Windows 8.1
- An invalid parameter value was specified for use with the cryptographic service provider. Please select a valid value from ...
- An invalid parameter was passed to this function. This function takes a package, not an AppxManifest.xml file. RegisterPackage ...
- An invalid request was sent to the admin support thread for the Remote Access Service, possibly from a down-level admin tool. ...
- An invalid response was received from the RADIUS authentication server. Make sure that the case sensitive secret pasword ...
- An Io Request to the device %1 did not complete or canceled within the specific timeout. This can occur if the device driver ...
- An IP address range of a scope which is part of a failover relationship cannot be deleted. The scope will need to be removed ...
- An IP Address Range targeting item allows a preference item to be applied to computers or users only if the processing computer's ...
- An IP filter list is composed of multiple filters. In this way, multiple subnets, IP addresses and protocols can be combined ...
- An IP-HTTPS certificate with a subject name that matches the ConnectToAddress setting is not installed on server %1!s!. Change ...
- An IP-HTTPS certificate with a subject name that matches the public name or IP address used by clients to connect to the ...
- An IP-HTTPS certificate with subject name %1!s! cannot be found on server %2!s!. Manually enroll a certificate with the required ...
- An IPConnectivitySubnet represents a group of related IPProtocolEndpoints that can communicate with each other, as members ...
- An IPsec extended mode negotiation failed. The corresponding main mode security association has been deleted. Local Endpoint: ...
- An IPsec extended mode negotiation failed. The corresponding main mode security association has been deleted. Local Endpoint: ...
- An IPsec main mode negotiation failed. Local Endpoint: Local Principal Name: %1 Network Address: %3 Keying Module Port: %4 ...
- An IPsec main mode negotiation failed. Local Endpoint: Principal Name: %1 Network Address: %9 Keying Module Port: %10 Local ...
- An IPsec main mode security association ended. Local Network Address: %1 Remote Network Address: %2 Keying Module Name: %3 ...
- An IPsec main mode security association was established. Extended mode was not enabled. A certificate was used for authentication. ...
- An IPsec main mode security association was established. Extended mode was not enabled. Certificate authentication was not ...
- An IPsec negotiation with a remote computer failed because the IKE and AuthIP IPsec Keying Modules (IKEEXT) service is not ...
- An IPsec policy has been provided by the domain controller. Domain provided policy overrides policy assigned on the local ...
- An IPsec quick mode negotiation failed. Local Endpoint: Network Address: %1 Network Address mask: %2 Port: %3 Tunnel Endpoint: ...
- An IPsec quick mode negotiation failed. Local Endpoint: Network Address: %1 Network Address mask: %2 Port: %3 Tunnel Endpoint: ...
- An IPsec Quick Mode security association ended. Local address: %1 Local port: %2 Local tunnel endpoint: %3 Remote address: ...
- An IPsec quick mode security association ended. Local Endpoint: Network Address: %1 Network Address mask: %2 Port: %3 Tunnel ...
- An IPsec quick mode security association ended. Local Endpoint: Network Address: %1 Port: %2 Tunnel Endpoint: %3 Remote Endpoint: ...
- An IPsec Quick Mode security association was established. Local address: %1 Local address mask: %2 Local port: %3 Local tunnel ...
- An IPsec quick mode security association was established. Local Endpoint: Network Address: %1 Network Address mask: %2 Port: ...
- An IPsec quick mode security association was established. Local Endpoint: Network Address: %1 Network Address mask: %2 Port: ...
- An IPsec tunnel allows packets to traverse a public or private network with the security level of a direct, private connection ...
- An IPv6 multicast-capable router uses the Multicast Listener Query message to query a link for multicast group membership. ...
- An issuance policy describes the conditions under which a certificate is issued. Select the issuance policy to include in ...
- An item was returned from Active Directory Domain Services for which there is no information available. Contact your system ...
- An LDAP operation exceeded the administratively configured memory limits and was rejected. Consider simplifying the operation ...
- An LDAP query group was created. Subject: Security ID: %4 Account Name: %5 Account Domain: %6 Logon ID: %7 Group: Security ...
- An LDAP query group was deleted. Subject: Security ID: %4 Account Name: %5 Account Domain: %6 Logon ID: %7 Group: Security ...
- An LDAP Query targeting item allows a preference item to be applied to computers or users only if the LDAP query returns ...
- An LDAP search exceeded the administratively configured memory limits and was executed without optimization. Consider simplifying ...
- An MS DTC component was unable to allocate memory for a critical operation. That component is terminating. The category field ...
- An MS DTC log file already exists in the selected directory. Resetting an existing MS DTC log file may cause your databases ...
- An MS DTC log file already exists in the selected directory. Resetting an existing MS DTC log file may cause your databases ...
- An MSI Query targeting item allows a preference item to be applied to computers or users only if certain aspects of an MSI ...
- An network abstraction defined for your environment. This property is inherited from the subnet to which this range maps. ...
- An NFS shared folder with this name already exists. Using the same share name for both SMB-based and NFS-based access is ...
- An NIS domain denotes a group of computers communicating using NIS. NIS subordinate servers running windows are detected ...
- An notification package has been loaded by the Security Account Manager. This package will be notified of any account or ...
- An object (%2) with the following name cannot be found: "%1". Check the selected object types and locations for accuracy ...
- An object cannot be processed because search cannot convert a Notes Access-Denied entry in the Access Control List into a ...
- An object could not be inserted because it was a duplicate of an existing object. The object may be a catalog or other named ...
- An object identifier cannot contain characters other than periods (.) and the numbers from 0 to 9. For more information about ...
- An object identifier cannot contain two consecutive periods (.). For more information about creating object identifiers, ...
- An object identifier must contain at least two numbers separated by a period (.). For more information about creating object ...
- An object identifier uniquely identifies an issuance or application policy. You can use these object identifiers when creating ...
- An object in the COM+ Catalog was modified. Subject: Security ID: %1 Account Name: %2 Account Domain: %3 Logon ID: %4 Object: ...
- An object named "%1" cannot be found. Check the selected object types and location for accuracy and ensure that you typed ...
- An object of this class cannot be created under the schema container. You can only create attribute-schema and class-schema ...
- An object was added to the COM+ Catalog. Subject: Security ID: %1 Account Name: %2 Account Domain: %3 Logon ID: %4 Object: ...
- An object was deleted from the COM+ Catalog. Subject: Security ID: %1 Account Name: %2 Account Domain: %3 Logon ID: %4 Object: ...
- An object was deleted. Subject: Security ID: %1 Account Name: %2 Account Domain: %3 Logon ID: %4 Object: Object Server: %5 ...
- An object was not created because the object's parent was missing. Object: %1 This operation will be tried again later. Objects ...
- An offline or stand-alone CA may not be able to automatically publish updated CRLs. If updated CRLs are not published to ...
- An old configuration is still pending. Please wait for the pending configuration to finish. If the problem persists, execute ...
- An old version of Internet Explorer is installed on this computer. Internet Explorer 4.01 with Service Pack 2 (or newer) ...
- An Online Responder Array controller could not be located or is offline. Please verify that the Array controller is online, ...
- An operating system is software/firmware that makes a computer system's hardware usable, and implements and/or manages the ...
- An Operating System targeting item allows a preference item to be applied to computers or users only if the processing computer's ...
- An operation failed because the disk was full. If this is a thinly provisioned volume the physical storage backing this volume ...
- An operation is being attempted on a command that is being closed. This can happen if the command handle that is being used ...
- An operation is being attempted on a session that is being closed.This can happen if the session that is being used is also ...
- An operation is being attempted on a shell that is being closed. This can happen if the shell that is being used is also ...
- An operation on a socket could not be performed because the system lacked sufficient buffer space or because a queue was ...
- An operation on the backup catalog failed because the catalog is corrupted. Please restore the catalog using the wbadmin.exe ...
- An operation was attempted on a privileged object. Subject: Security ID: %1 Account Name: %2 Account Domain: %3 Logon ID: ...
- An operation was performed on an object. Subject : Security ID: %1 Account Name: %2 Account Domain: %3 Logon ID: %4 Object: ...
- An operator is required to compare the two specified values. Include a valid operator in the command, and then try the command ...