method returns an integer value that can ...
  25. Retrieves configuration settings for existing DFS namespace or enumerates DFS namespaces by server,domain or namespace path ...
  26. Retrieves Routing Domain Configuration for specified name. If No name is specified information of all RDIDs is retrieved. ...
  27. Retrieves the list of ID records for the files that are scheduled to be replicated to the receiving partner given its version ...
  28. Retry connecting to the wireless network with the SSID: {ssid} and be sure to acknowledge all prompts displayed by the Networking ...
  29. Return Code: 0 - Successful, the result compared is identical 1 - Failed 2 - Successful, the result compared is different ...
  30. Return codes: 0 = The verb executed successfully. 1 = The verb executed successfully but needs report finalization. -1 = ...
  31. Return Packet Calls/sec is the average rate, in incidents per second, at which the stack returned received packets to an ...
  32. Return to the files and folders update page Select a different set of files and folders to update with the new certificate ...
  33. Returned less than asked for with S_FALSE; should only return S_FALSE when there are more elements available than asked for ...
  34. Returned Packets/sec is the average rate, in packets per second, at which the stack returned received packets to an interface. ...
  35. Returns a list of update titles with approvals that are in a permanently inactive state because of the server language settings. ...
  36. Returns an object for the DirectAccess DNS configuration consisting of the Name Resolution Policy Table rules and local name ...
  37. Returns an object that conveys the properties of the DirectAccess server. By default this cmdlet does not generate any output ...
  38. Returns an object the contains the configuration common to DirectAccess and VPN. By default this cmdlet does not generate ...
  39. Returns an object, viz. the list of users/client IPs that were successfully disconnected. By default this cmdlet does not ...
  40. Returns multicast scope statistics corresponding to specified multicast scope name(s). Returns statistics for all multicast ...
  41. Returns one or more multicast scope objects corresponding to the specified scope names. If Name is not specified, the cmdlet ...
  42. Returns or sets a value that specifies whether all selection UI (selection bounding box, selection handles) will be drawn ...
  43. Returns or sets a value that specifies whether ink will be rendered as just one color, Color = COLOR_WINDOWTEXT (as detected ...
  44. Returns or sets a value that specifies whether the InkCollector or InkOverlay objects will collect pen input (in-air packets, ...
  45. Returns or sets a value that specifies whether the InkPicture control will collect pen input, such as in-air packets or cursor ...
  46. Returns or sets a value that specifies whether the object/control is in ink mode, deletion mode, or selecting/editing mode. ...
  47. Returns or sets the Ink object that is associated with an InkCollector object, an InkOverlay object, or a InkPicture control.This ...
  48. Returns or sets the length of time, in milliseconds, between the last ink stroke collected and the beginning of text recognition.This ...
  49. Returns superscope statistics for the specified super scopes. Returns statistics for all superscopes if Name parameter is ...
  50. Returns the application server connection object which contains the properties of the connectivity to the corporate network. ...
  51. Returns the collection of strokes that are currently selected inside the control.This property returns the collection of ...
  52. Returns the computer name of the Intersite Topology Generator (ISTG) server for a specified site. SYNTAX /istg DSA_LIST /verbose ...
  53. Returns the management server object which is the list of configured management servers. By default this cmdlet does not ...
  54. Returns the Name Resolution Policy Table object that contains the Name Resolution Policy Table rules. By default this cmdlet ...
  55. Returns the object representing the accounting configuration for Remote Access. By default this cmdlet does not generate ...
  56. Returns whether any combination of the following are enabled: 1. Application Launch Prefetching 2. Operation API Prefetching ...
  57. Reverse replication request is not allowed because the virtual machine '%1' (Virtual machine ID %2) on the primary server ...
  58. Reverse replication request is not allowed because the virtual machine '%1' on the primary server is not in the initial replica ...
  59. Reverse replication requires that extended replication be disabled on the Replica virtual machine. Either remove extended ...
  60. REVERT Reverts the volume to a specified shadow copy of it. The shadow copy must be a persistent volume shadow copy. The ...
  61. Reverting this shadow copy will cause you to permanently lose all changes made to volume %s since the shadow copy was created. ...
  62. Reverts the original storage volume to this shadow copy. After Revert is done, the original volume will be identical to this ...
  63. Review the "{0}" test. Ensure that the disks you want to test are unmasked, that is, your masking or zoning does not prevent ...
  64. Review the Action column for each replicated folder. If a shared folder is needed, click Edit to specify the new shared folder ...
  65. Review the alert details to see why the software was detected. If you do not like how the software operates or if you do ...
  66. Review the component and subcomponent definitions. Also, verify list of volumes to be shadow copied and the existing writers ...
  67. Review the error messages to identify the API that is not part of the Windows SDK for Windows Store apps. Please note, C++ ...
  68. Review the GPOs that will be applied to the client computers security group and the DirectAccess server in the relevant domains. ...
  69. Review which volumes and files are included for Data Deduplication and make applicable changes. Use the Ddpeval.exe tool ...
  70. Revocation information is signed before it is sent to a client. The Online Responder can select a signing certificate automatically, ...
  71. Revocation status for a certificate in the chain for CA certificate %3 for %1 could not be verified because a server is currently ...
  72. Revokes the TS CAL represented by the Win32_TSIssuedLicense object. NOT a static functionRevokableCals returns number of ...
  73. Rights policy templates can support clients with different languages. Configure this template's identification information ...
  74. RIP Global Configuration Information - Logging Level : %1!s! Max Receive Queue Size : %2!d! Max Send Queue Size : %3!d! Min ...
  75. RIP Interface Configuration Information for %1!s! - State : %2!s! %3!s! Metric : %4!d! Update Mode : %5!s! Accept Mode : ...