System Center Configuration Manager 2012 R2

  1. This report shows compliance information for the selected application within the selected collection. This is an application ...
  2. This report shows compliance status information for the selected application deployment type within the selected collection. ...
  3. This report shows detailed information for application infrastructure errors. These can include internal infrastructure errors ...
  4. This report shows objects that are secured by the selected security scope and that are assigned to only to this security ...
  5. This report shows securable objects, the security scopes associated with the objects, and which administrative users have ...
  6. This report shows security roles and which Configuration Manager administrative users are associated with each security role. ...
  7. This report shows security scopes and which Configuration Manager administrative users and security groups are associated ...
  8. This report shows the details of either error or warning for folder redirection or roaming user profile when drilled down ...
  9. This report shows the details of health state for folder redirection per each of the redirected folders for a given user. ...
  10. This report shows the list of computers that are currently running in a specific group/phase of the specified task sequence ...
  11. This report shows the list of computers that failed within a specific group/phase of the specified task sequence deployment. ...
  12. This report shows the log of administrative changes made for administrative users, security roles, security scopes, and collections. ...
  13. This report shows the operating system, memory, hard drive free space and processor speed for each system in the specified ...
  14. This report shows the percentage of clients which have requested policy at least once in the last 30 days. Each day represents ...
  15. This report shows the status of related dependency and supersedence deployment types for a particular machine and user. If ...
  16. This report shows the status summary of all resources that have been targeted by an deployment that is available to a collection ...
  17. This report will show a number of yearly quarters and a count of the computers whose birth date falls within that quarter. ...
  18. This report will show the differences between the software inventory reported for two selected computers. Only the discrepancies ...
  19. This report will show the specific computers that are nearing expiration. License Status: 0=Unlicensed, 1=Licensed, 2=Out ...
  20. This reports displays all mobile devices clients. Mobile devices that are discovered by the Exchange Server connector are ...
  21. This reports lists the computers that installed a specific software update through remediation during a specific time period ...
  22. This reports provides an asset manager summary of computers matching keyword filters on computer name, ConfigMgr site, domain, ...
  23. This setting might be used by deployed apps. If you clear this setting, apps that use this VPN profile will no longer be ...
  24. This site failed to connect to the central administration site. If you continue, the site will uninstall, although it might ...
  25. This site failed to connect to the central administration site. If you continue, the site will uninstall, although it might ...
  26. This site has %d secondary child site(s). You must uninstall secondary sites through the Configuration Manager console first, ...
  27. This site has secondary child site(s). You must uninstall secondary sites through the Configuration Manager console first, ...
  28. This site has secondary child site(s). You must uninstall secondary sites through the Configuration Manager console first. ...
  29. This site is in System Center 2012 R2 Configuration Manager compatibility mode. Some objects might not be available until ...
  30. This site system is set as the default Application Catalog website point in one or more custom client settings. Remove this ...
  31. This site system is set as the default Application Catalog website point in the default client settings. Remove this site ...
  32. This site system is the only Client Access Point for the site and cannot be removed. Site server services always require ...
  33. This site system is the only intranet management point for the site. If you configure it to allow Internet-only connections, ...
  34. This site system role is the sync source for all software update points in the site. Select a new sync source for this site ...
  35. This site will be responsible for processing all the discovery records of the hierarchy. In case the primary discovery processing ...
  36. This site's public key has not been created, and configured yet. Therefore, keys cannot be dumped from this site. Please ...
  37. This software update addresses a browse dialog box error that might occur when the Configuration Manager console is installed ...
  38. This software update addresses several MMC errors that may occur when you run the Configuration Manager console. You should ...
  39. This source site has been previously specified. The original source site has been reactivated and you can view historical ...
  40. This system cannot be deleted from the database because it is currently serving as a branch distribution point. To delete ...
  41. This task sequence cannot be run because a package referenced by the task sequence could not be found. For more information, ...
  42. This task sequence cannot be run because the program files for %1!s! %2!s! are inaccessible on the distribution point. Make ...
  43. This task sequence cannot be run because the program files for %1!s! %2!s! cannot be located on a distribution point. For ...
  44. This task sequence cannot be run because the program files for %1!s! are inaccessible on the distribution point. Make sure ...
  45. This task sequence cannot be run because the program files for %1!s! cannot be located on a distribution point. For more ...
  46. This task sequence object is referred to by an invalid boot image. The invalid data will be ignored. You can specify a valid ...
  47. This task sequence object references one or more invalid packages. Make sure all associated packages exist and are available ...
  48. This variable determines whether or not the task sequence uses the drive letter captured in the operating system image WIM ...
  49. This version of Sysprep is incompatible with the current operating system. Ensure that the correct version is available on ...
  50. This VPN profile might be used by deployed apps. If you delete this VPN profile, apps that used it will no longer be able ...
  51. This will clear the required PXE boot deployments of all the members assigned to this site in this collection. The members ...
  52. This will re-send this package to this distribution point. This may take some time to complete. Are you sure you wish to ...
  53. This Windows Firewall profile is for computers that connect to a private network location, such as a home or office network. ...
  54. This wizard allows you to import one or more drivers. You can let Configuration Manager find all drivers in the given network ...
  55. This wizard configures the Microsoft Intune subscription that lets you manage mobile devices by using Microsoft Intune. You ...
  56. This wizard helps you copy a package to a new distribution point, update an existing package on a distribution point, or ...
  57. This wizard helps you copy objects from one Configuration Manager database into another Configuration Manager database. Use ...
  58. This wizard helps you copy one or more objects from one Configuration Manager database into another Configuration Manager ...
  59. This wizard imports new computer information into the Configuration Manager database. Select Import computers using a file ...
  60. This wizard walks you through the steps necessary to install or upgrade Configuration Manager. Setup also provides you with ...
  61. This wizard will help you decide whether it is appropriate to delete the program listed below. The wizard describes the results ...
  62. This {0} action will apply to all managed Endpoint Protection clients in collection "{1}" and might result in high CPU usage ...
  63. This {0} action will apply to {1} managed Endpoint Protection clients and might result in high CPU usage on these clients ...
  64. Time must be formatted as year][month][day][military time].[microseconds(3 digits) Example: March 12, 1997 at 1:30 PM would ...
  65. To change installation options, click Back. To apply the settings and install the Configuration Manager console, click Install. ...
  66. To change installation options, click Back. To apply the settings and install the Configuration Manager policy module, click ...
  67. To change installation options, click Back. To repair the Configuration Manager policy module installation, click Repair. ...
  68. To change these settings, click Previous. To apply the settings and start the installation prerequisite check, click Next. ...
  69. To complete the setup for mobile device management, you must add the Microsoft Intune Connector site system role by using ...
  70. To complete the update process, you must close the following software. When you next run the software, it uses the updated ...
  71. To control the type of objects that administrative users can manage, assign one or more security roles to the administrative ...
  72. To copy files and templates to and from a VMM management server, App Controller must import SSL certificates from the management ...
  73. To create direct membership rules, locate and select the resources that you want to add as direct members of the collection. ...
  74. To enable Asset Intelligence reporting, select to enable all or at least one reporting class from the available Asset Intelligence ...
  75. To ensure that data is not lost during the upgrade process, critical inboxes should be performing as expected and have no ...