Windows 7

  1. Audit: Force audit policy subcategory settings (Windows Vista or later) to override audit policy category settings. Windows ...
  2. Audit: Shut down system immediately if unable to log security audits This security setting determines whether the system ...
  3. Auditing settings on object changed: Object Server: %1 Object Type: %2 Object Name: %3 Handle ID: %4 Process ID: %5 Image ...
  4. Auditing settings on object were changed. Subject: Security ID: %1 Account Name: %2 Account Domain: %3 Logon ID: %4 Object: ...
  5. Auditing settings on object were changed. Subject: Security ID: %1 Account Name: %2 Account Domain: %3 Logon ID: %4 Object: ...
  6. Auth1ECDSAP256CAName: %1!s! Auth1ECDSAP256CertMapping: %2!s! Auth1ECDSAP256ExcludeCAName: %3!s! Auth1ECDSAP256CertType: %4!s! ...
  7. Auth1ECDSAP384CAName: %1!s! Auth1ECDSAP384CertMapping: %2!s! Auth1ECDSAP384ExcludeCAName: %3!s! Auth1ECDSAP384CertType: %4!s! ...
  8. Auth2ECDSAP256CAName: %1!s! Auth2ECDSAP256CertMapping: %2!s! Auth2ECDSAP256CertType: %3!s! Auth2ECDSAP256HealthCert: %4!s! ...
  9. Auth2ECDSAP384CAName: %1!s! Auth2ECDSAP384CertMapping: %2!s! Auth2ECDSAP384CertType: %3!s! Auth2ECDSAP384HealthCert: %4!s! ...
  10. Authenticate messages if authentication level for calls (on Security Property Page) is not NONE. This is Windows 2000 behavior. ...
  11. Authenticate using certificates (Recommended) Connections to the scan server are authenticated using client certificates ...
  12. Authentication failed due to a user account restriction or requirement that was not followed. For example, the user account ...
  13. Authentication failed due to a user credentials mismatch. Either the user name provided does not map to an existing user ...
  14. authentication failed due to status code 13: Responding station does not support the specified authentication algorithm (for ...
  15. Authentication helps you confirm the identity of users requesting access to your Web sites. IIS supports both challenge-based ...
  16. Authentication is enabled for the following URL group: %1. Negotiate authentication is set to %2. NTLM authentication is ...
  17. Authentication methods specify how trust is established between computers. These authentication methods are offered and accepted ...
  18. Authentication Ticket Request Failed: User Name: %1 Supplied Realm Name: %2 Service Name: %3 Ticket Options: %4 Failure Code: ...
  19. Authentication Ticket Request: User Name: %1 Supplied Realm Name: %2 User ID: %3 Service Name: %4 Service ID: %5 Ticket Options: ...
  20. AuthenticationType - Specify one of the following client authentication methods while adding a URL %1 - %2 %3 - %4 %5 - %6 ...
  21. Authenticode allows you to designate software publishers and credentials agencies as trustworthy. This customization only ...
  22. AuthIP Main Mode Negotiation Time is the number of milliseconds taken for the last Authenticated IP main mode security association ...
  23. AuthIP Quick Mode Negotiation Time is the number of milliseconds taken for the last Authenticated IP quick mode security ...
  24. AuthType: ISCSI_NO_AUTH_TYPE = 0, No iSCSI in-band authentication is used ISCSI_CHAP_AUTH_TYPE = 1, One way CHAP (Target ...
  25. Auto Select scans your channels, enables the ones that have a signal, and then saves any changes. This process will affect ...
  26. Auto-Add Policy: Policy: %s Poll interval: %d seconds Max retry count: %d times Message to pending clients: %s Retention ...
  27. Auto-Cast. Starts the transmission automatically when a client requests the image. Then, as other clients request the same ...
  28. Autochk cannot run due to an error caused by a recently installed software package. Use the system restore feature from the ...
  29. AutoComplete remembers entries in web forms, like the one you just typed. In the future, it can list suggestions as you type. ...
  30. Automated System Recovery failed the shadow copy, because a selected critical volume is located on a cluster shared disk. ...
  31. Automatic backup will periodically back up the WMI repository to a pre-defined file. Backup only occurs when there is a change ...
  32. Automatic certificate enrollment for %1 failed to contact the active directory (%2). %3 Enrollment will not be performed. ...
  33. Automatic Configuration allows you to make updates to your user's machine after deployment. You can specify a URL to an .INS ...
  34. Automatic configuration may override manual settings. To ensure the use of manual settings, disable automatic configuration. ...
  35. Automatic dial-up usually requires a user name and password. Please enter this information in the Internet Control Panel. ...
  36. Automatic remediation for antispyware signatures failed. Windows could not update signatures for Windows Defender. Failure ...
  37. Automatic remediation for Windows Security Center service failed. Windows could not turn on Windows Security Center service. ...
  38. Automatic remediation for Windows Security Center service succeeded. Windows Security Center service was turned on successfully. ...
  39. Automatic unlock is disabled on volume %1!c!:. NOTE: An associated External Key protector was created on this data volume ...
  40. Automatic unlocking is the only way to unlock this drive. Add another unlocking method before removing automatic unlocking. ...
  41. Automatic wireless network configuration is disabled on this computer The setting may be disabled because another program ...
  42. Automatically correct the problem by installing DNS Server service on this computer. This will also configure the IP settings ...
  43. Automatically download media information from the Internet and join the Customer Experience Improvement Program to send data ...
  44. AutoSearch is customizable for registered providers via the Search Provider Keyword. To get registered as a search provider, ...
  45. autoShutdownExe Executable to run when an application pool is shut down by Rapid Fail Protection. This could be used to configure ...
  46. autoStart If true, the application pool is started upon creation, or when IIS is started. Starting an application pool sets ...
  47. autoStart If true, the Web site is started upon creation, or when IIS is started. Starting a Web site sets this property ...
  48. Available Bytes is the amount of physical memory, in bytes, immediately available for allocation to a process or for system ...
  49. Available command line switches: /quiet - Unattended mode (no user interaction). /norestart - Do not restart the system when ...
  50. Available KBytes is the amount of physical memory, in Kilobytes, immediately available for allocation to a process or for ...
  51. Available MBytes is the amount of physical memory, in Megabytes, immediately available for allocation to a process or for ...
  52. Available Threads is the number of server threads on this CPU not currently working on requests from a client. The server ...
  53. Available: Amount of memory (including Standby and Free memory) that is immediately available for use by processes, drivers, ...
  54. AvailableRequestedStates indicates the possible values for the RequestedState parameter of the method RequestStateChange, ...
  55. Average length of time the Security Descriptor propagator spends waiting for exclusive access to Data Base elements during ...
  56. Average seconds per operation is a good indicator of disk activity and health. An I/O is expected to take under .015 ms on ...
  57. Avg number of ms between the current frame and the start frame of an ISO transfer when scheduled. For device instances only. ...
  58. Avg Response Time shows the average response time to the referral requests that were processed by the DFS Namespace service. ...
  59. Avg Response Time shows the average response time to the requests to one API that were processed by the DFS Namespace service. ...
  60. Avg. Disk Queue Length is the average number of both read and write requests that were queued for the selected disk during ...
  61. Avg. Disk Read Queue Length is the average number of read requests that were queued for the selected disk during the sample ...
  62. Avg. Disk Write Queue Length is the average number of write requests that were queued for the selected disk during the sample ...
  63. B A T C H R E C U R S I O N exceeds STACK limits Recursion Count=%1!d!, Stack Usage=%2!d! percent B A T C H PROCESSING IS ...
  64. b wireless networks do not have the capacity to provide the Windows Media Center experience on the Media Center Extender. ...
  65. b%b%b%b-d domain Specify a domain other than the default domain. -x Dump the map nickname translation table. -h server Send ...
  66. b%b%b%b-k Print keys as well as values. -d domain Specify a domain other than the default domain. -x Dump the map nickname ...
  67. b%b%b%b-k Print keys as well as values. -x Dump the map nickname translation table. -h server Send request to specified server. ...
  68. B+ Tree Left Merges/sec is the count of pages removed from a database B+ Tree per second by moving all its records to the ...
  69. B+ Tree Opportune Prereads/sec is the number of pages per second that are preread because they are adjacent to a page read ...
  70. B+ Tree Page Moves/sec is the count of B+ Tree pages per second where all the records are moved to a new page. Dev Only] ...
  71. B+ Tree Partial Left Merges/sec is the count of pages where some of its records are moved to a page on the left in a database ...
  72. Back up files and directories This user right determines which users can bypass file and directory, registry, and other persistent ...
  73. Back up your files immediately to prevent information loss, and then contact the computer manufacturer to determine if you ...
  74. Background Intelligent Transfer Service (BITS) asynchronously transfers files in the foreground or background, throttles ...
  75. Background Intelligent Transfer Services (BITS) server extension cleanup for the virtual directory %1 and the unique identifier ...