Windows Server 2008

  1. A third-party antispyware product is not enabled. Windows cannot enable the antispyware product automatically. An administrator ...
  2. A third-party antivirus product is not enabled. Windows cannot enable the antivirus product automatically. An administrator ...
  3. A third-party firewall product is not enabled. Windows cannot enable the firewall product automatically. An administrator ...
  4. A thread in Active Directory Domain Services is waiting for the completion of a RPC made to the following directory service. ...
  5. A thread in Active Directory Lightweight Directory Services is waiting for the completion of a RPC made to the following ...
  6. A threadpool worker thread enter a callback at thread affinity %p and exited at affinity %p. This is unexpected, indicating ...
  7. A threadpool worker thread enter a callback at thread base priority x and exited at priority x. This is unexpected, indicating ...
  8. A threadpool worker thread enter a callback, which left the loader lock held. This is unexpected, indicating that the callback ...
  9. A threadpool worker thread enter a callback, which left transaction state. This is unexpected, indicating that the callback ...
  10. A threadpool worker thread enter a callback, which left with background priorities set. This is unexpected, indicating that ...
  11. A threadpool worker thread enter a callback, which left with preferred languages set. This is unexpected, indicating that ...
  12. A threadpool worker thread is impersonating a client, after a callback to p( p). This is unexpected, indicating that the ...
  13. A threadpool worker thread is impersonating a client, after executing an APC. This is unexpected, indicating that the APC ...
  14. A Time Range targeting item allows a preference item to be applied to computers or users only if the current time on the ...
  15. A timeout occurred when collecting counter data. Retry later, or increase the value of the "CollectTime" registry value at ...
  16. A timeout period that specifies the maximum amount of time that the client expects the transition to the new state to take. ...
  17. A TLN or Exclusion record with the specified name exists on the trust but it's type does not match the switch used. Ensure ...
  18. A tModel typically represents a description of an interface and can be referenced as part of the binding and instance information ...
  19. A tModel typically represents a description of an interface and can be referenced as part of the binding and instance information ...
  20. A tModel usually represents a description of an interface. Make tModels easy to locate and reference by adding details, categories, ...
  21. A token request was received for a resource partner with the Uniform Resource Identifier (URI) '%1', but the request could ...
  22. A token request was received for an application with the Uniform Resource Locator (URL) '%1', but the request could not be ...
  23. A Token Ring Lobe Wire Fault has occurred. Verify cable connections. The network adapter will continue to try to reinsert ...
  24. A torn-write was detected during hard recovery in logfile %4. The failing checksum record is located at position %5. This ...
  25. A torn-write was detected during soft recovery in logfile %4. The failing checksum record is located at position %5. The ...
  26. A torn-write was detected while restoring from backup in logfile %4 of the backup set. The failing checksum record is located ...
  27. A TPM was not found. A TPM is required to turn on BitLocker. If your computer has a TPM, then contact the computer manufacturer ...
  28. A transaction lasts %1 minutes and %2 seconds, much longer than expected. (The caller is %3.) Long-running transactions contribute ...
  29. A transition cannot be added here. Make sure two video clips are adjacent on the Video track and that the default duration ...
  30. A Trojan that records user activity, such as keystrokes. This information may be sent to an attacker using e-mail or other ...
  31. A trust is a relationship that enables users in one domain, forest, or realm to be authenticated in a specified domain, forest, ...
  32. A trust policy defines what types of claims your organization issues and accepts when federating with a partner organization. ...
  33. A trust to a domain was removed. Subject: Security ID: %3 Account Name: %4 Account Domain: %5 Logon ID: %6 Domain Information: ...
  34. A trusted forest information entry was added. Subject: Security ID: %10 Account Name: %11 Account Domain: %12 Logon ID: %13 ...
  35. A trusted forest information entry was modified. Subject: Security ID: %1 Account Name: %2 Account Domain: %3 Logon ID: %4 ...
  36. A trusted forest information entry was removed. Subject: Security ID: %10 Account Name: %11 Account Domain: %12 Logon ID: ...
  37. A trusted logon process has been registered with the Local Security Authority. This logon process will be trusted to submit ...
  38. A trusted logon process has registered with the Local Security Authority. This logon process will be trusted to submit logon ...
  39. A TS CAP allows you to specify the users who can connect to this TS Gateway server. A TS RAP allows you to specify the network ...
  40. A tuner for radio cannot be found. Please ensure that the tuner hardware is either plugged in or installed, and that a valid ...
  41. A TV listings provider must be selected before you can download and use the Guide. Please go to Guide Settings and select ...
  42. A UDDI Services site requires a complete installation of all UDDI Services role services, including at least one UDDI Services ...
  43. A UDDI Services site requires a complete installation of all UDDI Services role services, including at least one UDDI Services ...
  44. A UDDI Services site requires a complete installation of all UDDI Services role services, including at least one UDDI Services ...
  45. A UDP endpoint created for provider %1 on interface %2:%3 has been shutdown. An endpoint is shutdown if it is closed by the ...
  46. A use license was granted to a user belonging to the super user group. The user has the following e-mail address: %1 E-mail ...
  47. A user account named %1 already exists on the local computer. Should the demand-dial interface be configured to use this ...
  48. A user account restriction (for example, a time-of-day restriction) is preventing you from logging on. For assistance, contact ...
  49. A user account was changed. Subject: Security ID: %5 Account Name: %6 Account Domain: %7 Logon ID: %8 Target Account: Security ...
  50. A user account was created. Subject: Security ID: %4 Account Name: %5 Account Domain: %6 Logon ID: %7 New Account: Security ...
  51. A user account was deleted. Subject: Security ID: %4 Account Name: %5 Account Domain: %6 Logon ID: %7 Target Account: Security ...
  52. A user account was disabled. Subject: Security ID: %4 Account Name: %5 Account Domain: %6 Logon ID: %7 Target Account: Security ...
  53. A user account was enabled. Subject: Security ID: %4 Account Name: %5 Account Domain: %6 Logon ID: %7 Target Account: Security ...
  54. A user account was locked out. Subject: Security ID: %4 Account Name: %5 Account Domain: %6 Logon ID: %7 Account That Was ...
  55. A user account was unlocked. Subject: Security ID: %4 Account Name: %5 Account Domain: %6 Logon ID: %7 Target Account: Security ...
  56. A user created process matching criteria cannot have the same name as that of a built-in process matching criteria. Please ...
  57. A user has requested a type of logon (e.g., interactive or network) that has not been granted. An administrator has control ...
  58. A user opened a Remote Assistance invitation, but the invitation was closed due to too many bad password attempts to connect ...
  59. A user profile describes the configuration for a specific user, including the user's environment and preference settings. ...
  60. A user QoS policy "%2" potentially conflicts with other QoS policies. See documentation for rules about which policy will ...
  61. A user QoS policy "%2" was ignored because the application path cannot be processed. The application path may be totally ...
  62. A user QoS policy exceeds the maximum allowed name length. The offending policy is listed under the user-level QoS policy ...
  63. A user QoS policy has a zero length name. The offending policy is listed under the user-level QoS policy root key, with index ...
  64. A user right was assigned. Subject: Security ID: %1 Account Name: %2 Account Domain: %3 Logon ID: %4 Target Account: Account ...
  65. A user right was removed. Subject: Security ID: %1 Account Name: %2 Account Domain: %3 Logon ID: %4 Target Account: Account ...
  66. A User targeting item allows a preference item to be applied to users only if the processing user is the user specified in ...
  67. A user tried to use Remote Assistance and send an invitation for help through their default e-mail client, but Remote Assistance ...
  68. A user tried to use Remote Assistance, group policy requires a session log to be maintained, and a session log couldn't be ...
  69. A user was unable to connect on port %1. No more connections can be made to this remote computer because the computer has ...
  70. A user was unable to connect on port %1. The Appletalk Remote Access protocol has been disabled for the Remote Access Server. ...
  71. A user-friendly name for the object. This property allows each instance to define a user-friendly name IN ADDITION TO its ...
  72. A valid backup location could not be found. Windows cannot find a backup on this computer. Attach the backup hard disk or ...
  73. A valid certification authority (CA) configured to issue certificates based on this template cannot be located, or the CA ...
  74. A valid country/region code must be displayed in the box. Zero is not a valid code. To choose a valid Country/region code ...
  75. A valid crash dump was found in the paging file while trying to configure a direct dump. Direct dump is disabled! This occurs ...