Exchange Server 2007

  1. For information about how to configure MTLS on the SIP endpoint, see the documentation that is provided by the SIP endpoint ...
  2. For security reasons, Outlook Web Access is configured to prevent access to this type of document or folder. For more information, ...
  3. for the cultures specified. Valid with /addumlanguagepack parameter only. /UpdatesDir, /u - Updates from the directory specified ...
  4. For the store threshold, messages with an spam confidence level (SCL) greater than or equal to {9} will be moved to the Junk ...
  5. For these configuration changes to take effect, you must restart Internet Information Services (IIS). To restart IIS, run ...
  6. For this tool to be able to process ExMon data from another machine, you must run this tool on a version of Windows that ...
  7. ForcedDatabaseMountAfter property can only be set on a clustered mailbox server in a cluster continuous replication environment. ...
  8. Foreign Connector Queries per second is the number of mailboxes for which free busy information is requested from a foreign ...
  9. Found more than 900 administrative groups in the organization. Exchange is limited to 1000 total administrative groups. There ...
  10. Found {1} Accepted Domain object(s) in the Active Directory and {2} Accepted Domain object(s) in the Active Directory Application ...
  11. Found {1} Accepted Domain object(s) in the Active Directory and {2} Accepted Domain object(s) in the Active Directory Application ...
  12. Found {1} computers with the Hub Transport server role installed in the same Active Directory site as server {2} using local ...
  13. Free busy message in system attendant mailbox on virtual machine %1 has message delivery time less than the current time, ...
  14. Free page table entries (PTE) is at the critical threshold. System instability may occur. Memory Free System Page Table Entries ...
  15. Free page table entries (PTE) is at the warning threshold. This could cause system instability. Memory Free System Page Table ...
  16. Free page table entries (PTE) on server {2} is at the critical threshold. System instability may occur. Current free PTE ...
  17. Free page table entries (PTE) on server {2} is at the warning threshold. This could cause system instability. Current free ...
  18. From information provided by the headers of %4, the file is not a database file. The headers of the file may be corrupted. ...
  19. From the ping results, it appears that a black hole router may be present between server {2} and remote server {1}. Follow ...
  20. Function Call logging (FCL) records specific external function calls by Exchange to a log file. This tool can use this data ...
  21. Function call logging is disabled for the Microsoft Exchange Information Store process on server {2}. This configuration ...
  22. Function call logging is enabled for the Microsoft Exchange Information Store process on server {2}. This configuration should ...
  23. Function Call logging is not turned on for the server {2}. Turning on Function Call logging is recommended for troubleshooting ...
  24. Generate Certificate Request to Console: FriendlyName="{0}", SubjectName="{1}", DomainName="{2}", Services="{3}", KeySize="{4}" ...
  25. Generate Certificate Request to file: FriendlyName="{0}", SubjectName="{1}", DomainName="{2}", Services="{3}", KeySize="{4}", ...
  26. Generic protocol error (SMTP error). The remote SMTP response to our EHLO with a 500 level error and the sending system will ...
  27. Get Attachment Commands/sec is the number of GetAttachment commands that are processed each second. Clients that are running ...
  28. Get Attachment Total is the total number of GetAttachments requests that have been processed since the service was started. ...
  29. Get Hierarchy Commands/sec is the number of GetHierarchy commands that are processed each second. Clients that are running ...
  30. Get Item Estimate Commands/sec is the number of GetItemEstimate commands that are processed each second. The GetItemEstimate ...
  31. Get Item Estimate Total is the total number of GetItemEstimate requests that have been processed since the service was started. ...
  32. Get the latest technical information and support resources for Microsoft Exchange, including downloads and Knowledge Base ...
  33. Getting the name of the domain controller to be used to double write the configurable object's changes. Double Write is the ...
  34. Global updates need to be made to Active Directory, and this user account is not a member of the 'Enterprise Admins' group. ...
  35. Heap Bytes Allocated is the size of all memory allocations in the MP Heaps discounting heap managemnt overhead. Dev Only] ...
  36. Hosts '%1' and '%2' cannot be configured with the same IP address. Please check your UM IP gateway and DNS server configuration. ...
  37. However, the report may inadvertently contain personal information that could potentially be used to determine your identity. ...
  38. I/O Database Reads Abnormal Latency/sec is the rate of database read operations that take an abnormally long length of time ...
  39. I/O Database Reads In Heap is the number of database read operations queued in the database engine's I/O heap and waiting ...
  40. I/O Database Writes Abnormal Latency/sec is the rate of database write operations that take an abnormally long length of ...
  41. I/O Database Writes Async Pending is the number of database write operations asynchronously pending completion. Dev Only] ...
  42. I/O Database Writes In Heap is the number of database write operations queued in the database engine's I/O heap and waiting ...
  43. I/O Log Reads Abnormal Latency/sec is the rate of logfile read operations that take an abnormally long length of time (default ...
  44. I/O Log Reads In Heap is the number of logfile read operations queued in the database engine's I/O heap and waiting to be ...
  45. I/O Log Writes Abnormal Latency/sec is the rate of logfile write operations that take an abnormally long length of time (default ...
  46. I/O Log Writes In Heap is the number of logfile write operations queued in the database engine's I/O heap and waiting to ...
  47. ID counters have been successfully patched for database "%1". Original Global Counter: %2 Patched Global Counter: %3 Original ...
  48. If a dial plan is selected, a default hunt group will be created to associate this new UM IP gateway to the specified dial ...
  49. If All Address Lists is set to Enabled, users can view all address lists. If it is set to Disabled, the user can only view ...
  50. If Change Password is set to Enabled, a user can change their password in Outlook Web Access Options in General Settings. ...
  51. If E-Mail Signature is set to Enabled, users can customize their signature and choose whether to automatically include it ...
  52. If Exchange ActiveSync Integration is set to Enabled, users can remove mobile devices, initiate a remote device wipe if they ...
  53. If local continuous replication is enabled for this storage group, a second copy of the database in this storage group will ...
  54. If Outlook Web Access is in use, you should replicate the free/busy folder on this server to every other free/busy server ...
  55. If Reminders and Notifications is set to Enabled, users will receive new e-mail notifications, task and calendar reminders, ...
  56. If Search Folders is set to Enabled, users can access Microsoft Exchange search folders created by Microsoft Outlook or another ...
  57. If the database that you want to use as the merge or copy source is not running, click 'Previous' below to go back and mount ...
  58. If the file is missing or damaged, locate another copy of the file. If the file is an Exchange streaming file (.STM file) ...
  59. If the most recently generated transaction log file in the temporary folder is not already named {0}.LOG, rename it to {0}.LOG. ...
  60. If the most recently generated transaction log file in the temporary folder is not already named {0}.LOG, rename it to {1}.LOG. ...
  61. If the repair is successful, all previous backups will be incompatible with backups taken after the repair process. Therefore, ...
  62. If the repair regimen has completed successfully, it is EXTREMELY important that a full online and verified good backup of ...
  63. If the required location is not displayed, use the appropriate Exchange Management Shell commands to set the configuration. ...
  64. If the storage group has no log files or if the storage group is enabled for local continuous replication, it will not be ...
  65. If the user has chosen to suppress the creation of one-off tasks, they cannot complete a recurring task that is not the last ...
  66. If the users accessing the Exchange server are highly active, and you are unable to reduce the load on your server, and your ...
  67. If Theme Selection is set to Enabled, users can change the color scheme in Outlook Web Access Options in General Settings. ...
  68. If there are additional log files in unbroken sequence after {0}, you can also copy those transaction log files to the temporary ...
  69. If there are additional transaction log files in unbroken sequence after {0}, you can also copy those transaction log files ...
  70. If this is in a single-server laboratory environment, the LegacyDN.exe tool may be used to change the Organization and Administrative ...
  71. If Unified Messaging Integration is set to Enabled, users can access their voice mail and faxes through Outlook Web Access. ...
  72. If you already made changes in the original database, such as adding new users, you should not select the check box below ...
  73. If you are deploying an Edge Transport server but not by using the Microsoft Exchange EdgeSync service , you must manually ...
  74. If you are deploying an Edge Transport server but not by using the Microsoft Exchange EdgeSync service, you must manually ...
  75. If you are merging mailbox data as part of a 'dial tone' recovery strategy, there are additional administrative tasks that ...