Windows 10
- Follow the instructions for wireless projection for your Miracast enabled device. If you're using Windows 8 or newer, press ...
- Following is the summary of warnings and errors encountered by File Replication Service while polling the Domain Controller ...
- Following successful promotion of the domain controller, restart your computer. Then allow dynamic updates to these zones ...
- Font name. For TrueType Fonts and TrueType Collections if NULL the installer registers the font after reading the correct ...
- For a ProtectedSpaceExtent that is allocated to a VolumeSet, (i.e. is named in a CIM_VolumeSetBasedOnPSExtent association), ...
- For added security, you can require users to press Ctrl+Alt+Delete before signing in. This guarantees that the authentic ...
- For additional information, double-click a permission entry. To modify a permission entry, select the entry and click Edit ...
- For additional information, double-click an audit entry. To modify an audit entry, select the entry and click Edit (if available). ...
- For assigned applications, whether or not a lightweight install or an actual install is performed 1 = This is not an assigned ...
- For best results, write as many sentences as possible. If you want to stop before you reach the end of the group of sentences, ...
- For best results, write as many sentences as possible. If you want to stop before you reach the end of the group of sentences, ...
- For better speech recognition, make sure that the microphone is positioned correctly, that you are speaking in a quiet environment, ...
- For certificate-based authentication of users and computers the client computers must use CAs registered in the Active Directory ...
- For certificate-based authentication of users and computers, along with CAs that are registered in Active Directory, the ...
- For Counter '%1', bad descriptionID %2!u!( 2!x!) was specified. descriptionID attribute is required, and must be globally ...
- For Counter '%1', bad nameID %2!u!( 2!x!) was specified. nameID attribute is required, and must be globally unique. In addition, ...
- For CounterSet '%1', bad descriptionID %2!u!( 2!x!) was specified. descriptionID attribute is required, and must be globally ...
- For CounterSet '%1', bad nameID %2!u!( 2!x!) was specified. nameID attribute is required, and must be globally unique. In ...
- For directory paths, indicates if the operation is to apply to the entire directory tree or only to the directory entry itself. ...
- For each selected item, Windows will check for problems and send you a message if problems are found. How does Security and ...
- For each selected item, Windows will check for problems and send you a message if problems are found. How does Security and ...
- For each zone, the Binary and Scripted Behavior security restrictions may be configured to allow only a list of admin-approved ...
- For each zone, the Network Protocol Lockdown security restriction may be configured to prevent active content obtained through ...
- For element with Id %1!u!( 1!x!), under '%2', attribute 'aggregate' is not allowed since the parent counterSet has either ...
- For element with Id %1!u!( 1!x!), under '%2', attribute 'baseID' is required. Here is the list of counter types that require ...
- For element with Id %1!u!( 1!x!), under '%2', attribute 'multiCounterID' is required, and the counter referenced by that ...
- For element with Id %1!u!( 1!x!), under '%2', attributes 'perfTimeID' and 'perfFreqID' are required, and the counters referenced ...
- For event '%1', with Id %2!u!( 2!x!), a property insert in the event message is referencing a non-existent property. Event ...
- For event '%1', with Id %2!u!( 2!x!), level must be specified and it should be one of Critical, Error, Warning, or Informational, ...
- For event '%1', with Id %2!u!( 2!x!), Opcode '%3' is global, and its value collides with that of local Opcode '%4' of the ...
- For example, file-based applications would typically have scope names based on file paths, whereas Web-based applications ...
- For example, to specify a device that has a VID 058F, PID 6387 and Revision 0142, type the value in the following format ...
- For file access across network domains to function properly, each UNIX user or group identity should map to a Windows user ...
- For help solving this problem with additional wireless software, contact the manufacturer of the wireless hardware or your ...
- For help solving this problem with additional wireless software, contact the manufacturer of the wireless hardware or your ...
- For HTTP header authentication, either WS_SSL_TRANSPORT_SECURITY_BINDING must also be included in the security description ...
- For information on command line arguments specific to Windows Deployment Services, see the Windows Deployment Services documentation. ...
- For machine certificates, please read help and contact a system administrator if this warning reappears the next time you ...
- For more detailed information, review the event log or run GPRESULT /H GPReport.html from the command line to access information ...
- For more information about these DISM options and their arguments, specify an option immediately before /?. Examples: DISM.exe ...
- For more information about these servicing commands and their arguments, specify a command immediately before /?. Examples: ...
- For more information about these servicing commands and their arguments, specify a command immediately before /?. Examples: ...
- For more information on how to obtain the manufacturer and product ID from the device search for "Enhanced Storage Access" ...
- For more information on how to set a silo type identifier for this policy search for "Enhanced Storage Access" on Microsoft ...
- For sharing and discovery to work properly, make sure the settings in your firewall program match the following settings. ...
- For template '%1', invalid Custom Xml specified. Custom Xml must have a top-level element and it should be in its own namespace. ...
- For the operation to complete, the user needs to log off and log on. Could not log the user off. Error - %s. Please log off. ...
- For Windows Installer packages, this is the file system path to the Windows installer package. For ZAP packages, this is ...
- For Windows NT only) The WinstationDesktop property specifies either the name of the desktop only or the name of both the ...
- For your computer's security, Internet Explorer does not allow you to drag web content to a program outside Protected mode ...
- For your computer's security, this file was saved to the Temporary Internet Files folder Do you want to open this folder? ...
- Force device Read/Write permissions to match the permission necessary for all IOCTLs. This compatibility fix enables SecureROM ...
- Force shutdown from a remote system This security setting determines which users are allowed to shut down a computer from ...
- Forces a transaction that has an undetermined outcome to either a committed or a rolled-back outcome. Usage : ktmutil tx ...
- Forces the application to use the WAVE_MAPPER device instead of device 0. It is only safe to apply this compatibility fix ...
- Forces the KCC on targeted domain controller(s) to immediately recalculate its inbound replication topology. By default, ...
- Forces the Start screen to use one of the available backgrounds, 1 through 20, and prevents the user from changing it. If ...
- Forces Windows to use the specified colors for the background and accent. The color values are specified in hex as #RGB. ...
- Forcing the user to restart their computer right after they install the app can cause them to lose data from other apps that ...
- Forcing the user to restart their computer right after they uninstall the app can cause them to lose data from other apps ...
- Foreground optimizations (prefetching) took longer to complete, resulting in a performance degradation in the system start ...
- Forest trust A forest trust is a transitive trust between two forests that allows users in any of the domains in one forest ...
- Forest-wide authentication Users in the %s forest can have access to all computers in the local forest. This option is preferred ...
- Forest-wide authentication Users in the local forest can have access to all computers in the %s forest. This option is preferred ...
- Forest-wide authentication Windows will automatically authenticate users from the local forest for all resources in the %s ...
- Forest-wide authentication Windows will automatically authenticate users from the specified forest for all resources in the ...
- Forgets a transaction that is waiting for a response from a subordinate enlistment or tm Usage : ktmutil tx forget {TmGuid} ...
- Form factor of memory installed on the computer system. This map is defined in Table 72 in section 7.18.1 (SMBIOS Reference ...
- Formal assessments cannot be run over a terminal server session. Please try again by running directly on the system's physical ...
- Formal assessments cannot be run when the system is on battery power. Please try again when the system is running AC power. ...
- Format cannot run because the volume is in use by another process. Format may run if this volume is dismounted first. ALL ...
- Format version: %1!d! CSid: %2!s! LinkIndex: 3!08x!.%4!08x! LinkFileNtfsID: 5!08x!.%6!08x! CSFileNtfsID: 7!08x!.%8!08x! CSChecksum: ...
- FORMAT volume /FS:file-system /V:label /Q /L /A:size /C /I:state /X /P:passes /S:state FORMAT volume /V:label /Q /F:size ...
- FORMAT volume /Q volume Specifies the drive letter (followed by a colon), mount point, or volume name. /FS:filesystem Specifies ...
- FORMAT volume /Q volume Specifies the drive letter (followed by a colon), mount point, or volume name. /FS:filesystem Specifies ...