Windows 10
- This machine is configured to retrieve Group Policy files from a file share in an insecure way. UNC Path: %1 Mutual Authentication ...
- This machine is not connected to the Fax Printer on the selected Fax Server. Connecting to the Fax Printer on the Fax Server ...
- This may be a transient error. Try running dcdiag again in a few minutes. If the error persists, there might be a problem ...
- This may be the result of user credentials being required on the remote machine. See Enable-WSManCredSSP Cmdlet help on how ...
- This media can't be formatted with the Live File System. The media might be incompatible or your drive might not work with ...
- This method invokes the chkdsk operation on the disk. The method is applicable to only those instances of logical disk that ...
- This method invokes the chkdsk operation on the volume. The method is applicable to only those volume instances that represent ...
- This method is used exclude disks from the chkdsk operation to be run at the next reboot. If not excluded, chkdsk is performed ...
- This method is used schedule chkdsk to be run at the next reboot if the dirty bit has been set. The method is applicable ...
- This method is used schedule chkdsk to be run at the next reboot if the dirty bit has been set.The method is applicable to ...
- This method is used to add a mount point directory for the volume. The result of this method is the creation of a Win32_MountPoint ...
- This method is used to change the order of boot sources for the persistent boot configuration specified by the property ...
- This method is used to exclude volumes from the chkdsk operation to be run at the next reboot. If not excluded, chkdsk is ...
- This method resets the values of the thresholds to hardware defaults. This method returns 0 if successful, 1 if unsupported ...
- This method returns the USBDevice Descriptor as specified by the input parameters. Each parameter is briefly described here ...
- This method will advertise an associated Win32_Product using the installation package provided through PackageLocation and ...
- This method will configure the associated instance of Win32_Product to the specified install state and level. The method ...
- This method will configure the associated instance of Win32_SoftwareFeature to the specified install state. The method can ...
- This method Will install an associated Win32_Product using the installation package provided through PackageLocation and ...
- This method will preform an administrative install of an associated Win32_Product using the installation package provided ...
- This method will reinstall the associated instance of Win32_Product using the specified reinstallation mode. The method can ...
- This method will reinstall the associated instance of Win32_SoftwareFeature using the specified reinstallation mode. The ...
- This method will uninstall the associated instance of Win32_Product. The method can return the following values: 0 - Success. ...
- This method will upgrade the associated Win32_Product using the upgrade package provided through PackageLocation and any ...
- This might take a few hours, but will make it harder for someone to recover your removed files. Use this if you're recycling ...
- This mirror cannot be removed because the mirrored volume is currently missing or regenerating. Retry this operation when ...
- This modified version of the kernel32!CreateFile* APIs prevents an application from using the FILE_FLAG_NO_BUFFERING flag ...
- This modified version of the kernel32!CreateFile* APIs prevents an application from using the FILE_FLAG_OVERLAPPED flag if ...
- This name suffix conflicts with name suffix in remote forest. Click Refresh button and try to edit the name suffix again. ...
- This name suffix is defined as a user principal name (UPN) suffix in the local forest: %1. Therefore, Windows routes all ...
- This name suffix is enabled for routing to the forest: %1. Therefore, Windows routes all authentication requests that use ...
- This NC (%1) is supposed to be replicated to this server, but has not been replicated yet. This could be because the replica ...
- This node contains registry settings that do not correspond to an Administrative Template policy. For example, they did not ...
- This note contains changes on pages that didn't load successfully. Rename the note to save these changes without affecting ...
- This object contains the data identifying either the initial load device (its key) or the boot service that requested the ...
- This object contains the data needed to find either the initial load device (its key) or the boot service to request the ...
- This object is not allowed to change its grandparent container. Moves are not forbidden on this object, but are restricted ...
- This object may not be moved across domain boundaries either because cross-domain moves for this class are disallowed, or ...
- This object uses a property definition that is deprecated. You must change it to use a non-deprecated property definition. ...
- This occurs if the current state of the virtual machine does not support shut down. For example, integration services might ...
- This operating system uses the Physical Address Extension feature to support systems with more than 4 GB of RAM. You'll need ...
- This operation cannot be performed because one or more of the selected objects have active property sheets. Close the active ...
- This operation cannot be performed because the snap-in is connected to a Domain Controller that is not running Windows Server ...
- This operation cannot be performed on a default instance of ImmutableArray . Consider initializing the array, or checking ...
- This operation completed, but no trust anchors were added because all of the trust anchors received were either invalid, ...
- This operation could not be completed because the DNS server has been configured with DNSSEC features disabled. Enable DNSSEC ...
- This operation could not be completed because the DNS server listed as the current key master for this zone is down or misconfigured. ...
- This operation has been cancelled due to restrictions in effect on this computer. Please contact your system administrator. ...
- This operation is disallowed as it could result in an administration account being disabled, deleted or unable to logon. ...
- This operation is not allowed on an invalid disk. The disk may be invalid because it is corrupted or failing, or it may be ...
- This operation is not allowed on the current boot, system or pagefile volume. It is also not allowed on any volume on a basic ...
- This operation is not supported on a clustered virtual machine. To perform this operation, remove the virtual machine from ...
- This operation may take a long time and will affect all users. Do you want to start the move now, or wait until the next ...
- This operation measures the memory performance of system memory by copying data from one memory buffer to another. SSE or ...
- This operation measures the performance of the system by decoding a file containing video and audio streams. The process ...
- This operation measures the performance of the system by decoding and/or encoding a file containing video and audio streams. ...
- This operation provides metrics on disk performance via a profiling mechanism. Sequential Read/Write and Random Read/Write ...
- This operation ran for too long and was canceled automatically. You can find detailed technical information in the Windows ...
- This operation will add all the computer security principals from the Auth2 list of the RODC to the Allow list. Do you wish ...
- This operation will add all the security principals from the Auth2 list of the RODC to the Allow list. Do you wish to continue? ...
- This operation will add all user security principals from the Auth2 list of the RODC to the Allow list. Do you wish to continue? ...
- This operation will delete your index (including custom index locations and excluded locations) and completely re-build the ...
- This operation will immediately rebuild the index. Depending upon how many files you have, it can take as long as several ...
- This operation will make the volume available for use but the data on it may be corrupted or stale. If you have another disk ...
- This operation will move all the computer security principals from the Auth2 list of the RODC to the Allow list. Do you wish ...
- This operation will move all the security principals from the Auth2 list of the RODC to the Allow list. Do you wish to continue? ...
- This operation will move all user security principals from the Auth2 list of the RODC to the Allow list. Do you wish to continue? ...
- This option allows authenticated but unencrypted network packets to be sent while encryption is being negotiated. Compatible ...
- This option allows the computer to be trusted for delegation. Trusting the computer for delegation is a security-sensitive ...
- This option allows you to move the virtual machine without moving its virtual hard disks. The virtual machine's virtual hard ...
- This option allows you to specify locations to move the virtual hard disks and automatically move the other virtual machine ...
- This option automatically creates a new instance of AD LDS that uses the default configuration and schema partitions. The ...
- This option compacts the file size of a virtual hard disk. The storage capacity of the virtual hard disk remains the same. ...
- This option converts a virtual hard disk by copying the contents to a new virtual hard disk. The new virtual hard disk can ...
- This option creates a new instance of AD LDS that uses the configuration and schema partitions replicated from another instance ...