Windows 8.1
- Results of synchronization are logged automatically. To log intermediate steps in synchronization retries, select the Enable ...
- resume - Resume cluster operations after a previous suspend command for the specified cluster. start - Start cluster operations ...
- Resume cluster operation control on all remoted-control-enabled nodes. NumNodes returns the number of nodes respond to the ...
- Resume cluster operation control. This method will fail when called on instances of objects that represent remote nodes. ...
- RESUME LOADER The following types apply to entries for the resume loader. For information about data formats for these types, ...
- Resume Maker Deluxe 7.0 has a known compatibility issue with this version of Windows and might not run as expected. This ...
- Resumes replication for the volume. Volume must be in auto recovery state and replication stopped on the volume due to auto ...
- Resynchronization failed for VM '%1'. Resynchronization needs to be started again. If this error occurs repeatedly, you can ...
- Resynchronization is already scheduled for virtual machine '%1'. To modify the schedule, cancel the existing scheduled task, ...
- Resynchronization is scheduled for {0}. You can start resynchronization immediately by using the Resume Replication task ...
- Resynchronization of the virtual machine '%1' was cancelled for extended replication because it requires resynchronization ...
- Resynchronization of the virtual machine '%1' was cancelled for extended replication because it requires resynchronization ...
- Resynchronization process requires significant storage and processing resources. It is recommended to schedule resynchronization ...
- Resynchronization requires significant storage, processing, and network resources. We recommend running this process during ...
- Retain application log This security setting determines the number of days' worth of events to be retained for the application ...
- Retain security log This security setting determines the number of days' worth of events to be retained for the security ...
- Retain system log This security setting determines the number of days' worth of events to be retained for the system log ...
- Retention method for application log This security setting determines the "wrapping" method for the application log. If you ...
- Retention method for security log This security setting determines the "wrapping" method for the security log. If you do ...
- Retention method for system log This security setting determines the "wrapping" method for the system log. If you do not ...
- Retries inactive subscription by attempting to reactivate all or specified event sources by establishing a connection and ...
- Retrieves a structural representation of the object's security descriptor. The method returns an integer value that can be ...
- Retrieves a structural representation of the object's security descriptor. The method returns an integer value that can be ...
- Retrieves a structural representation of the service's security descriptor. The method returns an integer value that can ...
- Retrieves configuration settings for existing DFS namespace or enumerates DFS namespaces by server,domain or namespace path ...
- Retrieves Routing Domain Configuration for specified name. If No name is specified information of all RDIDs is retrieved. ...
- Retrieves the list of ID records for the files that are scheduled to be replicated to the receiving partner given its version ...
- Retry connecting to the wireless network with the SSID: {ssid} and be sure to acknowledge all prompts displayed by the Networking ...
- Return Code: 0 - Successful, the result compared is identical 1 - Failed 2 - Successful, the result compared is different ...
- Return codes: 0 = The verb executed successfully. 1 = The verb executed successfully but needs report finalization. -1 = ...
- Return Packet Calls/sec is the average rate, in incidents per second, at which the stack returned received packets to an ...
- Return to the files and folders update page Select a different set of files and folders to update with the new certificate ...
- Returned less than asked for with S_FALSE; should only return S_FALSE when there are more elements available than asked for ...
- Returned Packets/sec is the average rate, in packets per second, at which the stack returned received packets to an interface. ...
- Returns a list of update titles with approvals that are in a permanently inactive state because of the server language settings. ...
- Returns an object for the DirectAccess DNS configuration consisting of the Name Resolution Policy Table rules and local name ...
- Returns an object that conveys the properties of the DirectAccess server. By default this cmdlet does not generate any output ...
- Returns an object the contains the configuration common to DirectAccess and VPN. By default this cmdlet does not generate ...
- Returns an object, viz. the list of users/client IPs that were successfully disconnected. By default this cmdlet does not ...
- Returns multicast scope statistics corresponding to specified multicast scope name(s). Returns statistics for all multicast ...
- Returns one or more multicast scope objects corresponding to the specified scope names. If Name is not specified, the cmdlet ...
- Returns or sets a value that specifies whether all selection UI (selection bounding box, selection handles) will be drawn ...
- Returns or sets a value that specifies whether ink will be rendered as just one color, Color = COLOR_WINDOWTEXT (as detected ...
- Returns or sets a value that specifies whether the InkCollector or InkOverlay objects will collect pen input (in-air packets, ...
- Returns or sets a value that specifies whether the InkPicture control will collect pen input, such as in-air packets or cursor ...
- Returns or sets a value that specifies whether the object/control is in ink mode, deletion mode, or selecting/editing mode. ...
- Returns or sets the Ink object that is associated with an InkCollector object, an InkOverlay object, or a InkPicture control.This ...
- Returns or sets the length of time, in milliseconds, between the last ink stroke collected and the beginning of text recognition.This ...
- Returns superscope statistics for the specified super scopes. Returns statistics for all superscopes if Name parameter is ...
- Returns the application server connection object which contains the properties of the connectivity to the corporate network. ...
- Returns the collection of strokes that are currently selected inside the control.This property returns the collection of ...
- Returns the computer name of the Intersite Topology Generator (ISTG) server for a specified site. SYNTAX /istg DSA_LIST /verbose ...
- Returns the management server object which is the list of configured management servers. By default this cmdlet does not ...
- Returns the Name Resolution Policy Table object that contains the Name Resolution Policy Table rules. By default this cmdlet ...
- Returns the object representing the accounting configuration for Remote Access. By default this cmdlet does not generate ...
- Returns whether any combination of the following are enabled: 1. Application Launch Prefetching 2. Operation API Prefetching ...
- Reverse replication request is not allowed because the virtual machine '%1' (Virtual machine ID %2) on the primary server ...
- Reverse replication request is not allowed because the virtual machine '%1' on the primary server is not in the initial replica ...
- Reverse replication requires that extended replication be disabled on the Replica virtual machine. Either remove extended ...
- REVERT Reverts the volume to a specified shadow copy of it. The shadow copy must be a persistent volume shadow copy. The ...
- Reverting this shadow copy will cause you to permanently lose all changes made to volume %s since the shadow copy was created. ...
- Reverts the original storage volume to this shadow copy. After Revert is done, the original volume will be identical to this ...
- Review the "{0}" test. Ensure that the disks you want to test are unmasked, that is, your masking or zoning does not prevent ...
- Review the Action column for each replicated folder. If a shared folder is needed, click Edit to specify the new shared folder ...
- Review the alert details to see why the software was detected. If you do not like how the software operates or if you do ...
- Review the component and subcomponent definitions. Also, verify list of volumes to be shadow copied and the existing writers ...
- Review the error messages to identify the API that is not part of the Windows SDK for Windows Store apps. Please note, C++ ...
- Review the GPOs that will be applied to the client computers security group and the DirectAccess server in the relevant domains. ...
- Review which volumes and files are included for Data Deduplication and make applicable changes. Use the Ddpeval.exe tool ...
- Revocation information is signed before it is sent to a client. The Online Responder can select a signing certificate automatically, ...
- Revocation status for a certificate in the chain for CA certificate %3 for %1 could not be verified because a server is currently ...
- Revokes the TS CAL represented by the Win32_TSIssuedLicense object. NOT a static functionRevokableCals returns number of ...
- Rights policy templates can support clients with different languages. Configure this template's identification information ...
- RIP Global Configuration Information - Logging Level : %1!s! Max Receive Queue Size : %2!d! Max Send Queue Size : %3!d! Min ...
- RIP Interface Configuration Information for %1!s! - State : %2!s! %3!s! Metric : %4!d! Update Mode : %5!s! Accept Mode : ...