Windows 8.1

  1. PROBLEM: The PCI BIOS has NOT properly configured the gigabit network connection. ACTION: Get the latest BIOS for your computer. ...
  2. PROBLEM: The PCI BIOS has NOT properly configured the PRO/1000 adapter. ACTION: Get the latest BIOS for your computer. ACTION: ...
  3. PROBLEM: The PRO/1000 adapter was not configured for bus mastering by the PCI BIOS. ACTION: Install the adapter in a bus ...
  4. Problems with the Search Filter Host might indicate errors in the Windows Search service, which can cause searches to fail ...
  5. Problems with the Search Protocol Host might indicate errors in the Windows Search service, which can cause searches to fail ...
  6. Process Count - Total shows the number of processes, both active and terminated, that are or have been associated with the ...
  7. Process Creation This policy setting allows you to audit events generated when a process is created or starts. The name of ...
  8. Process Termination This policy setting allows you to audit events generated when a process ends. If you configure this policy ...
  9. Process {result} has the highest CPU percent ({image}%). For this server role, the top process should be Lsass.exe (for Active ...
  10. Processes Confirmation ID for AD forest using the specified product-key to generate and then publish the Activation Object ...
  11. Processes installation, removal, and enumeration requests for software deployed through Group Policy. If the service is disabled, ...
  12. Processes is the number of processes in the computer at the time of data collection. This is an instantaneous count, not ...
  13. Processes that use the Web Proxy Auto-Discovery (WPAD) protocol invoke it out of process where it runs in a less privileged ...
  14. Processing -File '{0}' failed because the file does not have a '.ps1' extension. Specify a valid Windows PowerShell script ...
  15. Processing the module manifest file '{0}' did not result in a valid manifest object. Update the file to contain a valid Windows ...
  16. Processor %1 was throttled by an entity other than the kernel power manager. IA32_CLOCK_MODULATION MSR = %2. Elapsed time ...
  17. Processor %2 in group %1 exposes the following power management capabilities: Idle state type: %4 (%3 state(s)) Performance ...
  18. Processor idle states have been automatically disabled due to a known incompatibility with the hardware in this computer. ...
  19. Processor Performance is the average performance of the processor while it is executing instructions, as a percentage of ...
  20. Processor performance settings which allow the system to lower processor performance (and power consumption) if the system ...
  21. Processor performance states have been automatically disabled due to a known incompatibility with the hardware in this computer. ...
  22. Processor Queue Length is the number of threads in the processor queue. Unlike the disk counters, this counter counters, ...
  23. Processor throttle states have been automatically disabled due to a known incompatibility with the hardware in this computer. ...
  24. Processor Time is the percentage of elapsed time that all of process threads used the processor to execution instructions. ...
  25. Processor Time is the percentage of elapsed time that the processor spends to execute a non-Idle thread. It is calculated ...
  26. Processor Time is the percentage of elapsed time that the processor spends to execute a non-Idle thread. It is calculated ...
  27. Processor Utility is the amount of work a processor is completing, as a percentage of the amount of work the processor could ...
  28. Product activation telephone numbers can be obtained by searching the phone.inf file for the appropriate phone number for ...
  29. Product identification such as a serial number on software, a die number on a hardware chip, or (for non-commercial Products) ...
  30. Product version information. Corresponds to the Version property in the product object in the DMTF Solution Exchange Standard. ...
  31. ProductName WixUI_Wizard_Name ended prematurely because of an error. Your system has not been modified. To install this program ...
  32. Profile single process This security setting determines which users can use performance monitoring tools to monitor the performance ...
  33. Profile system performance This security setting determines which users can use performance monitoring tools to monitor the ...
  34. Profiles allow you to scan documents or pictures using pre-selected settings. Make sure that you choose a profile to use ...
  35. Profiles store information about how to recognize your voice. Change a profile to recognize a different voice or a different ...
  36. Program %1 with instanceID=%2 was removed from the Security Center reporting database because the program was either uninstalled, ...
  37. Program that stopped working: %ws Repair status: Success - Restart required Damaged file: %ws Type: %ws Version: %ws Created ...
  38. Program(s) or devices(s) requesting attention. Message title: %s Program path: %s Received: %s This problem occurs when a ...
  39. Programs and drivers that might be restored. These programs might not work correctly after restore and might need to be reinstalled: ...
  40. Programs customization allows you to specify the default program Windows should automatically use as for a HTML editor, E-mail, ...
  41. Programs on the remote computer will continue to run after you have disconnected. You can reconnect to this remote session ...
  42. Programs or services may store data in the registry. Therefore, it is important to have this data available on the node on ...
  43. Programs or services may store data in the registry. Therefore, it is important to have this data available on the node on ...
  44. Programs sometimes store temporary information in a TEMP folder. Before a program closes, it usually deletes this information. ...
  45. Programs that might affect your privacy or make changes to your computer that could negatively impact your computing experience, ...
  46. Programs that might collect your personal information and negatively affect your privacy or damage your computer, for example, ...
  47. Programs that require a network connection won't work, because there is no virtual IP address available for this session. ...
  48. Programs that require a network connection won't work, because there is no virtual IP address available for this session. ...
  49. Progress to '%1': %2 stage; %3 retries; %4 bytes sent; %5 total bytes to send; %6 bytes received; %7 total bytes to receive. ...
  50. Promotes or Demotes an Active Directory domain controller Command line parameters include: /answer[:filename /unattend[:filename ...
  51. Promotion of the local domain controller to a global catalog has been delayed because the directory partition occupancy requirements ...
  52. Promotion of this domain controller to a global catalog will be delayed for the following interval. Interval (minutes): %1 ...
  53. Propagation stopped because the propagation state for search server cannot be read. Try propagation again. If this error ...
  54. Properties for this program cannot be verified. Another program may be using the APPS.INF file. Close your other programs ...
  55. Properties for this program cannot be verified. The APPS.INF file is missing. Copy the APPS.INF file from your Windows Setup ...
  56. Property Store is not found in the indexer. The possible causes are that the call came during a catalog reset or that the ...
  57. PropertyName is a string property and is either DeleteTempFolders or UseTempFolders.They are flags that are either set to ...
  58. PropertyName is an enumeration of the properties: 0 = LPTPortMapping, 1 = COMPortMapping, 2 = AudioMapping, 3 = ClipboardMapping, ...
  59. PropertyName is an enumeration of the properties: 0 = SessionDirectoryLocation and 1 = SessionDirectoryClusterNamewhich are ...
  60. Proposed Central Access Policy does not grant the same access permissions as the current Central Access Policy. Subject: ...
  61. Protect data from modification and preserve confidentiality on the network with these integrity and encryption algorithms. ...
  62. Protect Key operation failed. Cryptographic Parameters: Protector Name: %1 Protector Attributes: %2 Flags: %3 Failure Information: ...
  63. Protected content was recently transferred to this computer. Type the password for your user account on the old computer ...
  64. Protected Extensible Authentication Protocol (PEAP) is the authentication method used with wireless access points and authenticating ...
  65. Protected Mode Internet Explorer Shim - intercepts and elevates CreateProcess, WinExec, CoCreateInstance, CoGetClassObject. ...
  66. Protected Mode Internet Explorer Shim - intercepts save-to-file dialogs and prompts the user with an appropriate location. ...
  67. Protected Mode Internet Explorer Shim - intercepts save-to-file dialogs and prompts the user with the redirected low location. ...
  68. Protected Storage helps safeguard data you want to keep private. These details show which program is attempting to access ...
  69. Protection has not been enabled on the volume. Enabling protection requires a connected account. If you already have a connected ...
  70. Protection is enabled on the volume but has been suspended. This is likely to have happened due to an update being applied ...
  71. Protection of auditable protected data was attempted. Subject: Security ID: %1 Account Name: %2 Account Domain: %3 Logon ...
  72. Protection of auditable protected data. Data Description: %2 Key Identifier: %1 Protected Data Flags: %3 Protection Algorithms: ...
  73. ProtocolIFType is an enumeration that is synchronized with the IANA ifType MIB. The ifType MIB is maintained at the URL, ...
  74. Provide a hint to help you remember your password. Set the hint so that others cannot use it to easily guess your password. ...
  75. Provide a PIN that contains characters limited to unaccented letters (A-Z, a-z), numbers (0-9), space, and the following ...