Windows 8.1

  1. An invalid parameter value was specified for use with the cryptographic service provider. Please select a valid value from ...
  2. An invalid parameter was passed to this function. This function takes a package, not an AppxManifest.xml file. RegisterPackage ...
  3. An invalid request was sent to the admin support thread for the Remote Access Service, possibly from a down-level admin tool. ...
  4. An invalid response was received from the RADIUS authentication server. Make sure that the case sensitive secret pasword ...
  5. An Io Request to the device %1 did not complete or canceled within the specific timeout. This can occur if the device driver ...
  6. An IP address range of a scope which is part of a failover relationship cannot be deleted. The scope will need to be removed ...
  7. An IP Address Range targeting item allows a preference item to be applied to computers or users only if the processing computer's ...
  8. An IP filter list is composed of multiple filters. In this way, multiple subnets, IP addresses and protocols can be combined ...
  9. An IP-HTTPS certificate with a subject name that matches the ConnectToAddress setting is not installed on server %1!s!. Change ...
  10. An IP-HTTPS certificate with a subject name that matches the public name or IP address used by clients to connect to the ...
  11. An IP-HTTPS certificate with subject name %1!s! cannot be found on server %2!s!. Manually enroll a certificate with the required ...
  12. An IPConnectivitySubnet represents a group of related IPProtocolEndpoints that can communicate with each other, as members ...
  13. An IPsec extended mode negotiation failed. The corresponding main mode security association has been deleted. Local Endpoint: ...
  14. An IPsec extended mode negotiation failed. The corresponding main mode security association has been deleted. Local Endpoint: ...
  15. An IPsec main mode negotiation failed. Local Endpoint: Local Principal Name: %1 Network Address: %3 Keying Module Port: %4 ...
  16. An IPsec main mode negotiation failed. Local Endpoint: Principal Name: %1 Network Address: %9 Keying Module Port: %10 Local ...
  17. An IPsec main mode security association ended. Local Network Address: %1 Remote Network Address: %2 Keying Module Name: %3 ...
  18. An IPsec main mode security association was established. Extended mode was not enabled. A certificate was used for authentication. ...
  19. An IPsec main mode security association was established. Extended mode was not enabled. Certificate authentication was not ...
  20. An IPsec negotiation with a remote computer failed because the IKE and AuthIP IPsec Keying Modules (IKEEXT) service is not ...
  21. An IPsec policy has been provided by the domain controller. Domain provided policy overrides policy assigned on the local ...
  22. An IPsec quick mode negotiation failed. Local Endpoint: Network Address: %1 Network Address mask: %2 Port: %3 Tunnel Endpoint: ...
  23. An IPsec quick mode negotiation failed. Local Endpoint: Network Address: %1 Network Address mask: %2 Port: %3 Tunnel Endpoint: ...
  24. An IPsec Quick Mode security association ended. Local address: %1 Local port: %2 Local tunnel endpoint: %3 Remote address: ...
  25. An IPsec quick mode security association ended. Local Endpoint: Network Address: %1 Network Address mask: %2 Port: %3 Tunnel ...
  26. An IPsec quick mode security association ended. Local Endpoint: Network Address: %1 Port: %2 Tunnel Endpoint: %3 Remote Endpoint: ...
  27. An IPsec Quick Mode security association was established. Local address: %1 Local address mask: %2 Local port: %3 Local tunnel ...
  28. An IPsec quick mode security association was established. Local Endpoint: Network Address: %1 Network Address mask: %2 Port: ...
  29. An IPsec quick mode security association was established. Local Endpoint: Network Address: %1 Network Address mask: %2 Port: ...
  30. An IPsec tunnel allows packets to traverse a public or private network with the security level of a direct, private connection ...
  31. An IPv6 multicast-capable router uses the Multicast Listener Query message to query a link for multicast group membership. ...
  32. An issuance policy describes the conditions under which a certificate is issued. Select the issuance policy to include in ...
  33. An item was returned from Active Directory Domain Services for which there is no information available. Contact your system ...
  34. An LDAP operation exceeded the administratively configured memory limits and was rejected. Consider simplifying the operation ...
  35. An LDAP query group was created. Subject: Security ID: %4 Account Name: %5 Account Domain: %6 Logon ID: %7 Group: Security ...
  36. An LDAP query group was deleted. Subject: Security ID: %4 Account Name: %5 Account Domain: %6 Logon ID: %7 Group: Security ...
  37. An LDAP Query targeting item allows a preference item to be applied to computers or users only if the LDAP query returns ...
  38. An LDAP search exceeded the administratively configured memory limits and was executed without optimization. Consider simplifying ...
  39. An MS DTC component was unable to allocate memory for a critical operation. That component is terminating. The category field ...
  40. An MS DTC log file already exists in the selected directory. Resetting an existing MS DTC log file may cause your databases ...
  41. An MS DTC log file already exists in the selected directory. Resetting an existing MS DTC log file may cause your databases ...
  42. An MSI Query targeting item allows a preference item to be applied to computers or users only if certain aspects of an MSI ...
  43. An network abstraction defined for your environment. This property is inherited from the subnet to which this range maps. ...
  44. An NFS shared folder with this name already exists. Using the same share name for both SMB-based and NFS-based access is ...
  45. An NIS domain denotes a group of computers communicating using NIS. NIS subordinate servers running windows are detected ...
  46. An notification package has been loaded by the Security Account Manager. This package will be notified of any account or ...
  47. An object (%2) with the following name cannot be found: "%1". Check the selected object types and locations for accuracy ...
  48. An object cannot be processed because search cannot convert a Notes Access-Denied entry in the Access Control List into a ...
  49. An object could not be inserted because it was a duplicate of an existing object. The object may be a catalog or other named ...
  50. An object identifier cannot contain characters other than periods (.) and the numbers from 0 to 9. For more information about ...
  51. An object identifier cannot contain two consecutive periods (.). For more information about creating object identifiers, ...
  52. An object identifier must contain at least two numbers separated by a period (.). For more information about creating object ...
  53. An object identifier uniquely identifies an issuance or application policy. You can use these object identifiers when creating ...
  54. An object in the COM+ Catalog was modified. Subject: Security ID: %1 Account Name: %2 Account Domain: %3 Logon ID: %4 Object: ...
  55. An object named "%1" cannot be found. Check the selected object types and location for accuracy and ensure that you typed ...
  56. An object of this class cannot be created under the schema container. You can only create attribute-schema and class-schema ...
  57. An object was added to the COM+ Catalog. Subject: Security ID: %1 Account Name: %2 Account Domain: %3 Logon ID: %4 Object: ...
  58. An object was deleted from the COM+ Catalog. Subject: Security ID: %1 Account Name: %2 Account Domain: %3 Logon ID: %4 Object: ...
  59. An object was deleted. Subject: Security ID: %1 Account Name: %2 Account Domain: %3 Logon ID: %4 Object: Object Server: %5 ...
  60. An object was not created because the object's parent was missing. Object: %1 This operation will be tried again later. Objects ...
  61. An offline or stand-alone CA may not be able to automatically publish updated CRLs. If updated CRLs are not published to ...
  62. An old configuration is still pending. Please wait for the pending configuration to finish. If the problem persists, execute ...
  63. An old version of Internet Explorer is installed on this computer. Internet Explorer 4.01 with Service Pack 2 (or newer) ...
  64. An Online Responder Array controller could not be located or is offline. Please verify that the Array controller is online, ...
  65. An operating system is software/firmware that makes a computer system's hardware usable, and implements and/or manages the ...
  66. An Operating System targeting item allows a preference item to be applied to computers or users only if the processing computer's ...
  67. An operation failed because the disk was full. If this is a thinly provisioned volume the physical storage backing this volume ...
  68. An operation is being attempted on a command that is being closed. This can happen if the command handle that is being used ...
  69. An operation is being attempted on a session that is being closed.This can happen if the session that is being used is also ...
  70. An operation is being attempted on a shell that is being closed. This can happen if the shell that is being used is also ...
  71. An operation on a socket could not be performed because the system lacked sufficient buffer space or because a queue was ...
  72. An operation on the backup catalog failed because the catalog is corrupted. Please restore the catalog using the wbadmin.exe ...
  73. An operation was attempted on a privileged object. Subject: Security ID: %1 Account Name: %2 Account Domain: %3 Logon ID: ...
  74. An operation was performed on an object. Subject : Security ID: %1 Account Name: %2 Account Domain: %3 Logon ID: %4 Object: ...
  75. An operator is required to compare the two specified values. Include a valid operator in the command, and then try the command ...