Windows 7

  1. The elements of the Formats array define lists of properties to be shown for this alias. This is a list of lists indexed ...
  2. The email address of the user that owned the file that was being written to when the event was fired. This property may not ...
  3. The email addresses of those persons to be included on the TO: line. Addresses must be separated by commas or semicolons. ...
  4. The embedded controller (EC) did not respond within the specified timeout period. This may indicate that there is an error ...
  5. The embedded controller (EC) might not be functioning. Despite additional retries, no requests have been processed. This ...
  6. The embedded controller (EC) returned data when none was requested. The BIOS might be trying to access the EC without synchronizing ...
  7. The EnableAnonWin9xConnections indicates whether remote access without security checking is permitted. This property only ...
  8. The EnableAtStorageActivation property indicates whether the instance of the DCOM application retrieves the saved state of ...
  9. The enabled (green underline) selected locale will become the end-user's default locale when this policy is applied otherwise ...
  10. The Enabled property indicates whether or not the on-board device is available for use. Values: TRUE or FALSE. A value of ...
  11. The EnableDaylightSavingsTime property indicates whether Daylight Savings Time is recognized on this machine. FALSE - time ...
  12. The EnableDevice method has been deprecated in lieu of the more general RequestStateChange method that directly overlaps ...
  13. The EnableDHCP method enables the Dynamic Host Configuration Protocol (DHCP) for service with this network adapter. DHCP ...
  14. The EnableDNS method enables the Domain Name System (DNS) for service on TCP/IP-bound network adapters. The method returns ...
  15. The EnableEvents property indicates whether the WMI event subsystem should be enabled. Values: TRUE or FALSE, If TRUE,then ...
  16. The EnableIPFilterSec method is used to enable IP security globally across all IP-bound network adapters. With security enabled, ...
  17. The EnableIPSec method is used to enable IP security on this specific TCP/IP-enabled network adapter. Ports are secured only ...
  18. The EnableStartupHeapPreallocation property indicates whether WMI will start with a pre-allocated heap. Values: TRUE or FALSE. ...
  19. The EnableStatic method enables static TCP/IP addressing for the target network adapter. As a result, DHCP for this network ...
  20. The EnableWINS method enables Windows Internet Naming Service (WINS) settings specific to TCP/IP, but independent of the ...
  21. The encrypted rights policy in the issuance license cannot be decrypted because the certificate is not issued by the current ...
  22. The encryption key length does not meet the policy for secure encryption key. Please use Identity Management for UNIX Administration ...
  23. The encryption settings are supported by computers running Microsoft Routing and Remote Access Service. If you use different ...
  24. The EncryptionLevel property specifies if the encryption level for secure transactions is 40-bit, 128-bit, or n-bit encryption. ...
  25. The EncryptionMethod property is a free form string indicating the algorithm or tool used to encrypt the logical file. If ...
  26. The ending address is not valid for this range. Subnet broadcast addresses (host ID of all 1s) are not valid ending addresses. ...
  27. The ending address specified for the address range is invalid. Please enter an ending address that is greater than or equal ...
  28. The ending address, referenced by an application or operating system and mapped by a memory controller, for this memory object. ...
  29. The EndingAddress property specifies the ending address referenced by an application or operating system. This memory address ...
  30. The endpoint for Active Directory Web Services is already in use. The service may already be running. There cannot be more ...
  31. The EndpointConfiguration with the {0} identifier does not give a valid initial session state on the remote computer. Contact ...
  32. The Enhanced Key Usage (EKU) attribute of the specified certificate does not permit it to be used for BitLocker Drive Encryption. ...
  33. The enhanced security configuration also adjusts the Internet Explorer extensibility and security settings to further reduce ...
  34. The enhanced security configuration also restricts access to scripts, executable files, and other potentially unsafe files ...
  35. The enhanced security configuration applies to different user accounts according to the type of installation. The following ...
  36. The enhanced security configuration increases the level of security on your server, but may also affect Internet browsing ...
  37. The Enrollee (%1) has no E-Mail name registered in the Active Directory. The E-Mail name will not be included in the certificate. ...
  38. The enrollment policy "%1" cannot be removed as it is the current default enrollment policy. Please choose a new default ...
  39. The entered computer name is not valid or remote shutdown is not supported on the target computer. Check the name and then ...
  40. The entered MAC address format is invalid, please retry with valid format Examples: abcd11223344 ab-cd-11-22-33-44 ab-cd-* ...
  41. The Enterprise Domain Controllers group does not have read access to this GPO. The Enterprise Domain Controllers group must ...
  42. The Enterprise PKI MMC snap-in allows administrators to assess and manage the health of a Windows Enterprise CA hierarchy. ...
  43. The EnvironmentVariables property contains a list of settings for the configuration of a computer. Environment variables ...
  44. The EqualPerUser, EqualPerSession and EqualPerProcess management rules cannot be applied to an allocation which is sub-allocated. ...
  45. The error occurred while the notification callback was being processed. Background Intelligent Transfer Service (BITS) will ...
  46. The ErrorAccess property indicates the memory access operation that caused the last error. This property is valid only when ...
  47. The ErrorAddress property specifies the address of the last memory error. This property is used only when ErrorInfo is not ...
  48. The ErrorControlForced property contains the command string used to enable error correction control when establishing a connection. ...
  49. The ErrorData property contains data captured from the last memory access with an error. The data occupies the first n octets ...
  50. The ErrorDataOrder property indicates the ordering for data stored in the ErrorData property. This property is used only ...
  51. The ErrorInfo property contains an integer enumeration describing the type of error that occurred most recently. The values, ...
  52. The ErrorMode property controls how the operating system handles several types of serious errors. You can specify that the ...
  53. The ErrorReplaceCharacter property specifies the value of the character used to replace bytes received with a parity error. ...
  54. The ErrorReplacementEnabled specifies whether bytes received with parity errors are replaced with the ErrorReplaceCharacter ...
  55. The ErrorResolution property specifies the amount of data actually determined to cause the error. This property is unused ...
  56. The ErrorTime property contains the time that the last memory error occurred. This property is valid only when ErrorInfo ...
  57. The ErrorTransferSize property specifies the size of the data (containing the last error) being transferred. This property ...
  58. The established connection with the remote server has been lost. Check your network connectivity status, and then try again. ...
  59. The event identifier specifies the message that goes with this event as an entry in the message file associated with the ...
  60. The event log on this node could not be opened and new events will not be reported during this session. An attempt to re-open ...
  61. The event log time could not be converted from UCT to local time. GetTimeZoneInformation returned a value of %1. UCT time ...
  62. The event logging service encountered a configuration-related error (res=%1) for channel %2. The error was encountered while ...
  63. The event logging service encountered a fatal error (res=%1) when applying settings to the %2 channel. The service is shutting ...
  64. The event logging service encountered a log file for channel %1 which is an unsupported version. The log was renamed with ...
  65. The event logging service encountered an error %1 while going through publisher configuration. The publisher %2 is already ...
  66. The event logging service encountered an error (%1) while enabling publisher %3 to channel %2. This does not affect channel ...
  67. The event logging service encountered an error (res=%1) while opening configuration for primary channel %2. Trying again ...
  68. The event logging service encountered an error (res=%1) while opening log file for channel %2. Trying again using default ...
  69. The event logging service encountered an error (res=%1) while parsing filter for channel %2. Will continue without filter. ...
  70. The event logging service encountered an error while initializing publishing resources for channel %2. If channel type is ...
  71. The event logging service encountered an error while processing an incoming event from publisher %3 and trying to process ...
  72. The event message as it appears in the NT Eventlog. This is a standard message with zero or more insertion strings supplied ...
  73. The event provider {0} must guard against concurrent calls to append methods, and may not call append methods if Emit was ...
  74. The event provider {0} must guard against concurrent calls to Emit, and may not call Emit if Emit was previously called without ...
  75. The event provider {0} must guard against concurrent calls to Reset, and may not call Reset until any accumulated event data ...