Windows 10

  1. LDAP Query Group Deleted: Target Account Name: %1 Target Domain: %2 Target Account ID: %3 Caller User Name: %4 Caller Domain: ...
  2. LDAP will apply new QOS policy. QOS Policy ID: %1 LdapQosPolicyTrigger: %2 LdapQosPolicyMaxCpu: %3 IsReplicationPolicy: %4 ...
  3. LDAP will apply updated QOS policy. QOS Policy ID: %1 LdapQosPolicyTrigger: %2 LdapQosPolicyMaxCpu: %3 IsReplicationPolicy: ...
  4. LDIF Directory Exchange General Parameters = -i Turn on Import Mode (The default is Export) -f filename Input or Output filename ...
  5. LDIF file importation was skipped because the AD LDS service could not be started. To import LDIF files after the service ...
  6. Learn how to use a tablet pen to perform navigational and editing shortcuts. Navigational flicks include drag up, drag down, ...
  7. Left hand side arguments to binary operators must be either attributes, nodes or variables and right hand side arguments ...
  8. Legal entities that are constrained by and accountable to this Web site, but may use the data in a way not specified in this ...
  9. Length of message passed to NtRequestPort or NtRequestWaitReplyPort was longer than the maximum message allowed by the port. ...
  10. Less than - case insensitive. When the left operand is a collection, returns values from the collection that are less than ...
  11. Less than - case sensitive. When the left operand is a collection, returns values from the collection that are less than ...
  12. Less than or equal to - case insensitive. When the left operand is a collection, returns values from the collection that ...
  13. Less than or equal to - case sensitive. When the left operand is a collection, returns values from the collection that are ...
  14. Let me pick from a list of device drivers on my computer This list will show installed driver software compatible with the ...
  15. Let the user decide whether to allow unsolicited from the Internet through a NAT edge device when an application requests ...
  16. Let Windows and apps request your location, including location history, and send Microsoft and trusted partners some location ...
  17. Let Windows and apps request your location, including location history, and use your advertising ID to personalize your experiences. ...
  18. Let Windows remember your sign-in name and password so you don't have to. Stored sign-in info can be used with other apps ...
  19. Let Windows sync as much music as possible, or select specific artist folders, album folders, playlists, or songs to sync. ...
  20. Let your apps automatically share and sync info with wireless devices that don't explicitly pair with your PC, tablet, or ...
  21. Lets users run a 16-bit program in a dedicated (not shared) Virtual DOS Machine (VDM) process. All DOS and 16-bit programs ...
  22. Lets you selectively permit or prohibit the use of Microsoft Management Console (MMC) snap-ins. - If you enable this setting, ...
  23. Level 1 TLB Fills/sec is the frequency of faults that occur when reference is made to memory whose Page Table Entry (PTE) ...
  24. Level 2 TLB Fills/sec is the frequency of faults that occur when reference is made to memory whose Page Table Entry (PTE) ...
  25. Libraries that are encrypted with Encrypting File System, on a network location, or on a drive that doesn't use the NTFS ...
  26. License install storage failed for license Id %1 Type: %2 Package (if available): %3 User Id(if available): %4 Result code: ...
  27. License status of this product's application. 0=Unlicensed, 1=Licensed, 2=OOBGrace, 3=OOTGrace, 4=NonGenuineGrace, 5=Notification, ...
  28. License Violation} The system has detected tampering with your registered product type. This is a violation of your software ...
  29. Licenses are being migrated to a machine running XP or downlevel OS. This operation can only be performed on Windows Vista ...
  30. Licenses cannot be copied from one computer to another. Use License Management to transfer licenses, or get a new license ...
  31. Limited Number of User Sessions: (0) feature is disabled , a value greater than 0 represents the number of sessions allowed ...
  32. Limits newly scheduled to items on the user's Start menu, and prevents the user from changing the scheduled program for existing ...
  33. Limits the amount of storage that a page or site using the DHTML Persistence behavior can use for the Internet security zone. ...
  34. Limits the amount of storage that a page or site using the DHTML Persistence behavior can use for the Local Computer security ...
  35. Limits the amount of storage that a page or site using the DHTML Persistence behavior can use for the Local Intranet security ...
  36. Limits the amount of storage that a page or site using the DHTML Persistence behavior can use for the Restricted Sites security ...
  37. Limits the amount of storage that a page or site using the DHTML Persistence behavior can use for the Trusted Sites security ...
  38. Limits the bandwidth audio and video will consume when in a conference. This setting will guide NetMeeting to choose the ...
  39. Limits the percentage of a volume's disk space that can be used to store deleted files. If you enable this setting, the user ...
  40. Limits the percentage of the computer's disk space that can be used to store automatically cached offline files. This setting ...
  41. Limits the Windows programs that users have permission to run on the computer. If you enable this policy setting, users can ...
  42. Linearity calibration data is already present. Please use the 'Reset' button in the Tablet PC Settings control panel applet ...
  43. Link latency and bandwidth could not be detected for tunnel %2. The error code is %1. The following default network characteristics ...
  44. List event publishers. Usage: wevtutil { ep | enum-publishers } Example: The following example lists the event publishers ...
  45. List of Compatible IDs for the device. If Setup cannot locate an INF file that matches one of a device's hardware IDs, it ...
  46. List of Hardware IDs associated with the device. A hardware ID is a vendor-defined identification string that Setup uses ...
  47. List the names of all existent remote event subscriptions. Usage: wecutil { es | enum-subscription } Example: List event ...
  48. List the names of all logs. Usage: wevtutil { el | enum-logs } Example: The following example lists the names of all logs. ...
  49. Listener port mapping property of the Hyper-V Replica broker for network listeners on the Replica cluster is not valid. Changes ...
  50. Lists cross-domain move proxy objects. When an object is moved from one domain to another, a marker remains in the original ...
  51. Lists tm and tx objects Usage: ktmutil tx list Lists all transactions ktmutil tx list {TmGuid} Lists transactions in a tm ...
  52. Lists types of files that cannot be used offline. This setting lets you exclude certain types of files from automatic and ...
  53. Live migration of the machine failed because all the LUNS on the source machine were not seen on the target for virtual HBA ...
  54. Live migrations of virtual machines cannot be sent to the destination host because no migration networks are specified for ...
  55. LmCompatibilityLevel value is different from the default. Configured LM Compatibility Level: %1 Default LM Compatibility ...
  56. Load and unload device drivers This user right determines which users can dynamically load and unload device drivers or other ...
  57. loadMorePages is deprecated. Invoking this function will not have any effect. Please refer to the 'ListView loading behaviors' ...
  58. Local Configuration Manager settings were not found, or the current document contains other configurations. Correct that ...
  59. Local Configuration Manager that controls the states of configuration files and uses Configuration Agent to apply the configurations. ...
  60. Local forest root domain: %1 Because some of the local name suffixes already exist in the specified forest (or a forest that ...
  61. Local Group Policy Objects are stored on the local computer. Use the Browse button to select one of the Group Policy Objects. ...
  62. Local security could not be started because an error occurred during initialization. The error code returned is %1. THE SYSTEM ...
  63. Local security could not be started because the user accounts database (NET.ACC) was missing or corrupted, and no usable ...
  64. Local security could not be started because the user accounts database (NET.ACC) was missing or corrupted, and no usable ...
  65. Local Session Key} A user session key was requested for a local RPC connection. The session key returned is a constant value ...
  66. LocalFirewallRules %1!s! LocalConSecRules %2!s! InboundUserNotification %3!s! RemoteManagement %4!s! UnicastResponseToMulticast ...
  67. Locate and install driver software (recommended) Windows will guide you through the process of installing driver software ...
  68. Locates security errors (or those possibly security related) and performs the initial diagnosis of the problem. Optional ...
  69. Location of Offline Files cache on the local computer. This is the directory under which the locally-cached file copies exist. ...
  70. Lock pages in memory This security setting determines which accounts can use a process to keep data in physical memory, which ...
  71. Log "{0}" could not be read to completion due to the following error. This may have occurred because the log was cleared ...
  72. Log expiry events, and, for user policy, only show expiry notifications when the percentage of remaining certificate lifetime ...
  73. Log on as a batch job This security setting allows a user to be logged on by means of a batch-queue facility and is provided ...
  74. Log on as a service This security setting allows a security principal to log on as a service. Services can be configured ...
  75. Log on locally Determines which users can log on to the computer. Important Modifying this setting may affect compatibility ...