Windows 10

  1. A fatal error occurred while opening the system %1 cryptographic module. Operations that require the SSL or TLS cryptographic ...
  2. A fatal error occurred while printing job %1, id %2 on the print queue %3. The print filter pipeline process was terminated. ...
  3. A fatal hardware error has occurred. Component: %5 Error Source: %1 Bus:Device:Function: %9:%10:%11 Vendor ID:Device ID: ...
  4. A fatal hardware error has occurred. Component: %5 Error Source: %1 The details view of this entry contains further information. ...
  5. A fatal hardware error has occurred. Component: AMD Northbridge Error Source: %1 Error Type: %7 Processor APIC ID: %2 The ...
  6. A fatal hardware error has occurred. Component: Memory Error Source: %1 Error Type: %19 The details view of this entry contains ...
  7. A fatal hardware error has occurred. Component: Memory Error Source: %1 The details view of this entry contains further information. ...
  8. A fatal hardware error has occurred. Component: PCI/PCI-X Bus Error Source: %1 Error Type: %5 Segment:Bus: %7:%6 The details ...
  9. A fatal hardware error has occurred. Component: PCI/PCI-X Bus Error Source: %1 Error Type: %5 The details view of this entry ...
  10. A fatal hardware error has occurred. Component: PCI/PCI-X Device Error Source: %1 Error Type: %5 Segment:Bus:Device:Function: ...
  11. A fatal hardware error has occurred. Component: PCI/PCI-X Device Error Source: %1 Error Type: %5 The details view of this ...
  12. A fatal hardware error has occurred. Reported by component: Processor Core Error Source: %1 Error Type: %7 Processor APIC ...
  13. A fax .tif file cannot be created for archiving, and the fax will not be archived. File name: '%1'. Verify that the archive ...
  14. A feature required for this connection isn't used on domain networks The Teredo interface is disabled on domain networks ...
  15. A feed is a method of delivering frequently updated web content. Feeds are also known as web feeds, RSS feeds, XML feeds, ...
  16. A file by that name already exists. Move or delete the file and rerun Gpresult, or rerun Gpresult and use the /f option to ...
  17. A file cannot be created in the archive folder and the fax will not be archived. Verify that an archive folder exists and ...
  18. A file on the volume is no longer reachable from its parent directory. The parent file reference number is 1!0I64x!. The ...
  19. A file or directory change can't be synced yet because a dependent folder is not yet synced. This item will sync after the ...
  20. A file or directory was skipped during this synchronization pass to rebuild the sync client's metadata. It will be synchronized ...
  21. A File Server Resource Manager configuration file or import-export file is corrupted. If the corrupt file is a configuration ...
  22. A File Server Resource Manager module encountered an invalid parameter or a valid parameter with an invalid value or an expected ...
  23. A File Server Resource Manager Service command line action specifies an insecure path because it gives write access to '%1' ...
  24. A File Server Resource Manager Service command line action was not run because command line actions are disabled on this ...
  25. A File Server Resource Manager Service command line action was not run because the last person who saved it is no longer ...
  26. A File Server Resource Manager Service email action could not be run because the specified TO or FROM address is invalid. ...
  27. A File Server Resource Manager Service email action could not be run because there is no SMTP server set. Use the FSRM management ...
  28. A file system error occurred while opening or writing to the system message log file %1. Message logging has been switched ...
  29. A file system index structure contains a cycle. The file reference number is 1!0I64x!. The name of the file is "%2!wZ!". ...
  30. A file system index structure contains entries that violate ordering rules. The file reference number is 1!0I64x!. The name ...
  31. A file system index structure contains entries that violate ordering rules. The file reference number is 1!0I64x!. The name ...
  32. A file that is required cannot be installed because the cabinet file 2 has an invalid digital signature. This may indicate ...
  33. A file that is required cannot be installed because the cabinet file 2 is not digitally signed. This may indicate that the ...
  34. A file was found to have a security ID that is not described in the security file. The invalid security ID is 1!lx!. The ...
  35. A file was virtualized. Subject: Security ID: %1 Account Name: %2 Account Domain: %3 Logon ID: %4 Object: File Name: %5 Virtual ...
  36. A filter action requires at least one security method for negotiation. This filter action has none. Select a different one, ...
  37. A filter action sets the security requirements for a data transfer. These requirements are specified in a list of security ...
  38. A firewall can help prevent hackers or malicious software from gaining access to your PC through a network or the Internet. ...
  39. A firewall is blocking inbound traffic on TCP port 443, which is used by the Hosted Cache server for accepting incoming client ...
  40. A firewall is blocking inbound traffic on TCP port 80, which is used to serve content to requesting computers. As a result, ...
  41. A firewall is blocking inbound traffic on UDP port 3702, which is used to discover the availability of cached content on ...
  42. A firewall product is not enabled on this system. It is highly recommended you run Windows with one enabled firewall product. ...
  43. A floor performance for Processor Power Efficiency Class 0 when there are Processor Power Efficiency Class 1 processors unparked ...
  44. A font file could not be opened because the file, directory, network location, drive, or other storage location does not ...
  45. A free form string indicating the algorithm or tool used by the device to support compression. If it is not possible or not ...
  46. A free form string indicating the algorithm or tool used to compress the file system. If it is not possible or not desired ...
  47. A free form string indicating the algorithm or tool used to encrypt the file system. If it is not possible or not desired ...
  48. A free-form string containing a human-readable description of CIMStatusCode. This description MAY extend, but MUST be consistent ...
  49. A free-form string describing that this slot is physically unique and may hold special types of hardware. This property only ...
  50. A free-form string describing the way(s) in which this card is physically unique from other cards. This property only has ...
  51. A free-form string providing a description of the organization when 1, \"Other\", is specified for the RegisteredOrganization. ...
  52. A free-form string providing additional information related to the AdvertiseType. A description MUST be provided when the ...
  53. A free-form string providing additional information related to the AdvertiseTypes. A description shall be provided for each ...
  54. A free-form string representing the positioning of the PhysicalElement within the PhysicalPackage. Information relative to ...
  55. A free-form string specifying information related to the CIM_ReplacementSet. The purpose of the set or information related ...
  56. A free-form string that contains the vendor error description. Note that this property is also present in the JobProcessingStatistics ...
  57. A free-form string that represents the status of the job. The primary status is reflected in the inherited OperationalStatus ...
  58. A fully qualified domain name (FQDN) consists of a host and domain name, including top-level domain. For example, www.contonso.com ...
  59. A Generation ID change has been detected. Generation ID cached in DS (old value): %1 Generation ID currently in VM (new value): ...
  60. A Generation ID change has been detected. Generation ID cached in DS (old value): %1 Generation ID currently in VM (new value): ...
  61. A geofence is a boundary around a place of interest, and apps can use your location to see if you're crossing in and out ...
  62. A global catalog (GC) cannot be contacted. A GC is needed to list the object's group memberships. The GC may be temporarily ...
  63. A global catalog (GC) cannot be contacted. A GC is needed to list the object's group memberships. The GC may be temporarily ...
  64. A global catalog cannot be contacted to retrieve the icons for the member list because access was denied. Some icons may ...
  65. A group of instances that share the same configuration and schema is called a configuration set. Setup will replicate configuration ...
  66. A group policy file in SYSVOL is locked. This may prevent synchronizing important Group Policy files between domain controllers. ...
  67. A group policy file in SYSVOL is locked. This may prevent synchronizing important Group Policy files between domain controllers. ...
  68. A Group Policy Object(GPO) name was not specified. In order to configure NRPT settings in the GPO, you must specify a valid ...
  69. A group's type was changed. Subject: Security ID: %5 Account Name: %6 Account Domain: %7 Logon ID: %8 Change Type: %1 Group: ...
  70. A Guard Page was modified by a collect procedure in Extensible Counter DLL "%1!s!" for the "%2!s!" service. The performance ...
  71. A guid corresponding to the ApplicationId property of RSOP_ApplicationManagmentPolicySetting for the application that caused ...
  72. A GUID used to correlate reliability metrics on this computer. The GUID will be reset if an error prevents reliability metrics ...
  73. A GUID used to identify the Issuance License (IL) to the customer. The ILID is not unique, unless combined with the ILVID. ...
  74. A handle to an object has been duplicated: Source Handle ID: %1 Source Process ID: %2 Target Handle ID: %3 Target Process ...
  75. A handle to an object was requested with intent to delete. Subject: Security ID: %1 Account Name: %2 Account Domain: %3 Logon ...