Windows Server 2008

  1. An Io Request to the device %1 did not complete or canceled within the specific timeout. This can occur if the device driver ...
  2. An IP address can be automatically obtained by this network card from a DHCP server. If your network does not have a DHCP ...
  3. An IP Address Range targeting item allows a preference item to be applied to computers or users only if the processing computer's ...
  4. An IP filter list is composed of multiple filters. In this way, multiple subnets, IP addresses and protocols can be combined ...
  5. An IPsec Extended Mode negotiation failed. The corresponding Main Mode security association has been deleted. Local Endpoint: ...
  6. An IPsec Extended Mode negotiation failed. The corresponding Main Mode security association has been deleted. Local Endpoint: ...
  7. An IPsec Main Mode negotiation failed. Local Endpoint: Local Principal Name: %1 Network Address: %3 Keying Module Port: %4 ...
  8. An IPsec Main Mode negotiation failed. Local Endpoint: Principal Name: %1 Network Address: %9 Keying Module Port: %10 Local ...
  9. An IPsec Main Mode security association ended. Local Network Address: %1 Remote Network Address: %2 Keying Module Name: %3 ...
  10. An IPsec Main Mode security association was established. Extended Mode was not enabled. A certificate was used for authentication. ...
  11. An IPsec Main Mode security association was established. Extended Mode was not enabled. Certificate authentication was not ...
  12. An IPsec negotiation with a remote computer failed because the IKE and AuthIP IPsec Keying Modules (IKEEXT) service is not ...
  13. An IPsec policy has been provided by the domain controller. Domain provided policy overrides policy assigned on the local ...
  14. An IPsec Quick Mode negotiation failed. Local Endpoint: Network Address: %1 Network Address mask: %2 Port: %3 Tunnel Endpoint: ...
  15. An IPsec Quick Mode security association ended. Local address: %1 Local port: %2 Local tunnel endpoint: %3 Remote address: ...
  16. An IPsec Quick Mode security association ended. Local Endpoint: Network Address: %1 Port: %2 Tunnel Endpoint: %3 Remote Endpoint: ...
  17. An IPsec Quick Mode security association was established. Local address: %1 Local address mask: %2 Local port: %3 Local tunnel ...
  18. An IPsec Quick Mode security association was established. Local Endpoint: Network Address: %1 Network Address mask: %2 Port: ...
  19. An IPsec tunnel allows packets to traverse a public or private network with the security level of a direct, private connection ...
  20. An IPv6 multicast-capable router uses the Multicast Listener Query message to query a link for multicast group membership. ...
  21. An IrDA serial infrared device is a built-in COM port or external transceiver which transmits infrared pulses. This NDIS ...
  22. An issuance policy describes the conditions under which a certificate is issued. Select the issuance policy to include in ...
  23. An item was returned from Active Directory Domain Services for which there is no information available. Contact your system ...
  24. An LDAP query group was created. Subject: Security ID: %4 Account Name: %5 Account Domain: %6 Logon ID: %7 Group: Security ...
  25. An LDAP query group was deleted. Subject: Security ID: %4 Account Name: %5 Account Domain: %6 Logon ID: %7 Group: Security ...
  26. An LDAP Query targeting item allows a preference item to be applied to computers or users only if the LDAP query returns ...
  27. An MS DTC component was unable to allocate memory for a critical operation. That component is terminating. The category field ...
  28. An MS DTC log file already exists in the selected directory. Resetting an existing MS DTC log file may cause your databases ...
  29. An MS DTC log file already exists in the selected directory. Resetting an existing MS DTC log file may cause your databases ...
  30. An MSI Query targeting item allows a preference item to be applied to computers or users only if certain aspects of an MSI ...
  31. An MSMQ Configuration (msmq) object with the GUID supplied cannot be created. By default, an Active Directory Domain Services ...
  32. An NFS shared folder with this name already exists. Using the same share name for both SMB-based and NFS-based access is ...
  33. An NIS domain denotes a group of computers communicating using NIS. NIS subordinate servers running windows are detected ...
  34. An notification package has been loaded by the Security Account Manager. This package will be notified of any account or ...
  35. An object (%2) with the following name cannot be found: "%1". Check the selected object types and locations for accuracy ...
  36. An object cannot be processed because search cannot convert a Notes Access-Denied entry in the Access Control List into a ...
  37. An object could not be inserted because it was a duplicate of an existing object. The object may be a catalog or other named ...
  38. An object identifier cannot contain characters other than periods (.) and the numbers from 0 to 9. For more information about ...
  39. An object identifier cannot contain two consecutive periods (.). For more information about creating object identifiers, ...
  40. An object identifier must contain at least two numbers separated by a period (.). For more information about creating object ...
  41. An object identifier uniquely identifies an issuance or application policy. You can use these object identifiers when creating ...
  42. An object in the COM+ Catalog was modified. Subject: Security ID: %1 Account Name: %2 Account Domain: %3 Logon ID: %4 Object: ...
  43. An object named "%1" cannot be found. Check the selected object types and location for accuracy and ensure that you typed ...
  44. An object of this class cannot be created under the schema container. You can only create attribute-schema and class-schema ...
  45. An object was added to the COM+ Catalog. Subject: Security ID: %1 Account Name: %2 Account Domain: %3 Logon ID: %4 Object: ...
  46. An object was deleted from the COM+ Catalog. Subject: Security ID: %1 Account Name: %2 Account Domain: %3 Logon ID: %4 Object: ...
  47. An object was deleted. Subject: Security ID: %1 Account Name: %2 Account Domain: %3 Logon ID: %4 Object: Object Server: %5 ...
  48. An old version of Internet Explorer is installed on this computer. Internet Explorer 4.01 with Service Pack 2 (or newer) ...
  49. An Online Responder Array controller could not be located or is offline. Please verify that the Array controller is online, ...
  50. An operating system is software/firmware that makes a computer system's hardware usable, and implements and/or manages the ...
  51. An Operating System targeting item allows a preference item to be applied to computers or users only if the processing computer's ...
  52. An operation is being attempted on a command that is being closed. This can happen if the command handle that is being used ...
  53. An operation is being attempted on a session that is being closed.This can happen if the session that is being used is also ...
  54. An operation is being attempted on a shell that is being closed. This can happen if the shell that is being used is also ...
  55. An operation on a socket could not be performed because the system lacked sufficient buffer space or because a queue was ...
  56. An operation was attempted on a privileged object. Subject: Security ID: %1 Account Name: %2 Account Domain: %3 Logon ID: ...
  57. An operation was performed on an object. Subject : Security ID: %1 Account Name: %2 Account Domain: %3 Logon ID: %4 Object: ...
  58. An Organizational Unit targeting item allows a preference item to be applied to computers or users only if the user or computer ...
  59. An overridden property was deleted. This value is returned to signal that the original non-overridden value has been restored ...
  60. An overview document is an HTTP-accessible resource, such as a WSDL file or interface specification, that typically contains ...
  61. An overview document is an HTTP-accessible resource, such as WSDL file or specification document, that usually contains technical ...
  62. An overview document is an HTTP-accessible resource, such as WSDL file or specification document, that usually contains technical ...
  63. An SCW analysis operation was performed, but a specific SCW analysis extension failed to complete successfully. Machine Name: ...
  64. An SMB shared folder with this name already exists. Using the same share name for both SMB-based and NFS-based access is ...
  65. An SSL %1 handshake completed successfully. The negotiated cryptographic parameters are as follows. Protocol: %2 CipherSuite: ...
  66. An SSL connection request was received from a remote client application, but none of the cipher suites supported by the client ...
  67. An unauthorized change was made to %1. %1 must be reinstalled to activate. Insert the %1 installation DVD or CD into your ...
  68. An unauthorized change was made to %1. %1 must be reinstalled to activate. Insert the %1 installation DVD or CD into your ...
  69. An unauthorized DHCP server on a network can cause a variety of problems, such as the leasing of duplicate IP addresses. ...
  70. An Uncorrected Hardware Error Occurred Error Source: Machine Check Exception Error Type: Bus or Interconnect error. Processor ...
  71. An Uncorrected Hardware Error Occurred Error Source: Machine Check Exception Error Type: Bus or Interconnect timeout error. ...
  72. An Uncorrected Hardware Error Occurred Error Source: Machine Check Exception Error Type: Internal processor error Processor ...
  73. An Uncorrected Hardware Error Occurred Error Source: Machine Check Exception Error Type: Internal watchdog timer error Processor ...
  74. An Uncorrected Hardware Error Occurred Error Source: Machine Check Exception Error Type: Memory Hierarchy Error. Processor ...
  75. An Uncorrected Hardware Error Occurred Error Source: Machine Check Exception Error Type: Processor functional redundancy ...