Windows 8.1
- The user account or password entered is invalid. If you entered a domain account, make sure the name is prefixed with the ...
- The user account that you selected is an administrator account. Administrators have full access permissions for Anywhere ...
- The user account that you selected is an administrator. Administrators have full access permissions on all shared folders ...
- The user account that you selected is an administrator.Administrators have full access permissions on all shared folders ...
- The user account that you use to upgrade AD RMS must be a member of the local Administrators group on the AD RMS server and ...
- The user account {0} could not be assigned to a pooled virtual desktop because the user does not have access to the pooled ...
- The user accounts database (NET.ACC) is corrupted. The local security system is replacing the corrupted NET.ACC with the ...
- The user accounts database (NET.ACC) is corrupted. The local security system is replacing the corrupted NET.ACC with the ...
- The user accounts database (NET.ACC) is missing. The local security system is restoring the backup database made at %1. Any ...
- The user accounts database (NET.ACC) is missing. The local security system is restoring the backup database made on %1 at ...
- The user agent string is what the browser sends to visited servers to identify itself. It is often used to keep Internet ...
- The user agent string was not specified or contains invalid characters. Specify a user agent which is not empty and does ...
- The user attempted the following repair option: {repairoption}. This was recommended by the following helper class: {helperclassname}. ...
- The user attempted to authenticate using a certificate with an Extended Key Usage or Issuance Policy that is not allowed ...
- The user attempted to connect through either a phone number or calling station that does not match the Caller ID listed for ...
- The user attempted to force close the files on a redirected drive, but there were opened directories on the drive, and the ...
- The user attempted to force close the files on a redirected drive, but there were opened files on the drive, and the user ...
- The user authentication plug-in "%1" has been configured. The configuration will take effect after the RD Gateway service ...
- The user authentication plug-in could not be imported to the RD Gateway server "{0}" because it is not installed on the server. ...
- The user authorization plug-in could not be imported to the RD Gateway server "{0}" because it is not installed on the server. ...
- The user can choose to allow or not allow applications to show the Encoder Configuration Dialog Box by selecting the appropriate ...
- The user can try the other repair options given during diagnosis. If all repair options have been attempted, the user may ...
- The user connected to port %1 has been disconnected because the following internal authentication error occurred in the third ...
- The user connected to port %1 has been disconnected because there was a transport-level error during the authentication conversation. ...
- The user could not be authenticated using Challenge Handshake Authentication Protocol (CHAP). A reversibly encrypted password ...
- The user could not change his or her password because the new password did not meet the password requirements for this network. ...
- The User Count Check detected a condition in your environment that is out of compliance with the licensing policy. This server ...
- The User Count Check detected a condition in your environment that is out of compliance with the licensing policy. This server ...
- The user creating the cluster requires the 'Create Computer Object' permission on the container where computer objects are ...
- The user disk quota information is unusable. To ensure accuracy, the file system quota information on the device %1 with ...
- The user does not have permission to run the scan process. PSP Identifier (GUID): %1. Submitting Username: %2. Failure: %3. ...
- The User Exclusion list defines which rights account certificates (RACs) are not trusted by this cluster. Click Exclude RAC ...
- The user exclusion policy is disabled currently. Please run Update-RmsCluster cmdlet to refresh the cluster and try again. ...
- The user group has been created, but it has not been assigned the necessary permissions. Delete the group and create it again. ...
- The user has chosen not to start People Near Me by declining the privacy dialog. The privacy will appear the next time the ...
- The user in domain %2 was not able to authenticate via the Kerberos protocol in domain %1. %2 may trust %1 but the trust ...
- The user is approaching the threshold for maximum number of failed logon attempts. Once the maximum limit is reached the ...
- The user load quota of %1 requests per %2 seconds has been exceeded. Send future requests at a slower rate or raise the quota ...
- The user locale "%1" (specified by the UserLocale element) is not a supported locale name or is not installed on the system. ...
- The user logon name %1 contains one or more of the following illegal characters: / \ : ; | = , + ? < > " If you continue ...
- The user logon name %2 contains one or more of the following illegal characters: / \ : ; | = , + ? < > " If you continue ...
- The user logon name you have chosen is already in use in this enterprise. Choose another logon name, and then try again. ...
- The user mailbox will be retained for the period specified in the mailbox retention policy on the Exchange Server (default ...
- The user name %1 specified in registry (%2) does not map to a real user name. The entry is ignored. It must have a valid ...
- The user name %1 specified in registry (%2) is not valid, winerror %3. The entry is ignored. It must have a valid username ...
- The user name (%1) in the certificate enrollment request does not match the user name (%2) specified for OTP authentication. ...
- The user name and password are either incorrect or are for a user who does not have read permission to the remote shared ...
- The user name and password for this connection cannot be saved for use by all users. As a result, Internet Connection Sharing ...
- The user name and password for this connection were not saved for use by all users. As a result, Internet Connection Sharing ...
- The user name being used to perform the backup is not recognized by the computer that contains the remote shared folder. ...
- The user name can't contain the @ symbol. Want this person to sign in with an email address instead? Create a Microsoft account. ...
- The user name can't contain the @ symbol. Want to sign in with an email address instead? Create an account using a Microsoft ...
- The user name entered in the Administrator field must be qualified with a domain or computer name. In the unattended removal ...
- The user name entered in the SourceUsername field must be qualified with a domain or computer name. In the unattended setup ...
- The user name is not valid. A user name can contain a maximum of 20 characters and must not consist entirely of periods or ...
- The user name mapping cannot be read. Check that the database, view, and column names are correct, that the Notes database ...
- The user name of the proxy authentication credential parameter value is invalid. It must be in domain\username or [email protected] ...
- The user name of the proxy authentication credential parameter value is invalid. When the proxy authentication scheme is ...
- The user name of the replication account must be qualified by a domain or computer name. Example: COMPUTER1\UserName Example: ...
- The user name or password for your domain name service provider is not correct. Double-check your user name and password, ...
- The user name or password is incorrect. Verify that CAPS LOCK is off, and then retype your user name and password. If you ...
- The user name that is used by the access client in the RADIUS message. This attribute is a character string that typically ...
- The user name you typed is the same as the user name you logged in with. That user name has already been tried. A domain ...
- The user or computer does not have permission to access the network on this day at this time. To change the day and time ...
- The user or group name is invalid in specified user or group list. Check all of names either are a valid e-mail address ([email protected]) ...
- The user or group of {0} will not have any right after the custom rights are reset. Therefore, the user or group needs to ...
- The user or group that you specify will be able to attach a server to the RODC account that you are creating now and complete ...
- The user reset all customizations for their user locale "%1" (specified by the UserLocale element) to the system default. ...
- The user selected the following repair option: {repairoption}. The repair option required the following Security Identifier ...
- The user specified a username/password/authority on a local connection. The user must use a blank username/password and rely ...
- The user specified an invalid cryptographic mode. If this is the licensing cluster, it must be provisioned using the same ...
- The user tried to apply an unattended XML file (%1) in an unsupported format. Reason: %3 (Line %2). The system has not been ...
- The user was authenticated as %1 by the third party security host module but was authenticated as %2 by the RAS security. ...
- The user who is running validation does not have permissions to create computer objects in the '{0}' domain in the '{1}' ...
- The user will not have to change their password at the next logon because the following error occurred. %1 If you want them ...