Windows Server 2003

  1. PROBLEM: The OS was unable to assign PCI resources to the gigabit network connection. ACTION: Move the adapter to another ...
  2. PROBLEM: The OS was unable to assign PCI resources to the PRO/1000 adapter. ACTION: Move the adapter to another slot. ACTION: ...
  3. PROBLEM: The PCI BIOS has NOT properly configured the Compaq Ethernet or Fast Ethernet NIC. ACTION: Get the latest BIOS for ...
  4. PROBLEM: The PCI BIOS has NOT properly configured the Compaq/1000 NIC. ACTION: Get the latest BIOS for your computer. ACTION: ...
  5. PROBLEM: The PCI BIOS has NOT properly configured the gigabit network connection. ACTION: Get the latest BIOS for your computer. ...
  6. PROBLEM: The PCI BIOS has NOT properly configured the PRO/1000 adapter. ACTION: Get the latest BIOS for your computer. ACTION: ...
  7. PROBLEM: The PCI configuration of this PRO/10GbE adapter is invalid. ACTION: Get the latest BIOS for your computer. ACTION: ...
  8. PROBLEM: The PRO/1000 adapter was not configured for bus mastering by the PCI BIOS. ACTION: Install the adapter in a bus ...
  9. Problems with this Web page might prevent it from being displayed properly or functioning properly. In the future, you can ...
  10. Process Count - Total shows the number of processes, both active and terminated, that are or have been associated with the ...
  11. Processes installation, removal, and enumeration requests for Active Directory IntelliMirror group policy programs. If the ...
  12. Processes is the number of processes in the computer at the time of data collection. This is an instantaneous count, not ...
  13. Processes that use the Web Proxy Auto-Discovery (WPAD) protocol invoke it out of process where it runs in a less privileged ...
  14. Processor Queue Length is the number of threads in the processor queue. Unlike the disk counters, this counter counters, ...
  15. Processor Time is the percentage of elapsed time that all of process threads used the processor to execution instructions. ...
  16. Processor Time is the percentage of elapsed time that the processor spends to execute a non-Idle thread. It is calculated ...
  17. Product identification such as a serial number on software, a die number on a hardware chip, or (for non-commercial Products) ...
  18. Product version information. Corresponds to the Version property in the product object in the DMTF Solution Exchange Standard. ...
  19. Production - Production environment where all live sites and actual user accounts are hosted. This is the environment your ...
  20. ProductName can be installed only on computers running either Windows XP Professional (with either Q329357 or Service Pack ...
  21. ProductName setup ended prematurely because of an error. Your system has not been modified. To install this program at a ...
  22. ProductName Setup is preparing the InstallShield Wizard which will guide you through the program setup process. Please wait. ...
  23. ProductName setup was interrupted. Your system has not been modified. To install this program at a later time, please run ...
  24. Profiles store information about how to recognize your voice. Change a profile to recognize a different voice or a different ...
  25. Program Compatibility Not Known - Setup cannot determine the compatibility of the software listed below. Most programs support ...
  26. Program Compatibility Not Known Setup cannot determine the compatibility of the software listed below. Most programs support ...
  27. Programs customization allows you to specify the default program Windows should automatically use as for a HTML editor, E-mail, ...
  28. Programs or services may store data in the registry. Therefore, it is important to have this data available on the node on ...
  29. Programs sometimes store temporary information in a TEMP folder. Before a program closes, it usually deletes this information. ...
  30. Prohibits use of Internet Connection Firewall on your DNS domain network. Determines whether users can enable the Internet ...
  31. Prohibits Windows Installer from generating and saving the files it needs to reverse an interrupted or unsuccessful installation. ...
  32. Promotion of the local domain controller to a global catalog has been delayed because the directory partition occupancy requirements ...
  33. Promotion of this domain controller to a global catalog will be delayed for the following interval. Interval (minutes): %1 ...
  34. Prompts users for alternate logon credentials during network-based installations. This setting displays the "Install Program ...
  35. Properties for this program cannot be verified. Another program may be using the APPS.INF file. Close your other programs ...
  36. Properties for this program cannot be verified. The APPS.INF file is missing. Copy the APPS.INF file from your Windows Setup ...
  37. Properties not supported in MS-DOS mode are not available. For more information, click the Advanced button on the Program ...
  38. Property (%1) defined in schema has the Property ID (%2) which collides with property (%3) already defined. Ignoring the ...
  39. Property (%1) defined in schema is attempting to use Property ID (%2) which was already being used by another property. Update ...
  40. PropertyName is a string property and is either DeleteTempFolders or UseTempFolders.They are flags that are either set to ...
  41. PropertyName is an enumeration of the properties: 0 = LPTPortMapping, 1 = COMPortMapping, 2 = AudioMapping, 3 = ClipboardMapping ...
  42. PropertyName is an enumeration of the properties: 0 = SessionDirectoryLocation and 1 = SessionDirectoryClusterNamewhich are ...
  43. Protect your backup files by copying them to floppy disks, a network server, a compressed archive file, or other backup mechanism. ...
  44. Protect your backup files by copying them to floppy disks, a network server, a compressed archive file, or other backup mechanism. ...
  45. Protected Storage has detected data created with a previous version. To continue to use this data, enter your Windows password ...
  46. Protected Storage helps safeguard data you want to keep private. These details show which program is attempting to access ...
  47. Protected Storage helps safeguard data you want to keep private. These details show which program is attempting to access ...
  48. Protected Storage helps safeguard data you wish to keep private. These details show which application is attempting to access ...
  49. Protected Storage uses your Windows password to protect your personal data. Protected Storage has detected a password change. ...
  50. Protected Storage uses your Windows password to protect your personal data. Your password is not currently available to Protected ...
  51. Protected Storage uses your Windows password to protect your personal items. Since you have not logged-off, the password ...
  52. Protected Storage uses your Windows password to protect your personal items. Since you have not rebooted, the password is ...
  53. Protection of auditable protected data. Data Description: %2 Key Identifier: %1 Protected Data Flags: %3 Protection Algorithms: ...
  54. Protects storage of sensitive information, such as private keys, and prevents access by unauthorized services, processes, ...
  55. Protocol specific filtering information: TCP => Server port is required. Client port is optional, except if is FIN or RST. ...
  56. Provide a hint to help you remember your password. Set the hint so that others cannot use it to easily guess your password. ...
  57. Provide the network and security configuration to enable a client to connect to a VPN server. Click Edit to specify these ...
  58. Provides a common interface and object model to access management information about operating system, devices, applications ...
  59. Provides a host service for remote administration COM components. If this service is stopped, some Remote Administration ...
  60. Provides a messaging infrastructure and development tool for creating distributed messaging applications for Windows-based ...
  61. Provides a method that initiates a new internal transaction and returns an MSMQ transaction object representing the new underlying ...
  62. Provides a method that initiates a new MS DTC external transaction and returns an MSMQ transaction object representing the ...
  63. Provides a seamless interface between Microsoft Message Queue Servers (MSMQ) running on Windows computers and IBM MQSeries ...
  64. Provides a space for you to type a server name or a domain name. You can use wildcards in the domain name. Some examples ...
  65. Provides access to extensible Web user interface elements for a remotely managed server. If this service is stopped, it will ...
  66. Provides Active Directory access for Message Queuing clients (Windows 9x, Windows NT 4.0 and Windows 2000) on domain controllers. ...
  67. Provides DDNS name registration and automatic IPv6 connectivity over an IPv4 network. If this service is stopped, other computers ...
  68. Provides end-to-end security between clients and servers on TCP/IP networks. If this service is stopped, TCP/IP security ...
  69. Provides enhanced domain account policies, limits the use of LanManager authentication, and provides further restrictions ...
  70. Provides enhanced local account policies, limits the use of LanMan authentication, enables server-side SMB signing, and provides ...
  71. Provides for setting a more granular set of auditing permissions to the existing account specified.The permissions are set ...
  72. Provides network address translation, addressing, name resolution and/or intrusion prevention services for a home or small ...
  73. Provides network transport and security for Dynamic Data Exchange (DDE) for programs running on the same computer or on different ...
  74. Provides options for closing your programs and logging off, or for leaving your programs running and switching to another ...
  75. Provides options for you to customize the appearance and functionality of your computer, add or remove programs, and set ...