Windows 10

  1. Impression Id: %1{ImpressionId}. Channel extension text node encountered with element name %2{ElementName} and value %3{Value} ...
  2. Impression Id: %1{ImpressionId}. extension node encountered with name %2{ElementName} with object id: %3{ParserObjectId}, ...
  3. Impression Id: %1{ImpressionId}. extension text node encountered with name %2{ElementName} with value %3{ElementValue} for ...
  4. Impression Id: %1{ImpressionId}. item node encountered with object id: %2{ParserObjectId} and sub-element id: %3{ParserSubElementId} ...
  5. Impression Id: %1{ImpressionId}. Query result is empty due to policy enforcement. %2{QueryBlocked}. %3{Message}. %4{ShowSettings} ...
  6. Improve your wireless signal quality Windows Help and Support can provide more information about low wireless signal quality ...
  7. Improves system performance by enabling write caching on the device, but a power outage or equipment failure might result ...
  8. In a critical shutdown, applications that return FALSE to WM_QUERYENDSESSION will be sent WM_ENDSESSION and closed, while ...
  9. In a reduction of attack surface, retired protocols are no longer supported. This feature disables the MK protocol. Resources ...
  10. In a Windows PowerShell Workflow, loop conditions that invoke activities are not supported. Conditions can use only variable ...
  11. In a Windows PowerShell Workflow, loop conditions that modify variables are not supported. To change a variable, place the ...
  12. In a Windows PowerShell Workflow, parameter defaults may only be simple value types (such as integers) and strings. In addition, ...
  13. In a Windows PowerShell Workflow, the CmdletBinding attribute only supports the following values: "DefaultParameterSetName, ...
  14. In a Windows PowerShell Workflow, the syntax for Start-Sleep is: "Start-Sleep -Seconds " or "Start-Sleep -Milliseconds ". ...
  15. In a Windows PowerShell Workflow, throw statements that invoke activities (other than New-Object) are not supported. Throw ...
  16. In addition to basic information, more detailed information is sent to Microsoft about malware and potentially unwanted software, ...
  17. In addition to the certificate for Hyper-V Replica Broker, each node of the cluster must also have a valid certificate with ...
  18. In addition, substitution of FOR variable references has been enhanced. You can now use the following optional syntax: %~I ...
  19. In administrator mode, users can deploy and maintain applications. Users have access to all features except they cannot create ...
  20. In case of any waiver instructions, you will need to exercise this option. The output of "test" will indicate if report finalization ...
  21. In File Explorer, Internet Explorer, or any other process which opts into the security restriction, Network Protocol Lockdown ...
  22. In future versions of Windows, Microsoft might remove the Netsh functionality for %1!s!. Microsoft recommends that you transition ...
  23. In Internet Explorer 9 and Internet Explorer 10: This policy setting prevents users from deleting ActiveX Filtering and Tracking ...
  24. In NT 4, GetShortPathName did not care if the file existed - it would give the short path name anyway. This behavior was ...
  25. In order for Scan Management to display scan server logs, you must enable Remote Event Log Management in Windows Firewall ...
  26. In order for this domain controller to be located by other domain members and domain controllers, the A record corresponding ...
  27. In order for this domain controller to be located by other domain members and domain controllers, the domain controller Locator ...
  28. In order for your changes to take effect, you must restart Windows. Save your work and close all programs, then click Restart ...
  29. In order to complete the installation of 2], you must restart the computer. Other users are currently logged on to this computer, ...
  30. In order to dial correctly, your computer might require additional information, such as a calling-card number or the area ...
  31. In order to set administrative callback mode, either you must specify a callback number or the user must already have a callback ...
  32. In order to share this printer, Windows Firewall must be configured to allow this printer to be shared with other computers ...
  33. In order to share this printer, Windows Firewall will be configured to allow this printer to be shared with other computers ...
  34. In order to transfer music to your Creative Nomad digital audio player, you must upgrade to version 2.50 or later. The update ...
  35. In order to use the SSLCertificateSHA1Hash WMI property, you mustfirst find the hexadecimal Thumbprint value for the certificatethat ...
  36. In previous versions of Windows with Internet Explorer, some Web pages could access objects cached from another Web site. ...
  37. In response to local cultural norm, sensitivites and laws, your SafeSearch setting and access to adult content is locked ...
  38. In some editions of Windows, the disk might include file shadow copies and older Windows Complete PC Backup images as part ...
  39. In strict mode, function declarations cannot be nested inside a statement or block. They may only appear at the top level ...
  40. In the case of an LDAP-derived instance, the ObjectClass property value(s) may be set to the objectClass attribute values. ...
  41. In the case of an LDAP-derived instance, the SeeAlso property specifies distinguished name of other Directory objects which ...
  42. In the case of an LDAP-derived instance, the UserPassword property may contain an encrypted password used to access the person's ...
  43. In the condition box, you can enter an optional expression to evaluate every time the event is triggered. If the expression ...
  44. In the input box, enter the expression or quoted strings that should be traced every time the tracepoint is encountered. ...
  45. In the input box, enter the expression to evaluate every time the breakpoint is encountered. If the expression evaluates ...
  46. In the OnLaunched method implementation of the app, ensure you handle the LaunchActivatedEventArgs.PreLaunch option to be ...
  47. In the past %1 hour(s) and %2 minute(s), %3 HTTP.SYS responses have had their application requested QoS conflict with URL ...
  48. In the Start menu you can choose a computer activity, such as reading new e-mail messages or browsing the Web. This menu ...
  49. In the trace box, enter the expression or quoted strings that should be traced every time the event is triggered. E.g., 'The ...
  50. In Windows 2003 and earlier versions of Windows, the Remote Procedure Call (RPC) Locator service manages the RPC name service ...
  51. In Windows 9x applications could restart the computer by calling the ExitWindowsEx API. Windows XP requires the application ...
  52. In Windows 9x, DirectDraw manipulates the palette directly without using GDI, while on NT it uses GDI. Therefore, if an application ...
  53. In Windows 9x, the DrawText API would accept out of range values and then convert them to acceptable values. This compatibility ...
  54. In Windows XP, applications are restricted from modifying the system menu. Instead, each application gets a separate copy ...
  55. In Windows XP, due to a modification in the caching between MoveFile and DeleteFile API's, when the VerInstallFileW API is ...
  56. In Windows XP, the WS_EX_CLIENTEDGE window style causes applications to run with the taskbar still visible. This may not ...
  57. In Windows XP, we have changed foreground semantics to stop foreground focus stealing by one app if another application is ...
  58. InactivityTimeout defines the time limit (in seconds) for automatic disconnection of the phone line, if no data is exchanged. ...
  59. Inbound Allowed Default Block Exempt Packets is the total number of default block exempt packets forwarded from a public ...
  60. Inbound Allowed Default Block Exempt Packets per Second is the rate at which default block exempt packets are forwarded from ...
  61. Inbound Allowed Filter Exempt IPv6 Packets is the total number of IPv6 filter exempt packets forwarded from a public interface ...
  62. Inbound Allowed Filter Exempt IPv6 Packets per Second is the rate at which IPv6 filter exempt packets are forwarded from ...
  63. Inbound Allowed ICMPv6 Packets is the total number of ICMPv6 packets forwarded from a public interface to an internal interface. ...
  64. Inbound Allowed ICMPv6 Packets per Second is the rate at which ICMPv6 packets are forwarded from a public interface to an ...
  65. Inbound Allowed IPv6 IPsec Authenticated Packets is the total number of authenticated IKEv1, IKEv2, AuthIP, or ESP IPv6 packets ...
  66. Inbound Allowed IPv6 IPsec Authenticated Packets per Second is the rate at which authenticated IKEv1, IKEv2, AuthIP or ESP ...
  67. Inbound Allowed IPv6 IPsec Unauthenticated Packets is the total number of unauthenticated IKEv1, IKEv2, AuthIP, or ESP IPv6 ...
  68. Inbound Allowed IPv6 IPsec Unauthenticated Packets per Second is the rate at which unauthenticated IKEv1, IKEv2, AuthIP, ...
  69. Inbound Connections Allowed per Second is the rate at which inbound connections are being allowed by the Windows Filtering ...
  70. Inbound Connections Blocked per Second is the rate at which inbound connections are being blocked by the Windows Filtering ...
  71. Inbound Connections is the number of inbound connections allowed by the Windows Filtering Platform since the computer was ...
  72. Inbound connections must be authenticated to be allowed. Outbound connections are authenticated whenever possible but authentication ...
  73. Inbound Discarded Default Block Packets is the total number of default block packets received and discarded on a public interface. ...
  74. Inbound Discarded Default Block Packets per Second is the rate at which default block discarded packets are received and ...
  75. Inbound Discarded Filter Blocked IPv6 Packets is the total number of filter blocked IPv6 packets received and discarded on ...