Windows 10
- A certificate found in the local Active Directory Lightweight Directory Services claims to be from a domain controller with ...
- A certificate presented to Active Directory Domain Services claims to be from a directory service with the following computer ...
- A certificate presented to Active Directory Lightweight Directory Services claims to be from a directory service with the ...
- A Certificate Services template was updated. %1 v%2 (Schema V%3) %4 %5 Template Change Information: Old Template Content: ...
- A certificate stored by this extension is not valid. Use the Group Policy Management Editor to reconfigure the settings in ...
- A certificate template is a set of predefined properties for certificates issued to computers. Select a template from the ...
- A certificate trust list (CTL) is a signed list of root certification authority (CA) certificates that have been judged reputable ...
- A certificate trust list used to create certificate trust chain did not have a valid signature (CERT_TRUST_CTL_IS_NOT_SIGNATURE_VALID) ...
- A certificate trust list used to create certificate trust chain is not valid for this usage (CERT_TRUST_CTL_IS_NOT_VALID_FOR_USAGE) ...
- A certificate was found but it is not within its validity period. Please try another smart card or contact your administrator. ...
- A certificate, which is issued by a certification authority, is a confirmation of your identity and contains information ...
- A certification authority could not be contacted for authentication. If you are using a Remote Desktop Gateway with a smart ...
- A change has been made to IPSec settings. A Connection Security Rule was added. Profile changed: %1 Added Connection Security ...
- A change has been made to IPSec settings. A Connection Security Rule was deleted. Profile changed: %1 Deleted Connection ...
- A change has been made to IPSec settings. A Connection Security Rule was modified. Profile changed: %1 Modified Connection ...
- A change has been made to IPSec settings. A Crypto Set was deleted. Profile changed: %1 Deleted Crypto Set: Id: %2 Name: ...
- A change has been made to IPSec settings. A Crypto Set was modified. Profile changed: %1 Modified Crypto Set: Id: %2 Name: ...
- A change has been made to IPSec settings. An Authentication Set was added. Profile changed: %1 Added Authentication Set: ...
- A change has been made to IPSec settings. An Authentication Set was deleted. Profile changed: %1 Deleted Authentication Set: ...
- A change has been made to IPSec settings. An Authentication Set was modified. Profile changed: %1 Modified Authentication ...
- A change has been made to the system that requires that you restart the computer. Do you want to restart the computer now? ...
- A change has been made to Windows Firewall exception list. A rule was added. Profile changed: %1 Added Rule: Rule Id: %2 ...
- A change has been made to Windows Firewall exception list. A rule was deleted. Profile changed: %1 Deleted Rule: Rule Id: ...
- A change has been made to Windows Firewall exception list. A rule was modified. Profile changed: %1 Modified Rule: Rule Id: ...
- A change was made to IPsec settings. A connection security rule was added. Profile Changed: %1 Added Connection Security ...
- A change was made to IPsec settings. A connection security rule was deleted. Profile Changed: %1 Deleted Connection Security ...
- A change was made to IPsec settings. A connection security rule was modified. Profile Changed: %1 Modified Connection Security ...
- A change was made to IPsec settings. A crypto set was modified. Profile Changed: %1 Modified Crypto Set: ID: %2 Name: %3 ...
- A change was made to IPsec settings. An authentication set was added. Profile Changed: %1 Added Authentication Set: ID: %2 ...
- A change was made to IPsec settings. An authentication set was deleted. Profile Changed: %1 Deleted Authentication Set: ID: ...
- A change was made to IPsec settings. An authentication set was modified. Profile Changed: %1 Modified Authentication Set: ...
- A change was made to the Windows Firewall exception list. A rule was added. Profile Changed: %1 Added Rule: Rule ID: %2 Rule ...
- A change was made to the Windows Firewall exception list. A rule was deleted. Profile Changed: %1 Deleted Rule: Rule ID: ...
- A change was made to the Windows Firewall exception list. A rule was modified. Profile Changed: %1 Modified Rule: Rule ID: ...
- A character that is not valid was found at the following position and string while processing an event log override registry ...
- A chassis can contain other packages, such as other chassis and cards. The CIM_PackageInChassis association makes explicit ...
- A check is a condition or characteristic that is expected to be true in an environment defined or scoped by an instance of ...
- A checkpoint of '{0}' is now being taken. Type a name if you do not want to use a default name. Do you want to rename the ...
- A CIM_Action is an operation that is part of a process to either create a software element in its next state or to eliminate ...
- A CIM_FileSpecification identifies a file that is either to be on or off the system. The file is to be located in the directory ...
- A CIM_Service is a Logical Element that contains the information necessary to represent and manage the functionality provided ...
- A CIM_System is a LogicalElement that aggregates an enumerable set of Managed System Elements. The aggregation operates as ...
- A circular dependency was found in the resources specified in instance document. Check and correct the Requires property ...
- A circular dependency was found in the resources specified in the instance document. Check and correct the Requires property ...
- A class derived from CIM_ComputerSystem that represents a desktop, mobile, network PC, server or other type of a single node ...
- A class derived from CIM_LogicalElement that is a special collection of managed system elements. This collection indicates ...
- A class derived from CIM_System that is a special collection of CIM_ManagedSystemElement instances. This collection provides ...
- A class derived from FileSystem that represents access of the FileSystem via a network-related service. In this case, the ...
- A class derived from FileSystem that represents the file store controlled by a ComputerSystem through local means (e.g., ...
- A class derived from redundancy group containing mass storage-related redundancy information. Storage redundancy groups are ...
- A class derived from redundancy group indicating that the aggregated elements have more capacity or capability than is needed. ...
- A class derived from RedundancyGroup indicating that one or more of the aggregated elements can be spared. (The actual Spares ...
- A class derived from RemoteFileSystem representing that the FileSystem is mounted, using the NFS protocol, from a ComputerSystem. ...
- A class derived from System that is a special collection of ManagedSystemElements. This collection provides compute capabilities ...
- A client application is using search referrals, indicating that its LDAP_OPT_REFERRALS option is on. LDAP client applications ...
- A client attempted to access the server using SMB1 and was rejected because SMB1 file sharing support is disabled or has ...
- A client has associated with the hosted network. Interface GUID: %1 Interface description:%2 Network SSID: %3 Local MAC address: ...
- A client has failed to authenticate with the hosted network. Error code: %2 Error Message: %3 Interface GUID: %1 Interface ...
- A client has successfully authenticated with the hosted network. Interface GUID: %1 Interface description:%2 Network SSID: ...
- A client made a DirSync LDAP request for a directory partition that included attributes in the Read-Only DC Filtered Set. ...
- A client made a DirSync LDAP request for a directory partition. Access was denied due to the following error. Directory partition: ...
- A cloud requested is not present; review the configured IPv6 addresses and verify there are addresses of appropriate scope.%0 ...
- A cluster cannot be created with the specified cluster name because that cluster name is already in use. Specify a different ...
- A cluster object was passed that is not valid. Run the command again and specify an object that represents a cluster group ...
- A cluster was found to be used by a file but not marked as used in the volume bitmap. The file reference number is 1!0I64x!. ...
- A cmdlet threw an exception after calling ThrowTerminatingError. The first exception was "{0}" with stack trace "{1}". The ...
- A codec is required to play this file. To determine if this codec is available to download from the web, click Web Help.%0 ...
- A column having the specified property set and PID already exists. The application's configuration has been corrupted. Reinstall ...
- A COM call (IID: %1, method index: %2!d!) to an ASTA (thread %3!d!) was blocked because the call chain originated in or passed ...
- A COM call to an ASTA was blocked because the call chain originated in or passed through another ASTA. This call pattern ...
- A COM+ service (such as Queued Components or Compensating Resource Manager) failed an ApplicationFree event. This is not ...
- A COM+ service (such as Queued Components or Compensating Resource Manager) failed an ApplicationLaunch event. If this problem ...
- A COM+ service (such as Queued Components or Compensating Resource Manager) failed an ApplicationShutdown event. This is ...
- A COM+ service (such as Queued Components or Compensating Resource Manager) failed in its PauseProcess method. The service ...
- A COM+ service (such as Queued Components or Compensating Resource Manager) failed in its ResumeProcess method. The service ...