Windows 10

  1. Errors occurred in more than one device. Specify each command and device separately to determine which devices caused the ...
  2. ESP protocol provides privacy and integrity for the packet payload. ESP is compatible with Network Address Translation (NAT). ...
  3. Estimated time (in milliseconds) the next request will spend in the queue prior to being serviced by the directory service. ...
  4. EstimatedRunTime is an estimate in minutes of the time to battery charge depletion under the present load conditions if the ...
  5. EstimatedRunTime is an estimate in minutes of the time to battery, generator, . depletion under the present load conditions ...
  6. ETW Collector Service for Internet Explorer. When running, this service collects real time ETW events and processes them. ...
  7. EVA Animator has a known compatibility issue with this version of Windows. For an update that is compatible with this version ...
  8. EVA Viewer has a known compatibility issue with this version of Windows. For an update that is compatible with this version ...
  9. Even if your PC can't start, you can use a recovery drive to reset it or troubleshoot problems. If you back up system files ...
  10. Even though this site has not been reported to Microsoft for containing threats, check the address to make sure it is a site ...
  11. Even when Windows Update is configured to receive updates from an intranet update service, it will periodically retrieve ...
  12. Even without completing additional training, the computer's ability to understand you will improve the more you use speech ...
  13. Event cannot be written because multiple events with id {0} have beend defined for provider {1}. Please provide a version ...
  14. Event cannot be written because the specified version {0} for event {1} is not defined for the provider {2}. Please correct ...
  15. Event cannot be written because there are no events defined with id {0} for the provider {1}. Please correct the event id ...
  16. Event details cannot be viewed on the local computer when the GUI shell is disabled. To view event details, connect to the ...
  17. Event filter with query "%2" could not be reactivated in namespace "%1" because of error %3. Events cannot be delivered through ...
  18. Event ID %2 for the Windows Search Service has been suppressed %3 time(s) since %4. This event is used to suppress Windows ...
  19. Event Log Online Help cannot be displayed using the currently specified program. For more information on selecting the program ...
  20. Event Passing Object Does Not Support Needed Interfaces, This Should Not Happen if the Object Supports COM and Automation ...
  21. Event provider %1 attempted to register a syntactically invalid query "%2". The query will be ignored. The query can be corrected ...
  22. Event provider %1 attempted to register an intrinsic event query "%2" in %3 namespace for which the set of target object ...
  23. Event provider %1 attempted to register query "%2" in %3 namespace which is too broad. Event providers cannot provide events ...
  24. Event provider %1 attempted to register query "%2" whose target class "%3" in %4 namespace does not exist. The query will ...
  25. Event provider %1 attempted to register query "%2" whose target class "%3" is not an event class. The query will be ignored. ...
  26. Event Type: %1!s! Event Source: %2!s! Event Category: %3!s! Event ID: %4!d! Date: %5!s! Time: %6!s! User: %7!s! Computer: ...
  27. Event Type: %1!s! Event Source: %2!s! Event Category: %3!s! Event ID: %4!d! Date: %5!s! Time: %6!s! User: %7!s!\%8!s! Computer: ...
  28. Event Viewer can only save up to 256 individually selected events. To save a larger amount of events, use filtering or custom ...
  29. Event Viewer cannot begin a sorting operation when one is already in progress or when it is retrieving events. Wait until ...
  30. Event Viewer cannot open this link. This link might not be valid, or the item that this link refers to is not associated ...
  31. Event Viewer cannot refresh a view while performing a sorting operation. You must cancel the sorting operation or wait until ...
  32. Event Viewer cannot save the remote log to the local computer. The remote computer account might not have the necessary permissions ...
  33. Event Viewer encountered an error while generating the friendly view. There might be an error in the format of the event ...
  34. Events from the remote computer cannot be saved into .evtx format files on the local computer. If you want to save the events ...
  35. Events is the number of events in the computer at the time of data collection. This is an instantaneous count, not an average ...
  36. Every request from a client is represented in the server as a 'work item,' and the server maintains a pool of available work ...
  37. Every request from a client is represented in the server as a 'work item,' and the server maintains a pool of available work ...
  38. Every request from a client is represented in the server as a 'work item,' and the server maintains a pool of available work ...
  39. Everything on the drive will be deleted. If you have any personal files on this drive, make sure you've backed up the files. ...
  40. Everything on your PC's recovery partition is now copied to your recovery drive. You can delete the recovery partition to ...
  41. Eviction of this node is invalid at this time. Due to quorum requirements node eviction will result in cluster shutdown. ...
  42. EvictNode removes a computer system from a cluster. The node to be evicted is specified as a parameter to the method. The ...
  43. EvntWin's configuration information may have been corrupted. Expected configuration information could not be found in the ...
  44. Examine average load times of Internet Explorer add-ons enabled on your system. To improve Internet Explorer performance, ...
  45. Example: http://myhost/training/ or https://*/training/ Example of non-standard TCP port: http://myhost:8080/training/ or ...
  46. Examples of services that might not be available on the guest operating system include Volume Shadow Copy Services and operating ...
  47. Examples: Add a rule for domain isolation using defaults: netsh advfirewall consec add rule name="isolation" endpoint1=any ...
  48. Examples: Add a rule for domain isolation using defaults: netsh advfirewall consec add rule name="isolation" endpoint1=any ...
  49. Examples: REG QUERY HKLM\Software\Microsoft\ResKit /v Version Displays the value of the registry value Version REG QUERY ...
  50. Examples: Rename rule1 to rule 2: netsh advfirewall consec set rule name="rule1" new name="rule2" Change the action on a ...
  51. Examples: setspn -R daserver1 It will register SPN "HOST/daserver1" and "HOST/{DNS of daserver1}" setspn -S http/daserver ...
  52. Examples: WBADMIN START RECOVERY -version:03/31/2005-09:00 -itemType:Volume -items:d: WBADMIN START RECOVERY -version:03/31/2005-09:00 ...
  53. EXAMPLES: WDSMCAST /progress /verbose /trace:trace.etl /Transfer-File /Server:MyWDSServer /Namespace:WindowsVista /Username:MyDomain\WDSAdmin ...
  54. Exceeded the maximum number of computer QoS policies. The computer QoS policy "%2" and subsequent computer QoS policies will ...
  55. Exceeded the maximum number of user QoS policies. The user QoS policy "%2" and subsequent user QoS policies will not be applied. ...
  56. Exceeded the maximum number(32) of Third Party EapHost processes. Running the current eap session in short lived Eap3Host ...
  57. Exception is raised while trying to remove cached secrets from local domain controller. Additional data: Exception value: ...
  58. EXCEPTION} Guard Page Exception A page of memory that marks the end of a data structure, such as a stack or an array, has ...
  59. Excessive low frequency noise. Make sure the microphone is not subjected to mechanical shocks and is not in the direct path ...
  60. Excluding certain files and locations can help speed up a scan, but may leave your computer less protected. To add multiple ...
  61. exe file command volumename][path][filename Description: Configures file and directory exclusion settings. Command List: ...
  62. exe filter command Description: Configures filter specific and global settings. Command List: enable Enables UWF for the ...
  63. exe overlay command argument Description: Configures overlay settings. Command List: set-size Sets the overlay size for a ...
  64. exe parameter commands arguments Description: Configures Unified Write Filter (UWF) lockdown options. Parameter List: filter ...
  65. exe registry command key value Description: Configures registry exclusion settings or commit registry change. Command List: ...
  66. exe servicing command arguments Description: Configures servicing settings. Command List: enable Enables UWF Servicing Mode ...
  67. exe volume command argument Description: Configures volume specific Unified Write Filter (UWF) settings. Command List: protect ...
  68. Execute permissions are enabled on the Internet Information Services (IIS) virtual directory associated with the remote file ...
  69. Executes command in response to an event, see the Win32 SDK documentation for CreateProcess for more complete description ...
  70. Existing restore points on the disk will be deleted and new restore points will not be created. You will not be able to use ...
  71. Expands the maximum size available on a virtual disk. Syntax: EXPAND VDISK MAXIMUM= MAXIMUM= Indicates the new virtual size ...
  72. Expected data for Software Restriction Policies cannot be found. Use the Group Policy Management Editor to reconfigure the ...
  73. Expedited Data Received} The network transport returned data to its client that was marked as expedited by the remote system. ...
  74. Export events from a log, log file, or using structured query to a file. Usage: wevtutil { epl | export-log } /OPTION:VALUE ...
  75. Extended Mode Negotiation Time is the number of milliseconds taken for the last extended mode security association negotiated. ...