Windows Server 2008

  1. The certificate validity period will be shorter than the %1 Certificate Template specifies, because the template validity ...
  2. The certificate was issued but could not be installed. This error can occur if the certificate was requested by the current ...
  3. The certificate you are about to copy refers to a private key. The private key will not be copied with the certificate. Are ...
  4. The certificate you requested was given to you, however, this wizard cannot install it. Contact your administrator for further ...
  5. The certificates bound to the HTTPS listener for IPv4 and IPv6 do not match. For SSTP connections, certificates should be ...
  6. The Certificates snap-in allows you to browse the contents of the certificate stores for yourself, a service, or a computer. ...
  7. The certificates you are about to copy refer to private keys. The private keys will not be copied with the certificates. ...
  8. The certification authority (CA) was unable to perform a decryption operation. This error can occur when an advanced encryption ...
  9. The Certification Authority Certificate Template snap-in allows you to configure the certificate templates that the Certification ...
  10. The certification authority has been uninstalled from this computer. However, Windows was not able to remove objects related ...
  11. The certification authority is already installed on this computer. Microsoft Simple Certificate Enrollment Protocol can send ...
  12. The certification authority name contains characters that are not valid. Specify a different certification authority name. ...
  13. The Certification Authority registration and security settings in Active Directory must be upgraded from the Windows 2000 ...
  14. The Certification Authority Service is installed on this computer. You must remove that service before you can change the ...
  15. The Certification Authority Service is installed on this computer. You must remove that service before you can change the ...
  16. The chain of virtual hard disks is broken. The system cannot locate the parent virtual hard disk for the differencing disk. ...
  17. The chain of virtual hard disks is corrupted. The time stamp of the parent virtual hard disk does not match the time stamp ...
  18. The chain of virtual hard disks is corrupted. There is a mismatch in the identifiers of the parent virtual hard disk and ...
  19. The change for the Triggers service to run under the Network Service account will not take effect as long as the "Allow service ...
  20. The change log cache maintained by the Netlogon service for %1 database changes is inconsistent. The Netlogon service is ...
  21. The Change method modifies a service. The Win32_LoadOrderGroup parameter represents a grouping of system services defining ...
  22. The change was not immediately replicated to the read-only domain controller. The following Active Directory Domain Services ...
  23. The change you are about to make will result in 9 or more permissions that propagate to child objects being added to the ...
  24. The change you just made may have resulted in an access control list that exceeds the maximum size. If this is the problem, ...
  25. The change you just made resulted in an access control list that exceeds the maximum size. You must remove approximately ...
  26. The changes to the spool folder will occur immediately and any currently active documents will not print. It is recommended ...
  27. The ChangeSecurityPermissions method changes the security permissions for the logical file specified in the object path. ...
  28. The ChangeSecurityPermissionsEx method changes the security permissions for the logical file specified in the object path. ...
  29. The ChangeStartMode method modifies the StartMode of a service. It returns one of the following integer values: 0 - The request ...
  30. The channel may not be supported. If you cannot tune to any other channel, restart Windows Media Center or restart the computer, ...
  31. The CheckAccess method verifies that the user possesses the specified permissions. The method returns a uint32 which is 0 ...
  32. The CheckMode property is used to indicate whether the condition is expected to exist or not exist in the environment. When ...
  33. The checkpoint cannot be enabled, because the content index is not idle. Wait until the index is idle, and then try again. ...
  34. The CheckPoint property specifies a value that the service increments periodically to report its progress during a lengthy ...
  35. The checkpoint record cannot be read, and this action cannot be completed. If the problem persists, restart the service, ...
  36. The checkpoint record cannot be updated, and this action cannot be completed. The gatherer will attempt to update the checkpoint ...
  37. The child domain name %1 has an invalid format. This name may contain letters, numbers, and hyphens, but not spaces or periods. ...
  38. The CIM_ActionSequence association is used to define a series of operations that either transitions the software element, ...
  39. The CIM_ActsAsSpare association indicates which elements can spare or replace the other aggregated elements. The fact that ...
  40. The CIM_AggregatePExtent class provides summary information about the addressable logical blocks which are in the same storage ...
  41. The CIM_ApplicationSystem class is used to represent an application or a software system that supports a particular business ...
  42. The CIM_ApplicationSystemSoftwareFeature associations identifies the software features that make up a particular application ...
  43. The CIM_Card class represents a type of physical container that can be plugged into another card or hosting board, or is ...
  44. The CIM_CDROMDrive class represents a CD-ROM drive on the system. Note: The name of the drive does not correspond to the ...
  45. The CIM_Chassis class represents the physical elements that enclose other elements and provide definable functionality, such ...
  46. The CIM_ClusteringService class represents the functionality provided by a cluster. For example, failover functionality may ...
  47. The CIM_ComputerSystem object and its derivatives are Top Level Objects of CIM. They provide the scope for numerous components. ...
  48. The CIM_Container association represents the relationship between a contained and a containing physical element. A containing ...
  49. The CIM_ControlledBy relationship indicates which devices are commanded by or accessed through the controller logical device. ...
  50. The CIM_CopyFileAction specifies files that exist on a computer system, and to move or copy those files to a new location. ...
  51. The CIM_DeviceSoftware relationship identifies any software that is associated with a device - such as drivers, configuration ...
  52. The CIM_DirectoryAction is an abstract class that is used for directories to be managed. Creation of directories is handled ...
  53. The CIM_DirectoryContainsFile class represents an association between a directory and files contained within that directory. ...
  54. The CIM_DirectorySpecification class captures the major directory structure of a software element. This class is used to ...
  55. The CIM_DirectorySpecificationFile association identifies the directorythat contains the file being specified by referencing ...
  56. The CIM_DiskDrive class represents a physical disk drive as seen by the operating system. The features of the drive seen ...
  57. The CIM_FileAction allows the author to locate files that already exist on the users machine, and move or copy those files ...
  58. The CIM_FromDirectoryAction association identifies the source directory for the file action. When this association is used, ...
  59. The CIM_FromDirectorySpecification association identifies the source directory for the file action. When this association ...
  60. The CIM_FRU class is a vendor-defined collection of products and/or physical elements that is associated with a product for ...
  61. The CIM_InstalledSoftwareElement association allows one to identify the computer system a particular software element is ...
  62. The CIM_LogicalDevice dependent reference represents the CIM_LogicalDevice connected to the Universal Serial Bus (USB) controller. ...
  63. The CIM_LogicalElement class is the base class for all the components of the system that represent abstract system components. ...
  64. The CIM_LogicalFile class represents a named collection of data (this can be executable code) located in a file system on ...
  65. The CIM_ManagedSystemElement class is the base class for the system element hierarchy. Membership criteria: Any distinguishable ...
  66. The CIM_OSVersionCheck class specifies the versions of the OS that can support this software element. This check can be for ...
  67. The CIM_PhysicalComponent class represents any low-level or basic component within a package. Any physical element that is ...
  68. The CIM_PhysicalConnector class represents any physical element that is used to connect to other elements. Any object that ...
  69. The CIM_PhysicalLink class represents the cabling of physical elements together. For example, serial or Ethernet cables, ...
  70. The CIM_PhysicalMedia class represents any type of documentation or storage medium, such as tapes, CD ROMs, etc. This class ...
  71. The CIM_PhysicalPackage class represents physical elements that contain or host other components. Examples are a rack enclosure ...
  72. The CIM_PointingDevice class represents a device used to point to regions on the display. Membership criteria: Any device ...
  73. The CIM_ProductParentChild association defines a parent child hierarchy among products. For example, a product may come bundled ...
  74. The CIM_RedundancyComponent association indicates that 'this set of fans' or 'these physical extents' participate in a single ...
  75. The CIM_RedundancyComponent class associates a redundancy group composed of managed system elements and indicates that these ...