Windows 8.1

  1. A certificate could not be found. Connections that use the L2TP protocol over IPSec require the installation of a machine ...
  2. A certificate could not be found. Connections that use the L2TP protocol over IPsec require the installation of a machine ...
  3. A certificate for the network location server is not installed on server %1!s!. Manually enroll a certificate with the subject ...
  4. A certificate found in the local Active Directory Domain Services claims to be from a domain controller with the following ...
  5. A certificate found in the local Active Directory Lightweight Directory Services claims to be from a domain controller with ...
  6. A certificate in the chain for CA certificate %3 for %1 could not be verified because no information is available describing ...
  7. A certificate presented to Active Directory Domain Services claims to be from a directory service with the following computer ...
  8. A certificate presented to Active Directory Lightweight Directory Services claims to be from a directory service with the ...
  9. A Certificate Services template was updated. %1 v%2 (Schema V%3) %4 %5 Template Change Information: Old Template Content: ...
  10. A certificate stored by this extension is not valid. Use the Group Policy Management Editor to reconfigure the settings in ...
  11. A certificate template %1 has been loaded. For additional information, please refer to the EventData section of the Details ...
  12. A certificate template is a set of predefined properties for certificates issued to computers. Select a template from the ...
  13. A certificate to authenticate the network location server cannot be deployed on server %1!s!. Install a certificate on the ...
  14. A certificate trust list (CTL) is a signed list of root certification authority (CA) certificates that have been judged reputable ...
  15. A certificate trust list used to create certificate trust chain did not have a valid signature (CERT_TRUST_CTL_IS_NOT_SIGNATURE_VALID) ...
  16. A certificate trust list used to create certificate trust chain is not valid for this usage (CERT_TRUST_CTL_IS_NOT_VALID_FOR_USAGE) ...
  17. A certificate was found but it is not within its validity period. Please try another smart card or contact your administrator. ...
  18. A certificate with server authentication Extended Key Usage (EKU) is required for the network location server. The specified ...
  19. A certificate, which is issued by a certification authority, is a confirmation of your identity and contains information ...
  20. A certification authority %1 has been loaded. For additional information, please refer to the EventData section of the Details ...
  21. A Certification Authority (CA) and the {0} cannot be installed on this computer simultaneously. Complete your CA setup before ...
  22. A certification authority (CA) is installed on this computer. Do not specify a CA for the Network Device Enrollment Service ...
  23. A certification authority could not be contacted for authentication. If you are using a Remote Desktop Gateway with a smart ...
  24. A change has been made to IPSec settings. A Connection Security Rule was added. Profile changed: %1 Added Connection Security ...
  25. A change has been made to IPSec settings. A Connection Security Rule was deleted. Profile changed: %1 Deleted Connection ...
  26. A change has been made to IPSec settings. A Connection Security Rule was modified. Profile changed: %1 Modified Connection ...
  27. A change has been made to IPSec settings. A Crypto Set was deleted. Profile changed: %1 Deleted Crypto Set: Id: %2 Name: ...
  28. A change has been made to IPSec settings. A Crypto Set was modified. Profile changed: %1 Modified Crypto Set: Id: %2 Name: ...
  29. A change has been made to IPSec settings. An Authentication Set was added. Profile changed: %1 Added Authentication Set: ...
  30. A change has been made to IPSec settings. An Authentication Set was deleted. Profile changed: %1 Deleted Authentication Set: ...
  31. A change has been made to IPSec settings. An Authentication Set was modified. Profile changed: %1 Modified Authentication ...
  32. A change has been made to the system that requires that you restart the computer. Do you want to restart the computer now? ...
  33. A change has been made to Windows Firewall exception list. A rule was added. Profile changed: %1 Added Rule: Rule Id: %2 ...
  34. A change has been made to Windows Firewall exception list. A rule was deleted. Profile changed: %1 Deleted Rule: Rule Id: ...
  35. A change has been made to Windows Firewall exception list. A rule was modified. Profile changed: %1 Modified Rule: Rule Id: ...
  36. A change to a Server for NFS configuration registry key requires the server to be restarted for the change take effect. The ...
  37. A change was made to IPsec settings. A connection security rule was added. Profile Changed: %1 Added Connection Security ...
  38. A change was made to IPsec settings. A connection security rule was deleted. Profile Changed: %1 Deleted Connection Security ...
  39. A change was made to IPsec settings. A connection security rule was modified. Profile Changed: %1 Modified Connection Security ...
  40. A change was made to IPsec settings. A crypto set was modified. Profile Changed: %1 Modified Crypto Set: ID: %2 Name: %3 ...
  41. A change was made to IPsec settings. An authentication set was added. Profile Changed: %1 Added Authentication Set: ID: %2 ...
  42. A change was made to IPsec settings. An authentication set was deleted. Profile Changed: %1 Deleted Authentication Set: ID: ...
  43. A change was made to IPsec settings. An authentication set was modified. Profile Changed: %1 Modified Authentication Set: ...
  44. A change was made to the Windows Firewall exception list. A rule was added. Profile Changed: %1 Added Rule: Rule ID: %2 Rule ...
  45. A change was made to the Windows Firewall exception list. A rule was deleted. Profile Changed: %1 Deleted Rule: Rule ID: ...
  46. A change was made to the Windows Firewall exception list. A rule was modified. Profile Changed: %1 Modified Rule: Rule ID: ...
  47. A character that is not valid was found at the following position and string while processing an event log override registry ...
  48. A chassis can contain other packages, such as other chassis and cards. The CIM_PackageInChassis association makes explicit ...
  49. A check is a condition or characteristic that is expected to be true in an environment defined or scoped by an instance of ...
  50. A checkpoint of '{0}' is now being taken. Type a name if you do not want to use a default name. Do you want to rename the ...
  51. A CIM_Action is an operation that is part of a process to either create a software element in its next state or to eliminate ...
  52. A CIM_Cluster is composed of two or more computer system's, operating together. A computer system may participate in multiple ...
  53. A CIM_FileSpecification identifies a file that is either to be on or off the system. The file is to be located in the directory ...
  54. A CIM_Service is a Logical Element that contains the information necessary to represent and manage the functionality provided ...
  55. A CIM_System is a LogicalElement that aggregates an enumerable set of Managed System Elements. The aggregation operates as ...
  56. A circular dependency was found in the resources specified in instance document. Check and correct the Requires property ...
  57. A circular dependency was found in the resources specified in the instance document. Check and correct the Requires property ...
  58. A claim type is an assertion about the object with which it is associated. The assertion is based on an Active Directory ...
  59. A class derived from CIM_ComputerSystem that 'is made up of' two or more computer systems which operate together as an atomic, ...
  60. A class derived from CIM_ComputerSystem that represents a desktop, mobile, network PC, server or other type of a single node ...
  61. A class derived from CIM_LogicalElement that is a special collection of managed system elements. This collection indicates ...
  62. A class derived from CIM_System that is a special collection of CIM_ManagedSystemElement instances. This collection provides ...
  63. A class derived from ComputerSystem that 'is made up of' two or more ComputerSystems which operate together as an atomic, ...
  64. A class derived from ComputerSystem that represents a Desktop, Mobile, NetPC, Server or other type of a single node Computer ...
  65. A class derived from FileSystem that represents access of the FileSystem via a network-related service. In this case, the ...
  66. A class derived from FileSystem that represents the file store controlled by a ComputerSystem through local means (e.g., ...
  67. A class derived from redundancy group containing mass storage-related redundancy information. Storage redundancy groups are ...
  68. A class derived from redundancy group indicating that the aggregated elements have more capacity or capability than is needed. ...
  69. A class derived from RedundancyGroup indicating that one or more of the aggregated elements can be spared. (The actual Spares ...
  70. A class derived from RemoteFileSystem representing that the FileSystem is mounted, using the NFS protocol, from a ComputerSystem. ...
  71. A class derived from System that is a special collection of ManagedSystemElements. This collection provides compute capabilities ...
  72. A client application is using search referrals, indicating that its LDAP_OPT_REFERRALS option is on. LDAP client applications ...
  73. A client computer backup contains errors that must be resolved. Before you can repair the backup, you must resolve all Server ...
  74. A client has associated with the hosted network. Interface GUID: %1 Interface description:%2 Network SSID: %3 Local MAC address: ...
  75. A client has failed to authenticate with the hosted network. Error code: %2 Error Message: %3 Interface GUID: %1 Interface ...