Windows 7

  1. The urn:schemas-microsoft-com:publishing:ShortcutTarget property must be type LPWSTR. Change the type for the property to ...
  2. The USB CEIP (Customer Experience Improvement Program) task collects Universal Serial Bus related statistics and information ...
  3. The USB device did not enter the Suspend state. Processor power management may be prevented if a USB device does not enter ...
  4. The USB device intermittently suspended during the trace. Processor power management may be prevented when the USB device ...
  5. The use of a single DNS server per interface does not allow for redundancy and failover. If the configured DNS server becomes ...
  6. The use of null encapsulation is not recommended. It might expose your network to security risks by allowing IP traffic to ...
  7. The use of this method is being deprecated, since Current senor reading can be retrieved through the GetInstance operation. ...
  8. The Use-Transaction cmdlet is intended for scripting of transaction-enabled .NET objects. Its ScriptBlock should contain ...
  9. The user "%1", connected by using client computer "%2" to the network resource "%3" was successfully reauthenticated/reauthorized ...
  10. The user "%1", on client computer "%2", did not connect to the following network resource: "%4" because the remote computer ...
  11. The user "%1", on client computer "%2", did not meet connection authorization policy requirements and was therefore not authorized ...
  12. The user "%1", on client computer "%2", did not meet resource authorization policy requirements and was therefore not authorized ...
  13. The user "%1", on client computer "%2", did not meet the requirements of the Network Access Protection (NAP) policies defined ...
  14. The user "%1", on client computer "%2", disconnected from the following network resource: "%3" because the session exceeded ...
  15. The user "%1", on client computer "%2", disconnected from the following network resource: "%4". Before the user disconnected, ...
  16. The user "%1", on client computer "%2", met connection authorization policy and resource authorization policy requirements, ...
  17. The user "%1", on client computer "%2", met connection authorization policy requirements and was therefore authorized to ...
  18. The user "%1", on client computer "%2", met RD resource authorization policy (RD RAP) requirements but the network resource ...
  19. The user "%1", on client computer "%2", met resource authorization policy requirements and was therefore authorized to connect ...
  20. The user "%1", on client computer "%2", was disconnected from the following network resource: "%4" because of a failure during ...
  21. The user "%1", on client computer "%2", was not authorized to connect to the RD Gateway server because a tunnel could not ...
  22. The user "%1", on client computer "%2", was not authorized to connect to this RD Gateway server because the authentication ...
  23. The user %1 could not be added because the supplied password does not meet the requirements for passwords on this computer. ...
  24. The user %1 has connected and failed to authenticate with a third party security on port %2. The line has been disconnected. ...
  25. The user %s is logged on to this computer and has been disconnected for %s. If you continue this user's Windows Session will ...
  26. The user %s\%s is already logged on to the console of this computer. You do not have permission to log in at this time. To ...
  27. The user %s\%s is currently logged on to this computer. Only the current user or an administrator can log on to this computer. ...
  28. The user %s\%s is logged on to this computer and has been disconnected for %s. If you continue this user's Windows Session ...
  29. The user account %1!s! was not found for the following reason: %2!s! Please ensure that you created a user account with the ...
  30. The user account does not have permission to view task history on this computer. Task instance start time data will not be ...
  31. The user account has been automatically locked because too many invalid logon attempts or password change attempts have been ...
  32. The user account has been locked because there were too many log on attempts. For assistance, contact your system administrator. ...
  33. The user account is currently disabled and cannot be used. For assistance, contact your system administrator or technical ...
  34. The user account is in a different forest than the computer account. The processing of Group Policy from another forest is ...
  35. The user account name can not be resolved within the Active Directory. You would need to verify whether the user is a real ...
  36. The user account or password entered is invalid. If you entered a domain account, make sure the name is prefixed with the ...
  37. The user account specified does not have sufficient permissions to create a domain-based namespace. Please specify a user ...
  38. The user accounts database (NET.ACC) is corrupted. The local security system is replacing the corrupted NET.ACC with the ...
  39. The user accounts database (NET.ACC) is corrupted. The local security system is replacing the corrupted NET.ACC with the ...
  40. The user accounts database (NET.ACC) is missing. The local security system is restoring the backup database made at %1. Any ...
  41. The user accounts database (NET.ACC) is missing. The local security system is restoring the backup database made on %1 at ...
  42. The user agent string is what the browser sends to visited servers to identify itself. It is often used to keep Internet ...
  43. The user agent string was not specified or contains invalid characters. Specify a user agent which is not empty and does ...
  44. The user assignment list for this RemoteApp is invalid or corrupted. Click OK to create a new user assignment list, or Cancel ...
  45. The user attempted the following repair option: {repairoption}. This was recommended by the following helper class: {helperclassname}. ...
  46. The user attempted to authenticate using a certificate with an Extended Key Usage or Issuance Policy that is not allowed ...
  47. The user attempted to connect through either a phone number or calling station that does not match the Caller ID listed for ...
  48. The user attempted to force close the files on a redirected drive, but there were opened directories on the drive, and the ...
  49. The user attempted to force close the files on a redirected drive, but there were opened files on the drive, and the user ...
  50. The user authentication plug-in "%1" has been configured. The configuration will take effect after the RD Gateway service ...
  51. The user authentication plug-in could not be imported to the RD Gateway server "{0}" because it is not installed on the server. ...
  52. The user authorization plug-in could not be imported to the RD Gateway server "{0}" because it is not installed on the server. ...
  53. The user can choose to allow or not allow applications to show the Encoder Configuration Dialog Box by selecting the appropriate ...
  54. The user can try the other repair options given during diagnosis. If all repair options have been attempted, the user may ...
  55. The user connected to port %1 has been disconnected because the following internal authentication error occurred in the third ...
  56. The user connected to port %1 has been disconnected because there was a transport-level error during the authentication conversation. ...
  57. The user could not be authenticated using Challenge Handshake Authentication Protocol (CHAP). A reversibly encrypted password ...
  58. The user could not change his or her password because the new password did not meet the password requirements for this network. ...
  59. The User Count Check detected a condition in your environment that is out of compliance with the licensing policy. This server ...
  60. The User Count Check detected a condition in your environment that is out of compliance with the licensing policy. This server ...
  61. The user creating the cluster requires the 'Create Computer Object' permission on the container where computer objects are ...
  62. The user credentials that are configured on this page cannot be accepted and authenticated, because Forms authentication ...
  63. The user disk quota information is unusable. To ensure accuracy, the file system quota information on the device %1 with ...
  64. The user does not have permission to run the scan process. PSP Identifier (GUID): %1. Submitting Username: %2. Failure: %3. ...
  65. The User Exclusion list defines which user accounts are not trusted by this cluster. Users can be excluded by e-mail name ...
  66. The user exclusion policy is disabled currently. Please run Update-RmsCluster cmdlet to refresh the cluster and try again. ...
  67. The user friendly name for this instance of Capabilities. In addition, the user friendly name can be used as a index property ...
  68. The user has chosen not to start People Near Me by declining the privacy dialog. The privacy will appear the next time the ...
  69. The user in domain %2 was not able to authenticate via the Kerberos protocol in domain %1. %2 may trust %1 but the trust ...
  70. The user load quota of %1 requests per %2 seconds has been exceeded. Send future requests at a slower rate or raise the quota ...
  71. The user locale "%1" (specified by the UserLocale element) is not a supported locale name or is not installed on the system. ...
  72. The user logon name %1 contains one or more of the following illegal characters: / \ : ; | = , + ? < > " If you continue ...
  73. The user logon name %2 contains one or more of the following illegal characters: / \ : ; | = , + ? < > " If you continue ...
  74. The user logon name you have chosen is already in use in this enterprise. Choose another logon name, and then try again. ...
  75. The user name %1 specified in registry (%2) does not map to a real user name. The entry is ignored. It must have a valid ...