Windows 8
- List of application servers that have to be added to the DirectAccess deployment. The servers are specified by their hostnames ...
- List of application servers that have to be deleted from the DirectAccess deployment. The servers are specified by their ...
- List of client security groups that are to be added to the DirectAccess deployment. Each security group is specified in DOMAIN\SG_NAME ...
- List of domains from which application server Group Policy Objects need to be removed. Domain is specified in the format ...
- List of processes that Windows System Resource Manager will not manage. wsrmc /Get:ExclusionList /SystemList | /UserList ...
- LIST PROVIDERS Lists detailed information about all providers on the computer that are registered with VSS. Example: LIST ...
- LIST SHADOWS { ALL | SET | ID } List shadow copies. ALL All shadow copies (persistent and non-persistent). SET List shadow ...
- List the names of all existent remote event subscriptions. Usage: wecutil { es | enum-subscription } Example: List event ...
- List the names of all logs. Usage: wevtutil { el | enum-logs } Example: The following example lists the names of all logs. ...
- LIST WRITERS METADATA | DETAILED | STATUS List detailed information about all writers on the computer. METADATA Same as LIST ...
- Listener port mapping property of the Hyper-V Replica broker for network listeners on the Replica cluster is not valid. Changes ...
- Lists all files under the specified namespace. A number of useful file system properties are included for each file. The ...
- Lists all folders where a property is explicitly assigned to the folder. Use this report to evaluate the different folders ...
- Lists cross-domain move proxy objects. When an object is moved from one domain to another, a marker remains in the original ...
- Lists file screening audit events on the server for a specified period. Use this report to identify users or applications ...
- Lists files by file group. Use this report to observe file group usage patterns and to quickly identify file groups that ...
- Lists files by the value of a property. Use this report to understand usage patterns on the server and to quickly identify ...
- Lists files by the values of a particular classification property. Use this report to observe file classification usage patterns. ...
- Lists files by users who own them. Use this report to understand usage patterns on the server and to quickly identify users ...
- Lists files that appear to be duplicates (files with same name, size and last modified time). Use this report to quickly ...
- Lists files that appear to be duplicates (files with the same size and last modified time). Use this report to quickly identify ...
- Lists files that are a specified size or larger. Use this report to quickly identify the files that are consuming the most ...
- Lists files that are of a specified size or larger. Use this report to quickly identify the files that are consuming the ...
- Lists files that have been accessed most recently. Use this report to identify frequently used data that needs to be highly ...
- Lists files that have been accessed most recently. Use this report to identify frequently used data that needs to be highly ...
- Lists files that have not been accessed recently. Use this report to quickly identify stale files that can be either deleted ...
- Lists files that have not been accessed recently. Use this report to quickly identify stale files that can be either deleted ...
- Lists files that were acted on by the classification policy. Use this report to understand how files were classified by the ...
- Lists folders by the values of a particular secure classification property. Use this report to observe folder classification ...
- Lists the calendar events that are scheduled between the specified date range. wsrmc /Get:CalView /Sd: /Ed: /Sd Specifies ...
- Lists the director and actors in the current movie or show. Selecting a name displays the other movies and shows the actor ...
- Lists the folders associated with updates from sources other than Microsoft Update. These folders can be safely deleted because ...
- Lists the quotas that exceed a certain disk space usage level. Use this report to quickly identify quotas that may soon be ...
- Lists the status of all client machines that remotely log data to this machine. wsrmc /Get:AccClients /o: /y /o Saves the ...
- Lists the usage of volume resources for shadow copies. Use this report to identify inconsistencies in diff area configuration ...
- Lists tm and tx objects Usage: ktmutil tx list Lists all transactions ktmutil tx list {TmGuid} Lists transactions in a tm ...
- Live migration of the machine failed because all the LUNS on the source machine were not seen on the target for virtual HBA ...
- Live migrations of virtual machines cannot be sent to the destination host because no migration networks are specified for ...
- LLMNR name resolution is used to resolve a single-label, unqualified name. It is attempted only if DNS name resolution failed ...
- Load and unload device drivers This user right determines which users can dynamically load and unload device drivers or other ...
- Load balancing cannot be enabled because DHCP is enabled on the IPv4 properties of the external adapter. Disable DHCP, or ...
- Load balancing cannot be enabled because DHCP is enabled on the IPv4 properties of the internal adapter. Disable DHCP, or ...
- Load balancing cannot be enabled because Remote Access cannot retrieve adapter settings for the server on which you want ...
- Load balancing cannot be enabled because the dedicated IP (DIP) address %1!s! specified for load balancing is included in ...
- Load balancing cannot be enabled because the dedicated IP address (DIP) %1!s! specified for load balancing is included in ...
- Load balancing cannot be enabled because the dedicated IP address (DIP) %1!s! specified for load balancing is included in ...
- Load balancing cannot be enabled because the virtual IP (VIP) address %1!s! specified for load balancing is included in the ...
- Load balancing cannot be enabled because the virtual IP (VIP) address %1!s! specified for load balancing is included in the ...
- Load balancing cannot be enabled because the virtual IP (VIP) address %1!s! specified for load balancing is included in the ...
- Loading the 'Default - Standard' assessment goals is taking longer than expected. Goals for some assessment metrics are currently ...
- LoadMXF -s storeFilename -v -i inputFilename where: -s storeFilename - the filename of the store. If not specified, the default ...
- Local administrative pages cannot be displayed. Message Queuing may not be properly installed. Please reinstall Message Queuing ...
- Local certificate revocations lists for Online Responder Array members could not be synchronized with the Array controller. ...
- Local forest root domain: %1 Because some of the local name suffixes already exist in the specified forest (or a forest that ...
- Local Group Policy Objects are stored on the local computer. Use the Browse button to select one of the Group Policy Objects. ...
- Local security could not be started because an error occurred during initialization. The error code returned is %1. THE SYSTEM ...
- Local security could not be started because the user accounts database (NET.ACC) was missing or corrupted, and no usable ...
- Local security could not be started because the user accounts database (NET.ACC) was missing or corrupted, and no usable ...
- Local Session Key} A user session key was requested for a local RPC connection. The session key returned is a constant value ...
- LocalFirewallRules %1!s! LocalConSecRules %2!s! InboundUserNotification %3!s! RemoteManagement %4!s! UnicastResponseToMulticast ...
- Locate and install driver software (recommended) Windows will guide you through the process of installing driver software ...
- Locate the centering and sizing controls for your TV. If you do not have these controls, select Back and go to the next adjustment. ...
- Locate the RGB color balance control for your display. If your monitor has a color temperature setting, set it to 6500k, ...
- Locates security errors (or those possibly security related) and performs the initial diagnosis of the problem. Optional ...
- Location sensors can detect your computer's current location. Once a location sensor is enabled, all programs and users on ...
- Location sensors can detect your computer's current location. Once a location sensor is enabled, all programs and users on ...
- Locator record create: CustomerIpAddress: %1, ProviderIpAddress: %2, VirtualSubnetId: %3, CustomerId: %4, CustomerMacAddress: ...
- Locator record delete: CustomerIpAddress: %1, ProviderIpAddress: %2, VirtualSubnetId: %3, CustomerId: %4, CustomerMacAddress: ...
- Locator record modify: ModifyFlags: %11, CustomerIpAddress: %1, ProviderIpAddress: %2, VirtualSubnetId: %3, CustomerId: %4, ...
- Lock pages in memory This security setting determines which accounts can use a process to keep data in physical memory, which ...
- Log "{0}" could not be read to completion due to the following error. This may have occurred because the log was cleared ...
- Log expiry events, and, for user policy, only show expiry notifications when the percentage of remaining certificate lifetime ...
- Log on as a batch job This security setting allows a user to be logged on by means of a batch-queue facility and is provided ...
- Log on as a service This security setting allows a security principal to log on as a service. Services can be configured ...
- Log on locally Determines which users can log on to the computer. Important Modifying this setting may affect compatibility ...