Windows 10
- Errors occurred in more than one device. Specify each command and device separately to determine which devices caused the ...
- ESP protocol provides privacy and integrity for the packet payload. ESP is compatible with Network Address Translation (NAT). ...
- Estimated time (in milliseconds) the next request will spend in the queue prior to being serviced by the directory service. ...
- EstimatedRunTime is an estimate in minutes of the time to battery charge depletion under the present load conditions if the ...
- EstimatedRunTime is an estimate in minutes of the time to battery, generator, . depletion under the present load conditions ...
- ETW Collector Service for Internet Explorer. When running, this service collects real time ETW events and processes them. ...
- EVA Animator has a known compatibility issue with this version of Windows. For an update that is compatible with this version ...
- EVA Viewer has a known compatibility issue with this version of Windows. For an update that is compatible with this version ...
- Even if your PC can't start, you can use a recovery drive to reset it or troubleshoot problems. If you back up system files ...
- Even though this site has not been reported to Microsoft for containing threats, check the address to make sure it is a site ...
- Even when Windows Update is configured to receive updates from an intranet update service, it will periodically retrieve ...
- Even without completing additional training, the computer's ability to understand you will improve the more you use speech ...
- Event cannot be written because multiple events with id {0} have beend defined for provider {1}. Please provide a version ...
- Event cannot be written because the specified version {0} for event {1} is not defined for the provider {2}. Please correct ...
- Event cannot be written because there are no events defined with id {0} for the provider {1}. Please correct the event id ...
- Event details cannot be viewed on the local computer when the GUI shell is disabled. To view event details, connect to the ...
- Event filter with query "%2" could not be reactivated in namespace "%1" because of error %3. Events cannot be delivered through ...
- Event ID %2 for the Windows Search Service has been suppressed %3 time(s) since %4. This event is used to suppress Windows ...
- Event Log Online Help cannot be displayed using the currently specified program. For more information on selecting the program ...
- Event Passing Object Does Not Support Needed Interfaces, This Should Not Happen if the Object Supports COM and Automation ...
- Event provider %1 attempted to register a syntactically invalid query "%2". The query will be ignored. The query can be corrected ...
- Event provider %1 attempted to register an intrinsic event query "%2" in %3 namespace for which the set of target object ...
- Event provider %1 attempted to register query "%2" in %3 namespace which is too broad. Event providers cannot provide events ...
- Event provider %1 attempted to register query "%2" whose target class "%3" in %4 namespace does not exist. The query will ...
- Event provider %1 attempted to register query "%2" whose target class "%3" is not an event class. The query will be ignored. ...
- Event Type: %1!s! Event Source: %2!s! Event Category: %3!s! Event ID: %4!d! Date: %5!s! Time: %6!s! User: %7!s! Computer: ...
- Event Type: %1!s! Event Source: %2!s! Event Category: %3!s! Event ID: %4!d! Date: %5!s! Time: %6!s! User: %7!s!\%8!s! Computer: ...
- Event Viewer can only save up to 256 individually selected events. To save a larger amount of events, use filtering or custom ...
- Event Viewer cannot begin a sorting operation when one is already in progress or when it is retrieving events. Wait until ...
- Event Viewer cannot open this link. This link might not be valid, or the item that this link refers to is not associated ...
- Event Viewer cannot refresh a view while performing a sorting operation. You must cancel the sorting operation or wait until ...
- Event Viewer cannot save the remote log to the local computer. The remote computer account might not have the necessary permissions ...
- Event Viewer encountered an error while generating the friendly view. There might be an error in the format of the event ...
- Events from the remote computer cannot be saved into .evtx format files on the local computer. If you want to save the events ...
- Events is the number of events in the computer at the time of data collection. This is an instantaneous count, not an average ...
- Every request from a client is represented in the server as a 'work item,' and the server maintains a pool of available work ...
- Every request from a client is represented in the server as a 'work item,' and the server maintains a pool of available work ...
- Every request from a client is represented in the server as a 'work item,' and the server maintains a pool of available work ...
- Everything on the drive will be deleted. If you have any personal files on this drive, make sure you've backed up the files. ...
- Everything on your PC's recovery partition is now copied to your recovery drive. You can delete the recovery partition to ...
- Eviction of this node is invalid at this time. Due to quorum requirements node eviction will result in cluster shutdown. ...
- EvictNode removes a computer system from a cluster. The node to be evicted is specified as a parameter to the method. The ...
- EvntWin's configuration information may have been corrupted. Expected configuration information could not be found in the ...
- Examine average load times of Internet Explorer add-ons enabled on your system. To improve Internet Explorer performance, ...
- Example: http://myhost/training/ or https://*/training/ Example of non-standard TCP port: http://myhost:8080/training/ or ...
- Examples of services that might not be available on the guest operating system include Volume Shadow Copy Services and operating ...
- Examples: Add a rule for domain isolation using defaults: netsh advfirewall consec add rule name="isolation" endpoint1=any ...
- Examples: Add a rule for domain isolation using defaults: netsh advfirewall consec add rule name="isolation" endpoint1=any ...
- Examples: REG QUERY HKLM\Software\Microsoft\ResKit /v Version Displays the value of the registry value Version REG QUERY ...
- Examples: Rename rule1 to rule 2: netsh advfirewall consec set rule name="rule1" new name="rule2" Change the action on a ...
- Examples: setspn -R daserver1 It will register SPN "HOST/daserver1" and "HOST/{DNS of daserver1}" setspn -S http/daserver ...
- Examples: WBADMIN START RECOVERY -version:03/31/2005-09:00 -itemType:Volume -items:d: WBADMIN START RECOVERY -version:03/31/2005-09:00 ...
- EXAMPLES: WDSMCAST /progress /verbose /trace:trace.etl /Transfer-File /Server:MyWDSServer /Namespace:WindowsVista /Username:MyDomain\WDSAdmin ...
- Exceeded the maximum number of computer QoS policies. The computer QoS policy "%2" and subsequent computer QoS policies will ...
- Exceeded the maximum number of user QoS policies. The user QoS policy "%2" and subsequent user QoS policies will not be applied. ...
- Exceeded the maximum number(32) of Third Party EapHost processes. Running the current eap session in short lived Eap3Host ...
- Exception is raised while trying to remove cached secrets from local domain controller. Additional data: Exception value: ...
- EXCEPTION} Guard Page Exception A page of memory that marks the end of a data structure, such as a stack or an array, has ...
- Excessive low frequency noise. Make sure the microphone is not subjected to mechanical shocks and is not in the direct path ...
- Excluding certain files and locations can help speed up a scan, but may leave your computer less protected. To add multiple ...
- exe file command volumename][path][filename Description: Configures file and directory exclusion settings. Command List: ...
- exe filter command Description: Configures filter specific and global settings. Command List: enable Enables UWF for the ...
- exe overlay command argument Description: Configures overlay settings. Command List: set-size Sets the overlay size for a ...
- exe parameter commands arguments Description: Configures Unified Write Filter (UWF) lockdown options. Parameter List: filter ...
- exe registry command key value Description: Configures registry exclusion settings or commit registry change. Command List: ...
- exe servicing command arguments Description: Configures servicing settings. Command List: enable Enables UWF Servicing Mode ...
- exe volume command argument Description: Configures volume specific Unified Write Filter (UWF) settings. Command List: protect ...
- Execute permissions are enabled on the Internet Information Services (IIS) virtual directory associated with the remote file ...
- Executes command in response to an event, see the Win32 SDK documentation for CreateProcess for more complete description ...
- Existing restore points on the disk will be deleted and new restore points will not be created. You will not be able to use ...
- Expands the maximum size available on a virtual disk. Syntax: EXPAND VDISK MAXIMUM= MAXIMUM= Indicates the new virtual size ...
- Expected data for Software Restriction Policies cannot be found. Use the Group Policy Management Editor to reconfigure the ...
- Expedited Data Received} The network transport returned data to its client that was marked as expedited by the remote system. ...
- Export events from a log, log file, or using structured query to a file. Usage: wevtutil { epl | export-log } /OPTION:VALUE ...
- Extended Mode Negotiation Time is the number of milliseconds taken for the last extended mode security association negotiated. ...