Windows 7
- Allows you to generate a rollback template with respect to a configuration template. The syntax of this command is: secedit ...
- Allows you to have Windows Explorer display a confirmation dialog whenever a file is deleted or moved to the Recycle Bin. ...
- Allows you to import a security template into a database so that the settings specified in the template can be applied to ...
- Allows you to remove the Run command from the Start menu, Internet Explorer, and Task Manager. If you enable this setting, ...
- Allows you to restrict programs from being run from online Help. If you enable this setting, you can prevent programs that ...
- Allows you to set up an online responder based on the Online Certificate Status Protocol (OCSP) to provide revocation information ...
- Allows you to specify that local computer administrators can supplement the "Define Activation Security Check exemptions" ...
- Allows you to validate the syntax of a security template. The syntax of this command is: secedit /validate filename /cfg ...
- Allows you to view and change a list of DCOM server application ids (appids) which are exempted from the DCOM Activation ...
- Allows you to view and change the inbound port exceptions list defined by Group Policy. Windows Firewall uses two port exception ...
- Allows you to view and change the inbound port exceptions list defined by Group Policy. Windows Firewall uses two port exception ...
- Allows you to view and change the program exceptions list defined by Group Policy. Windows Firewall uses two program exception ...
- Also apply redirection policy to Windows 2000, Windows 2000 server, Windows XP, and Windows Server 2003 operating systems ...
- Also apply redirection policy to Windows 2000, Windows 2000 Server, Windows XP, and Windows Server 2003 operating systems. ...
- Also include the SCWAudit.inf security template. SCWAudit.inf sets System Access Control Lists (SACLS) in order to audit ...
- Also, confirm that both the wireless network adapter and the wireless network access point are using the same encryption ...
- Although Routing and Remote Access can authenticate connection requests, large networks that include multiple remote access ...
- Although the Active Directory database is automatically defragmented while it is running (known as online defragmentation), ...
- Although the files were successfully added to the archive, Compressed (LZH) Folders was unable to completely remove the originals ...
- Although the files were successfully added to the archive, Compressed (zipped) Folders was unable to completely remove the ...
- Although the Guid DNS name (%1) could not be resolved, the server name (%2) resolved to the IP address (%3) but was not pingable. ...
- Although the Guid DNS name (%1) couldn't be resolved, the server name (%2) resolved to the IP address (%3) and was pingable. ...
- Although the Guid DNS name (%1) resolved to the IP address (%2), the server name (%3) could not be resolved by DNS. Check ...
- Although the Guid DNS name (%1) resolved to the IP address (%2), the server name (%3) resolved to the IP address (%4) and ...
- Although the Guid DNS name (%1) resolved to the IP address (%2), which could not be pinged, the server name (%3) resolved ...
- Always fall back to Link-Local Multicast Name Resolution (LLMNR) and NetBIOS for any kind of name resolution error (least ...
- Always fall back to Link-Local Multicast Name Resolution (LLMNR) and NetBIOS for any kind of name resolution error (least ...
- Always fall back to Link-Local Multicast Name Resolution (LLMNR) and NetBIOS if the name does not exist in DNS or if the ...
- Always fall back to Link-Local Multicast Name Resolution (LLMNR) and NetBIOS if the name does not exist in DNS or if the ...
- Always prefer Certificate Revocation Lists (CRL) over Online Certificate Status Protocol (OCSP) responses (not recommended) ...
- Always use local ADM files for the Group Policy snap-in. By default, when you edit a Group Policy object (GPO) using the ...
- America Online (AOL) might not function properly with this version of Windows. For information about a compatible version ...
- AM_DVD_EVR_ONLY cannot be passed to RenderDvdVideoVolume if the graph builder's filter graph contains a renderer which is ...
- An %1 connection request was received from a remote client application, but none of the cipher suites supported by the client ...
- An abnormal error occurred during the WINS initialization. Check the application and system logs for information on the cause. ...
- An abstraction or emulation of a hardware entity, that may or may not be Realized in physical hardware. Any characteristics ...
- An abstraction or emulation of a hardware entity, that may or may not be realized in physical hardware. Any characteristics ...
- An abstraction or emulation of a hardware entity, that might or might not be Realized in physical hardware. Any characteristics ...
- An access point for a service. Access points are dependent in this relationship since they have no function without a corresponding ...
- An access to a user buffer failed at an "expected" point in time. This code is defined since the caller does not want to ...
- An Access-Request message was received from RADIUS client %1 with an Extensible Authentication Protocol (EAP) message but ...
- An Access-Request message was received from RADIUS client %1 without a Message-Authenticator attribute when a Message-Authenticator ...
- An account failed to log on. Subject: Security ID: %1 Account Name: %2 Account Domain: %3 Logon ID: %4 Logon Type: %11 Account ...
- An account for this domain and user could not be found. Check that the user has a valid user account in the specified domain. ...
- An account was logged off. Subject: Security ID: %1 Account Name: %2 Account Domain: %3 Logon ID: %4 Logon Type: %5 This ...
- An account was successfully logged on. Subject: Security ID: %1 Account Name: %2 Account Domain: %3 Logon ID: %4 Logon Type: ...
- An accurate clock enables administrators to better correlate audit events. Also, many security protocols use time to prevent ...
- An acquire is a request by the IPSEC driver to have IKE perform a task. The active acquire statistic includes the outstanding ...
- An action by your device manufacturer has disabled the experience for this device in Windows. Please contact the manufacturer ...
- An Active Directory Domain Controller (AD DC) for the domain "%1" could not be contacted. Ensure that the domain name is ...
- An Active Directory domain controller for the domain "%1" could not be contacted. Ensure that the correct DNS domain name ...
- An Active Directory domain controller for the domain "%1" could not be contacted. Ensure that the DNS domain name is typed ...
- An Active Directory domain controller for the domain "%1" could not be contacted. Ensure that you supplied the correct DNS ...
- An Active Directory domain controller for the forest root domain "%1" could not be contacted. Ensure that the domain name ...
- An Active Directory domain controller for the forest root domain "%1" could not be contacted. Ensure that the domain name ...
- An Active Directory Domain Services replication connection from a source directory service to a destination directory service ...
- An Active Directory Lightweight Directory Services replication connection from a source directory service to a destination ...
- An Active Directory replica destination naming context was modified. Destination DRA: %1 Source DRA: %2 Destination Address: ...
- An Active Directory replica source naming context was established. Destination DRA: %1 Source DRA: %2 Source Address: %3 ...
- An Active Directory replica source naming context was modified. Destination DRA: %1 Source DRA: %2 Source Address: %3 Naming ...
- An Active Directory replica source naming context was removed. Destination DRA: %1 Source DRA: %2 Source Address: %3 Naming ...
- An Active Directory Rights Management Services (AD RMS) client issuance license does not contain a valid cluster. Ensure ...
- An Active Directory Rights Management Services (AD RMS) client requested a rights policy template that is not recognized ...
- An Active Directory Rights Management Services (AD RMS) operation failed due to insufficient memory. Free up some memory ...
- An active partition was detected on the selected disk, and it is not the active partition used to boot the currently running ...
- An active server control or component performed an illegal OLE CoUninitialize call. Components used by Active Server Pages ...
- An active transaction is already in progress. A new one cannot be started until the current one is committed or rolled back. ...
- An ActiveX control on this page is not safe. Your current security settings prohibit running unsafe controls on this page. ...
- An ActiveX control on this page might be unsafe to interact with other parts of the page. Do you want to allow this interaction? ...
- An ad hoc network (sometimes called a computer-to-computer network) is a temporary network used for sharing files, presentations, ...
- An AD Property Value Collection may only contain values of the same type. Specified value of type '{0}' does not match the ...
- An address could not bind to a socket. Make sure the TCP/IP stack is installed And running properly. This event might mean ...
- An administrator has changed the type and zone storage options of zone %1. The zone is now type %2. The zone will be stored ...
- An administrator has changed the type and/or Active Directory location of zone %1. The zone is now type %2. The zone will ...
- An administrator has moved the zone %1 to a new location in Active Directory. The zone will be stored in Active Directory ...