System Center Cross Platform 2012 R2

  1. The account for the UNIX/Linux Agent Maintenance Run As profile associated with the workflow "%2", running for instance "%3" ...
  2. The authentication data in parameter {0} contains an illegal character at position {1}. Authentication data can only contain ...
  3. The elevation method, either "su" or "sudo", that elevates the supplied credential to a privileged account on the UNIX or ...
  4. The file name, including its path, of an SSH key. The SSH key file must be in PuTTY key format. This parameter is required ...
  5. The following list of computers will have the installed agents uninstalled and the computers will no longer be monitored ...
  6. The Get-SCXAgent cmdlet retrieves the managed UNIX/Linux computers that match the provided selection criteria. If no selection ...
  7. The Install-SCXAgent cmdlet installs the Operations Manager agent for discovered UNIX and Linux computers, signs the certificate ...
  8. The Install-SCXAgent cmdlet installs the Operations Manager agent for discovered UNIX/Linux computers, signs the certificate ...
  9. The Invoke-SCXDiscovery cmdlet invokes the discovery operation for the specified configuration of UNIX and Linux computers. ...
  10. The Invoke-SCXDiscovery cmdlet invokes the discovery operation for the specified configuration. The operation uses an SSH ...
  11. The pass phrase for the specified SSH key. This parameter is optional, but must be provided if the specified SSH Key requires ...
  12. The provided Discovery Scope value is invalid. The value needs to be either a valid IP address, a valid DNS name or two valid ...
  13. The provided DiscoveryResult cannot be added to the SelectedDiscoveryResults because it does not exist in the DiscoveryResults ...
  14. The Remove-SCXAgent cmdlet removes the target managed UNIX and Linux computers from the management group. Managed UNIX and ...
  15. The Remove-SCXAgent cmdlet removes the target managed UNIX/Linux computers from the management group. Managed UNIX/Linux ...
  16. The Run As account cannot be deleted because it is associated with a Run As profile. Please remove the association and try ...
  17. The Set-SCXResourcePool cmdlet changes the managing Resource Pool for the specified target managed UNIX or Linux computers. ...
  18. The specified regular expression cannot be tested. It may be an invalid regular expression, or it may be a valid regular ...
  19. The SSH key was created by an unsupported SSH implementation. The key must be converted into a supported format before it ...
  20. The SSH key was created using the OpenSSH implementation and is not supported. The key must be converted into a supported ...
  21. The System Center Audit Forwarding Service must be installed and configured for Automatic Startup prior to the installation ...
  22. The Uninstall-SCXAgent cmdlet uninstalls the management agent on the specified UNIX/Linux computers. The required Agent parameter ...
  23. The UNIX/Linux Action Run As profile associated with the workflow "%2", running for instance "%3" with ID %4 is configured ...
  24. The UNIX/Linux Run As account could not be created. The SDK service may be unavailable. The following steps may resolve this ...
  25. The UNIX/Linux Run As account could not be saved. The SDK service may be unavailable. The following steps may resolve this ...
  26. The Update-SCXAgent cmdlet updates the agent on the specified computers to the latest version available. If the latest available ...
  27. The WinRM client cannot process the request. Basic authentication is currently disabled in the client configuration. Verify ...
  28. This command takes in a collection of host names in enumerated fashion. It collects all host names and process the entire ...
  29. This option uses the associated credentials from the UNIX/Linux Agent Maintenance Account and the UNIX/Linux Action Account ...
  30. This option uses the associated credentials from the UNIX/Linux Agent Maintenance Account and the UNIX/Linux Action Account ...
  31. This will use an SSH key and can optionally include a passphrase. Using an SSH key will require additional credentials for ...
  32. This will use the account credentials to establish the SSH connection and then elevate using su' to perform privileged actions. ...
  33. This will use the account credentials to establish the SSH connection and then elevate using sudo' to perform privileged ...
  34. This will use the default credentials to establish the SSH connection and then elevate using su' to perform privileged actions. ...
  35. This will use the default credentials to establish the SSH connection and then elevate using sudo' to perform privileged ...
  36. Unable to enumerate Installable agent types. The associated resource pool may still be initializing. If you had selected ...
  37. Upon activation of Audit Collection Services for UNIX/Linux, the ACS for UNIX/Linux group policy can create a large number ...
  38. USAGE: Help screen: %1 -help Signing : %1 -sign Import : %1 -import Export : %1 -export List installed SCX certificates: ...
  39. When SuppressWarning is specified, the security warning will not be displayed when creating an SSH credential. When creating ...
  40. When you browse for a process, process monitoring targets the computer it runs on. You can also select a group to replace ...
  41. When you provide the command, the command can be a path to a binary or script file, or a single-line shell command. The specified ...
  42. Without a valid certificate, Operations Manager will not be able to communicate with this computer. Please refer to the Operations ...