Windows Server 2008

  1. PROBLEM: Could not allocate the NDIS receive buffers necessary for operation. ACTION: Reduce the number of receive descriptors ...
  2. PROBLEM: Could not allocate the NDIS receive packets necessary for operation. ACTION: Reduce the number of receive descriptors ...
  3. PROBLEM: Could not start the gigabit network connection. ACTION: Connect cable to the network device and restart, or disable ...
  4. PROBLEM: Could not start the gigabit network connection. ACTION: Connect cable to the network device and restart, or disable ...
  5. PROBLEM: Failed to allocate all requested receive resources. ACTION: Reduce the number of receive descriptors and restart. ...
  6. PROBLEM: Failed to allocate all requested transmit resources. ACTION: Reduce the number of transmit descriptors and restart. ...
  7. PROBLEM: Failed to allocate the requested receive resources. ACTION: Reduce the number of receive descriptors and restart. ...
  8. PROBLEM: Failed to register named device for the adapter. Applications may not be able to configure the adapter. ACTION: ...
  9. PROBLEM: The driver was unable to claim PCI resources of this gigabit network connection. ACTION: Remove any unused driver ...
  10. PROBLEM: The driver was unable to claim PCI resources of this PRO/1000 adapter. ACTION: Remove any unused driver instances ...
  11. PROBLEM: The EEPROM on your PRO/1000 adapter may have errors. ACTION: Visit the support web site at http://support.intel.com/support/network/ ...
  12. PROBLEM: The gigabit network connection was not configured for bus mastering by the PCI BIOS. ACTION: Install the adapter ...
  13. PROBLEM: The OS was unable to assign PCI resources to the gigabit network connection. ACTION: Move the adapter to another ...
  14. PROBLEM: The OS was unable to assign PCI resources to the PRO/1000 adapter. ACTION: Move the adapter to another slot. ACTION: ...
  15. PROBLEM: The PCI BIOS has NOT properly configured the gigabit network connection. ACTION: Get the latest BIOS for your computer. ...
  16. PROBLEM: The PCI BIOS has NOT properly configured the PRO/1000 adapter. ACTION: Get the latest BIOS for your computer. ACTION: ...
  17. PROBLEM: The PRO/1000 adapter was not configured for bus mastering by the PCI BIOS. ACTION: Install the adapter in a bus ...
  18. Problems with this Web page might prevent it from being displayed properly or functioning properly. In the future, you can ...
  19. Process Count - Total shows the number of processes, both active and terminated, that are or have been associated with the ...
  20. Process Model hosts Web and WCF services. Introduced with IIS 6.0, the process model is a new architecture that features ...
  21. Process {result} has the highest CPU percent ({image}%). For this server role, the top process should be Lsass.exe (for Active ...
  22. Processes installation, removal, and enumeration requests for software deployed through Group Policy. If the service is disabled, ...
  23. Processes is the number of processes in the computer at the time of data collection. This is an instantaneous count, not ...
  24. Processes that use the Web Proxy Auto-Discovery (WPAD) protocol invoke it out of process where it runs in a less privileged ...
  25. Processing has terminated because an internal inconsistency has been detected. Detailed information may have been logged ...
  26. Processor performance settings which allow the system to lower processor performance (and power consumption) if the system ...
  27. Processor Queue Length is the number of threads in the processor queue. Unlike the disk counters, this counter counters, ...
  28. Processor Time is the percentage of elapsed time that all of process threads used the processor to execution instructions. ...
  29. Processor Time is the percentage of elapsed time that the processor spends to execute a non-Idle thread. It is calculated ...
  30. Product activation telephone numbers can be obtained by searching the phone.inf file for the appropriate phone number for ...
  31. Product identification such as a serial number on software, a die number on a hardware chip, or (for non-commercial Products) ...
  32. Product version information. Corresponds to the Version property in the product object in the DMTF Solution Exchange Standard. ...
  33. Product: %1 - Update '%2' could not be installed. Error code %3. Windows Installer can create logs to help troubleshoot issues ...
  34. Product: %1 - Update '%2' could not be removed. Error code %3. Windows Installer can create logs to help troubleshoot issues ...
  35. Product: %1. Restart required. The installation or update for the product required a restart for all changes to take effect. ...
  36. Product: %1. The application tried to install a more recent version of the protected Windows file %2. You may need to update ...
  37. Profile single process This security setting determines which users can use performance monitoring tools to monitor the performance ...
  38. Profile system performance This security setting determines which users can use performance monitoring tools to monitor the ...
  39. Profiles allow you to scan documents or pictures using pre-selected settings. Make sure that you choose a profile to use ...
  40. Profiles store information about how to recognize your voice. Change a profile to recognize a different voice or a different ...
  41. Program %1 with instanceID=%2 was removed from the Security Center reporting database because the program was either uninstalled, ...
  42. Program that stopped working: %ws Repair status: Success - Restart required Damaged file: %ws Type: %ws Version: %ws Created ...
  43. Program(s) or devices(s) requesting attention. Message title: %s Program path: %s Received: %s This problem happens because ...
  44. Programs customization allows you to specify the default program Windows should automatically use as for a HTML editor, E-mail, ...
  45. Programs or services may store data in the registry. Therefore, it is important to have this data available on the node on ...
  46. Programs or services may store data in the registry. Therefore, it is important to have this data available on the node on ...
  47. Programs sometimes store temporary information in a TEMP folder. Before a program closes, it usually deletes this information. ...
  48. Programs that might affect your privacy or make changes to your computer that could negatively impact your computing experience, ...
  49. Programs that might collect your personal information and negatively affect your privacy or damage your computer, for example, ...
  50. Promotes or Demotes an Active Directory domain controller Command line parameters include: /answer[:filename /unattend[:filename ...
  51. Promotion of the local domain controller to a global catalog has been delayed because the directory partition occupancy requirements ...
  52. Promotion of this domain controller to a global catalog will be delayed for the following interval. Interval (minutes): %1 ...
  53. Propagation stopped because the propagation state for search server cannot be read. Try propagation again. If this error ...
  54. Properties for this program cannot be verified. Another program may be using the APPS.INF file. Close your other programs ...
  55. Properties for this program cannot be verified. The APPS.INF file is missing. Copy the APPS.INF file from your Windows Setup ...
  56. Properties not supported in MS-DOS mode are not available. For more information, click the Advanced button on the Program ...
  57. Property cache modification takes effect when Indexing Service is restarted. Only newly filtered documents will have the ...
  58. Property Store is not found in the indexer. The possible causes are that the call came during a catalog reset or that the ...
  59. PropertyName is a string property and is either DeleteTempFolders or UseTempFolders.They are flags that are either set to ...
  60. PropertyName is an enumeration of the properties: 0 = LPTPortMapping, 1 = COMPortMapping, 2 = AudioMapping, 3 = ClipboardMapping ...
  61. PropertyName is an enumeration of the properties: 0 = SessionDirectoryLocation and 1 = SessionDirectoryClusterNamewhich are ...
  62. Protect data from modification and preserve confidentiality on the network with these integrity and encryption algorithms. ...
  63. Protected content was recently transferred to this computer. Type the password for your user account on the old computer ...
  64. Protected Extensible Authentication Protocol (PEAP) is the authentication method used with wireless access points and authenticating ...
  65. Protected Mode Internet Explorer Shim - intercepts and elevates CreateProcess, WinExec, CoCreateInstance, CoGetClassObject. ...
  66. Protected Mode Internet Explorer Shim - intercepts save-to-file dialogs and prompts the user with an appropriate location. ...
  67. Protected Mode Internet Explorer Shim - intercepts save-to-file dialogs and prompts the user with the redirected low location. ...
  68. Protected mode is currently turned off for the %1!s!, %2!s!, %3!s! and %4!s! zones. Click here to open security settings. ...
  69. Protected Storage helps safeguard data you want to keep private. These details show which program is attempting to access ...
  70. Protection of auditable protected data was attempted. Subject: Security ID: %1 Account Name: %2 Account Domain: %3 Logon ...
  71. Protection of auditable protected data. Data Description: %2 Key Identifier: %1 Protected Data Flags: %3 Protection Algorithms: ...
  72. Provide a hint to help you remember your password. Set the hint so that others cannot use it to easily guess your password. ...
  73. Provide a password to unlock the volume. You must have previously created a Numerical Password protector for the encrypted ...
  74. Provide an external key file to unlock the volume. Required if -RecoveryPassword is not provided. You must have previously ...
  75. Provide the absolute directory path to save file(s) containing displayed external key(s). These external key files may be ...