System Center Configuration Manager 2012

  1. This is the total number of bad (ill-formed or otherwise invalid) SMS software metering usage files processed by Software ...
  2. This is the total number of bytes this SMS sender has successfully sent, either to all sites or to the specified site, since ...
  3. This is the total number of bytes this SMS sender tried to send (regardless of success or failure), either to all sites or ...
  4. This is the total number of bytes this SMS sender tried unsuccessfully to send, either to all sites or to the specified site, ...
  5. This is the total number of message database records that could not be processed because the record did not reference existing ...
  6. This is the total number of SMS Discovery Data Records (DDRs) which are from User or Group discovery processed by Discovery ...
  7. This is the total number of SMS Discovery Data Records (DDRs) which are not from User or Group discovery processed by Discovery ...
  8. This is the total number of SMS hardware inventory records (in MIF files) processed by Inventory Data Loader since it was ...
  9. This is the total number of SMS objects added to the queue by the source component since the source and destination components ...
  10. This is the total number of SMS objects removed from the queue by the destination component since the source and destination ...
  11. This is the total number of SMS software inventory records (SINVs) processed by Software Inventory Processor since it was ...
  12. This is the total number of SMS software metering usage records processed by Software Metering Processor since it was last ...
  13. This mobile device might have already been retired/wiped but not yet reported this status to the Configuration Manager site. ...
  14. This mobile device might have already been wiped but not yet reported this status to the Configuration Manager site. Are ...
  15. This mobile device might have already been wiped or retired but not yet reported this status to the Configuration Manager ...
  16. This MSI product code must exist on the target system and the following condition must be met to indicate presence of this ...
  17. This name is already in use as an inventoried name for the following display name: {0}. To use this inventoried name you ...
  18. This object contains counters that track the activity of an SMS Inbox. An SMS Inbox contains files that are used in site ...
  19. This object contains counters that track the activity of an SMS Outbox. An SMS Outbox contains files that are used in site ...
  20. This object contains the counters that track movement of SMS objects through in-memory object queues in the SMS Executive ...
  21. This object contains the counters that track the activity of the SMS RAS Asynchronous Sender. The RAS Asynchronous Sender ...
  22. This object contains the counters that track the activity of the SMS RAS ISDN Sender. The RAS ISDN Sender transmits data ...
  23. This object contains the counters that track the activity of the SMS RAS SNA Sender. The RAS SNA Sender transmits data to ...
  24. This object contains the counters that track the activity of the SMS RAS X.25 Sender. The RAS X.25 Sender transmits data ...
  25. This object contains the counters that track the activity of the SMS Scheduler. The Scheduler creates send requests for various ...
  26. This object contains the counters that track the activity of the SMS Standard Sender. The Standard Sender transmits data ...
  27. This object contains the counters that track the processing of SMS Discovery Data Records (DDRs) by Discovery Data Manager. ...
  28. This object contains the counters that track the processing of SMS hardware inventory records (in MIF files) by Inventory ...
  29. This object contains the counters that track the processing of SMS software inventory records (SINVs) by Software Inventory ...
  30. This object contains the counters that track the processing of SMS software metering usage records files by Software Metering ...
  31. This operation is related to a restore operation for the same threat. Clients targeted with the restore operation will continue ...
  32. This operation will delete all the resources listed in this collection from the database. Are you sure want to delete all ...
  33. This option allows clients that use Windows BranchCache to download content from on-premises distribution points. Content ...
  34. This option installs the Configuration Manager client on newly discovered computer resources and on existing computer resources ...
  35. This package is assigned to the following distribution points or distribution point groups. To redistribute this package ...
  36. This package is associated with one or more task sequences that are configured to allow clients to install the content in ...
  37. This package is automatically created and distributed so that client can upgrade itself from the closest distribution point. ...
  38. This package is distributed to the distribution point on site '{0}'. Review the detail status on the central administration ...
  39. This parameter contains the PPP Tunnel Type configured in the RAS config blob. This tunnel is decided after first successful ...
  40. This phone is enrolled. Your phone can connect to your company network and IT department can provide software and configure ...
  41. This policy setting allows you to configure UNC file share sources for downloading definition updates. Sources will be contacted ...
  42. This primary site is corrupted. Setup cannot find a valid site control image in the database or in the site control file. ...
  43. This problem could also occur if %s is a defective add-on product to Configuration Manager that reports Configuration Manager ...
  44. This problem could occur if you configured Configuration Manager to collect NT Events from %s but %s is not installed on ...
  45. This problem should automatically remediate within the next thirty minutes. If this issue continues, save the analysis report ...
  46. This program cannot be run because the program files are inaccessible. For more information, please contact your administrator ...
  47. This program cannot be run because the program files cannot be found. For more information, please contact your administrator ...
  48. This program cannot be run because the Windows Installer package is not valid. For more information, please contact your ...
  49. This program depends on other programs. Make sure that all dependencies are also set to Run from Distribution Point to avoid ...
  50. This program depends on program {0} in package {1}. Make sure that all dependencies are also set to Run from Distribution ...
  51. This program has been set to use Windows NT client software installation account, but the account is not currently defined ...
  52. This program is ready to run. If you don't run the program now, the program might have to be downloaded again in the future. ...
  53. This program is waiting for another program to finish running. It will run automatically when the other program finishes. ...
  54. This program must be downloaded before it can be run. However, the space allocated for program downloads is insufficient ...
  55. This program will be available as soon as it has been distributed to the content servers unless it is scheduled for a later ...
  56. This PXE-enabled distribution point contains packages. Remove all packages from the PXE-enabled distribution point before ...
  57. This report allows you to view software titles based on matching of all selected custom label criteria. Up to three custom ...
  58. This report contains detailed health information for mobile devices that are managed by the Configuration Manager client ...
  59. This report contains detailed information about certificate issues on mobile devices that are managed by the Configuration ...
  60. This report contains detailed information about communication issues on mobile devices that are managed by the Configuration ...
  61. This report contains detailed information about deployment failure for mobile devices that are managed by the Configuration ...
  62. This report contains detailed information about deployment success for mobile devices that are managed by the Configuration ...
  63. This report contains detailed information about local client issues on mobile devices that are managed by the Configuration ...
  64. This report contains health summary information for mobile devices that are managed by the Configuration Manager client for ...
  65. This report contains summary information for the status of mobile devices that are managed by the Configuration Manager client ...
  66. This report displays a list of the computers that were unknown at the time they ran a task sequence deployment and whether ...
  67. This report displays a list of the destination computers for the specified task sequence deployment that is in specified ...
  68. This report displays a list of the destination computers for the specified task sequence deployment that is in the specified ...
  69. This report displays a summary of hardware device status for a specified operating system. Use this report to determine hardware ...
  70. This report displays a summary of the application status for a specified operating system. Use this report to determine application ...
  71. This report displays a summary of the compliance status with the Default Exchange ActiveSync mailbox policy for the mobile ...
  72. This report displays a summary of those alerts that were generated most often from today back to the specified date for the ...
  73. This report displays computers which have software installed that has not been used for a specified period of time. The specified ...
  74. This report displays detailed information about each client in site that has run the HTTPS Communication Readiness Tool and ...
  75. This report displays detailed information about each client in site that have run the HTTPS Communication Readiness Tool ...