Windows 8

  1. PROBLEM: Failed to register named device for the adapter. Applications may not be able to configure the adapter. ACTION: ...
  2. PROBLEM: PCI Express bandwidth available for this adapter is not sufficient for optimal performance. ACTION: Move the adapter ...
  3. PROBLEM: The driver failed to initialize properly. You may not be able to change the adapter settings. ACTION: Install the ...
  4. PROBLEM: The driver was unable to claim PCI resources of this gigabit network connection. ACTION: Remove any unused driver ...
  5. PROBLEM: The driver was unable to claim PCI resources of this PRO/1000 adapter. ACTION: Remove any unused driver instances ...
  6. PROBLEM: The driver was unable to load due to an unsupported SFP+ module installed in the adapter. ACTION: Replace the module. ...
  7. PROBLEM: The EEPROM on the network adapter may be corrupt. ACTION: Visit "http://www.intel.com/support/go/network/adapter/home.htm" ...
  8. PROBLEM: The EEPROM on your PRO/1000 adapter may have errors. ACTION: Visit the support web site at http://support.intel.com/support/network/ ...
  9. PROBLEM: The gigabit network connection was not configured for bus mastering by the PCI BIOS. ACTION: Install the adapter ...
  10. PROBLEM: The MAC address on the network adapter is invalid. ACTION: Visit "http://www.intel.com/support/go/network/adapter/home.htm" ...
  11. PROBLEM: The network adapter driver did not unload successfully. ACTION: Install the latest driver from "http://www.inte ...
  12. PROBLEM: The network adapter has been stopped because it has overheated. ACTION: Restart the computer. If the problem persists, ...
  13. PROBLEM: The network adapter is configured for auto-negotiation but the link partner is not. This may result in a duplex ...
  14. PROBLEM: The OS was unable to assign PCI resources to the gigabit network connection. ACTION: Move the adapter to another ...
  15. PROBLEM: The OS was unable to assign PCI resources to the PRO/1000 adapter. ACTION: Move the adapter to another slot. ACTION: ...
  16. PROBLEM: The PCI BIOS has NOT properly configured the gigabit network connection. ACTION: Get the latest BIOS for your computer. ...
  17. PROBLEM: The PCI BIOS has NOT properly configured the PRO/1000 adapter. ACTION: Get the latest BIOS for your computer. ACTION: ...
  18. PROBLEM: The PRO/1000 adapter was not configured for bus mastering by the PCI BIOS. ACTION: Install the adapter in a bus ...
  19. PROBLEM: Unable to allocate the map registers necessary for operation. ACTION: Reduce the number of transmit descriptors ...
  20. PROBLEM: Unable to start the network adapter. ACTION: Install the latest driver from "http://www.intel.com/support/go/network/adapter/home.htm". ...
  21. Problems with the Search Filter Host might indicate errors in the Windows Search service, which can cause searches to fail ...
  22. Problems with the Search Protocol Host might indicate errors in the Windows Search service, which can cause searches to fail ...
  23. Process Count - Total shows the number of processes, both active and terminated, that are or have been associated with the ...
  24. Process Creation This policy setting allows you to audit events generated when a process is created or starts. The name of ...
  25. Process Termination This policy setting allows you to audit events generated when a process ends. If you configure this policy ...
  26. Process {result} has the highest CPU percent ({image}%). For this server role, the top process should be Lsass.exe (for Active ...
  27. Processes installation, removal, and enumeration requests for software deployed through Group Policy. If the service is disabled, ...
  28. Processes is the number of processes in the computer at the time of data collection. This is an instantaneous count, not ...
  29. Processes that use the Web Proxy Auto-Discovery (WPAD) protocol invoke it out of process where it runs in a less privileged ...
  30. Processing -File '{0}' failed because the file does not have a '.ps1' extension. Specify a valid Windows PowerShell script ...
  31. Processing the module manifest file '{0}' did not result in a valid manifest object. Update the file to contain a valid Windows ...
  32. Processor %1 was throttled by an entity other than the kernel power manager. IA32_CLOCK_MODULATION MSR = %2. Elapsed time ...
  33. Processor %2 in group %1 exposes the following power management capabilities: Idle state type: %4 (%3 state(s)) Performance ...
  34. Processor idle states have been automatically disabled due to a known incompatibility with the hardware in this computer. ...
  35. Processor Performance is the average performance of the processor while it is executing instructions, as a percentage of ...
  36. Processor performance settings which allow the system to lower processor performance (and power consumption) if the system ...
  37. Processor performance states have been automatically disabled due to a known incompatibility with the hardware in this computer. ...
  38. Processor Queue Length is the number of threads in the processor queue. Unlike the disk counters, this counter counters, ...
  39. Processor throttle states have been automatically disabled due to a known incompatibility with the hardware in this computer. ...
  40. Processor Time is the percentage of elapsed time that all of process threads used the processor to execution instructions. ...
  41. Processor Time is the percentage of elapsed time that the processor spends to execute a non-Idle thread. It is calculated ...
  42. Processor Time is the percentage of elapsed time that the processor spends to execute a non-Idle thread. It is calculated ...
  43. Processor Utility is the amount of work a processor is completing, as a percentage of the amount of work the processor could ...
  44. Product activation telephone numbers can be obtained by searching the phone.inf file for the appropriate phone number for ...
  45. Profile single process This security setting determines which users can use performance monitoring tools to monitor the performance ...
  46. Profile system performance This security setting determines which users can use performance monitoring tools to monitor the ...
  47. Profiles allow you to scan documents or pictures using pre-selected settings. Make sure that you choose a profile to use ...
  48. Profiles store information about how to recognize your voice. Change a profile to recognize a different voice or a different ...
  49. Program %1 with instanceID=%2 was removed from the Security Center reporting database because the program was either uninstalled, ...
  50. Program that stopped working: %ws Repair status: Success - Restart required Damaged file: %ws Type: %ws Version: %ws Created ...
  51. Program(s) or devices(s) requesting attention. Message title: %s Program path: %s Received: %s This problem occurs when a ...
  52. Programs and drivers that might be restored. These programs might not work correctly after restore and might need to be reinstalled: ...
  53. Programs on the remote computer will continue to run after you have disconnected. You can reconnect to this remote session ...
  54. Programs or services may store data in the registry. Therefore, it is important to have this data available on the node on ...
  55. Programs or services may store data in the registry. Therefore, it is important to have this data available on the node on ...
  56. Programs sometimes store temporary information in a TEMP folder. Before a program closes, it usually deletes this information. ...
  57. Programs that require a network connection won't work, because there is no virtual IP address available for this session. ...
  58. Programs that require a network connection won't work, because there is no virtual IP address available for this session. ...
  59. Promotes or Demotes an Active Directory domain controller Command line parameters include: /answer[:filename /unattend[:filename ...
  60. Promotion of the local domain controller to a global catalog has been delayed because the directory partition occupancy requirements ...
  61. Promotion of this domain controller to a global catalog will be delayed for the following interval. Interval (minutes): %1 ...
  62. Propagation stopped because the propagation state for search server cannot be read. Try propagation again. If this error ...
  63. Properties for this program cannot be verified. Another program may be using the APPS.INF file. Close your other programs ...
  64. Properties for this program cannot be verified. The APPS.INF file is missing. Copy the APPS.INF file from your Windows Setup ...
  65. Property Store is not found in the indexer. The possible causes are that the call came during a catalog reset or that the ...
  66. Proposed Central Access Policy does not grant the same access permissions as the current Central Access Policy. Subject: ...
  67. Protect data from modification and preserve confidentiality on the network with these integrity and encryption algorithms. ...
  68. Protect Key operation failed. Cryptographic Parameters: Protector Name: %1 Protector Attributes: %2 Flags: %3 Failure Information: ...
  69. Protected content was recently transferred to this computer. Type the password for your user account on the old computer ...
  70. Protected Extensible Authentication Protocol (PEAP) is the authentication method used with wireless access points and authenticating ...
  71. Protected Mode Internet Explorer Shim - intercepts and elevates CreateProcess, WinExec, CoCreateInstance, CoGetClassObject. ...
  72. Protected Mode Internet Explorer Shim - intercepts save-to-file dialogs and prompts the user with an appropriate location. ...
  73. Protected Mode Internet Explorer Shim - intercepts save-to-file dialogs and prompts the user with the redirected low location. ...
  74. Protected Storage helps safeguard data you want to keep private. These details show which program is attempting to access ...
  75. Protection has not been enabled on the volume. Enabling protection requires a connected account. If you already have a connected ...