Windows 8.1
- A PCMCIA Present targeting item allows a preference item to be applied to computers or users only if the processing computer ...
- A PDH function could not allocate enough temporary memory to complete the operation. Close some applications or extend the ...
- A pending interrupt was detected on device %1 during a timeout operation. A large number of these warnings may indicate that ...
- A periodic update has failed polling URL. Please refer error description for detail: %1 AppUserModelId %2 Type %3 URL %4 ...
- A periodic update has rejected polling URL because size of notification exceeded maximum: %1 AppUserModelId %2 Type %3 URL]. ...
- A periodic update has rejected polling URL due to mobile broadband connection such as roaming or reaching quota : %1 AppUserModelId ...
- A permissions error occurred when trying to perform an operation on this server. This can happen if your permissions have ...
- A permissions error occurred when trying to perform an operation, and this wizard must be closed. You may restart the WSUS ...
- A persistent binding request that uses Fibre Channel Protocol (FCP) included a bad or not locatable Fibre Channel identifier ...
- A persistent binding request that uses Fibre Channel Protocol (FCP) included a bad World Wide Name (WWN) for the target node. ...
- A persistent binding request that uses Fibre Channel Protocol (FCP) included a bad World Wide Name (WWN) for the target port. ...
- A persistent binding request that uses Fibre Channel Protocol (FCP) included a Logical Unit Number that is not defined by ...
- A phase 1 crypto set was added to IPsec settings when Windows Firewall started. Set ID: %1 Set Name: %2 Origin: %4 Flags: ...
- A phase 1 crypto set was added to IPsec settings. Set ID: %1 Set Name: %2 Origin: %4 Flags: %6 NumSuites: %7 TimeOutMinutes: ...
- A phase 1 crypto set was deleted from IPsec settings. Deleted Rule: Rule ID: %1 Rule Name: %2 Modifying User: %3 Modifying ...
- A phase 1 crypto set was modified in IPsec settings. Set ID: %1 Set Name: %2 Origin: %4 Flags: %6 NumSuites: %7 TimeOutMinutes: ...
- A phase 2 crypto set was added to IPsec settings when Windows Firewall started. Set ID: %1 Set Name: %2 Origin: %4 Pfs: %6 ...
- A phase 2 crypto set was added to IPsec settings. Set ID: %1 Set Name: %2 Origin: %4 Pfs: %6 NumSuites: %7 ModifyingUser: ...
- A phase 2 crypto set was deleted from IPsec settings. Deleted Rule: Rule ID: %1 Rule Name: %2 Modifying User: %3 Modifying ...
- A phase 2 crypto set was modified in IPsec settings. Set ID: %1 Set Name: %2 Origin: %4 Pfs: %6 NumSuites: %7 ModifyingUser: ...
- A phone book is a collection of access numbers that users can dial to connect to a remote dial-up network. A phone book file ...
- A physical component can be hot swapped if it is possible to replace the element with a physically different but equivalent ...
- A physical component is removable if it is designed to be taken in and out of the physical container in which it is normally ...
- A physical component is replaceable if it is possible to replace (FRU or upgrade) the element with a physically different ...
- A physical package can be hot swapped if it is possible to replace the element with a physically different but equivalent ...
- A physical package is removable if it is designed to be taken in and out of the physical container in which it is normally ...
- A physical package is replaceable if it is possible to replace (FRU or upgrade) the element with a physically different one. ...
- A PhysicalExtent is used to model an SCC RAID implementation. It defines the consecutive addressable block addresses on a ...
- A plug-in is required to correctly play the file. To determine if the plug-in is available to download, click Web Help.%0 ...
- A policy consists of one or more conditions and a set of configuration settings (options, IP Address) that are distributed ...
- A policy is in effect on your computer which prevents you from connecting to this print queue. Please contact your system ...
- A policy with conditions based on fully qualified domain name can have configuration settings for DNS but not for options ...
- A policy with conditions based on fully qualified domain name can have configuration settings for DNS but not for options ...
- A pool of account-identifiers (RIDs) has been invalidated. This may occur in the following expected cases: 1. A domain controller ...
- A pool size for account-identifiers (RIDs) that was configured by an Administrator is greater than the supported maximum. ...
- A pop-up is a small web browser window that appears on top of the website you're viewing. Pop-up windows often open as soon ...
- A Portable Computer targeting item allows a preference item to be applied to computers or users only if the processing computer ...
- A portion of the Active Directory Certificate Services upgrade failed: Could not create CertEnroll folder and/or shared folder ...
- A positive or negative integer used in conjunction with RunDay to indicate the day of the week on which the Job is processed. ...
- A power consumption meter representation with the capability to measure and control budgeting and thresholds of the underlying ...
- A power plan is a collection of hardware and system settings (like display brightness, sleep, etc.) that manages how your ...
- A power plan is a collection of hardware and system settings (like display brightness, sleep, etc.) that manages how your ...
- A power supply may have an associated current sensor, monitoring its input frequency. This is described by this association. ...
- A power supply may have an associated voltage sensor, monitoring its input voltage. This is described by this association. ...
- A power surge has been received from the Satellite TV cable. Please remove the Satellite TV cable now to prevent equipment ...
- A pre-created RODC account that matches the name of the target server exists in the directory. Choose whether to use the ...
- A preexisting logging database was found during your Active Directory Rights Management Services upgrade. To avoid removing ...
- A prefix is the first part of the FQDN to which this rule applies. For example, in the FQDN someserver.corp.contoso.com, ...
- A present auxiliary class {0} is updated with new mustContains. Class definition is changed, mustContains are replaced with ...
- A preshared key provides authentication for your Layer Two Tunneling Protocol over Internet Protocol security (L2TP over ...
- A previous indication of insufficient throughput for one or more VHDs allocation from the pool is handled and no longer valid. ...
- A previous installation for this product is in progress. You must undo the changes made by that installation to continue. ...
- A previous installation of Hyper-V integration services has been detected (version %1). Click OK to upgrade this installation. ...
- A previous operation resulted in this initiator's registrations being preempted, resulting in a Unit Attention condition. ...
- A previous operation resulted in this initiator's reservations being preempted, resulting in a Unit Attention condition. ...
- A previous schema extension has defined some attribute value differently than the schema extension needed for this version ...
- A previous schema extension has defined the attribute value as "%1" for object "%2" differently than the schema extension ...
- A previous version of the Connector is already installed on this computer. Uninstall the existing Connector software and ...
- A previously issued Receive Lookahead command is active for this session. The network control block (NCB) command was rejected. ...
- A primary token was assigned to process. Subject: Security ID: %1 Account Name: %2 Account Domain: %3 Logon ID: %4 Process ...
- A print connection setting is not valid. Use the Group Policy Management Editor to reconfigure the settings in this extension. ...
- A print server provides and manages access to network printers and printer drivers so that network clients can submit print ...
- A printer setup operation failed during the installation process, error code %5, HRESULT %6. See the event user data for ...
- A private key is not configured correctly for the selected certificate. Import the certificate and private key directly into ...
- A private key is not configured correctly for the selected certificate. Using the Certificates snap-in import the certificate ...
- A privilege that the service requires to function properly does not exist in the service account configuration. You may use ...
- A privileged service was called. Subject: Security ID: %1 Account Name: %2 Account Domain: %3 Logon ID: %4 Service: Server: ...
- A problem caused the program to stop working correctly. Windows will close the program and notify you if a solution is available. ...
- A problem has occurred in retrieving the Digital Rights Management machine identification. Contact Microsoft product support.%0 ...
- A problem has occurred in the Digital Rights Management component during license migration. Contact Microsoft product support.%0. ...
- A problem has occurred in the Digital Rights Management component of this application. Try to acquire a license again.%0 ...
- A problem has occurred with one or more user-mode drivers and the hosting process has been terminated. This may temporarily ...
- A problem is preventing the program from starting. Install any available updates, and then try to start the program again. ...
- A problem is preventing Windows from installing the update you've selected. Contact the game publisher for more information. ...
- A problem occurred during hardware installation. The installation of one or more devices is forbidden by system policy. Contact ...