Windows 10
- Impression Id: %1{ImpressionId}. Channel extension text node encountered with element name %2{ElementName} and value %3{Value} ...
- Impression Id: %1{ImpressionId}. extension node encountered with name %2{ElementName} with object id: %3{ParserObjectId}, ...
- Impression Id: %1{ImpressionId}. extension text node encountered with name %2{ElementName} with value %3{ElementValue} for ...
- Impression Id: %1{ImpressionId}. item node encountered with object id: %2{ParserObjectId} and sub-element id: %3{ParserSubElementId} ...
- Impression Id: %1{ImpressionId}. Query result is empty due to policy enforcement. %2{QueryBlocked}. %3{Message}. %4{ShowSettings} ...
- Improve your wireless signal quality Windows Help and Support can provide more information about low wireless signal quality ...
- Improves system performance by enabling write caching on the device, but a power outage or equipment failure might result ...
- In a critical shutdown, applications that return FALSE to WM_QUERYENDSESSION will be sent WM_ENDSESSION and closed, while ...
- In a reduction of attack surface, retired protocols are no longer supported. This feature disables the MK protocol. Resources ...
- In a Windows PowerShell Workflow, loop conditions that invoke activities are not supported. Conditions can use only variable ...
- In a Windows PowerShell Workflow, loop conditions that modify variables are not supported. To change a variable, place the ...
- In a Windows PowerShell Workflow, parameter defaults may only be simple value types (such as integers) and strings. In addition, ...
- In a Windows PowerShell Workflow, the CmdletBinding attribute only supports the following values: "DefaultParameterSetName, ...
- In a Windows PowerShell Workflow, the syntax for Start-Sleep is: "Start-Sleep -Seconds " or "Start-Sleep -Milliseconds ". ...
- In a Windows PowerShell Workflow, throw statements that invoke activities (other than New-Object) are not supported. Throw ...
- In addition to basic information, more detailed information is sent to Microsoft about malware and potentially unwanted software, ...
- In addition to the certificate for Hyper-V Replica Broker, each node of the cluster must also have a valid certificate with ...
- In addition, substitution of FOR variable references has been enhanced. You can now use the following optional syntax: %~I ...
- In administrator mode, users can deploy and maintain applications. Users have access to all features except they cannot create ...
- In case of any waiver instructions, you will need to exercise this option. The output of "test" will indicate if report finalization ...
- In File Explorer, Internet Explorer, or any other process which opts into the security restriction, Network Protocol Lockdown ...
- In future versions of Windows, Microsoft might remove the Netsh functionality for %1!s!. Microsoft recommends that you transition ...
- In Internet Explorer 9 and Internet Explorer 10: This policy setting prevents users from deleting ActiveX Filtering and Tracking ...
- In NT 4, GetShortPathName did not care if the file existed - it would give the short path name anyway. This behavior was ...
- In order for Scan Management to display scan server logs, you must enable Remote Event Log Management in Windows Firewall ...
- In order for this domain controller to be located by other domain members and domain controllers, the A record corresponding ...
- In order for this domain controller to be located by other domain members and domain controllers, the domain controller Locator ...
- In order for your changes to take effect, you must restart Windows. Save your work and close all programs, then click Restart ...
- In order to complete the installation of 2], you must restart the computer. Other users are currently logged on to this computer, ...
- In order to dial correctly, your computer might require additional information, such as a calling-card number or the area ...
- In order to set administrative callback mode, either you must specify a callback number or the user must already have a callback ...
- In order to share this printer, Windows Firewall must be configured to allow this printer to be shared with other computers ...
- In order to share this printer, Windows Firewall will be configured to allow this printer to be shared with other computers ...
- In order to transfer music to your Creative Nomad digital audio player, you must upgrade to version 2.50 or later. The update ...
- In order to use the SSLCertificateSHA1Hash WMI property, you mustfirst find the hexadecimal Thumbprint value for the certificatethat ...
- In previous versions of Windows with Internet Explorer, some Web pages could access objects cached from another Web site. ...
- In response to local cultural norm, sensitivites and laws, your SafeSearch setting and access to adult content is locked ...
- In some editions of Windows, the disk might include file shadow copies and older Windows Complete PC Backup images as part ...
- In strict mode, function declarations cannot be nested inside a statement or block. They may only appear at the top level ...
- In the case of an LDAP-derived instance, the ObjectClass property value(s) may be set to the objectClass attribute values. ...
- In the case of an LDAP-derived instance, the SeeAlso property specifies distinguished name of other Directory objects which ...
- In the case of an LDAP-derived instance, the UserPassword property may contain an encrypted password used to access the person's ...
- In the condition box, you can enter an optional expression to evaluate every time the event is triggered. If the expression ...
- In the input box, enter the expression or quoted strings that should be traced every time the tracepoint is encountered. ...
- In the input box, enter the expression to evaluate every time the breakpoint is encountered. If the expression evaluates ...
- In the OnLaunched method implementation of the app, ensure you handle the LaunchActivatedEventArgs.PreLaunch option to be ...
- In the past %1 hour(s) and %2 minute(s), %3 HTTP.SYS responses have had their application requested QoS conflict with URL ...
- In the Start menu you can choose a computer activity, such as reading new e-mail messages or browsing the Web. This menu ...
- In the trace box, enter the expression or quoted strings that should be traced every time the event is triggered. E.g., 'The ...
- In Windows 2003 and earlier versions of Windows, the Remote Procedure Call (RPC) Locator service manages the RPC name service ...
- In Windows 9x applications could restart the computer by calling the ExitWindowsEx API. Windows XP requires the application ...
- In Windows 9x, DirectDraw manipulates the palette directly without using GDI, while on NT it uses GDI. Therefore, if an application ...
- In Windows 9x, the DrawText API would accept out of range values and then convert them to acceptable values. This compatibility ...
- In Windows XP, applications are restricted from modifying the system menu. Instead, each application gets a separate copy ...
- In Windows XP, due to a modification in the caching between MoveFile and DeleteFile API's, when the VerInstallFileW API is ...
- In Windows XP, the WS_EX_CLIENTEDGE window style causes applications to run with the taskbar still visible. This may not ...
- In Windows XP, we have changed foreground semantics to stop foreground focus stealing by one app if another application is ...
- InactivityTimeout defines the time limit (in seconds) for automatic disconnection of the phone line, if no data is exchanged. ...
- Inbound Allowed Default Block Exempt Packets is the total number of default block exempt packets forwarded from a public ...
- Inbound Allowed Default Block Exempt Packets per Second is the rate at which default block exempt packets are forwarded from ...
- Inbound Allowed Filter Exempt IPv6 Packets is the total number of IPv6 filter exempt packets forwarded from a public interface ...
- Inbound Allowed Filter Exempt IPv6 Packets per Second is the rate at which IPv6 filter exempt packets are forwarded from ...
- Inbound Allowed ICMPv6 Packets is the total number of ICMPv6 packets forwarded from a public interface to an internal interface. ...
- Inbound Allowed ICMPv6 Packets per Second is the rate at which ICMPv6 packets are forwarded from a public interface to an ...
- Inbound Allowed IPv6 IPsec Authenticated Packets is the total number of authenticated IKEv1, IKEv2, AuthIP, or ESP IPv6 packets ...
- Inbound Allowed IPv6 IPsec Authenticated Packets per Second is the rate at which authenticated IKEv1, IKEv2, AuthIP or ESP ...
- Inbound Allowed IPv6 IPsec Unauthenticated Packets is the total number of unauthenticated IKEv1, IKEv2, AuthIP, or ESP IPv6 ...
- Inbound Allowed IPv6 IPsec Unauthenticated Packets per Second is the rate at which unauthenticated IKEv1, IKEv2, AuthIP, ...
- Inbound Connections Allowed per Second is the rate at which inbound connections are being allowed by the Windows Filtering ...
- Inbound Connections Blocked per Second is the rate at which inbound connections are being blocked by the Windows Filtering ...
- Inbound Connections is the number of inbound connections allowed by the Windows Filtering Platform since the computer was ...
- Inbound connections must be authenticated to be allowed. Outbound connections are authenticated whenever possible but authentication ...
- Inbound Discarded Default Block Packets is the total number of default block packets received and discarded on a public interface. ...
- Inbound Discarded Default Block Packets per Second is the rate at which default block discarded packets are received and ...
- Inbound Discarded Filter Blocked IPv6 Packets is the total number of filter blocked IPv6 packets received and discarded on ...