System Center Configuration Manager 2012

  1. This report returns the count of computers assigned to a specific site in each compliance scan state returned by clients ...
  2. This report returns the count of computers for a specific collection in each compliance scan state returned by clients during ...
  3. This report returns the enforcement states for a specific software update deployment, which is typically the second phase ...
  4. This report returns the evaluation state for a specific software update deployment, which is typically the first phase of ...
  5. This report returns the software update compliance data for a specific computer. To limit the amount of information returned, ...
  6. This report returns the software updates in a specified deployment that do not have all of the associated content retrieved, ...
  7. This report shows administrative users, their associated security roles, and the security scopes associated with each security ...
  8. This report shows all User Device Associations for the selected collection, and groups the results by collection type (e.g. ...
  9. This report shows application infrastructure errors. These can include internal infrastructure errors as well as errors as ...
  10. This report shows asset details compliance information for the selected application deployment type within the selected collection. ...
  11. This report shows compliance information for deployment types of the selected application within the selected collection. ...
  12. This report shows compliance information for the selected application within the selected collection. This is an application ...
  13. This report shows compliance status information for the selected application deployment type within the selected collection. ...
  14. This report shows detailed information for application infrastructure errors. These can include internal infrastructure errors ...
  15. This report shows objects that are secured by the selected security scope and that are assigned to only to this security ...
  16. This report shows securable objects, the security scopes associated with the objects, and which administrative users have ...
  17. This report shows security roles and which Configuration Manager administrative users are associated with each security role. ...
  18. This report shows security scopes and which Configuration Manager administrative users and security groups are associated ...
  19. This report shows the details of either error or warning for folder redirection or roaming user profile when drilled down ...
  20. This report shows the details of health state for folder redirection per each of the redirected folders for a given user. ...
  21. This report shows the list of computers that are currently running in a specific group/phase of the specified task sequence ...
  22. This report shows the list of computers that failed within a specific group/phase of the specified task sequence deployment. ...
  23. This report shows the log of administrative changes made for administrative users, security roles, security scopes, and collections. ...
  24. This report shows the operating system, memory, hard drive free space and processor speed for each system in the specified ...
  25. This report shows the percentage of clients which have requested policy at least once in the last 30 days. Each day represents ...
  26. This report shows the status of related dependency and supersedence deployment types for a particular machine and user. If ...
  27. This report shows the status summary of all resources that have been targeted by an deployment that is available to a collection ...
  28. This report will show a number of yearly quarters and a count of the computers whose birth date falls within that quarter. ...
  29. This report will show the differences between the software inventory reported for two selected computers. Only the discrepancies ...
  30. This report will show the specific computers that are nearing expiration. License Status: 0=Unlicensed, 1=Licensed, 2=Out ...
  31. This reports displays all mobile devices clients. Mobile devices that are discovered by the Exchange Server connector are ...
  32. This reports lists the computers that installed a specific software update through remediation during a specific time period ...
  33. This reports provides an asset manager summary of computers matching keyword filters on computer name, ConfigMgr site, domain, ...
  34. This setting might be used by deployed apps. If you clear this setting, apps that use this VPN profile will no longer be ...
  35. This site contains applications that were created with a prerelease version of Configuration Manager and are not compatible ...
  36. This site failed to connect to the central administration site. If you continue, the site will uninstall, although it might ...
  37. This site failed to connect to the central administration site. If you continue, the site will uninstall, although it might ...
  38. This site has %d secondary child site(s). You must uninstall secondary sites through the Configuration Manager console first, ...
  39. This site has secondary child site(s). You must uninstall secondary sites through the Configuration Manager console first, ...
  40. This site has secondary child site(s). You must uninstall secondary sites through the Configuration Manager console first. ...
  41. This site is in System Center 2012 Configuration Manager Service Pack 1 compatibility mode. Some objects might not be available ...
  42. This site is in System Center 2012 R2 Configuration Manager compatibility mode. Some objects might not be available until ...
  43. This site system is set as the default Application Catalog website point in one or more custom client settings. Remove this ...
  44. This site system is set as the default Application Catalog website point in the default client settings. Remove this site ...
  45. This site system is the only Client Access Point for the site and cannot be removed. Site server services always require ...
  46. This site system is the only intranet management point for the site. If you configure it to allow Internet-only connections, ...
  47. This site system role is the sync source for all software update points in the site. Select a new sync source for this site ...
  48. This site will be responsible for processing all the discovery records of the hierarchy. In case the primary discovery processing ...
  49. This site's public key has not been created, and configured yet. Therefore, keys cannot be dumped from this site. Please ...
  50. This software update addresses a browse dialog box error that might occur when the Configuration Manager console is installed ...
  51. This software update addresses several MMC errors that may occur when you run the Configuration Manager console. You should ...
  52. This source site has been previously specified. The original source site has been reactivated and you can view historical ...
  53. This system cannot be deleted from the database because it is currently serving as a branch distribution point. To delete ...
  54. This task sequence cannot be run because a package referenced by the task sequence could not be found. For more information, ...
  55. This task sequence cannot be run because the program files for %1!s! %2!s! are inaccessible on the distribution point. Make ...
  56. This task sequence cannot be run because the program files for %1!s! %2!s! cannot be located on a distribution point. For ...
  57. This task sequence cannot be run because the program files for %1!s! are inaccessible on the distribution point. Make sure ...
  58. This task sequence cannot be run because the program files for %1!s! cannot be located on a distribution point. For more ...
  59. This task sequence object is referred to by an invalid boot image. The invalid data will be ignored. You can specify a valid ...
  60. This task sequence object references one or more invalid packages. Make sure all associated packages exist and are available ...
  61. This variable determines whether or not the task sequence uses the drive letter captured in the operating system image WIM ...
  62. This version of Sysprep is incompatible with the current operating system. Ensure that the correct version is available on ...
  63. This VPN profile might be used by deployed apps. If you delete this VPN profile, apps that used it will no longer be able ...
  64. This will clear the required PXE boot deployments of all the members assigned to this site in this collection. The members ...
  65. This will re-send this package to this distribution point. This may take some time to complete. Are you sure you wish to ...
  66. This Windows Firewall profile is for computers that connect to a private network location, such as a home or office network. ...
  67. This wizard allows you to import one or more drivers. You can let Configuration Manager find all drivers in the given network ...
  68. This wizard configures the Microsoft Intune subscription that lets you manage mobile devices by using Microsoft Intune. You ...
  69. This wizard configures the Windows Intune connector site system role that lets you manage mobile devices by using Windows ...
  70. This wizard helps you copy a package to a new distribution point, update an existing package on a distribution point, or ...
  71. This wizard helps you copy objects from one Configuration Manager database into another Configuration Manager database. Use ...
  72. This wizard helps you copy one or more objects from one Configuration Manager database into another Configuration Manager ...
  73. This wizard imports new computer information into the Configuration Manager database. Select Import computers using a file ...
  74. This wizard walks you through the steps necessary to install or upgrade Configuration Manager. Setup also provides you with ...
  75. This wizard will help you decide whether it is appropriate to delete the program listed below. The wizard describes the results ...