Windows Server 2003

  1. After you have added a role, return to this page at any time for tools and information to help you with your daily administrative ...
  2. After you log on, you can add this server to your Favorites and return to it easily. The FTP server will use the e-mail address ...
  3. After you make any changes to Remote Access Policies, you must restart the Remote Access Service for this change to take ...
  4. After you raise the domain functional level, it cannot be reversed. For more information on domain functional levels, click ...
  5. After you raise the forest functional level, it cannot be reversed. For more information on forest functional level, click ...
  6. After you register, Microsoft can, with your consent, notify you of product updates, new products, events and special offers. ...
  7. After you remove Active Directory from the last domain controller in the domain, the domain no longer exists, which means ...
  8. After you type the first 5 characters, the pointer will automatically move to the next box so you can type the next 5 characters. ...
  9. After your evaluation period ends, contact Microsoft or the nearest sales representative for purchasing the retail version ...
  10. After |Windows |XP |64-Bit |Edition |is |installed, |you |won't |have |to |search |for |updates |online |to |stay |up |to ...
  11. After |Windows |XP |Professional |x64 |Edition |is |installed, |you |won't |have |to |search |for |updates |online |to |stay ...
  12. Agent service has been locally installed. The Active Directory Migration Tool components will not be unregistered or removed. ...
  13. Alias (CNAME) Alias record. Indicates an alternate or alias DNS domain name for a name already specified in other resource ...
  14. Aligning for high resolution consecutively. Load a new sheet of paper or reuse the same one, and click OK. The high resolution ...
  15. Aligning for high speed consecutively. Load a new sheet of paper or reuse the same one, and click OK. The high-speed pattern ...
  16. Aligning for standard printing mode. Inspect the printed pattern and determine the number of the pattern where the black ...
  17. Aligning for standard resolution. Inspect the printed pattern and determine the number of the pattern where the black and ...
  18. Aligning for standard resolution. Inspect the printed pattern and determine the number of the pattern where the upper and ...
  19. All application directory partitions on this domain controller will be removed. This domain controller holds the last replica ...
  20. All approved applications must have a path. For each application in the list marked with "[No path!]", either edit the item ...
  21. All available %1!s! licenses for product %2!s! on server %3!s! have been removed. Use Terminal Server Licensing administrative ...
  22. All data sent between the client and the server is protected by encryption based on the maximum key strength supported by ...
  23. All data sent between the client and the server is protected by encryption based on the server's maximum key strength. Clients ...
  24. All data sent between the client and the server is protected by using Federal Information Processing Standard 140-1 validated ...
  25. All directory-enabled computers that access the Active Directory in the selected server's domain satisfy the following minimum ...
  26. All domain controllers in the following site that can replicate the directory partition over this transport are currently ...
  27. All encrypted data, such as EFS-encrypted files or e-mail, should be decrypted before continuing or it will be permanently ...
  28. All existing UDDI authentication tokens will be invalidated. Are you sure you want to reset the cryptography settings for ...
  29. All high priority inbound connections must complete successfully before any lower priority synchronizations are attempted. ...
  30. All inbound replication connections for the partition %1 are disabled. Inbound replication of this partition cannot be performed. ...
  31. All Internet and intranet sites are assigned to the Internet zone by default. If you trust an Internet or intranet site and ...
  32. All Internet and intranet sites are assigned to the Internet zone by default. Intranet sites are not part of the Local intranet ...
  33. All Internet services will be started. To start individual Internet services, use the Computer Management application in ...
  34. All Internet services will be stopped and restarted. You will loose all current sessions, and all Internet sites will be ...
  35. All Internet services will be stopped and restarted. You will loose all current sessions, and all Internet sites will be ...
  36. All Internet services will be stopped and restarted. You will loose all current sessions, and all Internet sites will be ...
  37. All network adapters must use static IP addresses. Non-static IP addresses may function correctly, but highest availability ...
  38. All nodes in all clusters must use the same service account as well as have the same service account stored in the Service ...
  39. All notification of policy changes from LSA/SAM were ignored by policy engine because it timed out to wait for PDC synchronization. ...
  40. All of Active Directory's LDAP send queues are full. This can be caused by clients that continue to send requests faster ...
  41. All other Internet Explorer tasks can be completed by all user groups, unless the server administrator chooses to further ...
  42. All privileges that may be required to perform the operation whether currently held or not. This may be a subset or all of ...
  43. All redirected shell folders, such as My Documents, Desktop, Start Menu, and Application Data, are available offline by default. ...
  44. All this is on the Internet. If you can't find what you are looking for, you can search for all kinds of information by using ...
  45. All unissued licenses stored on this server will be lost if Terminal Server Licensing is uninstalled. Do you wish to continue? ...
  46. All wave devices that can play files in the current format are in use. Wait until a wave device is free, and then try again. ...
  47. All wave devices that can record files in the current format are in use. Wait until a wave device is free, and then try again. ...
  48. Allocate a piece of available media. RSM ALLOCATE /M /L[G|F | /P[G|F /O[ERRUNAVAIL|NEW|NEXT /T /LN /LD /PN /PD /B /M : media ...
  49. Allow any authenticated user to update all DNS records with the same name. This setting applies only to DNS records for a ...
  50. Allow inheritable auditing entries from the parent to propagate to this object and all child objects. Include these with ...
  51. Allow inheritable permissions from the parent to propagate to this object and all child objects. Include these with entries ...
  52. Allow remote clients to connect to this server through either a dial-up connection or a secure Virtual Private Network (VPN) ...
  53. Allow remote clients to connect to this server through the Internet and local clients to connect to the Internet using a ...
  54. Allow the focus of the Group Policy Snap-in to be changed when launching from the command line. This only applies if you ...
  55. Allow the selected computer to be changed when launching from the command line. This only applies if you save the console. ...
  56. Allow the selected computer to be changed when launching from the command line. This only applies if you save the console. ...
  57. Allowing nonsecure dynamic updates is a significant security vulnerability because updates can be accepted from untrusted ...
  58. Allowing unsecured communication with non-IPSec-aware computers allows IP traffic to be transmitted with no authentication, ...
  59. Allows a user logged into the server to receive remote assistance requests via Windows Messenger. (Note: The Remote Assistance ...
  60. Allows Administrators to enable and disable the ability for Outlook Express users to save or open attachments that can potentially ...
  61. Allows administrators to use the Windows Firewall component in Control Panel to define a local port exceptions list. Windows ...
  62. Allows administrators to use the Windows Firewall component in Control Panel to define a local program exceptions list. Windows ...
  63. Allows client applications to access static and dynamic SNMP information through Windows Management Instrumentation (WMI). ...
  64. Allows clients to use wireless provisioning services, in addition to protecting credentials and authenticating the server. ...
  65. Allows configuration of components of the operating system used by a client computer to connect to a network. This includes ...
  66. Allows configuration of offline files. This includes how to make files available offline, encryption, and synchronization ...
  67. Allows Exchange 5.5 compatible server-side event scripts to be triggered by folder events either in public folders or individual ...
  68. Allows Exchange 5.5 site and configuration information to be replicated to the configuration naming partition of Active Directory. ...
  69. Allows file and printer sharing. To do this, Windows Firewall opens UDP ports 137 and 138, and TCP ports 139 and 445. If ...
  70. Allows files to be automatically copied and maintained simultaneously on multiple servers. If this service is stopped, file ...
  71. Allows Internet Message Access Protocol (IMAP4) clients to connect and retreive mail securely using the Secure Sockets Layer ...
  72. Allows middle-ware applications such as BizTalk and Host Integration Server to retrieve credentials for line-of-business ...
  73. Allows Network Load Balancing Services (NLBS) to receive remote control commands from the wlbs.exe cluster control program ...
  74. Allows Network Load Balancing Services (NLBS) to receive remote control commands from the wlbs.exe cluster control program ...
  75. Allows or Denies retrieving IP address of SessionDirectory according as whether Value is set to 1 or 0 respectively. The ...