Windows 10
- LDAP Query Group Deleted: Target Account Name: %1 Target Domain: %2 Target Account ID: %3 Caller User Name: %4 Caller Domain: ...
- LDAP will apply new QOS policy. QOS Policy ID: %1 LdapQosPolicyTrigger: %2 LdapQosPolicyMaxCpu: %3 IsReplicationPolicy: %4 ...
- LDAP will apply updated QOS policy. QOS Policy ID: %1 LdapQosPolicyTrigger: %2 LdapQosPolicyMaxCpu: %3 IsReplicationPolicy: ...
- LDIF Directory Exchange General Parameters = -i Turn on Import Mode (The default is Export) -f filename Input or Output filename ...
- LDIF file importation was skipped because the AD LDS service could not be started. To import LDIF files after the service ...
- Learn how to use a tablet pen to perform navigational and editing shortcuts. Navigational flicks include drag up, drag down, ...
- Left hand side arguments to binary operators must be either attributes, nodes or variables and right hand side arguments ...
- Legal entities that are constrained by and accountable to this Web site, but may use the data in a way not specified in this ...
- Length of message passed to NtRequestPort or NtRequestWaitReplyPort was longer than the maximum message allowed by the port. ...
- Less than - case insensitive. When the left operand is a collection, returns values from the collection that are less than ...
- Less than - case sensitive. When the left operand is a collection, returns values from the collection that are less than ...
- Less than or equal to - case insensitive. When the left operand is a collection, returns values from the collection that ...
- Less than or equal to - case sensitive. When the left operand is a collection, returns values from the collection that are ...
- Let me pick from a list of device drivers on my computer This list will show installed driver software compatible with the ...
- Let the user decide whether to allow unsolicited from the Internet through a NAT edge device when an application requests ...
- Let Windows and apps request your location, including location history, and send Microsoft and trusted partners some location ...
- Let Windows and apps request your location, including location history, and use your advertising ID to personalize your experiences. ...
- Let Windows remember your sign-in name and password so you don't have to. Stored sign-in info can be used with other apps ...
- Let Windows sync as much music as possible, or select specific artist folders, album folders, playlists, or songs to sync. ...
- Let your apps automatically share and sync info with wireless devices that don't explicitly pair with your PC, tablet, or ...
- Lets users run a 16-bit program in a dedicated (not shared) Virtual DOS Machine (VDM) process. All DOS and 16-bit programs ...
- Lets you selectively permit or prohibit the use of Microsoft Management Console (MMC) snap-ins. - If you enable this setting, ...
- Level 1 TLB Fills/sec is the frequency of faults that occur when reference is made to memory whose Page Table Entry (PTE) ...
- Level 2 TLB Fills/sec is the frequency of faults that occur when reference is made to memory whose Page Table Entry (PTE) ...
- Libraries that are encrypted with Encrypting File System, on a network location, or on a drive that doesn't use the NTFS ...
- License install storage failed for license Id %1 Type: %2 Package (if available): %3 User Id(if available): %4 Result code: ...
- License status of this product's application. 0=Unlicensed, 1=Licensed, 2=OOBGrace, 3=OOTGrace, 4=NonGenuineGrace, 5=Notification, ...
- License Violation} The system has detected tampering with your registered product type. This is a violation of your software ...
- Licenses are being migrated to a machine running XP or downlevel OS. This operation can only be performed on Windows Vista ...
- Licenses cannot be copied from one computer to another. Use License Management to transfer licenses, or get a new license ...
- Limited Number of User Sessions: (0) feature is disabled , a value greater than 0 represents the number of sessions allowed ...
- Limits newly scheduled to items on the user's Start menu, and prevents the user from changing the scheduled program for existing ...
- Limits the amount of storage that a page or site using the DHTML Persistence behavior can use for the Internet security zone. ...
- Limits the amount of storage that a page or site using the DHTML Persistence behavior can use for the Local Computer security ...
- Limits the amount of storage that a page or site using the DHTML Persistence behavior can use for the Local Intranet security ...
- Limits the amount of storage that a page or site using the DHTML Persistence behavior can use for the Restricted Sites security ...
- Limits the amount of storage that a page or site using the DHTML Persistence behavior can use for the Trusted Sites security ...
- Limits the bandwidth audio and video will consume when in a conference. This setting will guide NetMeeting to choose the ...
- Limits the percentage of a volume's disk space that can be used to store deleted files. If you enable this setting, the user ...
- Limits the percentage of the computer's disk space that can be used to store automatically cached offline files. This setting ...
- Limits the Windows programs that users have permission to run on the computer. If you enable this policy setting, users can ...
- Linearity calibration data is already present. Please use the 'Reset' button in the Tablet PC Settings control panel applet ...
- Link latency and bandwidth could not be detected for tunnel %2. The error code is %1. The following default network characteristics ...
- List event publishers. Usage: wevtutil { ep | enum-publishers } Example: The following example lists the event publishers ...
- List of Compatible IDs for the device. If Setup cannot locate an INF file that matches one of a device's hardware IDs, it ...
- List of Hardware IDs associated with the device. A hardware ID is a vendor-defined identification string that Setup uses ...
- List the names of all existent remote event subscriptions. Usage: wecutil { es | enum-subscription } Example: List event ...
- List the names of all logs. Usage: wevtutil { el | enum-logs } Example: The following example lists the names of all logs. ...
- Listener port mapping property of the Hyper-V Replica broker for network listeners on the Replica cluster is not valid. Changes ...
- Lists cross-domain move proxy objects. When an object is moved from one domain to another, a marker remains in the original ...
- Lists tm and tx objects Usage: ktmutil tx list Lists all transactions ktmutil tx list {TmGuid} Lists transactions in a tm ...
- Lists types of files that cannot be used offline. This setting lets you exclude certain types of files from automatic and ...
- Live migration of the machine failed because all the LUNS on the source machine were not seen on the target for virtual HBA ...
- Live migrations of virtual machines cannot be sent to the destination host because no migration networks are specified for ...
- LmCompatibilityLevel value is different from the default. Configured LM Compatibility Level: %1 Default LM Compatibility ...
- Load and unload device drivers This user right determines which users can dynamically load and unload device drivers or other ...
- loadMorePages is deprecated. Invoking this function will not have any effect. Please refer to the 'ListView loading behaviors' ...
- Local Configuration Manager settings were not found, or the current document contains other configurations. Correct that ...
- Local Configuration Manager that controls the states of configuration files and uses Configuration Agent to apply the configurations. ...
- Local forest root domain: %1 Because some of the local name suffixes already exist in the specified forest (or a forest that ...
- Local Group Policy Objects are stored on the local computer. Use the Browse button to select one of the Group Policy Objects. ...
- Local security could not be started because an error occurred during initialization. The error code returned is %1. THE SYSTEM ...
- Local security could not be started because the user accounts database (NET.ACC) was missing or corrupted, and no usable ...
- Local security could not be started because the user accounts database (NET.ACC) was missing or corrupted, and no usable ...
- Local Session Key} A user session key was requested for a local RPC connection. The session key returned is a constant value ...
- LocalFirewallRules %1!s! LocalConSecRules %2!s! InboundUserNotification %3!s! RemoteManagement %4!s! UnicastResponseToMulticast ...
- Locate and install driver software (recommended) Windows will guide you through the process of installing driver software ...
- Locates security errors (or those possibly security related) and performs the initial diagnosis of the problem. Optional ...
- Location of Offline Files cache on the local computer. This is the directory under which the locally-cached file copies exist. ...
- Lock pages in memory This security setting determines which accounts can use a process to keep data in physical memory, which ...
- Log "{0}" could not be read to completion due to the following error. This may have occurred because the log was cleared ...
- Log expiry events, and, for user policy, only show expiry notifications when the percentage of remaining certificate lifetime ...
- Log on as a batch job This security setting allows a user to be logged on by means of a batch-queue facility and is provided ...
- Log on as a service This security setting allows a security principal to log on as a service. Services can be configured ...
- Log on locally Determines which users can log on to the computer. Important Modifying this setting may affect compatibility ...