Windows Server 2008

  1. Description: Used to retrieve information from the specified WDS server. Syntax: WDSUTIL Options /Get-Server /Server: /Show:{Config ...
  2. Description: Used to retrieve information from the specified WDS Transport server. Syntax: WDSUTIL Options /Get-TransportServer ...
  3. Description: Used to retrieve information/properties from all WDS Servers in the organization. Note: A large number of WDS ...
  4. Description: Used to retrieve properties or data from servers, images, image groups, and devices. Syntax: WDSUTIL /Get- Where ...
  5. Description: Used to retrieve WDS-specific information about a pre-staged device. Syntax: WDSUTIL Options /Get-Device {/Device: ...
  6. Description: Used to return a server to its original state. This operation generally undoes actions that were performed during ...
  7. Description: Used to revert changes made to the server by running initial server configuration. This includes changes made ...
  8. Description: Used to set configuration parameters for the WDS Transport Server Syntax: WDSUTIL Options /Set-TransportServer ...
  9. Description: Used to set server, image, image group, and device configuration. Syntax: WDSUTIL /Set- Where object is one ...
  10. Description: Used to start a previously created ScheduledCast multicast transmission for a WDS image. This is not allowed ...
  11. Description: Used to start a previously created ScheduledCast namespace. This is not allowed for a previously created AutoCast ...
  12. Description: Used to start a WDS server. Syntax: WDSUTIL /Start- Where object is one of the following: Server TransportServer ...
  13. Description: Used to start all WDS services. Syntax: WDSUTIL Options /Start-Server /Server: /Server: The name of the WDS ...
  14. Description: Used to start all WDS Transport services. Syntax: WDSUTIL Options /Start-TransportServer /Server: /Server: The ...
  15. Description: Used to stop a WDS server. Syntax: WDSUTIL /Stop- Where object is one of the following: Server TransportServer ...
  16. Description: Used to stop all WDS services. Syntax: WDSUTIL Options /Stop-Server /Server: /Server: The name of the WDS Server. ...
  17. Description: Used to stop all WDS Transport services. Syntax: WDSUTIL Options /Stop-TransportServer /Server: /Server: The ...
  18. Description: Used to update a server resource from a known good source. Syntax: WDSUTIL /Update- Where object is one of the ...
  19. Description: Used to update files on the REMINST share using the latest files stored in the server's %Windir%\System32\RemInst ...
  20. DESCRIPTION: ViewDfsDirs lists all existing DFS reparse directories in a volume. Those directories can also be deleted using ...
  21. DESCRIPTION: ViewDfsPath can be used to resolve a DfsPath to a destination UNC path. The DfsPath can be a domain based/standalone ...
  22. DESCRIPTION: When PreferLogonDc registry key is set, the logon server will be put on the top of the referral list. %1!ws! ...
  23. DESCRIPTION: When set to 0 (the default), SYSVOL and NETLOGON referrals contain domain controllers in the clientÆs site listed ...
  24. Designate the port and address to which packets should be sent when they arrive on a special port on this interface's address ...
  25. Designation of the country/region for which the rack is designed. Country/region code strings are as defined by ISO/IEC 3166. ...
  26. DesiredSpeed is the currently requested fan speed, defined in revolutions per minute, when a variable speed fan is supported ...
  27. Desktop Experience includes features of Windows Vista, such as Windows Media Player, desktop themes, and photo management. ...
  28. Destination %2]: The path specified is not accessible. This path might need to be accessible during import/copy tasks. Details: ...
  29. Destination : %1!s! Next Hop Address : %2!s! Source : %3!s! Interface : %4!s! Path MTU : %5!u! Upper-layer MTU : %6!u! RTT ...
  30. Destination domain on Server For NIS is different from the previous one for this Unix NIS domain. Map name = '%1'. source ...
  31. Destination of the rejected call: Application Id: %s CLSID: %s IID: %s Method #: %ld Class: %s Interface: %s Method: %s Caller ...
  32. Destination Prefix: %1!s! Source Prefix: %2!s! Interface Index: %3!u! Gateway/Interface Name: %4!s! Publish: %5!s! Type: ...
  33. Destination Unreachable error messages are sent from any node that a packet traverses which is unable to forward the packet ...
  34. Destination Unreachable Fragmentation Needed error messages are sent from any node that a packet traverses which is unable ...
  35. Destroying the cluster was not completely successful and may require additional manual actions to complete. To view details, ...
  36. detach - Detaches a Filter Instance from the specified Volume %1 detach filterName volumeName instanceName The filterName ...
  37. Detailed data is not available for these settings because the Winning GPO containing settings for Security Zones was configured ...
  38. Detailed data is not available for these settings because the Winning GPO containing settings for Security Zones was configured ...
  39. Details present the access point, protocol supported, and a brief description of the binding. The binding key is unique and ...
  40. Details present the interface tModel name, which links to a description of that tModel. The UUID is unique and is intended ...
  41. Details present the name and a brief description of this resource. The use type specifies the type of support this contact ...
  42. Details present the name, owner, and a brief description of this provider. The provider key is unique and is intended for ...
  43. Details present the name, owner, and a brief description of this tModel. The tModel key is unique and is intended for use ...
  44. Details provide the service name and a brief description. The service key is unique and is intended for use in programmatic ...
  45. Detected one or more applications which are missing from the client's list of managed applications. A full policy refresh ...
  46. Detected user assigned application %1!s! from policy %2!s! that was uninstalled on another machine. This uninstall will be ...
  47. Detection of product '%1', feature '%2', component '%3' failed. The resource '%4' in a run-from-source component could not ...
  48. Detects other Infrared devices that are in range and launches the file transfer application. Stopping the service will prevent ...
  49. Determine when a new key is generated. If both options are selected, a new key is generated when the first threshold is reached. ...
  50. Determines the behavior of the software when the GPO for the application goes out of scope: 1 = uninstall the software, 2 ...
  51. Determines whether the queries expressed in Rules apply to this machine. Returns S_OK (0) if all queries expressed in rules ...
  52. Developers can use Windows Workflow Foundation (WF) to describe business processes and human or system workflows with a simple, ...
  53. Device %1 is not correctly processing some write requests. In Device Manager, ensure that the Write Cache option is disabled ...
  54. Device : %1!s! (%2!s!) Condition : %3!s! Line bps : %4!-12d! Duration : %5!d! Days, %6!d! Hrs, %7!d! Mins Bytes In : %8!-12d! ...
  55. DEVICE ADDITIONAL OPTIONS The following types apply to device additional options entries. For information about data formats ...
  56. DEVICE ADDITIONAL OPTIONS The following types apply to device additional options entries. For information about data formats ...
  57. Device Configuration could not be completed succesfully. Please check the device PIN, ensure all cables are connected properly ...
  58. Device Configuration could not be completed successfully. Please check the device PIN, ensure the device is powered on and ...
  59. Device Configuration could not be completed successfully. Please ensure that no other Vista PCs are configuring the device ...
  60. Device Configuration could not be completed. Please reset the device and try setup again. If the problem persists, contact ...
  61. Devices are normally disabled if they are not working properly or causing a resource conflict. You cannot use a device when ...
  62. Devices policy allows an administrator to configure hardware devices, including the ability to emable or disable hardware. ...
  63. Devices: Allow undock without having to log on This security setting determines whether a portable computer can be undocked ...
  64. Devices: Allowed to format and eject removable media This security setting determines who is allowed to format and eject ...
  65. Devices: Prevent users from installing printer drivers For a computer to print to a network printer, the driver for that ...
  66. Devices: Restrict CD-ROM access to locally logged-on user only This security setting determines whether a CD-ROM is accessible ...
  67. Devices: Restrict floppy access to locally logged-on user only This security setting determines whether removable floppy ...
  68. Devices: Unsigned driver installation behavior This security setting determines what happens when an attempt is made to install ...
  69. DFS could not access its private data from the Active Directory. Please manually check network connectivity, security access, ...
  70. DFS has recovered from an error and is able to read its private data from the Active Directory. Root %1 is now able to read ...
  71. DFS is requesting the client for a larger buffer for trusted domain information. Some Win98 clients may not be able to access ...
  72. DFS link %1 was marked incorrectly as a DFS root. The DFS namespace is operational on this server. If this namespace is hosted ...
  73. DFS metadata object %1 is empty in the metadata for DFS root %2. The DFS namespace is operational on this server. If this ...
  74. DFS Namespace aggregates the files from multiple file servers into a single, global namespace for users.Enabling this role ...
  75. DFS Namespaces enables you to group shared folders located on different servers into one or more logically structured namespaces. ...