Windows Server 2003

  1. Use the buttons below to enter the dialing steps for making international calls. Enter these steps in the exact order as ...
  2. Use the buttons below to enter the dialing steps for making local calls. Enter these steps in the exact order as they appear ...
  3. Use the buttons below to enter the dialing steps for making long-distance calls. Enter these steps in the exact order as ...
  4. Use the check boxes below to limit or expand the default search, which includes local paths and removable media. The best ...
  5. Use the Description field to specify a name or a detailed explanation of the IP filter. Select the Mirrored check box to ...
  6. Use the Disk Defragmenter system tool to rearrange files, programs, and unused hard disk space so that programs run faster ...
  7. Use the DISKPART command to manage the partitions on your hard disk volumes. DISKPART /add|/delete device-name|drive-name|partition-name ...
  8. Use the fast and easy Internet method to activate a license server or install licenses by connecting directly to Microsoft. ...
  9. Use the mouse to point to one of the buttons (pictures) below. Notice that the button is idle until you point to it. When ...
  10. Use the NTFS file system (recommended) Choose this option for increased file security, better reliability, and more efficient ...
  11. Use the preview pane to quickly open or save file attachments . Select a message with an attached file. Click on the large ...
  12. Use the Telephone method to activate a license server or install licenses by speaking to a Customer Service Representative. ...
  13. Use the tools provided in this console to manage objects on your network, domain trust relationships, and access to network ...
  14. Use the World Wide Web method to activate a license server or install licenses by connecting to the Microsoft Terminal Server ...
  15. Use these options to automatically remove the application when it is no longer managed, publish OLE information in the active ...
  16. Use this application to record the number of CLIENT ACCESS LICENSES purchased and avoid violation of the license agreement. ...
  17. Use this dialog box to set the initial synchronization priority for inbound connections. Learn more about the initial synchronization ...
  18. Use this option if there are computers that do not support IPSec on your network. Communication with computers that do not ...
  19. Use this option if you want to leave remote storage files intact so that future installations of Remote Storage can access ...
  20. Use this section to configure auditing based on your auditing objectives. The auditing policy determines the success and ...
  21. Use this section to configure inbound ports using Windows Firewall based on the roles and administration options that you ...
  22. Use this section to configure Internet Information Services (IIS). This section is displayed because the Web server role ...
  23. Use this section to configure protocols used to communicate with other computers. When configured to communicate with computers ...
  24. Use this section to configure services based on the selected server's roles and other features. These roles and other features ...
  25. Use this section to save the policy you have created. You can apply it to the selected server now, or you can apply it to ...
  26. Use this setting to control whether or not a user is given the choice to report an error. When Display Error Notification ...
  27. Use this Web site to request a certificate for your Web browser, e-mail client, or other program. By using a certificate, ...
  28. Use this wizard to determine how much content to make available offline. You can also set up a schedule to synchronize the ...
  29. Use UDDI Services to enables enterprise developers to efficiently publish, discover, share, and reuse Web Services directly ...
  30. Use unattend.txt to add intranet sites and UNC servers to the Local intranet zone inclusion list as part of the installation ...
  31. Use your preferred method to send it to your assistant (for example, attach it to an e-mail message or place it in a shared ...
  32. Used Average is the current number of resources (buffers) in use at this time. The number in parentheses following the resource ...
  33. Used by clients to send and receive Microsoft Message Queuing (MSMQ) messages. Also allows MQPing, Remote MSMQ Management ...
  34. Used by Message Queuing clients running Windows 9x, Windows NT 4.0, and Windows 2000 to access Active Directory for public ...
  35. Used for centralized configuration storage for Microsoft Internet Security and Acceleration Server 2004 Enterprise Edition. ...
  36. Used for remote administration of Internet Information Services (IIS) and other IIS-related components that may be installed, ...
  37. Used in LDAP URLs for the Authority Information Access extension Specifies the object class as certification authority Example ...
  38. Used in LDAP URLs for the CRL Distribution Points extension Specifies the object class as CRL distribution point Example ...
  39. Used in LDAP URLs Inserts the container name of the configuration data partition Example location: ldap:///CN= ,CN= ,CN=CDP,CN=Public ...
  40. Used in URLs and paths Derived from the name of the CA, guaranteed to be unique and less than 64 chars Example location: ...
  41. Used in URLs and paths for the Authority Information Access extension Appends a suffix to distingush the certificate file ...
  42. Used in URLs and paths for the CRL Distribution Points extension Appends a suffix to distingush the CRL file name Example ...
  43. Used in URLs and paths Substitutes the Delta CRL file name suffix for the CRL file name suffix, if appropriate Example location: ...
  44. Used Maximum is the maximum number of NetBEUI resources (buffers) in use at any point in time. This value is useful in sizing ...
  45. Used to accept accounting notifications, such as who logged on, from remote access servers that implement an early version ...
  46. Used to accept accounting notifications, such as who logged on, from remote access servers using the Remote Authentication ...
  47. Used to accept authentication requests from remote access servers using an early version of the Remote Authentication Dial-in ...
  48. Used to accept authentication requests from remote access servers using the Remote Authentication Dial-in User Service (RADIUS) ...
  49. Used to resynchronize transactions that span Windows and Distributed Relational Database Architecture (DRDA) servers, such ...
  50. User "%1" is currently logged on. If you delete the user, the user will not be able to log on to the computer again, unlock ...
  51. User %1 denied access to the current directory %2 due to a security change. For additional information specific to this message ...
  52. User %1 has hit the runaway recall limit. Files recalled by this user will not remain on primary storage after the user closes ...
  53. User %1 was denied access. Fully-Qualified-User-Name = %2 NAS-IP-Address = %3 NAS-Identifier = %4 Called-Station-Identifier ...
  54. User %1 was granted access. Fully-Qualified-User-Name = %2 NAS-IP-Address = %3 NAS-Identifier = %4 Client-Friendly-Name = ...
  55. User %2\%1 attempted to log on via the Remote Installation service and failed. The error is contained in the record data. ...
  56. User '[2]' has previously initiated an install for product '[3]'. That user will need to run that install again before they ...
  57. User '[2]' has previously initiated an install for product '[3]'. That user will need to run that install again before they ...
  58. User 2 has previously initiated an installation for product 3]. That user will need to run that installation again before ...
  59. User 2 has previously initiated an installation for product 3]. That user will need to run that installation again before ...
  60. User Account Changed: Target Account Name: %2 Target Domain: %3 Target Account ID: %4 Caller User Name: %5 Caller Domain: ...
  61. User Account Created: New Account Name: %1 New Domain: %2 New Account ID: %3 Caller User Name: %4 Caller Domain: %5 Caller ...
  62. User Account Deleted: Target Account Name: %1 Target Domain: %2 Target Account ID: %3 Caller User Name: %4 Caller Domain: ...
  63. User Account Disabled: Target Account Name: %1 Target Domain: %2 Target Account ID: %3 Caller User Name: %4 Caller Domain: ...
  64. User Account Enabled: Target Account Name: %1 Target Domain: %2 Target Account ID: %3 Caller User Name: %4 Caller Domain: ...
  65. User Account Locked Out: Target Account Name: %1 Target Account ID: %3 Caller Machine Name: %2 Caller User Name: %4 Caller ...
  66. User Account password set: Target Account Name: %1 Target Domain: %2 Target Account ID: %3 Caller User Name: %4 Caller Domain: ...
  67. User Account Unlocked: Target Account Name: %1 Target Domain: %2 Target Account ID: %3 Caller User Name: %4 Caller Domain: ...
  68. User Accounts That Cannot Be Upgraded The following user accounts are inaccessible or incomplete and cannot be upgraded to ...
  69. User Accounts That Cannot Be Upgraded The following user accounts are inaccessible or incomplete and cannot be upgraded to ...
  70. User devices are logical devices that allow a computer system's users to input, view or hear data. The CIM_UserDevice class ...
  71. User Name: %1 Domain: % %2 Request Type: %3 Logon Process: %4 Authentication Package: %5 Workstation Name: %6 Caller User ...
  72. User names may not contain spaces or any of the following characters: / \ " : ; | < > + = , ? Please enter a different name ...
  73. User Options could not be started with the supplied user information. Ensure that the supplied user information identifies ...
  74. User profiles store settings for your desktop and other information related to your user account. You can create a different ...
  75. User rights translation will be performed in 'Add' mode only. Any other objects will be translated in adherence to your mode ...