Windows 7
- Audit: Force audit policy subcategory settings (Windows Vista or later) to override audit policy category settings. Windows ...
- Audit: Shut down system immediately if unable to log security audits This security setting determines whether the system ...
- Auditing settings on object changed: Object Server: %1 Object Type: %2 Object Name: %3 Handle ID: %4 Process ID: %5 Image ...
- Auditing settings on object were changed. Subject: Security ID: %1 Account Name: %2 Account Domain: %3 Logon ID: %4 Object: ...
- Auditing settings on object were changed. Subject: Security ID: %1 Account Name: %2 Account Domain: %3 Logon ID: %4 Object: ...
- Auth1ECDSAP256CAName: %1!s! Auth1ECDSAP256CertMapping: %2!s! Auth1ECDSAP256ExcludeCAName: %3!s! Auth1ECDSAP256CertType: %4!s! ...
- Auth1ECDSAP384CAName: %1!s! Auth1ECDSAP384CertMapping: %2!s! Auth1ECDSAP384ExcludeCAName: %3!s! Auth1ECDSAP384CertType: %4!s! ...
- Auth2ECDSAP256CAName: %1!s! Auth2ECDSAP256CertMapping: %2!s! Auth2ECDSAP256CertType: %3!s! Auth2ECDSAP256HealthCert: %4!s! ...
- Auth2ECDSAP384CAName: %1!s! Auth2ECDSAP384CertMapping: %2!s! Auth2ECDSAP384CertType: %3!s! Auth2ECDSAP384HealthCert: %4!s! ...
- Authenticate messages if authentication level for calls (on Security Property Page) is not NONE. This is Windows 2000 behavior. ...
- Authenticate using certificates (Recommended) Connections to the scan server are authenticated using client certificates ...
- Authentication failed due to a user account restriction or requirement that was not followed. For example, the user account ...
- Authentication failed due to a user credentials mismatch. Either the user name provided does not map to an existing user ...
- authentication failed due to status code 13: Responding station does not support the specified authentication algorithm (for ...
- Authentication helps you confirm the identity of users requesting access to your Web sites. IIS supports both challenge-based ...
- Authentication is enabled for the following URL group: %1. Negotiate authentication is set to %2. NTLM authentication is ...
- Authentication methods specify how trust is established between computers. These authentication methods are offered and accepted ...
- Authentication Ticket Request Failed: User Name: %1 Supplied Realm Name: %2 Service Name: %3 Ticket Options: %4 Failure Code: ...
- Authentication Ticket Request: User Name: %1 Supplied Realm Name: %2 User ID: %3 Service Name: %4 Service ID: %5 Ticket Options: ...
- AuthenticationType - Specify one of the following client authentication methods while adding a URL %1 - %2 %3 - %4 %5 - %6 ...
- Authenticode allows you to designate software publishers and credentials agencies as trustworthy. This customization only ...
- AuthIP Main Mode Negotiation Time is the number of milliseconds taken for the last Authenticated IP main mode security association ...
- AuthIP Quick Mode Negotiation Time is the number of milliseconds taken for the last Authenticated IP quick mode security ...
- AuthType: ISCSI_NO_AUTH_TYPE = 0, No iSCSI in-band authentication is used ISCSI_CHAP_AUTH_TYPE = 1, One way CHAP (Target ...
- Auto Select scans your channels, enables the ones that have a signal, and then saves any changes. This process will affect ...
- Auto-Add Policy: Policy: %s Poll interval: %d seconds Max retry count: %d times Message to pending clients: %s Retention ...
- Auto-Cast. Starts the transmission automatically when a client requests the image. Then, as other clients request the same ...
- Autochk cannot run due to an error caused by a recently installed software package. Use the system restore feature from the ...
- AutoComplete remembers entries in web forms, like the one you just typed. In the future, it can list suggestions as you type. ...
- Automated System Recovery failed the shadow copy, because a selected critical volume is located on a cluster shared disk. ...
- Automatic backup will periodically back up the WMI repository to a pre-defined file. Backup only occurs when there is a change ...
- Automatic certificate enrollment for %1 failed to contact the active directory (%2). %3 Enrollment will not be performed. ...
- Automatic Configuration allows you to make updates to your user's machine after deployment. You can specify a URL to an .INS ...
- Automatic configuration may override manual settings. To ensure the use of manual settings, disable automatic configuration. ...
- Automatic dial-up usually requires a user name and password. Please enter this information in the Internet Control Panel. ...
- Automatic remediation for antispyware signatures failed. Windows could not update signatures for Windows Defender. Failure ...
- Automatic remediation for Windows Security Center service failed. Windows could not turn on Windows Security Center service. ...
- Automatic remediation for Windows Security Center service succeeded. Windows Security Center service was turned on successfully. ...
- Automatic unlock is disabled on volume %1!c!:. NOTE: An associated External Key protector was created on this data volume ...
- Automatic unlocking is the only way to unlock this drive. Add another unlocking method before removing automatic unlocking. ...
- Automatic wireless network configuration is disabled on this computer The setting may be disabled because another program ...
- Automatically correct the problem by installing DNS Server service on this computer. This will also configure the IP settings ...
- Automatically download media information from the Internet and join the Customer Experience Improvement Program to send data ...
- AutoSearch is customizable for registered providers via the Search Provider Keyword. To get registered as a search provider, ...
- autoShutdownExe Executable to run when an application pool is shut down by Rapid Fail Protection. This could be used to configure ...
- autoStart If true, the application pool is started upon creation, or when IIS is started. Starting an application pool sets ...
- autoStart If true, the Web site is started upon creation, or when IIS is started. Starting a Web site sets this property ...
- Available Bytes is the amount of physical memory, in bytes, immediately available for allocation to a process or for system ...
- Available command line switches: /quiet - Unattended mode (no user interaction). /norestart - Do not restart the system when ...
- Available KBytes is the amount of physical memory, in Kilobytes, immediately available for allocation to a process or for ...
- Available MBytes is the amount of physical memory, in Megabytes, immediately available for allocation to a process or for ...
- Available Threads is the number of server threads on this CPU not currently working on requests from a client. The server ...
- Available: Amount of memory (including Standby and Free memory) that is immediately available for use by processes, drivers, ...
- AvailableRequestedStates indicates the possible values for the RequestedState parameter of the method RequestStateChange, ...
- Average length of time the Security Descriptor propagator spends waiting for exclusive access to Data Base elements during ...
- Average seconds per operation is a good indicator of disk activity and health. An I/O is expected to take under .015 ms on ...
- Avg number of ms between the current frame and the start frame of an ISO transfer when scheduled. For device instances only. ...
- Avg Response Time shows the average response time to the referral requests that were processed by the DFS Namespace service. ...
- Avg Response Time shows the average response time to the requests to one API that were processed by the DFS Namespace service. ...
- Avg. Disk Queue Length is the average number of both read and write requests that were queued for the selected disk during ...
- Avg. Disk Read Queue Length is the average number of read requests that were queued for the selected disk during the sample ...
- Avg. Disk Write Queue Length is the average number of write requests that were queued for the selected disk during the sample ...
- B A T C H R E C U R S I O N exceeds STACK limits Recursion Count=%1!d!, Stack Usage=%2!d! percent B A T C H PROCESSING IS ...
- b wireless networks do not have the capacity to provide the Windows Media Center experience on the Media Center Extender. ...
- b%b%b%b-d domain Specify a domain other than the default domain. -x Dump the map nickname translation table. -h server Send ...
- b%b%b%b-k Print keys as well as values. -d domain Specify a domain other than the default domain. -x Dump the map nickname ...
- b%b%b%b-k Print keys as well as values. -x Dump the map nickname translation table. -h server Send request to specified server. ...
- B+ Tree Left Merges/sec is the count of pages removed from a database B+ Tree per second by moving all its records to the ...
- B+ Tree Opportune Prereads/sec is the number of pages per second that are preread because they are adjacent to a page read ...
- B+ Tree Page Moves/sec is the count of B+ Tree pages per second where all the records are moved to a new page. Dev Only] ...
- B+ Tree Partial Left Merges/sec is the count of pages where some of its records are moved to a page on the left in a database ...
- Back up files and directories This user right determines which users can bypass file and directory, registry, and other persistent ...
- Back up your files immediately to prevent information loss, and then contact the computer manufacturer to determine if you ...
- Background Intelligent Transfer Service (BITS) asynchronously transfers files in the foreground or background, throttles ...
- Background Intelligent Transfer Services (BITS) server extension cleanup for the virtual directory %1 and the unique identifier ...