Windows 8

  1. A file with the same name as the destination path already exists on the destination server. Specify a different destination ...
  2. A filter action requires at least one security method for negotiation. This filter action has none. Select a different one, ...
  3. A filter action sets the security requirements for a data transfer. These requirements are specified in a list of security ...
  4. A filter, such as 'name -like "*"', which is used to search the directory for matching fine grained password policy objects. ...
  5. A filter, such as 'samAccountName -like "*service*"', which is used to search the directory for matching service accounts. ...
  6. A fingerprint reader, which is a biometric device, is intended to give you quick, convenient access to your computer. Fingerprint ...
  7. A firewall can help prevent hackers or malicious software from gaining access to your PC through a network or the Internet. ...
  8. A firewall is blocking inbound traffic on TCP port 443, which is used by the Hosted Cache server for accepting incoming client ...
  9. A firewall is blocking inbound traffic on TCP port 80, which is used to serve content to requesting computers. As a result, ...
  10. A firewall is blocking inbound traffic on UDP port 3702, which is used to discover the availability of cached content on ...
  11. A firewall or network configuration issue is preventing media playback. Search Windows Help for information about setting ...
  12. A firewall product is not enabled on this system. It is highly recommended you run Windows with one enabled firewall product. ...
  13. A folder that is shared by using both the Server Message Block (SMB) protocol and the Network File System (NFS) protocol ...
  14. A folder with this name already exists. To add another target, right-click the folder, and then click Add Folder Target. ...
  15. A font file could not be opened because the file, directory, network location, drive, or other storage location does not ...
  16. A forward lookup zone translates DNS names to IP addresses and network services. This is an essential function for most DNS ...
  17. A free-form string containing a human-readable description of CIMStatusCode. This description MAY extend, but MUST be consistent ...
  18. A fully qualified domain name (FQDN) consists of a host and domain name, including top-level domain. For example, www.contonso.com ...
  19. A Generation ID change has been detected. Generation ID cached in DS (old value): %1 Generation ID currently in VM (new value): ...
  20. A Generation ID change has been detected. Generation ID cached in DS (old value): %1 Generation ID currently in VM (new value): ...
  21. A global catalog (GC) cannot be contacted. A GC is needed to list the object's group memberships. The GC may be temporarily ...
  22. A global catalog (GC) cannot be contacted. A GC is needed to list the object's group memberships. The GC may be temporarily ...
  23. A global catalog cannot be contacted to retrieve the icons for the member list because access was denied. Some icons may ...
  24. A global load balancing FQDN is configured, but the global load balancing IP address cannot be identified automatically. ...
  25. A group of instances that share the same configuration and schema is called a configuration set. Setup will replicate configuration ...
  26. A group policy corresponding to the new incoming port will be created. Organization Units configured to use the previous ...
  27. A group's type was changed. Subject: Security ID: %5 Account Name: %6 Account Domain: %7 Logon ID: %8 Change Type: %1 Group: ...
  28. A Guard Page was modified by a collect procedure in Extensible Counter DLL "%1!s!" for the "%2!s!" service. The performance ...
  29. A guest operating system that supports a network adapter is configured with a legacy network adapter. This configuration ...
  30. A handle to an object has been duplicated: Source Handle ID: %1 Source Process ID: %2 Target Handle ID: %3 Target Process ...
  31. A handle to an object was requested with intent to delete. Subject: Security ID: %1 Account Name: %2 Account Domain: %3 Logon ...
  32. A handle to an object was requested. Subject : Security ID: %1 Account Name: %2 Account Domain: %3 Logon ID: %4 Object: Object ...
  33. A handle to an object was requested. Subject: Security ID: %1 Account Name: %2 Account Domain: %3 Logon ID: %4 Object: Object ...
  34. A handle to an object was requested. Subject: Security ID: %1 Account Name: %2 Account Domain: %3 Logon ID: %4 Object: Object ...
  35. A hardware error occurred while formatting this disc. You can try again with a different disc, but if this problem persists, ...
  36. A hardware event has occurred. An informational record describing the condition is contained in the data section of this ...
  37. A homegroup can only be created on a private network. To change your network location setting, open Network and Sharing Center ...
  38. A homegroup links computers on your home network so that you can share pictures, music, videos, documents, and printers. ...
  39. A Hyper-V Replica Broker is required on this cluster for allowing replication from the current Replica Server after planned ...
  40. A Hyper-V Replica Broker is required on this cluster for allowing replication from the current Replica Server after planned ...
  41. A Hyper-V Replica Broker needs to be created on the failover cluster "{0}". Create the Hyper-V Replica Broker using Failover ...
  42. A Hyper-V Replica Broker needs to be created on this failover cluster. Create the Hyper-V Replica Broker using Failover Cluster ...
  43. A job could not be created from the {0} specification because the provided runspace is not a local runspace. Try again using ...
  44. A Kerberos authentication ticket (TGT) was requested. Account Information: Account Name: %1 Supplied Realm Name: %2 User ...
  45. A Kerberos authentication ticket request failed. Account Information: Account Name: %1 Supplied Realm Name: %2 Service Information: ...
  46. A Kerberos error message was received: on logon session %1 Client Time: %2 Server Time: %3 Error Code: %4 %5 Extended Error: ...
  47. A Kerberos service ticket request failed. Account Information: Account Name: %1 Account Domain: %2 Service Information: Service ...
  48. A Kerberos service ticket was renewed. Account Information: Account Name: %1 Account Domain: %2 Service Information: Service ...
  49. A Kerberos service ticket was requested. Account Information: Account Name: %1 Account Domain: %2 Logon GUID: %10 Service ...
  50. A Language targeting item allows a preference item to be applied to computers or users only if the locale specified in the ...
  51. A large number of replication updates need to be carried on this path. Higher priority replication work has temporarily interrupted ...
  52. A license file path was not specified. A license file must be specified when installing app packages (.appx). If a license ...
  53. A license request was received but Active Directory Rights Management Services (AD RMS) is in a decommissioned state and ...
  54. A licensing error occurred while the client was attempting to connect (Licensing timed out). Please try connecting to the ...
  55. A licensing error occurred while the client was attempting to connect (Licensing timed out). Please try connecting to the ...
  56. A lingering object was removed from a replica. Destination DRA: %1 Source DRA: %2 Object: %3 Options: %4 Status Code: %5 ...
  57. A link value pointing to an object without a GUID has been encountered. This value will be skipped. DN of object containing ...
  58. A list of fixed values. Multiple values can be assigned to a property at a time. When combining multiple values during classification ...
  59. A list of strings. Multiple values can be assigned to a property at a time. When combining multiple values during classification ...
  60. A list of websites excluded from filtering, and data used by Tracking Protection to detect where websites might be automatically ...
  61. A local certificate revocation list (CRL) is a list of revoked certificates that can be maintained on an Online Responder ...
  62. A local notification was received through an application endpoint: %1 AppUserModelId %2 NotificationType %3 NotificationTrackingId ...
  63. A local path is not defined for all replicated folders. Replication will be blocked on any replicated folder without a local ...
  64. A local user is authenticated as an anonymous user and cannot access Active Directory Domain Services. You need to log on ...
  65. A local user is authenticated as an anonymous user and cannot access Active Directory. You need to log on as a domain user ...
  66. A local volume will be created. To create a clustered volume and add this disk to storage in a cluster, select a cluster ...
  67. A location can be any valid URL or path. Enter an HTTP, LDAP, file address, or enter a UNC or local path. To insert a variable ...
  68. A lock error has occurred. This could happen if the WINS is trying to send a response on a dialogue that is no longer ACTIVE. ...
  69. A log file used to track which notifications were sent by a file management task was not deleted when the task was deleted. ...
  70. A log information record was not found in the existing CRM log file. It has been added. If this warning appears when the ...
  71. A logoff policy determines when users are logged off from a virtual desktop so that the virtual desktop can be recreated ...
  72. A logon message file was not specified or an error occurred while trying to open the file. Verify that the logon message ...
  73. A logon request was denied because the RD Session Host server is currently in drain mode and therefore not accepting new ...
  74. A logon was attempted using explicit credentials. Subject: Security ID: %1 Account Name: %2 Account Domain: %3 Logon ID: ...
  75. A longer than expected delay was encountered in this computer's communication with the remote computer. This was due to a ...