Windows 8.1

  1. Dynamic IP addresses impending threshold: CustomerIpAddress: %1, VirtualSubnetId: %2, CustomerMacAddress: %3, MaxDynamicIPAddressCount: ...
  2. Dynamic locator record event type: %1. CustomerIpAddress: %2, VirtualSubnetId: %3, CustomerMacAddress: %4, ProviderIpAddress: ...
  3. Dynamic MAC address for "%4" (%3) was not assigned. The virtual machine will not have network connectivity until this problem ...
  4. Dynamic MAC address for "%4" (%3) was not assigned. The virtual machine will not have network connectivity until this problem ...
  5. Dynamic memory and physical NUMA node mapping cannot be enabled on the virtual machine '%1' because when NUMA spanning is ...
  6. Dynamic memory and virtual NUMA cannot be enabled on the virtual machine '%1' because the features are mutually exclusive. ...
  7. Dynamic memory was turned off for '%1' because NumaNodesAreRequired and NumaNodeList are configured for the virtual machine. ...
  8. Dynamic registration or deletion of one or more DNS records associated with DNS domain '%1' failed. These records are used ...
  9. Dynamic Update NoOperation/sec is the average number of No-operation/Empty dynamic update requests received by the DNS server ...
  10. Dynamic Update Written to Database/sec is the average number of dynamic updates written to the database by the DNS server ...
  11. Dynamic updates enable DNS client computers to register and dynamically update their resource records with a DNS server whenever ...
  12. Dynamically expanding virtual hard disks require available space on the hosting volume so that space can be allocated when ...
  13. Dynamically update DNS records for DHCP clients that do not request updates (for example, clients running Windows NT 4.0) ...
  14. E - restricts the ping to the RPC/HTTP proxy only. The ping does not reach the server. Useful when trying to establish whether ...
  15. E-mail addresses cannot be more than {0} characters, and the length of all e-mail addresses cannot be more than {1} characters. ...
  16. E-mail claim is not present in the request. User Action Enable the E-mail claim on the Active Directory Federation Services ...
  17. Each calling address must be set to 'Automatic' or to a unique ring pattern. Change the duplicate ring pattern to a different ...
  18. Each domain controller maintains a directory partition signature list. This command displays a list of the removed application ...
  19. Each font currently selected will open in its own window. Opening many windows may take a long time and might impact your ...
  20. Each forwarder must be configured with one or more master DNS server IP addresses. Provide a master DNS server IP address ...
  21. Each group has a unique identifier in addition to its name. Deleting a group deletes this identifier and it cannot be restored, ...
  22. Each instance of the CIM_Process class represents a single instance of a running program. A user of the OperatingSystem will ...
  23. Each instance of this class represents a source file with it's various attributes, ordered by a unique, non-localized identifier. ...
  24. Each namespace server polls its closest domain controller at regular intervals. This is known as namespace scalability mode. ...
  25. Each new virtual machine includes a network adapter. You can configure the network adapter to use a virtual switch, or it ...
  26. Each node of the cluster must also have a computer authentication certificate that can be validated to the same root certificate ...
  27. Each Remote Desktop Services client must be licensed with a valid RDS CAL, TS CAL or VDI license that is equivalent in version ...
  28. Each restriction consists of a column name, a relational operator and a constant integer, string or date. One column name ...
  29. Each site in the forest {0} should contain at least one global catalog server or have universal group membership caching ...
  30. Each site in the forest {0} with at least one running domain controller contains at least one global catalog server or has ...
  31. Each user account has a unique identifier in addition to their user name. Deleting a user account deletes this identifier ...
  32. Each user or computing device that connects to a remote desktop server must have a valid RDS CAL issued by a license server. ...
  33. Eap method friendly name can not be verified or %1 path could not be accessed; Error: type(%2), authId(%3), vendorId(%4), ...
  34. EAP methods not registered or registry data could not be accessed; Failed to open method registry %1. Skip this author ID ...
  35. EAP methods not registered or registry data could not be accessed; Failed to open method registry %1\254\%2. Skip this vendor ...
  36. EAP methods not registered or registry data could not be accessed; Failed to open method registry %1\254\%2\%3. Skip this ...
  37. EAP methods not registered or registry data could not be accessed; Failed to open method registry %2\%1. Skip this type ID ...
  38. EapHostPeerGetResult returned a failure. Eap Method Friendly Name: %2 Reason code: %1 Root Cause String: %3 Repair String: ...
  39. EAS password expiration policy cannot be satisfied as the password expiration interval is less than the minimum password ...
  40. Ease of Access Center. ,Make your computer easier to use. ,You can use the tools in this section to help you get started. ...
  41. Ease of Access Center. ,Make your computer easier to use. ,You can use the tools in this section to help you get started. ...
  42. Easy CD Creator 4 has a known compatibility issue with this version of Windows. For an update that is compatible with this ...
  43. Easy CD Creator 5 has a known compatibility issue with this version of Windows. For an update that is compatible with this ...
  44. Edge In this topology, the Remote Access server is deployed at the edge of the internal corporate network and is configured ...
  45. Edge traversal allows the computer to accept unsolicited inbound packets that have passed through an edge device such as ...
  46. Edit is not available because snapshots exist for this virtual machine. Do not use another method to edit the virtual hard ...
  47. Edit the Group Policy Object using the Group Policy Management Editor. Expand the node Computer Configuration\Windows Settings\Security ...
  48. Editing an answer file without opening a Windows image will result in limited functionality. Do you want to open a Windows ...
  49. Edits command lines, recalls Windows commands, and creates macros. DOSKEY /REINSTALL /LISTSIZE=size /MACROS[:ALL | :exename ...
  50. Effective Access allows you to view the effective permissions for a user, group, or device account. If the account is a member ...
  51. EFS key added to user cache. CertValidated: %1, cbHash: %2, pbHash: %3, ContainerName: %4, ProviderName: %5, DisplayInformation: ...
  52. EFS key demoted from current key. CertValidated: %1, cbHash: %2, pbHash: %3, ContainerName: %4, ProviderName: %5, DisplayInformation: ...
  53. EFS key flushed from cache. CertValidated: %1, cbHash: %2, pbHash: %3, ContainerName: %4, ProviderName: %5, DisplayInformation: ...
  54. EFS key promoted from current key. CertValidated: %1, cbHash: %2, pbHash: %3, ContainerName: %4, ProviderName: %5, DisplayInformation: ...
  55. EFS recovery service cannot get the backup file name. The interrupted encryption/decryption operation (on file %3) may be ...
  56. EFS recovery service cannot open the backup file %3 by name. The interrupted encryption/decryption operation (on file %4) ...
  57. Either a connection to server %1!s! cannot be established, or the Remote Access role is not installed on the server. Check ...
  58. Either address {3} is not reachable from {2} or the ping latency is greater than the maximum allowed {4} ms. This may be ...
  59. Either choose from a list of packaged apps installed on this computer or browse for a packaged app installer to use as a ...
  60. Either DirectDraw has not been installed or the Video Card capabilities are not suitable. Make sure the display is not in ...
  61. Either enable HTTP GET for metadata exchange on the endpoint or specify a 'defaultMessageCallbackHandler' on the associated ...
  62. Either install Network Policy Server (NPS) and restore the connection request policy manually, or click Repair Settings to ...
  63. Either MMC cannot find the temporary directory or there may not be not enough disk space to complete the operation. Free ...
  64. Either one or both the path and file name specified is not in the correct format. Only fully qualified paths and file names ...
  65. Either Remote Assistance is unable to find the remote computer or you do not have permission to connect to the remote computer. ...
  66. Either Security Descriptor is not associated with the link or DACL in Security Descriptor is NULL. So cannot revoke permissions. ...
  67. Either the document's application is not installed, there is not enough memory to load the application, or this application ...
  68. Either the DxgkDdiOPMGetCOPPCompatibleInformation, DxgkDdiOPMGetInformation, or DxgkDdiOPMConfigureProtectedOutput function ...
  69. Either the DxgkDdiOPMGetCOPPCompatibleInformation, DxgkDdiOPMGetInformation, or DxgkDdiOPMConfigureProtectedOutput function ...
  70. Either the external network adapter has a domain profile (and the server is not configured with a single network adapter), ...
  71. Either the folder does not exist or you do not have permission to write to this location. Verify that you can create a file ...
  72. Either the interface index is wrong or the gateway does not lie on the same network as the interface. Check the IP Address ...
  73. Either the IOPMVideoOutput::COPPCompatibleGetInformation, IOPMVideoOutput::GetInformation, or IOPMVideoOutput::Configure ...
  74. Either the IOPMVideoOutput::COPPCompatibleGetInformation, IOPMVideoOutput::GetInformation, or IOPMVideoOutput::Configure ...
  75. Either the key container you specified does not exist, or the CSP you chose was unable to process the request. Enter the ...