Windows Server 2008

  1. List of Hardware IDs associated with the device. A hardware ID is a vendor-defined identification string that Setup uses ...
  2. List of processes that Windows System Resource Manager will not manage. wsrmc /Get:ExclusionList /SystemList | /UserList ...
  3. List of trusted domains obtained by DFS client is a truncated list of trusted domains, which might not contain all the trusted ...
  4. LIST PROVIDERS Lists detailed information about all providers on the computer that are registered with VSS. Example: LIST ...
  5. LIST SHADOWS { ALL | SET | ID } List shadow copies. ALL All shadow copies (persistent and non-persistent). SET List shadow ...
  6. List the names of all existent remote event subscriptions. Usage: wecutil { es | enum-subscription } Example: List event ...
  7. LIST WRITERS METADATA | DETAILED | STATUS List detailed information about all writers on the computer. METADATA Same as LIST ...
  8. Lists all files under the specified namespace. A number of useful file system properties are included for each file. The ...
  9. Lists cross-domain move proxy objects. When an object is moved from one domain to another, a marker remains in the original ...
  10. Lists file screening audit events on the server for a specified period. Use this report to identify users or applications ...
  11. Lists file screening audit events on the server. Use this report to identify users or applications that violate screening ...
  12. Lists files by file group. Use this report to observe file group usage patterns and to quickly identify file groups that ...
  13. Lists files by users who own them. Use this report to understand usage patterns on the server and to quickly identify users ...
  14. Lists files that appear to be duplicates (files with same name, size and last modified time). Use this report to quickly ...
  15. Lists files that appear to be duplicates (files with the same size and last modified time) Use this report to quickly identify ...
  16. Lists files that appear to be duplicates (files with the same size and last modified time). Use this report to quickly identify ...
  17. Lists files that are a specified size or larger. Use this report to quickly identify the files that are consuming the most ...
  18. Lists files that are of a specified size or larger. Use this report to quickly identify the files that are consuming the ...
  19. Lists files that have been accessed most recently. Use this report to identify frequently used data that needs to be highly ...
  20. Lists files that have not been accessed recently. Use this report to quickly identify files that can be either deleted or ...
  21. Lists files that have not been accessed recently. Use this report to quickly identify stale files that can be either deleted ...
  22. Lists files that have not been accessed recently. Use this report to quickly identify stale files that can be either deleted ...
  23. Lists large files. Use this report to quickly identify the files that are consuming the most disk space on the server. These ...
  24. Lists the calendar events that are scheduled between the specified date range. wsrmc /Get:CalView /Sd: /Ed: /Sd Specifies ...
  25. Lists the quotas that exceed a certain disk space usage level. Use this report to quickly identify quotas that may be exceeded ...
  26. Lists the quotas that exceed a certain disk space usage level. Use this report to quickly identify quotas that may soon be ...
  27. Lists the status of all client machines that remotely log data to this machine. wsrmc /Get:AccClients /o: /y /o Saves the ...
  28. Lists the usage of volume resources for shadow copies. Use this report to identify inconsistencies in diff area configuration ...
  29. Live File System - Allows you to add and erase files, like a USB flash drive. Might not be readable on operating systems ...
  30. LLMNR name resolution is used to resolve a single-label, unqualified name. It is attempted only if DNS name resolution failed ...
  31. Load and unload device drivers This user right determines which users can dynamically load and unload device drivers or other ...
  32. Load the roll paper to be used for auto cutter adjustment and select the paper type and paper size settings from the list ...
  33. Loading a backup destination catalog must be done before doing an async operation with an engine reference. Try creating ...
  34. Local administrative pages cannot be displayed. Message Queuing may not be properly installed. Please reinstall Message Queuing ...
  35. Local certificate revocations lists for Online Responder Array members could not be synchronized with the Array controller. ...
  36. Local forest root domain: %1 Because some of the local name suffixes already exist in the specified forest (or a forest that ...
  37. Local Group Policy Objects are stored on the local computer. Use the Browse button to select one of the Group Policy Objects. ...
  38. Local security could not be started because an error occurred during initialization. The error code returned is %1. THE SYSTEM ...
  39. Local security could not be started because the user accounts database (NET.ACC) was missing or corrupted, and no usable ...
  40. Local Session Key} A user session key was requested for a local RPC connection. The session key returned is a constant value ...
  41. LocalFirewallRules %1!s! LocalConSecRules %2!s! InboundUserNotification %3!s! RemoteManagement %4!s! UnicastResponseToMulticast ...
  42. Locate and install driver software (recommended) Windows will guide you through the process of installing driver software ...
  43. Locate the centering and sizing controls for your TV. If you do not have these controls, select Back and go to the next adjustment. ...
  44. Locate the RGB color balance control for your display. If your monitor has a color temperature setting, set it to 6500k, ...
  45. Lock pages in memory This security setting determines which accounts can use a process to keep data in physical memory, which ...
  46. Log Generation Checkpoint Depth represents the amount of work, in count of log files, that will need to be redone or undone ...
  47. Log on as a batch job This security setting allows a user to be logged on by means of a batch-queue facility and is provided ...
  48. Log on as a service This security setting determines which service accounts can register a process as a service. Default: ...
  49. Log on to %s locally as an administrator, install IP from the Network Connections folder, and then run this wizard again. ...
  50. Log Record Stalls/sec is the number of log records that cannot be added to the log buffers per second because they are full. ...
  51. Log represents any type of event, error or informational register or chronicle. The object describes the existence of the ...
  52. Log sequence numbers for this instance have almost been completely consumed. The current log generation is %4 which is approaching ...
  53. Log Threads Waiting is the number of threads waiting for their data to be written to the log in order to complete an update ...
  54. Log Writes/sec is the number of times the log buffers are written to the log file(s) per second. If this number approaches ...
  55. Log {0} could not be read to completion due to the following error. This may have occurred because the log was cleared while ...
  56. LogDrvInfoDetailData: Driver #%d: INF Date = %s; INF Section = %s; INF Filename = %s; Desc = %s; H/W device IDs = %s; Compatible ...
  57. Logging Agent provides support for logging statistics from clients that receive multicast broadcast or advertising content ...
  58. Logging could not be disabled for the following TS Gateway event: "%1". The following error occurred: "%2". To resolve this ...
  59. Logging could not be enabled for the following TS Gateway event: "%1". The following error occurred: "%2". To resolve this ...
  60. Logging off is required after changing the Administrator account name. Some tasks may not work until you log off and log ...
  61. Logging options can also be accessed by clicking the Remote Access Preferences menu item under the Advanced menu of the Network ...
  62. Logging Status: 1 = Client Side Extension logged data successfully, 2 = Client Side Extension logged could not log data, ...
  63. Logging was requested, but the time service encountered an error while trying to set up the log file: %1. The error was: ...
  64. Logging was requested, but the time service encountered an error while trying to write to the log file: %1. The error was: ...
  65. Logical devices may have memory installed on them or otherwise associated with them - such as cache memory. This is made ...
  66. Logical devices may have one or more alarm devices associated with them, in order to indicate problem situations. This relationship ...
  67. Logical Disk Manager cannot determine the partition type of a partition on a disk. To continue the conversion, you must first ...
  68. Logical Disk Manager could not update the boot file for any boot partitions on the target disk. Verify your arcpath listings ...
  69. Logical Disk Manager detected an unhealthy region on a basic volume. If the volume is initializing or regenerating, it will ...
  70. Logical Disk Manager is unavailable on %s. It may have stopped running, or there may be a network problem. Do you want to ...
  71. LogicalDisks can be BasedOn a DiskPartition. For example, a personal computer's C: drive may be located on a Partition on ...
  72. LogicalDisks can be BasedOn a single Volume (for example, exposed by a software volume manager), or be BasedOn a DiskPartition ...
  73. Login Flags: ISCSI_LOGIN_FLAG_REQUIRE_IPSEC 0x00000001 IPsec is required for the operation ISCSI_LOGIN_FLAG_MULTIPATH_ENABLED ...
  74. Login shell not specified. No login shell specified for this user. Specify a login shell for the user before saving the user's ...
  75. logman create counter perf_log -c "\Processor(_Total)\% Processor Time" logman create counter perf_log -c "\Processor(_Total)\% ...