Windows 8
- The attribute 'encoding' with value '%1' is not valid on a declaration. The value must be one of 'utf8', 'utf-16', 'utf-16le' ...
- The attribute 'standalone' with value '%1' is not valid on a declaration. The value must be 'yes' or 'no' on a declaration. ...
- The attribute cannot be set because attributes are not supported. Only the following attributes can be set: Archive, Hidden, ...
- The attribute index specified (%1) is out of range. There are only %2 attributes on the element '%3' with namespace '%4'. ...
- The attribute list entry with attribute of type 1 and instance tag 2 in file 6 is incorrect. The attribute list entry name ...
- The attribute list entry with attribute of type 1 and instance tag 2 should be after attribute of type 3 and instance tag ...
- The attribute name is colliding with the mapping pairs for attribute of type %4 and instance tag 5. The attribute name offset ...
- The attribute name offset 3 of attribute list entry with attribute of type 1 and instance tag 2 in file 5 is too small. The ...
- The attribute read from Active Directory does not contain any values. The BitLocker recovery information may be missing or ...
- The attribute record offset 1 is too large for attribute of type 3 and instance tag 4 in file 5. The maximum value is 2. ...
- The attribute request that was requested has encountered an error that was unlikely, and therefore could not be completed ...
- The attribute was not set. Verify that you are logged on with a domain account that has the ability to write information ...
- The AttributeID value for the following attribute duplicates the AttributeID value for the following existing attribute. ...
- The attributes with same type code 1 but different instance tags 2 and 4 have different names %3 and %5 respectively in file ...
- The attributes with same type code 1 but different instance tags 2 and 4 have non-contiguous VCN numbers 3 and 5 respectively ...
- The Audio properties dialog box is not designed to be viewed from a distance or for remote control interaction. Do you want ...
- The audit log was cleared Primary User Name: %1 Primary Domain: %2 Primary Logon ID: %3 Client User Name: %4 Client Domain: ...
- The audit policy (SACL) on an object was changed. Subject: Security ID: %1 Account Name: %2 Account Domain: %3 Logon ID: ...
- The audit policy contains duplicate values for one or more subcategories. The duplicate entries will be removed if the policy ...
- The Auditing configuration file is not in a valid format. There is invalid data in the file {0}. Use the Group Policy Management ...
- The authenticated messages that you already sent using the current internal certificate may be rejected as not authenticated. ...
- The authenticated messages that you already sent using the current internal certificate may be rejected as not authenticated. ...
- The authentication failed because 3rd party service required for this network is not responding and was automatically restarted ...
- The authentication mechanism (%1) requested by the client is not supported by the server. Possible authentication mechanisms ...
- The authentication mechanism requested by the proxy is not supported by the client. The only proxy authentication mechanism ...
- The authentication or accounting record could not be written to the configured accounting datastore. Ensure that the log ...
- The authentication protocol required by the remote server cannot use the stored password. Redial, entering the password explicitly.%0 ...
- The authentication request could not be forwarded to the remote RADIUS (Remote Authentication Dial-In User Service) server ...
- The authentication request was not processed because it contained a Remote Authentication Dial-In User Service (RADIUS) message ...
- The authentication type specified in the Hyper-V Replica Broker replication settings is not valid. Specify a valid authentication ...
- The authority information access extension on this certification authority (CA) refers to the local Web server. However, ...
- The authorization and license numbers are found on the header of your order confirmation. The authorization number is fifteen ...
- The authorization data for the storage root key (SRK) of the Trusted Platform Module (TPM) is not zero and is therefore incompatible ...
- The authorization number for the agreement is not valid. The authorization number should be an alphanumeric string of 15 ...
- The authorization number is not valid. The authorization number should be a string of 15 alphanumeric character (8 numbers ...
- The authorization of DHCP server failed with Error Code: {0}. {1}If the DHCP server is not authorized by AD DS, it cannot ...
- The authorization rules configuration file {0} is missing. Windows PowerShell Web Access requires this file. If you do not ...
- The authorization rules file {0} is missing. Windows PowerShell Web Access requires this file. If you do not have a backup, ...
- The authorization settings cannot be displayed as configured. To view the existing settings, execute "netsh advfirewall show ...
- The authorization value of the TPM's storage root key (SRK) is not compatible with Windows. Supply your TPM owner password ...
- The auto-unlock master key was not available from the operating system volume. Retry the operation using the BitLocker WMI ...
- The auto-unlock master key was not available from the operating system volume. Retry the operation via the BitLocker WMI ...
- The automatic correction of a noncompliant forest trust condition was not successful because error %1 occurred in function ...
- The automatic correction of a noncompliant FSMO role condition was not successful because error %1 occurred in function %2. ...
- The automatic description encoding tag value is invalid. The gatherer is setting this value to "yes". Fix the gthrprm.txt ...
- The automatic variable $PSDefaultParameterValues is ignored because it is not a valid Hashtable object. It must be of the ...
- The average call duration has exceeded 10 minutes. If this is not the expected behavior, please see article 910904 in the ...
- The Average Database Messages Execution Time performance counter shows the average time the database messages are executed ...
- The average disk queue length is {queuelength}. The disk may be at its maximum transfer capacity due to throughput and disk ...
- The Average Messages Execution Time performance counter shows the average time the messages are executed across all nodes. ...
- The average number of Accounting-Request packets received and responded to per second, but not recorded on this NPS server's ...
- The average number of duplicate RADIUS Accounting-Request packets received per second on this NPS server's accounting port. ...
- The average number of incoming packets per second that are silently discarded for a reason other than "malformed," "invalid ...
- The average number of seconds that elapse between the time at which a read or write request to this session is received and ...
- The average number of seconds that elapse between the time at which a read or write request to this share is received and ...
- The average number of seconds that elapse between the time at which a read request in this session is received and the time ...
- The average number of seconds that elapse between the time at which a read request to this share is received and the time ...
- The average number of seconds that elapse between the time at which a write request in this session is received and the time ...
- The average number of seconds that elapse between the time at which a write request to this share is received and the time ...
- The average number of seconds that elapse between the time at which the SMB File Server receives a request for this share ...
- The average number of seconds that elapse between the time at which the SMB File Server receives a request in this session ...
- The average processor utilization during the trace was high. The system will consume less power when the average processor ...
- The average processor utilization during the trace was moderate. The system will consume less power when the average processor ...
- The average processor utilization during the trace was very low. The system will consume less power when the average processor ...
- The Average Waiting Time To Execute Database Messages performance counter shows the time database messages wait before they ...
- The Average Waiting Time To Execute Messages performance counter shows the time messages wait before they can be executed ...
- The B-CAS card is missing, is not working, or is not intended for this receiver. Verify the correct card is inserted properly. ...
- The backed up data cannot be securely protected at this destination. Backups stored on a remote shared folder might be accessible ...
- The backing-file for the real-time session "%1" has reached its maximum size. As a result, new events will not be logged ...
- The backup cannot be completed because the backup storage destination is a shared folder mapped to a drive letter. Use the ...
- The backup cannot be deleted because the backup storage location is not available. Do you want to delete the entry of the ...
- The backup cannot be deleted because the backup storage location is not available. Do you want to delete the entry of the ...
- The backup cannot finish because another program is accessing temporary files used by the backup process. Stop or close any ...
- The backup cannot finish because another program is accessing temporary files used by the backup process. Stop or close any ...
- The backup catalog could not be loaded for the following reason: %1!s!. Should Windows erase the backup catalog and create ...