Windows 10

  1. Data Execution Prevention helps protect against damage from viruses or other threats. Some programs might not run correctly ...
  2. Data Flush Pages/sec is the number of pages the file system cache has flushed to disk as a result of a request to flush or ...
  3. Data Flushes/sec is the rate at which the file system cache has flushed its contents to disk as the result of a request to ...
  4. Data from %3 is not available from Domain Controller %2 because: %1Try again later, or choose another DC by selecting Connect ...
  5. Data is striped across physical disks, creating two or three copies of your data. This increases reliability, but reduces ...
  6. Data is striped across physical disks, maximizing capacity and increasing throughput, but decreasing reliability. This storage ...
  7. Data loss may occur if you continue. If you have used the virtual machine since creating the last checkpoint and want to ...
  8. Data loss may occur if you continue. If you have used the virtual machine since creating the last snapshot and want to retain ...
  9. Data Map Hits is the percentage of data maps in the file system cache that could be resolved without having to retrieve a ...
  10. Data Map Pins/sec is the frequency of data maps in the file system cache that resulted in pinning a page in main memory, ...
  11. Data Maps/sec is the frequency that a file system such as NTFS, maps a page of a file into the file system cache to read ...
  12. Data sent over the Internet that fails to reach this computer due to an error will be discarded and acknowledged with a "destination ...
  13. Data sent to this computer can be acknowledged with a confirmation message indicating the time that the data was received. ...
  14. Data that is backed up on a network location might be accessible by other people on the network. You should only save your ...
  15. Data transfer is only possible when the computers involved use the same security methods. Multiple security methods increase ...
  16. Data width of the physical memory, in bits. A data width of 0 and a total width of 8 would indicate that the memory is solely ...
  17. Datagram Bytes Received/sec is the rate at which datagram bytes are received by the computer. A datagram is a connectionless ...
  18. Datagram Bytes Sent/sec is the rate at which datagram bytes are sent from the computer. A datagram is a connectionless packet ...
  19. Datagram Bytes/sec is the rate at which datagram bytes are processed by the computer. This counter is the sum of datagram ...
  20. Datagrams Forwarded/sec is the rate, in incidents per second, at which attemps were made to find routes to forward input ...
  21. Datagrams Outbound Discarded is the number of output IP datagrams that were discarded even though no problems were encountered ...
  22. Datagrams Outbound No Route is the number of IP datagrams that were discarded because no route could be found to transmit ...
  23. Datagrams Received Address Errors is the number of input datagrams that were discarded because the IP address in their IP ...
  24. Datagrams Received Delivered/sec is the rate, in incidents per second, at which input datagrams were successfully delivered ...
  25. Datagrams Received Discarded is the number of input IP datagrams that were discarded even though problems prevented their ...
  26. Datagrams Received Errors is the number of received UDP datagrams that could not be delivered for reasons other than the ...
  27. Datagrams Received Header Errors is the number of input datagrams that were discarded due to errors in the IP headers, including ...
  28. Datagrams Received Unknown Protocol is the number of locally-addressed datagrams that were successfully received but were ...
  29. Datagrams Received/sec is the rate at which datagrams are received by the computer. A datagram is a connectionless packet ...
  30. Datagrams Received/sec is the rate, in incidents per second, at which IP datagrams are received from the interfaces, including ...
  31. Datagrams Sent/sec is the rate at which datagrams are sent from the computer. A datagram is a connectionless packet whose ...
  32. Datagrams Sent/sec is the rate, in incidents per second, at which IP datagrams were supplied for transmission by local IP ...
  33. Datagrams/sec is the rate at which datagrams are processed by the computer. This counter displays the sum of datagrams sent ...
  34. Datagrams/sec is the rate, in incidents per second, at which IP datagrams were received from or sent to the interfaces, including ...
  35. DataPackage does not contain the specified format. Verify its presence using DataPackageView.Contains or DataPackageView.AvailableFormats. ...
  36. DataProviderRequest.SetData() cannot be called after DataProviderHandler delegate returned without acquiring deferral object. ...
  37. Dcdiag could not locate %1 in the dcdiag's cache of servers. Try running this dcdiag test against this server, to avoid any ...
  38. Dcdiag detected that the DNS database contains the following zones: %1, %2, %3, and %4 Dcdiag also detected that the following ...
  39. DcInfo: DomainControllerName: %1!s! DomainControllerAddress: %2!s! DomainControllerAddressType: 3!x! DomainGuid: %4!s! DomainName: ...
  40. DCOM: Machine Access Restrictions in Security Descriptor Definition Language (SDDL) syntax This policy setting determines ...
  41. DCOM: Machine Launch Restrictions in Security Descriptor Definition Language (SDDL) syntax This policy setting determines ...
  42. Debug options: -d debug -t trace Stress options: The -T option doesn't do any file reads, but opens/closes the file and keeps ...
  43. Debug programs This user right determines which users can attach a debugger to any process or to the kernel. Developers who ...
  44. Decrypt call failed. Client Name: %2 Client Address: %4 Session ID: %7 Status: %6 (%5) Guidance: This event commonly occurs ...
  45. Decryption of %1!s! by BitLocker Drive Encryption is paused at %2!s!% complete. Click for more information and to resume ...
  46. Default actions for threats upon which default action should not be taken when detected. The actions need to be in the same ...
  47. Default gateway is set on %1 (%2 Family: %3 GatewayIP: %5 GatewayMAC: %7 KnownProxyless: %8 KnownHotspot: %9 KnownOppInternet: ...
  48. Default inproc handler. May be optionally provided only for Context = LocalServer or LocalServer32. A non-numeric value is ...
  49. default load base address, as listed in the NT image header; if the requested address is unavailable the image will be loaded ...
  50. Default streams : %1!s! Allocated : %2!s! Total allocated : %3!s! bytes. Named streams : %4!s! Allocated : %5!s! Total allocated ...
  51. Defender is no longer protecting your PC. To make sure your PC is protected, please see our end-of-support guidance for operating ...
  52. Defender is no longer supported and your PC is at risk. To make sure your PC is protected, please see our end-of-support ...
  53. Defer to user' setting can only be used in a firewall rule where program path and TCP/UDP protocol are specified with no ...
  54. Define the order of sources for downloading definition updates This setting allows you to define the order in which different ...
  55. Define the order of sources for downloading definition updates. This setting allows you to define the order in which different ...
  56. Defines constant string values that are used to increase recognition accuracy by providing contextual information to the ...
  57. Defines the DNS servers to which a computer sends queries when it attempts to resolve names. This policy setting supersedes ...
  58. Defines the file shares for downloading definition updates. setting allows you to configure UNC file share sources for downloading ...
  59. Defines the number of days after which a catch-up signature is warranted. Works with SignatureUpdateLastChecked. 0 = no catch-up, ...
  60. Defines the number of days after which a catch-up signature is warranted. Works with SignatureUpdateLastChecked. 0 = no catch-up; ...
  61. Defines the semantics of corresponding entries in the ActivityQualifiers array. An example of each of these 'formats' and ...
  62. Defines the set of Internet Control Message Protocol (ICMP) message types that Windows Firewall allows. Utilities can use ...
  63. Defines values that specify the collection mode settings for drawn ink - whether ink collection is disabled, whether ink ...
  64. Defines whether this is for instruction caching (value=3), data caching (value=4) or both (value=5, \"Unified\"). Also, \"Other\" ...
  65. Defines whether this is the primary (value=3), secondary (value=4) or tertiary (value=5) cache. Also, \"Other\" (1), \"Unknown\" ...
  66. Defines whether this is write-back (value=3) or write-through (value=4) Cache, or whether this information \"Varies with ...
  67. Defining a 'localhost' node in the configuration '{0}' is not allowed since the configuration already contains one or more ...
  68. Defining node '{0}' inside the current node '{1}' is not allowed since node definitions cannot be nested. Please move the ...
  69. Definitions can't be updated while another installation is in progress or while the system is waiting for a required restart. ...
  70. Delay Time: %1 milliseconds for the OFFER message sent by Secondary Servers is Updated on Scope: %2 for IPv4 by %4. The previous ...
  71. Delayed environment variable expansion is NOT enabled by default. You can enable or disable delayed environment variable ...
  72. Delayed Write Failed} Windows was unable to save all the data for the file %2. The data has been lost. This error may be ...
  73. Delayed Write Failed} Windows was unable to save all the data for the file %2; the data has been lost. This error may be ...
  74. Delayed Write Failed} Windows was unable to save all the data for the file %2; the data has been lost. This error may be ...
  75. Delayed Write Failed} Windows was unable to save all the data for the file %2; the data has been lost. This error was returned ...