Windows Server 2008

  1. The encryption key length does not meet the policy for secure encryption key. Please use Identity Management for UNIX Administration ...
  2. The encryption settings are supported by computers running Microsoft Routing and Remote Access Service. If you use different ...
  3. The EncryptionLevel property specifies if the encryption level for secure transactions is 40-bit, 128-bit, or n-bit encryption. ...
  4. The EncryptionMethod property is a free form string indicating the algorithm or tool used to encrypt the logical file. If ...
  5. The ending address is not valid for this range. Subnet broadcast addresses (host ID of all 1s) are not valid ending addresses. ...
  6. The ending address specified for the address range is invalid. Please enter an ending address that is greater than or equal ...
  7. The ending address, referenced by an application or operating system and mapped by a memory controller, for this memory object. ...
  8. The EndingAddress property specifies the ending address referenced by an application or operating system. This memory address ...
  9. The enhanced security configuration also adjusts the Internet Explorer extensibility and security settings to further reduce ...
  10. The enhanced security configuration also restricts access to scripts, executable files, and other potentially unsafe files ...
  11. The enhanced security configuration applies to different user accounts according to the type of installation. The following ...
  12. The enhanced security configuration increases the level of security on your server, but may also affect Internet browsing ...
  13. The Enrollee (%1) has no E-Mail name registered in the Active Directory. The E-Mail name will not be included in the certificate. ...
  14. The entered computer name is not valid or remote shutdown is not supported on the target computer. Check the name and then ...
  15. The Enterprise Domain Controllers group does not have read access to this GPO. The Enterprise Domain Controllers group must ...
  16. The Enterprise PKI MMC snap-in allows administrators to assess and manage the health of a Windows Enterprise CA hierarchy. ...
  17. The EnvironmentVariables property contains a list of settings for the configuration of a computer. Environment variables ...
  18. The EqualPerUser, EqualPerSession and EqualPerProcess management rules cannot be applied to an allocation which is sub-allocated. ...
  19. The error occurred while the notification callback was being processed. Background Intelligent Transfer Service (BITS) will ...
  20. The ErrorAccess property indicates the memory access operation that caused the last error. This property is valid only when ...
  21. The ErrorAddress property specifies the address of the last memory error. This property is used only when ErrorInfo is not ...
  22. The ErrorControlForced property contains the command string used to enable error correction control when establishing a connection. ...
  23. The ErrorData property contains data captured from the last memory access with an error. The data occupies the first n octets ...
  24. The ErrorDataOrder property indicates the ordering for data stored in the ErrorData property. This property is used only ...
  25. The ErrorInfo property contains an integer enumeration describing the type of error that occurred most recently. The values, ...
  26. The ErrorMode property controls how the operating system handles several types of serious errors. You can specify that the ...
  27. The ErrorReplaceCharacter property specifies the value of the character used to replace bytes received with a parity error. ...
  28. The ErrorReplacementEnabled specifies whether bytes received with parity errors are replaced with the ErrorReplaceCharacter ...
  29. The ErrorResolution property specifies the amount of data actually determined to cause the error. This property is unused ...
  30. The ErrorTime property contains the time that the last memory error occurred. This property is valid only when ErrorInfo ...
  31. The ErrorTransferSize property specifies the size of the data (containing the last error) being transferred. This property ...
  32. The evaluation period for this installation of Windows Movie Maker has expired, and Windows Movie Maker will now close. Install ...
  33. The evaluation time for %1 ends in %6!d! days and you have not activated. Please make sure you save off any important information ...
  34. The event identifier specifies the message that goes with this event as an entry in the message file associated with the ...
  35. The event log on this node could not be opened and new events will not be reported during this session. An attempt to re-open ...
  36. The event log time could not be converted from UCT to local time. GetTimeZoneInformation returned a value of %1. UCT time ...
  37. The event logging service encountered a configuration-related error (res=%1) for channel %2. The error was encountered while ...
  38. The event logging service encountered a fatal error (res=%1) when applying settings to the %2 channel. The service is shutting ...
  39. The event logging service encountered a log file for channel %1 which is an unsupported version. The log was renamed with ...
  40. The event logging service encountered an error (%1) while enabling publisher %3 to channel %2. This doesn't affect operation ...
  41. The event logging service encountered an error (res=%1) while opening configuration for primary channel %2. Trying again ...
  42. The event logging service encountered an error (res=%1) while opening log file for channel %2. Trying again using default ...
  43. The event logging service encountered an error (res=%1) while parsing filter for channel %2. Will continue without filter. ...
  44. The event logging service encountered an error while initializing publishing resources for channel %2. If channel type is ...
  45. The event logging service encountered an error while processing an incoming event from publisher %3 and trying to process ...
  46. The event message as it appears in the NT Eventlog. This is a standard message with zero or more insertion strings supplied ...
  47. The event provider {0} must guard against concurrent calls to append methods, and may not call append methods if Emit was ...
  48. The event provider {0} must guard against concurrent calls to Emit, and may not call Emit if Emit was previously called without ...
  49. The event provider {0} must guard against concurrent calls to Reset, and may not call Reset until any accumulated event data ...
  50. The event source cannot process the specified filter. Change the filter or remove it from the request and try the request ...
  51. The event source did not return events within the heartbeat interval. The subscription session was closed. Start a new subscription. ...
  52. The event source sent an event packet whose header could not be processed by the client. This can happen if it was malformed ...
  53. The event source was unable to deliver events to the client.This can happen due to network issues preventing the source from ...
  54. The event-to-trap settings are locked. This usually happens when another application either terminated unexpectedly or it ...
  55. The EventCharacter specifies the value of the control character that is used to signal an event, such as end of file. Example: ...
  56. The EventSystem sub system is suppressing duplicate event log entries for a duration of %1 seconds. The suppression timeout ...
  57. The exact error is unknown. Make a note of this error code, which might be useful if you seek additional help to resolve ...
  58. The example companies, organizations, products, domain names, e-mail addresses, logos, people, places, and events depicted ...
  59. The ExceedNotification property indicates whether or not events will be written to the event log when quotas are exceeded. ...
  60. The exclusion %1!s! is not in the network %2!s!/%3!s! which is the scope defined for the DHCP allocator. Please change the ...
  61. The execution of the setup program for application %1 from policy %2 failed. The setup path was %3 and the error was : %4 ...
  62. The existing cluster uses IPv4 cluster addresses, which is not supported on the selected interface. Please select a different ...
  63. The existing cluster uses IPv6 cluster addresses, which is not supported on the selected interface. Please select a different ...
  64. The existing TS Licensing database cannot be restored from its backup copy. To resolve this issue, ensure that the required ...
  65. The existing TS Licensing database file has been saved as "%1!s!". The Terminal Services Licensing service has started with ...
  66. The ExitCode property specifies a Win32 error code defining any problems encountered in starting or stopping the service. ...
  67. The ExpandedMiniDumpDirectory property is an expanded version of the MiniDumpDirectory property. Example: C:\WinNT\MiniDump ...
  68. The ExpectedBatteryLife property indicates the amount of time it takes to completely drain the battery after it has been ...
  69. The expiration date for installing this program is %s. You have chosen a date that occurs after the expiration date. Please ...
  70. The expiration time of the subscription is invalid. The time is either not supported, zero or a time that happened in the ...
  71. The expiration time passed to the WS-Management Enumerate method is not valid. The time value may be zero or refer to a time ...
  72. The exported file already exists in the specified directory. The existing file will be deleted before it is overwritten with ...
  73. The ExposedLocally property indicates whether the shadow copy is exposed on the local machine with a drive letter or mount ...
  74. The ExposedName property is the file system name of the shadow copy when it is exposed. This property might contain a drive ...
  75. The ExposedPath property is the file system path of the shadow copy when it is exposed. This property is NULL when the shadow ...