Windows Server 2008
- List of Hardware IDs associated with the device. A hardware ID is a vendor-defined identification string that Setup uses ...
- List of processes that Windows System Resource Manager will not manage. wsrmc /Get:ExclusionList /SystemList | /UserList ...
- List of trusted domains obtained by DFS client is a truncated list of trusted domains, which might not contain all the trusted ...
- LIST PROVIDERS Lists detailed information about all providers on the computer that are registered with VSS. Example: LIST ...
- LIST SHADOWS { ALL | SET | ID } List shadow copies. ALL All shadow copies (persistent and non-persistent). SET List shadow ...
- List the names of all existent remote event subscriptions. Usage: wecutil { es | enum-subscription } Example: List event ...
- LIST WRITERS METADATA | DETAILED | STATUS List detailed information about all writers on the computer. METADATA Same as LIST ...
- Lists all files under the specified namespace. A number of useful file system properties are included for each file. The ...
- Lists cross-domain move proxy objects. When an object is moved from one domain to another, a marker remains in the original ...
- Lists file screening audit events on the server for a specified period. Use this report to identify users or applications ...
- Lists file screening audit events on the server. Use this report to identify users or applications that violate screening ...
- Lists files by file group. Use this report to observe file group usage patterns and to quickly identify file groups that ...
- Lists files by users who own them. Use this report to understand usage patterns on the server and to quickly identify users ...
- Lists files that appear to be duplicates (files with same name, size and last modified time). Use this report to quickly ...
- Lists files that appear to be duplicates (files with the same size and last modified time) Use this report to quickly identify ...
- Lists files that appear to be duplicates (files with the same size and last modified time). Use this report to quickly identify ...
- Lists files that are a specified size or larger. Use this report to quickly identify the files that are consuming the most ...
- Lists files that are of a specified size or larger. Use this report to quickly identify the files that are consuming the ...
- Lists files that have been accessed most recently. Use this report to identify frequently used data that needs to be highly ...
- Lists files that have not been accessed recently. Use this report to quickly identify files that can be either deleted or ...
- Lists files that have not been accessed recently. Use this report to quickly identify stale files that can be either deleted ...
- Lists files that have not been accessed recently. Use this report to quickly identify stale files that can be either deleted ...
- Lists large files. Use this report to quickly identify the files that are consuming the most disk space on the server. These ...
- Lists the calendar events that are scheduled between the specified date range. wsrmc /Get:CalView /Sd: /Ed: /Sd Specifies ...
- Lists the quotas that exceed a certain disk space usage level. Use this report to quickly identify quotas that may be exceeded ...
- Lists the quotas that exceed a certain disk space usage level. Use this report to quickly identify quotas that may soon be ...
- Lists the status of all client machines that remotely log data to this machine. wsrmc /Get:AccClients /o: /y /o Saves the ...
- Lists the usage of volume resources for shadow copies. Use this report to identify inconsistencies in diff area configuration ...
- Live File System - Allows you to add and erase files, like a USB flash drive. Might not be readable on operating systems ...
- LLMNR name resolution is used to resolve a single-label, unqualified name. It is attempted only if DNS name resolution failed ...
- Load and unload device drivers This user right determines which users can dynamically load and unload device drivers or other ...
- Load the roll paper to be used for auto cutter adjustment and select the paper type and paper size settings from the list ...
- Loading a backup destination catalog must be done before doing an async operation with an engine reference. Try creating ...
- Local administrative pages cannot be displayed. Message Queuing may not be properly installed. Please reinstall Message Queuing ...
- Local certificate revocations lists for Online Responder Array members could not be synchronized with the Array controller. ...
- Local forest root domain: %1 Because some of the local name suffixes already exist in the specified forest (or a forest that ...
- Local Group Policy Objects are stored on the local computer. Use the Browse button to select one of the Group Policy Objects. ...
- Local security could not be started because an error occurred during initialization. The error code returned is %1. THE SYSTEM ...
- Local security could not be started because the user accounts database (NET.ACC) was missing or corrupted, and no usable ...
- Local Session Key} A user session key was requested for a local RPC connection. The session key returned is a constant value ...
- LocalFirewallRules %1!s! LocalConSecRules %2!s! InboundUserNotification %3!s! RemoteManagement %4!s! UnicastResponseToMulticast ...
- Locate and install driver software (recommended) Windows will guide you through the process of installing driver software ...
- Locate the centering and sizing controls for your TV. If you do not have these controls, select Back and go to the next adjustment. ...
- Locate the RGB color balance control for your display. If your monitor has a color temperature setting, set it to 6500k, ...
- Lock pages in memory This security setting determines which accounts can use a process to keep data in physical memory, which ...
- Log Generation Checkpoint Depth represents the amount of work, in count of log files, that will need to be redone or undone ...
- Log on as a batch job This security setting allows a user to be logged on by means of a batch-queue facility and is provided ...
- Log on as a service This security setting determines which service accounts can register a process as a service. Default: ...
- Log on to %s locally as an administrator, install IP from the Network Connections folder, and then run this wizard again. ...
- Log Record Stalls/sec is the number of log records that cannot be added to the log buffers per second because they are full. ...
- Log represents any type of event, error or informational register or chronicle. The object describes the existence of the ...
- Log sequence numbers for this instance have almost been completely consumed. The current log generation is %4 which is approaching ...
- Log Threads Waiting is the number of threads waiting for their data to be written to the log in order to complete an update ...
- Log Writes/sec is the number of times the log buffers are written to the log file(s) per second. If this number approaches ...
- Log {0} could not be read to completion due to the following error. This may have occurred because the log was cleared while ...
- LogDrvInfoDetailData: Driver #%d: INF Date = %s; INF Section = %s; INF Filename = %s; Desc = %s; H/W device IDs = %s; Compatible ...
- Logging Agent provides support for logging statistics from clients that receive multicast broadcast or advertising content ...
- Logging could not be disabled for the following TS Gateway event: "%1". The following error occurred: "%2". To resolve this ...
- Logging could not be enabled for the following TS Gateway event: "%1". The following error occurred: "%2". To resolve this ...
- Logging off is required after changing the Administrator account name. Some tasks may not work until you log off and log ...
- Logging options can also be accessed by clicking the Remote Access Preferences menu item under the Advanced menu of the Network ...
- Logging Status: 1 = Client Side Extension logged data successfully, 2 = Client Side Extension logged could not log data, ...
- Logging was requested, but the time service encountered an error while trying to set up the log file: %1. The error was: ...
- Logging was requested, but the time service encountered an error while trying to write to the log file: %1. The error was: ...
- Logical devices may have memory installed on them or otherwise associated with them - such as cache memory. This is made ...
- Logical devices may have one or more alarm devices associated with them, in order to indicate problem situations. This relationship ...
- Logical Disk Manager cannot determine the partition type of a partition on a disk. To continue the conversion, you must first ...
- Logical Disk Manager could not update the boot file for any boot partitions on the target disk. Verify your arcpath listings ...
- Logical Disk Manager detected an unhealthy region on a basic volume. If the volume is initializing or regenerating, it will ...
- Logical Disk Manager is unavailable on %s. It may have stopped running, or there may be a network problem. Do you want to ...
- LogicalDisks can be BasedOn a DiskPartition. For example, a personal computer's C: drive may be located on a Partition on ...
- LogicalDisks can be BasedOn a single Volume (for example, exposed by a software volume manager), or be BasedOn a DiskPartition ...
- Login Flags: ISCSI_LOGIN_FLAG_REQUIRE_IPSEC 0x00000001 IPsec is required for the operation ISCSI_LOGIN_FLAG_MULTIPATH_ENABLED ...
- Login shell not specified. No login shell specified for this user. Specify a login shell for the user before saving the user's ...
- logman create counter perf_log -c "\Processor(_Total)\% Processor Time" logman create counter perf_log -c "\Processor(_Total)\% ...