Windows 8.1
- PROBLEM: The PCI BIOS has NOT properly configured the gigabit network connection. ACTION: Get the latest BIOS for your computer. ...
- PROBLEM: The PCI BIOS has NOT properly configured the PRO/1000 adapter. ACTION: Get the latest BIOS for your computer. ACTION: ...
- PROBLEM: The PRO/1000 adapter was not configured for bus mastering by the PCI BIOS. ACTION: Install the adapter in a bus ...
- Problems with the Search Filter Host might indicate errors in the Windows Search service, which can cause searches to fail ...
- Problems with the Search Protocol Host might indicate errors in the Windows Search service, which can cause searches to fail ...
- Process Count - Total shows the number of processes, both active and terminated, that are or have been associated with the ...
- Process Creation This policy setting allows you to audit events generated when a process is created or starts. The name of ...
- Process Termination This policy setting allows you to audit events generated when a process ends. If you configure this policy ...
- Process {result} has the highest CPU percent ({image}%). For this server role, the top process should be Lsass.exe (for Active ...
- Processes Confirmation ID for AD forest using the specified product-key to generate and then publish the Activation Object ...
- Processes installation, removal, and enumeration requests for software deployed through Group Policy. If the service is disabled, ...
- Processes is the number of processes in the computer at the time of data collection. This is an instantaneous count, not ...
- Processes that use the Web Proxy Auto-Discovery (WPAD) protocol invoke it out of process where it runs in a less privileged ...
- Processing -File '{0}' failed because the file does not have a '.ps1' extension. Specify a valid Windows PowerShell script ...
- Processing the module manifest file '{0}' did not result in a valid manifest object. Update the file to contain a valid Windows ...
- Processor %1 was throttled by an entity other than the kernel power manager. IA32_CLOCK_MODULATION MSR = %2. Elapsed time ...
- Processor %2 in group %1 exposes the following power management capabilities: Idle state type: %4 (%3 state(s)) Performance ...
- Processor idle states have been automatically disabled due to a known incompatibility with the hardware in this computer. ...
- Processor Performance is the average performance of the processor while it is executing instructions, as a percentage of ...
- Processor performance settings which allow the system to lower processor performance (and power consumption) if the system ...
- Processor performance states have been automatically disabled due to a known incompatibility with the hardware in this computer. ...
- Processor Queue Length is the number of threads in the processor queue. Unlike the disk counters, this counter counters, ...
- Processor throttle states have been automatically disabled due to a known incompatibility with the hardware in this computer. ...
- Processor Time is the percentage of elapsed time that all of process threads used the processor to execution instructions. ...
- Processor Time is the percentage of elapsed time that the processor spends to execute a non-Idle thread. It is calculated ...
- Processor Time is the percentage of elapsed time that the processor spends to execute a non-Idle thread. It is calculated ...
- Processor Utility is the amount of work a processor is completing, as a percentage of the amount of work the processor could ...
- Product activation telephone numbers can be obtained by searching the phone.inf file for the appropriate phone number for ...
- Product identification such as a serial number on software, a die number on a hardware chip, or (for non-commercial Products) ...
- Product version information. Corresponds to the Version property in the product object in the DMTF Solution Exchange Standard. ...
- ProductName WixUI_Wizard_Name ended prematurely because of an error. Your system has not been modified. To install this program ...
- Profile single process This security setting determines which users can use performance monitoring tools to monitor the performance ...
- Profile system performance This security setting determines which users can use performance monitoring tools to monitor the ...
- Profiles allow you to scan documents or pictures using pre-selected settings. Make sure that you choose a profile to use ...
- Profiles store information about how to recognize your voice. Change a profile to recognize a different voice or a different ...
- Program %1 with instanceID=%2 was removed from the Security Center reporting database because the program was either uninstalled, ...
- Program that stopped working: %ws Repair status: Success - Restart required Damaged file: %ws Type: %ws Version: %ws Created ...
- Program(s) or devices(s) requesting attention. Message title: %s Program path: %s Received: %s This problem occurs when a ...
- Programs and drivers that might be restored. These programs might not work correctly after restore and might need to be reinstalled: ...
- Programs customization allows you to specify the default program Windows should automatically use as for a HTML editor, E-mail, ...
- Programs on the remote computer will continue to run after you have disconnected. You can reconnect to this remote session ...
- Programs or services may store data in the registry. Therefore, it is important to have this data available on the node on ...
- Programs or services may store data in the registry. Therefore, it is important to have this data available on the node on ...
- Programs sometimes store temporary information in a TEMP folder. Before a program closes, it usually deletes this information. ...
- Programs that might affect your privacy or make changes to your computer that could negatively impact your computing experience, ...
- Programs that might collect your personal information and negatively affect your privacy or damage your computer, for example, ...
- Programs that require a network connection won't work, because there is no virtual IP address available for this session. ...
- Programs that require a network connection won't work, because there is no virtual IP address available for this session. ...
- Progress to '%1': %2 stage; %3 retries; %4 bytes sent; %5 total bytes to send; %6 bytes received; %7 total bytes to receive. ...
- Promotes or Demotes an Active Directory domain controller Command line parameters include: /answer[:filename /unattend[:filename ...
- Promotion of the local domain controller to a global catalog has been delayed because the directory partition occupancy requirements ...
- Promotion of this domain controller to a global catalog will be delayed for the following interval. Interval (minutes): %1 ...
- Propagation stopped because the propagation state for search server cannot be read. Try propagation again. If this error ...
- Properties for this program cannot be verified. Another program may be using the APPS.INF file. Close your other programs ...
- Properties for this program cannot be verified. The APPS.INF file is missing. Copy the APPS.INF file from your Windows Setup ...
- Property Store is not found in the indexer. The possible causes are that the call came during a catalog reset or that the ...
- PropertyName is a string property and is either DeleteTempFolders or UseTempFolders.They are flags that are either set to ...
- PropertyName is an enumeration of the properties: 0 = LPTPortMapping, 1 = COMPortMapping, 2 = AudioMapping, 3 = ClipboardMapping, ...
- PropertyName is an enumeration of the properties: 0 = SessionDirectoryLocation and 1 = SessionDirectoryClusterNamewhich are ...
- Proposed Central Access Policy does not grant the same access permissions as the current Central Access Policy. Subject: ...
- Protect data from modification and preserve confidentiality on the network with these integrity and encryption algorithms. ...
- Protect Key operation failed. Cryptographic Parameters: Protector Name: %1 Protector Attributes: %2 Flags: %3 Failure Information: ...
- Protected content was recently transferred to this computer. Type the password for your user account on the old computer ...
- Protected Extensible Authentication Protocol (PEAP) is the authentication method used with wireless access points and authenticating ...
- Protected Mode Internet Explorer Shim - intercepts and elevates CreateProcess, WinExec, CoCreateInstance, CoGetClassObject. ...
- Protected Mode Internet Explorer Shim - intercepts save-to-file dialogs and prompts the user with an appropriate location. ...
- Protected Mode Internet Explorer Shim - intercepts save-to-file dialogs and prompts the user with the redirected low location. ...
- Protected Storage helps safeguard data you want to keep private. These details show which program is attempting to access ...
- Protection has not been enabled on the volume. Enabling protection requires a connected account. If you already have a connected ...
- Protection is enabled on the volume but has been suspended. This is likely to have happened due to an update being applied ...
- Protection of auditable protected data was attempted. Subject: Security ID: %1 Account Name: %2 Account Domain: %3 Logon ...
- Protection of auditable protected data. Data Description: %2 Key Identifier: %1 Protected Data Flags: %3 Protection Algorithms: ...
- ProtocolIFType is an enumeration that is synchronized with the IANA ifType MIB. The ifType MIB is maintained at the URL, ...
- Provide a hint to help you remember your password. Set the hint so that others cannot use it to easily guess your password. ...
- Provide a PIN that contains characters limited to unaccented letters (A-Z, a-z), numbers (0-9), space, and the following ...