Windows 8

  1. List of application servers that have to be added to the DirectAccess deployment. The servers are specified by their hostnames ...
  2. List of application servers that have to be deleted from the DirectAccess deployment. The servers are specified by their ...
  3. List of client security groups that are to be added to the DirectAccess deployment. Each security group is specified in DOMAIN\SG_NAME ...
  4. List of domains from which application server Group Policy Objects need to be removed. Domain is specified in the format ...
  5. List of processes that Windows System Resource Manager will not manage. wsrmc /Get:ExclusionList /SystemList | /UserList ...
  6. LIST PROVIDERS Lists detailed information about all providers on the computer that are registered with VSS. Example: LIST ...
  7. LIST SHADOWS { ALL | SET | ID } List shadow copies. ALL All shadow copies (persistent and non-persistent). SET List shadow ...
  8. List the names of all existent remote event subscriptions. Usage: wecutil { es | enum-subscription } Example: List event ...
  9. List the names of all logs. Usage: wevtutil { el | enum-logs } Example: The following example lists the names of all logs. ...
  10. LIST WRITERS METADATA | DETAILED | STATUS List detailed information about all writers on the computer. METADATA Same as LIST ...
  11. Listener port mapping property of the Hyper-V Replica broker for network listeners on the Replica cluster is not valid. Changes ...
  12. Lists all files under the specified namespace. A number of useful file system properties are included for each file. The ...
  13. Lists all folders where a property is explicitly assigned to the folder. Use this report to evaluate the different folders ...
  14. Lists cross-domain move proxy objects. When an object is moved from one domain to another, a marker remains in the original ...
  15. Lists file screening audit events on the server for a specified period. Use this report to identify users or applications ...
  16. Lists files by file group. Use this report to observe file group usage patterns and to quickly identify file groups that ...
  17. Lists files by the value of a property. Use this report to understand usage patterns on the server and to quickly identify ...
  18. Lists files by the values of a particular classification property. Use this report to observe file classification usage patterns. ...
  19. Lists files by users who own them. Use this report to understand usage patterns on the server and to quickly identify users ...
  20. Lists files that appear to be duplicates (files with same name, size and last modified time). Use this report to quickly ...
  21. Lists files that appear to be duplicates (files with the same size and last modified time). Use this report to quickly identify ...
  22. Lists files that are a specified size or larger. Use this report to quickly identify the files that are consuming the most ...
  23. Lists files that are of a specified size or larger. Use this report to quickly identify the files that are consuming the ...
  24. Lists files that have been accessed most recently. Use this report to identify frequently used data that needs to be highly ...
  25. Lists files that have been accessed most recently. Use this report to identify frequently used data that needs to be highly ...
  26. Lists files that have not been accessed recently. Use this report to quickly identify stale files that can be either deleted ...
  27. Lists files that have not been accessed recently. Use this report to quickly identify stale files that can be either deleted ...
  28. Lists files that were acted on by the classification policy. Use this report to understand how files were classified by the ...
  29. Lists folders by the values of a particular secure classification property. Use this report to observe folder classification ...
  30. Lists the calendar events that are scheduled between the specified date range. wsrmc /Get:CalView /Sd: /Ed: /Sd Specifies ...
  31. Lists the director and actors in the current movie or show. Selecting a name displays the other movies and shows the actor ...
  32. Lists the folders associated with updates from sources other than Microsoft Update. These folders can be safely deleted because ...
  33. Lists the quotas that exceed a certain disk space usage level. Use this report to quickly identify quotas that may soon be ...
  34. Lists the status of all client machines that remotely log data to this machine. wsrmc /Get:AccClients /o: /y /o Saves the ...
  35. Lists the usage of volume resources for shadow copies. Use this report to identify inconsistencies in diff area configuration ...
  36. Lists tm and tx objects Usage: ktmutil tx list Lists all transactions ktmutil tx list {TmGuid} Lists transactions in a tm ...
  37. Live migration of the machine failed because all the LUNS on the source machine were not seen on the target for virtual HBA ...
  38. Live migrations of virtual machines cannot be sent to the destination host because no migration networks are specified for ...
  39. LLMNR name resolution is used to resolve a single-label, unqualified name. It is attempted only if DNS name resolution failed ...
  40. Load and unload device drivers This user right determines which users can dynamically load and unload device drivers or other ...
  41. Load balancing cannot be enabled because DHCP is enabled on the IPv4 properties of the external adapter. Disable DHCP, or ...
  42. Load balancing cannot be enabled because DHCP is enabled on the IPv4 properties of the internal adapter. Disable DHCP, or ...
  43. Load balancing cannot be enabled because Remote Access cannot retrieve adapter settings for the server on which you want ...
  44. Load balancing cannot be enabled because the dedicated IP (DIP) address %1!s! specified for load balancing is included in ...
  45. Load balancing cannot be enabled because the dedicated IP address (DIP) %1!s! specified for load balancing is included in ...
  46. Load balancing cannot be enabled because the dedicated IP address (DIP) %1!s! specified for load balancing is included in ...
  47. Load balancing cannot be enabled because the virtual IP (VIP) address %1!s! specified for load balancing is included in the ...
  48. Load balancing cannot be enabled because the virtual IP (VIP) address %1!s! specified for load balancing is included in the ...
  49. Load balancing cannot be enabled because the virtual IP (VIP) address %1!s! specified for load balancing is included in the ...
  50. Loading the 'Default - Standard' assessment goals is taking longer than expected. Goals for some assessment metrics are currently ...
  51. LoadMXF -s storeFilename -v -i inputFilename where: -s storeFilename - the filename of the store. If not specified, the default ...
  52. Local administrative pages cannot be displayed. Message Queuing may not be properly installed. Please reinstall Message Queuing ...
  53. Local certificate revocations lists for Online Responder Array members could not be synchronized with the Array controller. ...
  54. Local forest root domain: %1 Because some of the local name suffixes already exist in the specified forest (or a forest that ...
  55. Local Group Policy Objects are stored on the local computer. Use the Browse button to select one of the Group Policy Objects. ...
  56. Local security could not be started because an error occurred during initialization. The error code returned is %1. THE SYSTEM ...
  57. Local security could not be started because the user accounts database (NET.ACC) was missing or corrupted, and no usable ...
  58. Local security could not be started because the user accounts database (NET.ACC) was missing or corrupted, and no usable ...
  59. Local Session Key} A user session key was requested for a local RPC connection. The session key returned is a constant value ...
  60. LocalFirewallRules %1!s! LocalConSecRules %2!s! InboundUserNotification %3!s! RemoteManagement %4!s! UnicastResponseToMulticast ...
  61. Locate and install driver software (recommended) Windows will guide you through the process of installing driver software ...
  62. Locate the centering and sizing controls for your TV. If you do not have these controls, select Back and go to the next adjustment. ...
  63. Locate the RGB color balance control for your display. If your monitor has a color temperature setting, set it to 6500k, ...
  64. Locates security errors (or those possibly security related) and performs the initial diagnosis of the problem. Optional ...
  65. Location sensors can detect your computer's current location. Once a location sensor is enabled, all programs and users on ...
  66. Location sensors can detect your computer's current location. Once a location sensor is enabled, all programs and users on ...
  67. Locator record create: CustomerIpAddress: %1, ProviderIpAddress: %2, VirtualSubnetId: %3, CustomerId: %4, CustomerMacAddress: ...
  68. Locator record delete: CustomerIpAddress: %1, ProviderIpAddress: %2, VirtualSubnetId: %3, CustomerId: %4, CustomerMacAddress: ...
  69. Locator record modify: ModifyFlags: %11, CustomerIpAddress: %1, ProviderIpAddress: %2, VirtualSubnetId: %3, CustomerId: %4, ...
  70. Lock pages in memory This security setting determines which accounts can use a process to keep data in physical memory, which ...
  71. Log "{0}" could not be read to completion due to the following error. This may have occurred because the log was cleared ...
  72. Log expiry events, and, for user policy, only show expiry notifications when the percentage of remaining certificate lifetime ...
  73. Log on as a batch job This security setting allows a user to be logged on by means of a batch-queue facility and is provided ...
  74. Log on as a service This security setting allows a security principal to log on as a service. Services can be configured ...
  75. Log on locally Determines which users can log on to the computer. Important Modifying this setting may affect compatibility ...