Windows Server 2008
- PROBLEM: Could not allocate the NDIS receive buffers necessary for operation. ACTION: Reduce the number of receive descriptors ...
- PROBLEM: Could not allocate the NDIS receive packets necessary for operation. ACTION: Reduce the number of receive descriptors ...
- PROBLEM: Could not start the gigabit network connection. ACTION: Connect cable to the network device and restart, or disable ...
- PROBLEM: Could not start the gigabit network connection. ACTION: Connect cable to the network device and restart, or disable ...
- PROBLEM: Failed to allocate all requested receive resources. ACTION: Reduce the number of receive descriptors and restart. ...
- PROBLEM: Failed to allocate all requested transmit resources. ACTION: Reduce the number of transmit descriptors and restart. ...
- PROBLEM: Failed to allocate the requested receive resources. ACTION: Reduce the number of receive descriptors and restart. ...
- PROBLEM: Failed to register named device for the adapter. Applications may not be able to configure the adapter. ACTION: ...
- PROBLEM: The driver was unable to claim PCI resources of this gigabit network connection. ACTION: Remove any unused driver ...
- PROBLEM: The driver was unable to claim PCI resources of this PRO/1000 adapter. ACTION: Remove any unused driver instances ...
- PROBLEM: The EEPROM on your PRO/1000 adapter may have errors. ACTION: Visit the support web site at http://support.intel.com/support/network/ ...
- PROBLEM: The gigabit network connection was not configured for bus mastering by the PCI BIOS. ACTION: Install the adapter ...
- PROBLEM: The OS was unable to assign PCI resources to the gigabit network connection. ACTION: Move the adapter to another ...
- PROBLEM: The OS was unable to assign PCI resources to the PRO/1000 adapter. ACTION: Move the adapter to another slot. ACTION: ...
- PROBLEM: The PCI BIOS has NOT properly configured the gigabit network connection. ACTION: Get the latest BIOS for your computer. ...
- PROBLEM: The PCI BIOS has NOT properly configured the PRO/1000 adapter. ACTION: Get the latest BIOS for your computer. ACTION: ...
- PROBLEM: The PRO/1000 adapter was not configured for bus mastering by the PCI BIOS. ACTION: Install the adapter in a bus ...
- Problems with this Web page might prevent it from being displayed properly or functioning properly. In the future, you can ...
- Process Count - Total shows the number of processes, both active and terminated, that are or have been associated with the ...
- Process Model hosts Web and WCF services. Introduced with IIS 6.0, the process model is a new architecture that features ...
- Process {result} has the highest CPU percent ({image}%). For this server role, the top process should be Lsass.exe (for Active ...
- Processes installation, removal, and enumeration requests for software deployed through Group Policy. If the service is disabled, ...
- Processes is the number of processes in the computer at the time of data collection. This is an instantaneous count, not ...
- Processes that use the Web Proxy Auto-Discovery (WPAD) protocol invoke it out of process where it runs in a less privileged ...
- Processing has terminated because an internal inconsistency has been detected. Detailed information may have been logged ...
- Processor performance settings which allow the system to lower processor performance (and power consumption) if the system ...
- Processor Queue Length is the number of threads in the processor queue. Unlike the disk counters, this counter counters, ...
- Processor Time is the percentage of elapsed time that all of process threads used the processor to execution instructions. ...
- Processor Time is the percentage of elapsed time that the processor spends to execute a non-Idle thread. It is calculated ...
- Product activation telephone numbers can be obtained by searching the phone.inf file for the appropriate phone number for ...
- Product identification such as a serial number on software, a die number on a hardware chip, or (for non-commercial Products) ...
- Product version information. Corresponds to the Version property in the product object in the DMTF Solution Exchange Standard. ...
- Product: %1 - Update '%2' could not be installed. Error code %3. Windows Installer can create logs to help troubleshoot issues ...
- Product: %1 - Update '%2' could not be removed. Error code %3. Windows Installer can create logs to help troubleshoot issues ...
- Product: %1. Restart required. The installation or update for the product required a restart for all changes to take effect. ...
- Product: %1. The application tried to install a more recent version of the protected Windows file %2. You may need to update ...
- Profile single process This security setting determines which users can use performance monitoring tools to monitor the performance ...
- Profile system performance This security setting determines which users can use performance monitoring tools to monitor the ...
- Profiles allow you to scan documents or pictures using pre-selected settings. Make sure that you choose a profile to use ...
- Profiles store information about how to recognize your voice. Change a profile to recognize a different voice or a different ...
- Program %1 with instanceID=%2 was removed from the Security Center reporting database because the program was either uninstalled, ...
- Program that stopped working: %ws Repair status: Success - Restart required Damaged file: %ws Type: %ws Version: %ws Created ...
- Program(s) or devices(s) requesting attention. Message title: %s Program path: %s Received: %s This problem happens because ...
- Programs customization allows you to specify the default program Windows should automatically use as for a HTML editor, E-mail, ...
- Programs or services may store data in the registry. Therefore, it is important to have this data available on the node on ...
- Programs or services may store data in the registry. Therefore, it is important to have this data available on the node on ...
- Programs sometimes store temporary information in a TEMP folder. Before a program closes, it usually deletes this information. ...
- Programs that might affect your privacy or make changes to your computer that could negatively impact your computing experience, ...
- Programs that might collect your personal information and negatively affect your privacy or damage your computer, for example, ...
- Promotes or Demotes an Active Directory domain controller Command line parameters include: /answer[:filename /unattend[:filename ...
- Promotion of the local domain controller to a global catalog has been delayed because the directory partition occupancy requirements ...
- Promotion of this domain controller to a global catalog will be delayed for the following interval. Interval (minutes): %1 ...
- Propagation stopped because the propagation state for search server cannot be read. Try propagation again. If this error ...
- Properties for this program cannot be verified. Another program may be using the APPS.INF file. Close your other programs ...
- Properties for this program cannot be verified. The APPS.INF file is missing. Copy the APPS.INF file from your Windows Setup ...
- Properties not supported in MS-DOS mode are not available. For more information, click the Advanced button on the Program ...
- Property cache modification takes effect when Indexing Service is restarted. Only newly filtered documents will have the ...
- Property Store is not found in the indexer. The possible causes are that the call came during a catalog reset or that the ...
- PropertyName is a string property and is either DeleteTempFolders or UseTempFolders.They are flags that are either set to ...
- PropertyName is an enumeration of the properties: 0 = LPTPortMapping, 1 = COMPortMapping, 2 = AudioMapping, 3 = ClipboardMapping ...
- PropertyName is an enumeration of the properties: 0 = SessionDirectoryLocation and 1 = SessionDirectoryClusterNamewhich are ...
- Protect data from modification and preserve confidentiality on the network with these integrity and encryption algorithms. ...
- Protected content was recently transferred to this computer. Type the password for your user account on the old computer ...
- Protected Extensible Authentication Protocol (PEAP) is the authentication method used with wireless access points and authenticating ...
- Protected Mode Internet Explorer Shim - intercepts and elevates CreateProcess, WinExec, CoCreateInstance, CoGetClassObject. ...
- Protected Mode Internet Explorer Shim - intercepts save-to-file dialogs and prompts the user with an appropriate location. ...
- Protected Mode Internet Explorer Shim - intercepts save-to-file dialogs and prompts the user with the redirected low location. ...
- Protected mode is currently turned off for the %1!s!, %2!s!, %3!s! and %4!s! zones. Click here to open security settings. ...
- Protected Storage helps safeguard data you want to keep private. These details show which program is attempting to access ...
- Protection of auditable protected data was attempted. Subject: Security ID: %1 Account Name: %2 Account Domain: %3 Logon ...
- Protection of auditable protected data. Data Description: %2 Key Identifier: %1 Protected Data Flags: %3 Protection Algorithms: ...
- Provide a hint to help you remember your password. Set the hint so that others cannot use it to easily guess your password. ...
- Provide a password to unlock the volume. You must have previously created a Numerical Password protector for the encrypted ...
- Provide an external key file to unlock the volume. Required if -RecoveryPassword is not provided. You must have previously ...
- Provide the absolute directory path to save file(s) containing displayed external key(s). These external key files may be ...