Windows 10

  1. This machine is configured to retrieve Group Policy files from a file share in an insecure way. UNC Path: %1 Mutual Authentication ...
  2. This machine is not connected to the Fax Printer on the selected Fax Server. Connecting to the Fax Printer on the Fax Server ...
  3. This may be a transient error. Try running dcdiag again in a few minutes. If the error persists, there might be a problem ...
  4. This may be the result of user credentials being required on the remote machine. See Enable-WSManCredSSP Cmdlet help on how ...
  5. This media can't be formatted with the Live File System. The media might be incompatible or your drive might not work with ...
  6. This method invokes the chkdsk operation on the disk. The method is applicable to only those instances of logical disk that ...
  7. This method invokes the chkdsk operation on the volume. The method is applicable to only those volume instances that represent ...
  8. This method is used exclude disks from the chkdsk operation to be run at the next reboot. If not excluded, chkdsk is performed ...
  9. This method is used schedule chkdsk to be run at the next reboot if the dirty bit has been set. The method is applicable ...
  10. This method is used schedule chkdsk to be run at the next reboot if the dirty bit has been set.The method is applicable to ...
  11. This method is used to add a mount point directory for the volume. The result of this method is the creation of a Win32_MountPoint ...
  12. This method is used to change the order of boot sources for the persistent boot configuration specified by the property ...
  13. This method is used to exclude volumes from the chkdsk operation to be run at the next reboot. If not excluded, chkdsk is ...
  14. This method resets the values of the thresholds to hardware defaults. This method returns 0 if successful, 1 if unsupported ...
  15. This method returns the USBDevice Descriptor as specified by the input parameters. Each parameter is briefly described here ...
  16. This method will advertise an associated Win32_Product using the installation package provided through PackageLocation and ...
  17. This method will configure the associated instance of Win32_Product to the specified install state and level. The method ...
  18. This method will configure the associated instance of Win32_SoftwareFeature to the specified install state. The method can ...
  19. This method Will install an associated Win32_Product using the installation package provided through PackageLocation and ...
  20. This method will preform an administrative install of an associated Win32_Product using the installation package provided ...
  21. This method will reinstall the associated instance of Win32_Product using the specified reinstallation mode. The method can ...
  22. This method will reinstall the associated instance of Win32_SoftwareFeature using the specified reinstallation mode. The ...
  23. This method will uninstall the associated instance of Win32_Product. The method can return the following values: 0 - Success. ...
  24. This method will upgrade the associated Win32_Product using the upgrade package provided through PackageLocation and any ...
  25. This might take a few hours, but will make it harder for someone to recover your removed files. Use this if you're recycling ...
  26. This mirror cannot be removed because the mirrored volume is currently missing or regenerating. Retry this operation when ...
  27. This modified version of the kernel32!CreateFile* APIs prevents an application from using the FILE_FLAG_NO_BUFFERING flag ...
  28. This modified version of the kernel32!CreateFile* APIs prevents an application from using the FILE_FLAG_OVERLAPPED flag if ...
  29. This name suffix conflicts with name suffix in remote forest. Click Refresh button and try to edit the name suffix again. ...
  30. This name suffix is defined as a user principal name (UPN) suffix in the local forest: %1. Therefore, Windows routes all ...
  31. This name suffix is enabled for routing to the forest: %1. Therefore, Windows routes all authentication requests that use ...
  32. This NC (%1) is supposed to be replicated to this server, but has not been replicated yet. This could be because the replica ...
  33. This node contains registry settings that do not correspond to an Administrative Template policy. For example, they did not ...
  34. This note contains changes on pages that didn't load successfully. Rename the note to save these changes without affecting ...
  35. This object contains the data identifying either the initial load device (its key) or the boot service that requested the ...
  36. This object contains the data needed to find either the initial load device (its key) or the boot service to request the ...
  37. This object is not allowed to change its grandparent container. Moves are not forbidden on this object, but are restricted ...
  38. This object may not be moved across domain boundaries either because cross-domain moves for this class are disallowed, or ...
  39. This object uses a property definition that is deprecated. You must change it to use a non-deprecated property definition. ...
  40. This occurs if the current state of the virtual machine does not support shut down. For example, integration services might ...
  41. This operating system uses the Physical Address Extension feature to support systems with more than 4 GB of RAM. You'll need ...
  42. This operation cannot be performed because one or more of the selected objects have active property sheets. Close the active ...
  43. This operation cannot be performed because the snap-in is connected to a Domain Controller that is not running Windows Server ...
  44. This operation cannot be performed on a default instance of ImmutableArray . Consider initializing the array, or checking ...
  45. This operation completed, but no trust anchors were added because all of the trust anchors received were either invalid, ...
  46. This operation could not be completed because the DNS server has been configured with DNSSEC features disabled. Enable DNSSEC ...
  47. This operation could not be completed because the DNS server listed as the current key master for this zone is down or misconfigured. ...
  48. This operation has been cancelled due to restrictions in effect on this computer. Please contact your system administrator. ...
  49. This operation is disallowed as it could result in an administration account being disabled, deleted or unable to logon. ...
  50. This operation is not allowed on an invalid disk. The disk may be invalid because it is corrupted or failing, or it may be ...
  51. This operation is not allowed on the current boot, system or pagefile volume. It is also not allowed on any volume on a basic ...
  52. This operation is not supported on a clustered virtual machine. To perform this operation, remove the virtual machine from ...
  53. This operation may take a long time and will affect all users. Do you want to start the move now, or wait until the next ...
  54. This operation measures the memory performance of system memory by copying data from one memory buffer to another. SSE or ...
  55. This operation measures the performance of the system by decoding a file containing video and audio streams. The process ...
  56. This operation measures the performance of the system by decoding and/or encoding a file containing video and audio streams. ...
  57. This operation provides metrics on disk performance via a profiling mechanism. Sequential Read/Write and Random Read/Write ...
  58. This operation ran for too long and was canceled automatically. You can find detailed technical information in the Windows ...
  59. This operation will add all the computer security principals from the Auth2 list of the RODC to the Allow list. Do you wish ...
  60. This operation will add all the security principals from the Auth2 list of the RODC to the Allow list. Do you wish to continue? ...
  61. This operation will add all user security principals from the Auth2 list of the RODC to the Allow list. Do you wish to continue? ...
  62. This operation will delete your index (including custom index locations and excluded locations) and completely re-build the ...
  63. This operation will immediately rebuild the index. Depending upon how many files you have, it can take as long as several ...
  64. This operation will make the volume available for use but the data on it may be corrupted or stale. If you have another disk ...
  65. This operation will move all the computer security principals from the Auth2 list of the RODC to the Allow list. Do you wish ...
  66. This operation will move all the security principals from the Auth2 list of the RODC to the Allow list. Do you wish to continue? ...
  67. This operation will move all user security principals from the Auth2 list of the RODC to the Allow list. Do you wish to continue? ...
  68. This option allows authenticated but unencrypted network packets to be sent while encryption is being negotiated. Compatible ...
  69. This option allows the computer to be trusted for delegation. Trusting the computer for delegation is a security-sensitive ...
  70. This option allows you to move the virtual machine without moving its virtual hard disks. The virtual machine's virtual hard ...
  71. This option allows you to specify locations to move the virtual hard disks and automatically move the other virtual machine ...
  72. This option automatically creates a new instance of AD LDS that uses the default configuration and schema partitions. The ...
  73. This option compacts the file size of a virtual hard disk. The storage capacity of the virtual hard disk remains the same. ...
  74. This option converts a virtual hard disk by copying the contents to a new virtual hard disk. The new virtual hard disk can ...
  75. This option creates a new instance of AD LDS that uses the configuration and schema partitions replicated from another instance ...