Exchange Server 2010

  1. If you enable the error reporting feature, Exchange automatically sends error reports to Microsoft. If an error occurs, the ...
  2. If you enable the Exchange Error Reporting feature, Microsoft Exchange will automatically send error reports to Microsoft ...
  3. If you have a product key, select Enter Product Key on the server work center action pane. If you don't have a product key, ...
  4. If you have low vision and use a screen reader or high contrast settings, you can select the check box below to optimize ...
  5. If you have low vision and use a screen reader or high contrast settings, you can select the check box below to optimize ...
  6. If you heard the e-mail address you want, say the number. Otherwise, say not listed. To hear the list again, say repeat. ...
  7. If you heard the name you want, say the number. If you didn't, say "Not Listed" or, to hear the list again, say "Repeat". ...
  8. If you heard the person you want, say the number. If you did not, say "Not Listed". To hear the list again, say "Repeat". ...
  9. If you heard the right entry, tell me the number. If the entry wasn't in the list, say "Not Listed". To hear the list again, ...
  10. If you heard the right name, tell me the number. If the name wasn't in the list, then say "Not Listed", or to hear the list ...
  11. If you immediately disable UM server '{0}', all calls that are currently connected to the server will be disconnected. Do ...
  12. If you immediately disable UM server '{0}', all calls that are currently connected to the server will be disconnected. Do ...
  13. If you join the program, all Exchange 2010 servers in your organization will be included. You can exclude specific servers ...
  14. If you join the program, all servers in your organization will be included. You can exclude specific servers from the list ...
  15. If you join the program, this Exchange server will be included in the program. You can exclude this server at any time by ...
  16. If you know the name of the person or option that you want, please say it at any time. Otherwise, please wait for a list ...
  17. If you remove the move request for the mailbox, you'll have to create a new move request if you want to move this mailbox ...
  18. If you remove the move request for the mailbox, you'll have to create a new move request if you want to move this mailbox ...
  19. If you restore a backup that is older than these log files, the log files will be required to bring the restored backup to ...
  20. If you select the check box below, auto-match will be disabled, and all source mailboxes will be matched to the mailbox that ...
  21. If you specify that messages should be forwarded to a moderator for approval, you can't specify any additional actions for ...
  22. If you use the Internal switch, or if you set the value of the Usage parameter to Internal, you must also specify a value ...
  23. If you want the names of groups created by users to include a specific prefix and suffix, specify a sequence of user attributes ...
  24. If you want to restrict who can send messages to the group, add users or groups to the list below. Only the specified senders ...
  25. If you want to return to browsing your calendar, say "Cancel". Otherwise, I can clear your calendar by canceling and declining ...
  26. If you want to return to browsing your calendar, say "Cancel". Otherwise, say a phrase like, "three thirty PM" or "two days" ...
  27. If you want to save the information in the members box, click Cancel, and then save it by clicking the Add to Group button. ...
  28. If you'd also like to start sending automatic replies to people who send you e-mail, press 1. Otherwise, press the star key. ...
  29. If you'd also like to stop sending automatic replies to people who send you e-mail, press 1. Otherwise, press the star key. ...
  30. If you'll remain in the {0} time zone permanently, you can change the start and end times for your work week to use that ...
  31. If your current credentials do not have sufficient permission to read application event logs on the Exchange servers, enter ...
  32. If your current credentials do not have sufficient permission to read application event logs on the specified server, enter ...
  33. If your current credentials do not have sufficient permission to read Exchange server configuration information from Active ...
  34. If your current credentials do not have sufficient permission to read Exchange server configuration information, enter alternate ...
  35. If your current credentials do not have sufficient permissions to read Exchange server configuration information, enter alternate ...
  36. If your digital ID isn't trusted by the Exchange server, you can't use it to encrypt messages. For more information, please ...
  37. If your Exchange 2010 organization is also running Exchange 2003, disabling this connector may cause routing loops. Exchange ...
  38. If your organization has an internal or customer facing Service Level Agreement (SLA), define this threshold parameter to ...
  39. If your phone is synchronizing with Microsoft Exchange, you can retrieve a log that shows interactions between Exchange and ...
  40. Ignore Trust for SSL When this check box is selected, the tool will ignore the trust requirement during certificate validation. ...
  41. IIS is configured to create 32-bit worker processes on 64-bit Windows Server '{2}'. This will break virtual directories for ...
  42. IM - Sent Message Delivery Failure % is the percentage of the last 100 messages that were sent but couldn't be delivered. ...
  43. IM - Sign-In Failures is the number of attempts to sign in to Instant Messaging that have failed since the service was started. ...
  44. IM - Total Message Delivery Failures is the number of attempts to deliver instant messages that have failed since the service ...
  45. IM - Total Users is the number of users who have signed into Instant Messaging in Outlook Web App since the service was started. ...
  46. IM - Users Currently Signed In is the number of users who are currently signed in to Instant Messaging in Outlook Web App. ...
  47. IMAIL exception handling on server {2} is disabled. This configuration should be set only under the guidance of Microsoft ...
  48. IMAP Server Enter the host name of your IMAP4 server. In many cases, this will be something like mail.contoso.com or imap.contoso.com. ...
  49. In a log shipping environment, a passive copy has detected an error that is preventing proper operation of database '%4' ...
  50. In a log shipping environment, a passive copy has detected an error that is preventing proper operation of database '%4' ...
  51. In accordance with the group naming policy for your organization, this group has been created with the following name: {0}. ...
  52. In order to complete the installation of 2], you must restart the computer. Other users are currently logged on to this computer, ...
  53. In order to get 'TokenGroupsGlobalAndUniversal' for object '{0}', a session with a domain controller is required with the ...
  54. In this command line, Enn refers to the first three characters of the transaction log file name. For example, for transaction ...
  55. In-country/region dialing rules A dialing rule defines types of calls that users can make. You can group rules by giving ...
  56. Inbound authentication failed with error %1 for Receive connector %2. The authentication mechanism is %3. The source IP address ...
  57. Inbound authentication failed with error %1 for Receive connector %2. The authentication mechanism is %3. The source IP address ...
  58. Inbound direct trust authentication failed for certificate %1. The source IP address of the server that tried to authenticate ...
  59. Inbound direct trust authentication failed for certificate %1. The source IP address of the server that tried to authenticate ...
  60. Inbound Proxy Requests - Peak is the largest number of requests simultaneously received from a primary Client Access server. ...
  61. Inbound Proxy Requests - Total is the total number of requests received from a primary Client Access server since the process ...
  62. Inbound Proxy Sessions - Peak is the largest number of Inbound Proxy sessions simultaneously loaded in the Exchange Control ...
  63. Inbound Proxy Sessions - Total is the total number of Inbound Proxy Sessions loaded in the Exchange Control Panel since the ...
  64. Inbound Proxy Sessions is the current number of RBAC sessions loaded in the Exchange Control Panel that are received from ...
  65. Inbound Proxy Sessions/sec is the number of Inbound Proxy sessions that are loaded per second in the Exchange Control Panel. ...
  66. Inbound rule for Microsoft Exchange Server to allow MSExchangeMailboxAssistants to receive RPC endpoint mapper communication. ...
  67. Inbound rule for Microsoft Exchange Server to allow MSExchangeMailSubmission to receive RPC endpoint mapper communication. ...
  68. Inbound rule for Microsoft Exchange Server to allow MSExchangeMigration service to receive RPC endpoint mapper communication. ...
  69. Inbound rule for Microsoft Exchange Server to allow the MSExchangeMailboxReplication service to receive RPC communication. ...
  70. Inbound rule for Microsoft Exchange Server to allow the MSExchangeRPC service to receive RPC endpoint mapper communication. ...
  71. Inbound rule for Microsoft Exchange Server to use Remote Procedure Call service in the Windows Management Instrumentation ...
  72. Inbound SMTP This test walks through the steps an Internet e-mail server uses to send inbound SMTP e-mail to your domain. ...
  73. Include unsearchable items Select this checkbox to capture items, such as encrypted attachments or message types with an ...
  74. Includes all of the extended property types that we support. Note that Error, Null, Object and Object array can not be used ...
  75. Includes all of the extended property types that we support. Note that Error, Null, Object and Object array can not be used ...