Windows 8.1

  1. A PCMCIA Present targeting item allows a preference item to be applied to computers or users only if the processing computer ...
  2. A PDH function could not allocate enough temporary memory to complete the operation. Close some applications or extend the ...
  3. A pending interrupt was detected on device %1 during a timeout operation. A large number of these warnings may indicate that ...
  4. A periodic update has failed polling URL. Please refer error description for detail: %1 AppUserModelId %2 Type %3 URL %4 ...
  5. A periodic update has rejected polling URL because size of notification exceeded maximum: %1 AppUserModelId %2 Type %3 URL]. ...
  6. A periodic update has rejected polling URL due to mobile broadband connection such as roaming or reaching quota : %1 AppUserModelId ...
  7. A permissions error occurred when trying to perform an operation on this server. This can happen if your permissions have ...
  8. A permissions error occurred when trying to perform an operation, and this wizard must be closed. You may restart the WSUS ...
  9. A persistent binding request that uses Fibre Channel Protocol (FCP) included a bad or not locatable Fibre Channel identifier ...
  10. A persistent binding request that uses Fibre Channel Protocol (FCP) included a bad World Wide Name (WWN) for the target node. ...
  11. A persistent binding request that uses Fibre Channel Protocol (FCP) included a bad World Wide Name (WWN) for the target port. ...
  12. A persistent binding request that uses Fibre Channel Protocol (FCP) included a Logical Unit Number that is not defined by ...
  13. A phase 1 crypto set was added to IPsec settings when Windows Firewall started. Set ID: %1 Set Name: %2 Origin: %4 Flags: ...
  14. A phase 1 crypto set was added to IPsec settings. Set ID: %1 Set Name: %2 Origin: %4 Flags: %6 NumSuites: %7 TimeOutMinutes: ...
  15. A phase 1 crypto set was deleted from IPsec settings. Deleted Rule: Rule ID: %1 Rule Name: %2 Modifying User: %3 Modifying ...
  16. A phase 1 crypto set was modified in IPsec settings. Set ID: %1 Set Name: %2 Origin: %4 Flags: %6 NumSuites: %7 TimeOutMinutes: ...
  17. A phase 2 crypto set was added to IPsec settings when Windows Firewall started. Set ID: %1 Set Name: %2 Origin: %4 Pfs: %6 ...
  18. A phase 2 crypto set was added to IPsec settings. Set ID: %1 Set Name: %2 Origin: %4 Pfs: %6 NumSuites: %7 ModifyingUser: ...
  19. A phase 2 crypto set was deleted from IPsec settings. Deleted Rule: Rule ID: %1 Rule Name: %2 Modifying User: %3 Modifying ...
  20. A phase 2 crypto set was modified in IPsec settings. Set ID: %1 Set Name: %2 Origin: %4 Pfs: %6 NumSuites: %7 ModifyingUser: ...
  21. A phone book is a collection of access numbers that users can dial to connect to a remote dial-up network. A phone book file ...
  22. A physical component can be hot swapped if it is possible to replace the element with a physically different but equivalent ...
  23. A physical component is removable if it is designed to be taken in and out of the physical container in which it is normally ...
  24. A physical component is replaceable if it is possible to replace (FRU or upgrade) the element with a physically different ...
  25. A physical package can be hot swapped if it is possible to replace the element with a physically different but equivalent ...
  26. A physical package is removable if it is designed to be taken in and out of the physical container in which it is normally ...
  27. A physical package is replaceable if it is possible to replace (FRU or upgrade) the element with a physically different one. ...
  28. A PhysicalExtent is used to model an SCC RAID implementation. It defines the consecutive addressable block addresses on a ...
  29. A plug-in is required to correctly play the file. To determine if the plug-in is available to download, click Web Help.%0 ...
  30. A policy consists of one or more conditions and a set of configuration settings (options, IP Address) that are distributed ...
  31. A policy is in effect on your computer which prevents you from connecting to this print queue. Please contact your system ...
  32. A policy with conditions based on fully qualified domain name can have configuration settings for DNS but not for options ...
  33. A policy with conditions based on fully qualified domain name can have configuration settings for DNS but not for options ...
  34. A pool of account-identifiers (RIDs) has been invalidated. This may occur in the following expected cases: 1. A domain controller ...
  35. A pool size for account-identifiers (RIDs) that was configured by an Administrator is greater than the supported maximum. ...
  36. A pop-up is a small web browser window that appears on top of the website you're viewing. Pop-up windows often open as soon ...
  37. A Portable Computer targeting item allows a preference item to be applied to computers or users only if the processing computer ...
  38. A portion of the Active Directory Certificate Services upgrade failed: Could not create CertEnroll folder and/or shared folder ...
  39. A positive or negative integer used in conjunction with RunDay to indicate the day of the week on which the Job is processed. ...
  40. A power consumption meter representation with the capability to measure and control budgeting and thresholds of the underlying ...
  41. A power plan is a collection of hardware and system settings (like display brightness, sleep, etc.) that manages how your ...
  42. A power plan is a collection of hardware and system settings (like display brightness, sleep, etc.) that manages how your ...
  43. A power supply may have an associated current sensor, monitoring its input frequency. This is described by this association. ...
  44. A power supply may have an associated voltage sensor, monitoring its input voltage. This is described by this association. ...
  45. A power surge has been received from the Satellite TV cable. Please remove the Satellite TV cable now to prevent equipment ...
  46. A pre-created RODC account that matches the name of the target server exists in the directory. Choose whether to use the ...
  47. A preexisting logging database was found during your Active Directory Rights Management Services upgrade. To avoid removing ...
  48. A prefix is the first part of the FQDN to which this rule applies. For example, in the FQDN someserver.corp.contoso.com, ...
  49. A present auxiliary class {0} is updated with new mustContains. Class definition is changed, mustContains are replaced with ...
  50. A preshared key provides authentication for your Layer Two Tunneling Protocol over Internet Protocol security (L2TP over ...
  51. A previous indication of insufficient throughput for one or more VHDs allocation from the pool is handled and no longer valid. ...
  52. A previous installation for this product is in progress. You must undo the changes made by that installation to continue. ...
  53. A previous installation of Hyper-V integration services has been detected (version %1). Click OK to upgrade this installation. ...
  54. A previous operation resulted in this initiator's registrations being preempted, resulting in a Unit Attention condition. ...
  55. A previous operation resulted in this initiator's reservations being preempted, resulting in a Unit Attention condition. ...
  56. A previous schema extension has defined some attribute value differently than the schema extension needed for this version ...
  57. A previous schema extension has defined the attribute value as "%1" for object "%2" differently than the schema extension ...
  58. A previous version of the Connector is already installed on this computer. Uninstall the existing Connector software and ...
  59. A previously issued Receive Lookahead command is active for this session. The network control block (NCB) command was rejected. ...
  60. A primary token was assigned to process. Subject: Security ID: %1 Account Name: %2 Account Domain: %3 Logon ID: %4 Process ...
  61. A print connection setting is not valid. Use the Group Policy Management Editor to reconfigure the settings in this extension. ...
  62. A print server provides and manages access to network printers and printer drivers so that network clients can submit print ...
  63. A printer setup operation failed during the installation process, error code %5, HRESULT %6. See the event user data for ...
  64. A private key is not configured correctly for the selected certificate. Import the certificate and private key directly into ...
  65. A private key is not configured correctly for the selected certificate. Using the Certificates snap-in import the certificate ...
  66. A privilege that the service requires to function properly does not exist in the service account configuration. You may use ...
  67. A privileged service was called. Subject: Security ID: %1 Account Name: %2 Account Domain: %3 Logon ID: %4 Service: Server: ...
  68. A problem caused the program to stop working correctly. Windows will close the program and notify you if a solution is available. ...
  69. A problem has occurred in retrieving the Digital Rights Management machine identification. Contact Microsoft product support.%0 ...
  70. A problem has occurred in the Digital Rights Management component during license migration. Contact Microsoft product support.%0. ...
  71. A problem has occurred in the Digital Rights Management component of this application. Try to acquire a license again.%0 ...
  72. A problem has occurred with one or more user-mode drivers and the hosting process has been terminated. This may temporarily ...
  73. A problem is preventing the program from starting. Install any available updates, and then try to start the program again. ...
  74. A problem is preventing Windows from installing the update you've selected. Contact the game publisher for more information. ...
  75. A problem occurred during hardware installation. The installation of one or more devices is forbidden by system policy. Contact ...