Windows 8

  1. The attribute 'encoding' with value '%1' is not valid on a declaration. The value must be one of 'utf8', 'utf-16', 'utf-16le' ...
  2. The attribute 'standalone' with value '%1' is not valid on a declaration. The value must be 'yes' or 'no' on a declaration. ...
  3. The attribute cannot be set because attributes are not supported. Only the following attributes can be set: Archive, Hidden, ...
  4. The attribute index specified (%1) is out of range. There are only %2 attributes on the element '%3' with namespace '%4'. ...
  5. The attribute list entry with attribute of type 1 and instance tag 2 in file 6 is incorrect. The attribute list entry name ...
  6. The attribute list entry with attribute of type 1 and instance tag 2 should be after attribute of type 3 and instance tag ...
  7. The attribute name is colliding with the mapping pairs for attribute of type %4 and instance tag 5. The attribute name offset ...
  8. The attribute name offset 3 of attribute list entry with attribute of type 1 and instance tag 2 in file 5 is too small. The ...
  9. The attribute read from Active Directory does not contain any values. The BitLocker recovery information may be missing or ...
  10. The attribute record offset 1 is too large for attribute of type 3 and instance tag 4 in file 5. The maximum value is 2. ...
  11. The attribute request that was requested has encountered an error that was unlikely, and therefore could not be completed ...
  12. The attribute was not set. Verify that you are logged on with a domain account that has the ability to write information ...
  13. The AttributeID value for the following attribute duplicates the AttributeID value for the following existing attribute. ...
  14. The attributes with same type code 1 but different instance tags 2 and 4 have different names %3 and %5 respectively in file ...
  15. The attributes with same type code 1 but different instance tags 2 and 4 have non-contiguous VCN numbers 3 and 5 respectively ...
  16. The Audio properties dialog box is not designed to be viewed from a distance or for remote control interaction. Do you want ...
  17. The audit log was cleared Primary User Name: %1 Primary Domain: %2 Primary Logon ID: %3 Client User Name: %4 Client Domain: ...
  18. The audit policy (SACL) on an object was changed. Subject: Security ID: %1 Account Name: %2 Account Domain: %3 Logon ID: ...
  19. The audit policy contains duplicate values for one or more subcategories. The duplicate entries will be removed if the policy ...
  20. The Auditing configuration file is not in a valid format. There is invalid data in the file {0}. Use the Group Policy Management ...
  21. The authenticated messages that you already sent using the current internal certificate may be rejected as not authenticated. ...
  22. The authenticated messages that you already sent using the current internal certificate may be rejected as not authenticated. ...
  23. The authentication failed because 3rd party service required for this network is not responding and was automatically restarted ...
  24. The authentication mechanism (%1) requested by the client is not supported by the server. Possible authentication mechanisms ...
  25. The authentication mechanism requested by the proxy is not supported by the client. The only proxy authentication mechanism ...
  26. The authentication or accounting record could not be written to the configured accounting datastore. Ensure that the log ...
  27. The authentication protocol required by the remote server cannot use the stored password. Redial, entering the password explicitly.%0 ...
  28. The authentication request could not be forwarded to the remote RADIUS (Remote Authentication Dial-In User Service) server ...
  29. The authentication request was not processed because it contained a Remote Authentication Dial-In User Service (RADIUS) message ...
  30. The authentication type specified in the Hyper-V Replica Broker replication settings is not valid. Specify a valid authentication ...
  31. The authority information access extension on this certification authority (CA) refers to the local Web server. However, ...
  32. The authorization and license numbers are found on the header of your order confirmation. The authorization number is fifteen ...
  33. The authorization data for the storage root key (SRK) of the Trusted Platform Module (TPM) is not zero and is therefore incompatible ...
  34. The authorization number for the agreement is not valid. The authorization number should be an alphanumeric string of 15 ...
  35. The authorization number is not valid. The authorization number should be a string of 15 alphanumeric character (8 numbers ...
  36. The authorization of DHCP server failed with Error Code: {0}. {1}If the DHCP server is not authorized by AD DS, it cannot ...
  37. The authorization rules configuration file {0} is missing. Windows PowerShell Web Access requires this file. If you do not ...
  38. The authorization rules file {0} is missing. Windows PowerShell Web Access requires this file. If you do not have a backup, ...
  39. The authorization settings cannot be displayed as configured. To view the existing settings, execute "netsh advfirewall show ...
  40. The authorization value of the TPM's storage root key (SRK) is not compatible with Windows. Supply your TPM owner password ...
  41. The auto-unlock master key was not available from the operating system volume. Retry the operation using the BitLocker WMI ...
  42. The auto-unlock master key was not available from the operating system volume. Retry the operation via the BitLocker WMI ...
  43. The automatic correction of a noncompliant forest trust condition was not successful because error %1 occurred in function ...
  44. The automatic correction of a noncompliant FSMO role condition was not successful because error %1 occurred in function %2. ...
  45. The automatic description encoding tag value is invalid. The gatherer is setting this value to "yes". Fix the gthrprm.txt ...
  46. The automatic variable $PSDefaultParameterValues is ignored because it is not a valid Hashtable object. It must be of the ...
  47. The average call duration has exceeded 10 minutes. If this is not the expected behavior, please see article 910904 in the ...
  48. The Average Database Messages Execution Time performance counter shows the average time the database messages are executed ...
  49. The average disk queue length is {queuelength}. The disk may be at its maximum transfer capacity due to throughput and disk ...
  50. The Average Messages Execution Time performance counter shows the average time the messages are executed across all nodes. ...
  51. The average number of Accounting-Request packets received and responded to per second, but not recorded on this NPS server's ...
  52. The average number of duplicate RADIUS Accounting-Request packets received per second on this NPS server's accounting port. ...
  53. The average number of incoming packets per second that are silently discarded for a reason other than "malformed," "invalid ...
  54. The average number of seconds that elapse between the time at which a read or write request to this session is received and ...
  55. The average number of seconds that elapse between the time at which a read or write request to this share is received and ...
  56. The average number of seconds that elapse between the time at which a read request in this session is received and the time ...
  57. The average number of seconds that elapse between the time at which a read request to this share is received and the time ...
  58. The average number of seconds that elapse between the time at which a write request in this session is received and the time ...
  59. The average number of seconds that elapse between the time at which a write request to this share is received and the time ...
  60. The average number of seconds that elapse between the time at which the SMB File Server receives a request for this share ...
  61. The average number of seconds that elapse between the time at which the SMB File Server receives a request in this session ...
  62. The average processor utilization during the trace was high. The system will consume less power when the average processor ...
  63. The average processor utilization during the trace was moderate. The system will consume less power when the average processor ...
  64. The average processor utilization during the trace was very low. The system will consume less power when the average processor ...
  65. The Average Waiting Time To Execute Database Messages performance counter shows the time database messages wait before they ...
  66. The Average Waiting Time To Execute Messages performance counter shows the time messages wait before they can be executed ...
  67. The B-CAS card is missing, is not working, or is not intended for this receiver. Verify the correct card is inserted properly. ...
  68. The backed up data cannot be securely protected at this destination. Backups stored on a remote shared folder might be accessible ...
  69. The backing-file for the real-time session "%1" has reached its maximum size. As a result, new events will not be logged ...
  70. The backup cannot be completed because the backup storage destination is a shared folder mapped to a drive letter. Use the ...
  71. The backup cannot be deleted because the backup storage location is not available. Do you want to delete the entry of the ...
  72. The backup cannot be deleted because the backup storage location is not available. Do you want to delete the entry of the ...
  73. The backup cannot finish because another program is accessing temporary files used by the backup process. Stop or close any ...
  74. The backup cannot finish because another program is accessing temporary files used by the backup process. Stop or close any ...
  75. The backup catalog could not be loaded for the following reason: %1!s!. Should Windows erase the backup catalog and create ...