Windows 10

  1. A certificate found in the local Active Directory Lightweight Directory Services claims to be from a domain controller with ...
  2. A certificate presented to Active Directory Domain Services claims to be from a directory service with the following computer ...
  3. A certificate presented to Active Directory Lightweight Directory Services claims to be from a directory service with the ...
  4. A Certificate Services template was updated. %1 v%2 (Schema V%3) %4 %5 Template Change Information: Old Template Content: ...
  5. A certificate stored by this extension is not valid. Use the Group Policy Management Editor to reconfigure the settings in ...
  6. A certificate template is a set of predefined properties for certificates issued to computers. Select a template from the ...
  7. A certificate trust list (CTL) is a signed list of root certification authority (CA) certificates that have been judged reputable ...
  8. A certificate trust list used to create certificate trust chain did not have a valid signature (CERT_TRUST_CTL_IS_NOT_SIGNATURE_VALID) ...
  9. A certificate trust list used to create certificate trust chain is not valid for this usage (CERT_TRUST_CTL_IS_NOT_VALID_FOR_USAGE) ...
  10. A certificate was found but it is not within its validity period. Please try another smart card or contact your administrator. ...
  11. A certificate, which is issued by a certification authority, is a confirmation of your identity and contains information ...
  12. A certification authority could not be contacted for authentication. If you are using a Remote Desktop Gateway with a smart ...
  13. A change has been made to IPSec settings. A Connection Security Rule was added. Profile changed: %1 Added Connection Security ...
  14. A change has been made to IPSec settings. A Connection Security Rule was deleted. Profile changed: %1 Deleted Connection ...
  15. A change has been made to IPSec settings. A Connection Security Rule was modified. Profile changed: %1 Modified Connection ...
  16. A change has been made to IPSec settings. A Crypto Set was deleted. Profile changed: %1 Deleted Crypto Set: Id: %2 Name: ...
  17. A change has been made to IPSec settings. A Crypto Set was modified. Profile changed: %1 Modified Crypto Set: Id: %2 Name: ...
  18. A change has been made to IPSec settings. An Authentication Set was added. Profile changed: %1 Added Authentication Set: ...
  19. A change has been made to IPSec settings. An Authentication Set was deleted. Profile changed: %1 Deleted Authentication Set: ...
  20. A change has been made to IPSec settings. An Authentication Set was modified. Profile changed: %1 Modified Authentication ...
  21. A change has been made to the system that requires that you restart the computer. Do you want to restart the computer now? ...
  22. A change has been made to Windows Firewall exception list. A rule was added. Profile changed: %1 Added Rule: Rule Id: %2 ...
  23. A change has been made to Windows Firewall exception list. A rule was deleted. Profile changed: %1 Deleted Rule: Rule Id: ...
  24. A change has been made to Windows Firewall exception list. A rule was modified. Profile changed: %1 Modified Rule: Rule Id: ...
  25. A change was made to IPsec settings. A connection security rule was added. Profile Changed: %1 Added Connection Security ...
  26. A change was made to IPsec settings. A connection security rule was deleted. Profile Changed: %1 Deleted Connection Security ...
  27. A change was made to IPsec settings. A connection security rule was modified. Profile Changed: %1 Modified Connection Security ...
  28. A change was made to IPsec settings. A crypto set was modified. Profile Changed: %1 Modified Crypto Set: ID: %2 Name: %3 ...
  29. A change was made to IPsec settings. An authentication set was added. Profile Changed: %1 Added Authentication Set: ID: %2 ...
  30. A change was made to IPsec settings. An authentication set was deleted. Profile Changed: %1 Deleted Authentication Set: ID: ...
  31. A change was made to IPsec settings. An authentication set was modified. Profile Changed: %1 Modified Authentication Set: ...
  32. A change was made to the Windows Firewall exception list. A rule was added. Profile Changed: %1 Added Rule: Rule ID: %2 Rule ...
  33. A change was made to the Windows Firewall exception list. A rule was deleted. Profile Changed: %1 Deleted Rule: Rule ID: ...
  34. A change was made to the Windows Firewall exception list. A rule was modified. Profile Changed: %1 Modified Rule: Rule ID: ...
  35. A character that is not valid was found at the following position and string while processing an event log override registry ...
  36. A chassis can contain other packages, such as other chassis and cards. The CIM_PackageInChassis association makes explicit ...
  37. A check is a condition or characteristic that is expected to be true in an environment defined or scoped by an instance of ...
  38. A checkpoint of '{0}' is now being taken. Type a name if you do not want to use a default name. Do you want to rename the ...
  39. A CIM_Action is an operation that is part of a process to either create a software element in its next state or to eliminate ...
  40. A CIM_FileSpecification identifies a file that is either to be on or off the system. The file is to be located in the directory ...
  41. A CIM_Service is a Logical Element that contains the information necessary to represent and manage the functionality provided ...
  42. A CIM_System is a LogicalElement that aggregates an enumerable set of Managed System Elements. The aggregation operates as ...
  43. A circular dependency was found in the resources specified in instance document. Check and correct the Requires property ...
  44. A circular dependency was found in the resources specified in the instance document. Check and correct the Requires property ...
  45. A class derived from CIM_ComputerSystem that represents a desktop, mobile, network PC, server or other type of a single node ...
  46. A class derived from CIM_LogicalElement that is a special collection of managed system elements. This collection indicates ...
  47. A class derived from CIM_System that is a special collection of CIM_ManagedSystemElement instances. This collection provides ...
  48. A class derived from FileSystem that represents access of the FileSystem via a network-related service. In this case, the ...
  49. A class derived from FileSystem that represents the file store controlled by a ComputerSystem through local means (e.g., ...
  50. A class derived from redundancy group containing mass storage-related redundancy information. Storage redundancy groups are ...
  51. A class derived from redundancy group indicating that the aggregated elements have more capacity or capability than is needed. ...
  52. A class derived from RedundancyGroup indicating that one or more of the aggregated elements can be spared. (The actual Spares ...
  53. A class derived from RemoteFileSystem representing that the FileSystem is mounted, using the NFS protocol, from a ComputerSystem. ...
  54. A class derived from System that is a special collection of ManagedSystemElements. This collection provides compute capabilities ...
  55. A client application is using search referrals, indicating that its LDAP_OPT_REFERRALS option is on. LDAP client applications ...
  56. A client attempted to access the server using SMB1 and was rejected because SMB1 file sharing support is disabled or has ...
  57. A client has associated with the hosted network. Interface GUID: %1 Interface description:%2 Network SSID: %3 Local MAC address: ...
  58. A client has failed to authenticate with the hosted network. Error code: %2 Error Message: %3 Interface GUID: %1 Interface ...
  59. A client has successfully authenticated with the hosted network. Interface GUID: %1 Interface description:%2 Network SSID: ...
  60. A client made a DirSync LDAP request for a directory partition that included attributes in the Read-Only DC Filtered Set. ...
  61. A client made a DirSync LDAP request for a directory partition. Access was denied due to the following error. Directory partition: ...
  62. A cloud requested is not present; review the configured IPv6 addresses and verify there are addresses of appropriate scope.%0 ...
  63. A cluster cannot be created with the specified cluster name because that cluster name is already in use. Specify a different ...
  64. A cluster object was passed that is not valid. Run the command again and specify an object that represents a cluster group ...
  65. A cluster was found to be used by a file but not marked as used in the volume bitmap. The file reference number is 1!0I64x!. ...
  66. A cmdlet threw an exception after calling ThrowTerminatingError. The first exception was "{0}" with stack trace "{1}". The ...
  67. A codec is required to play this file. To determine if this codec is available to download from the web, click Web Help.%0 ...
  68. A column having the specified property set and PID already exists. The application's configuration has been corrupted. Reinstall ...
  69. A COM call (IID: %1, method index: %2!d!) to an ASTA (thread %3!d!) was blocked because the call chain originated in or passed ...
  70. A COM call to an ASTA was blocked because the call chain originated in or passed through another ASTA. This call pattern ...
  71. A COM+ service (such as Queued Components or Compensating Resource Manager) failed an ApplicationFree event. This is not ...
  72. A COM+ service (such as Queued Components or Compensating Resource Manager) failed an ApplicationLaunch event. If this problem ...
  73. A COM+ service (such as Queued Components or Compensating Resource Manager) failed an ApplicationShutdown event. This is ...
  74. A COM+ service (such as Queued Components or Compensating Resource Manager) failed in its PauseProcess method. The service ...
  75. A COM+ service (such as Queued Components or Compensating Resource Manager) failed in its ResumeProcess method. The service ...