Exchange Server 2010
- If you enable the error reporting feature, Exchange automatically sends error reports to Microsoft. If an error occurs, the ...
- If you enable the Exchange Error Reporting feature, Microsoft Exchange will automatically send error reports to Microsoft ...
- If you have a product key, select Enter Product Key on the server work center action pane. If you don't have a product key, ...
- If you have low vision and use a screen reader or high contrast settings, you can select the check box below to optimize ...
- If you have low vision and use a screen reader or high contrast settings, you can select the check box below to optimize ...
- If you heard the e-mail address you want, say the number. Otherwise, say not listed. To hear the list again, say repeat. ...
- If you heard the name you want, say the number. If you didn't, say "Not Listed" or, to hear the list again, say "Repeat". ...
- If you heard the person you want, say the number. If you did not, say "Not Listed". To hear the list again, say "Repeat". ...
- If you heard the right entry, tell me the number. If the entry wasn't in the list, say "Not Listed". To hear the list again, ...
- If you heard the right name, tell me the number. If the name wasn't in the list, then say "Not Listed", or to hear the list ...
- If you immediately disable UM server '{0}', all calls that are currently connected to the server will be disconnected. Do ...
- If you immediately disable UM server '{0}', all calls that are currently connected to the server will be disconnected. Do ...
- If you join the program, all Exchange 2010 servers in your organization will be included. You can exclude specific servers ...
- If you join the program, all servers in your organization will be included. You can exclude specific servers from the list ...
- If you join the program, this Exchange server will be included in the program. You can exclude this server at any time by ...
- If you know the name of the person or option that you want, please say it at any time. Otherwise, please wait for a list ...
- If you remove the move request for the mailbox, you'll have to create a new move request if you want to move this mailbox ...
- If you remove the move request for the mailbox, you'll have to create a new move request if you want to move this mailbox ...
- If you restore a backup that is older than these log files, the log files will be required to bring the restored backup to ...
- If you select the check box below, auto-match will be disabled, and all source mailboxes will be matched to the mailbox that ...
- If you specify that messages should be forwarded to a moderator for approval, you can't specify any additional actions for ...
- If you use the Internal switch, or if you set the value of the Usage parameter to Internal, you must also specify a value ...
- If you want the names of groups created by users to include a specific prefix and suffix, specify a sequence of user attributes ...
- If you want to restrict who can send messages to the group, add users or groups to the list below. Only the specified senders ...
- If you want to return to browsing your calendar, say "Cancel". Otherwise, I can clear your calendar by canceling and declining ...
- If you want to return to browsing your calendar, say "Cancel". Otherwise, say a phrase like, "three thirty PM" or "two days" ...
- If you want to save the information in the members box, click Cancel, and then save it by clicking the Add to Group button. ...
- If you'd also like to start sending automatic replies to people who send you e-mail, press 1. Otherwise, press the star key. ...
- If you'd also like to stop sending automatic replies to people who send you e-mail, press 1. Otherwise, press the star key. ...
- If you'll remain in the {0} time zone permanently, you can change the start and end times for your work week to use that ...
- If your current credentials do not have sufficient permission to read application event logs on the Exchange servers, enter ...
- If your current credentials do not have sufficient permission to read application event logs on the specified server, enter ...
- If your current credentials do not have sufficient permission to read Exchange server configuration information from Active ...
- If your current credentials do not have sufficient permission to read Exchange server configuration information, enter alternate ...
- If your current credentials do not have sufficient permissions to read Exchange server configuration information, enter alternate ...
- If your digital ID isn't trusted by the Exchange server, you can't use it to encrypt messages. For more information, please ...
- If your Exchange 2010 organization is also running Exchange 2003, disabling this connector may cause routing loops. Exchange ...
- If your organization has an internal or customer facing Service Level Agreement (SLA), define this threshold parameter to ...
- If your phone is synchronizing with Microsoft Exchange, you can retrieve a log that shows interactions between Exchange and ...
- Ignore Trust for SSL When this check box is selected, the tool will ignore the trust requirement during certificate validation. ...
- IIS is configured to create 32-bit worker processes on 64-bit Windows Server '{2}'. This will break virtual directories for ...
- IM - Sent Message Delivery Failure % is the percentage of the last 100 messages that were sent but couldn't be delivered. ...
- IM - Sign-In Failures is the number of attempts to sign in to Instant Messaging that have failed since the service was started. ...
- IM - Total Message Delivery Failures is the number of attempts to deliver instant messages that have failed since the service ...
- IM - Total Users is the number of users who have signed into Instant Messaging in Outlook Web App since the service was started. ...
- IM - Users Currently Signed In is the number of users who are currently signed in to Instant Messaging in Outlook Web App. ...
- IMAIL exception handling on server {2} is disabled. This configuration should be set only under the guidance of Microsoft ...
- IMAP Server Enter the host name of your IMAP4 server. In many cases, this will be something like mail.contoso.com or imap.contoso.com. ...
- In a log shipping environment, a passive copy has detected an error that is preventing proper operation of database '%4' ...
- In a log shipping environment, a passive copy has detected an error that is preventing proper operation of database '%4' ...
- In accordance with the group naming policy for your organization, this group has been created with the following name: {0}. ...
- In order to complete the installation of 2], you must restart the computer. Other users are currently logged on to this computer, ...
- In order to get 'TokenGroupsGlobalAndUniversal' for object '{0}', a session with a domain controller is required with the ...
- In this command line, Enn refers to the first three characters of the transaction log file name. For example, for transaction ...
- In-country/region dialing rules A dialing rule defines types of calls that users can make. You can group rules by giving ...
- Inbound authentication failed with error %1 for Receive connector %2. The authentication mechanism is %3. The source IP address ...
- Inbound authentication failed with error %1 for Receive connector %2. The authentication mechanism is %3. The source IP address ...
- Inbound direct trust authentication failed for certificate %1. The source IP address of the server that tried to authenticate ...
- Inbound direct trust authentication failed for certificate %1. The source IP address of the server that tried to authenticate ...
- Inbound Proxy Requests - Peak is the largest number of requests simultaneously received from a primary Client Access server. ...
- Inbound Proxy Requests - Total is the total number of requests received from a primary Client Access server since the process ...
- Inbound Proxy Sessions - Peak is the largest number of Inbound Proxy sessions simultaneously loaded in the Exchange Control ...
- Inbound Proxy Sessions - Total is the total number of Inbound Proxy Sessions loaded in the Exchange Control Panel since the ...
- Inbound Proxy Sessions is the current number of RBAC sessions loaded in the Exchange Control Panel that are received from ...
- Inbound Proxy Sessions/sec is the number of Inbound Proxy sessions that are loaded per second in the Exchange Control Panel. ...
- Inbound rule for Microsoft Exchange Server to allow MSExchangeMailboxAssistants to receive RPC endpoint mapper communication. ...
- Inbound rule for Microsoft Exchange Server to allow MSExchangeMailSubmission to receive RPC endpoint mapper communication. ...
- Inbound rule for Microsoft Exchange Server to allow MSExchangeMigration service to receive RPC endpoint mapper communication. ...
- Inbound rule for Microsoft Exchange Server to allow the MSExchangeMailboxReplication service to receive RPC communication. ...
- Inbound rule for Microsoft Exchange Server to allow the MSExchangeRPC service to receive RPC endpoint mapper communication. ...
- Inbound rule for Microsoft Exchange Server to use Remote Procedure Call service in the Windows Management Instrumentation ...
- Inbound SMTP This test walks through the steps an Internet e-mail server uses to send inbound SMTP e-mail to your domain. ...
- Include unsearchable items Select this checkbox to capture items, such as encrypted attachments or message types with an ...
- Includes all of the extended property types that we support. Note that Error, Null, Object and Object array can not be used ...
- Includes all of the extended property types that we support. Note that Error, Null, Object and Object array can not be used ...