Windows Server 2008

  1. A categorization scheme is a predefined set of categories, derived from an internal or external hierarchy, that can be used ...
  2. A categorization scheme is a predefined set of categories, derived from an internal or external hierarchy, that can be used ...
  3. A categorization scheme is a predefined set of categories, derived from an internal or external hierarchy, that can be used ...
  4. A CD that contains music recorded as tracks so that it can be played on any stereo, plus enhanced content such as software ...
  5. A CD-recording driver is installed that might cause stability problems, including problems shutting down and problems using ...
  6. A certificate could not be found. Connections that use the L2TP protocol over IPSec require the installation of a machine ...
  7. A certificate could not be found. Connections that use the L2TP protocol over IPsec require the installation of a machine ...
  8. A certificate found in the local Active Directory Domain Services claims to be from a domain controller with the following ...
  9. A certificate found in the local Active Directory Lightweight Directory Services claims to be from a domain controller with ...
  10. A certificate in the chain for CA certificate %3 for %1 could not be verified because no information is available describing ...
  11. A certificate presented to Active Directory Domain Services claims to be from a directory service with the following computer ...
  12. A certificate presented to Active Directory Lightweight Directory Services claims to be from a directory service with the ...
  13. A Certificate Services template was updated. %1 v%2 (Schema V%3) %4 %5 Template Change Information: Old Template Content: ...
  14. A certificate stored by this extension is not valid. Use Group Policy Object Editor to reconfigure the settings in this extension. ...
  15. A certificate template is a set of predefined properties for certificates issued to computers. Select a template from the ...
  16. A certificate trust list (CTL) is a signed list of root certification authority (CA) certificates that have been judged reputable ...
  17. A certificate will be issued to this CA to secure communications with other CAs and with clients requesting certificates. ...
  18. A certificate, which is issued by a certification authority, is a confirmation of your identity and contains information ...
  19. A Certification Authority (CA) and the Network Device Enrollment Service cannot be installed on this computer simultaneously. ...
  20. A certification authority (CA) is needed to issue, validate, and manage certificates. The system will connect to all CAs ...
  21. A certification authority with the same name was found in the Active Directory. Do you want to overwrite the existing CA ...
  22. A change has been made to IPSec settings. A Connection Security Rule was added. Profile changed: %1 Added Connection Security ...
  23. A change has been made to IPsec settings. A Connection Security Rule was added. Profile Changed: %1 Added Connection Security ...
  24. A change has been made to IPSec settings. A Connection Security Rule was deleted. Profile changed: %1 Deleted Connection ...
  25. A change has been made to IPsec settings. A Connection Security Rule was deleted. Profile Changed: %1 Deleted Connection ...
  26. A change has been made to IPSec settings. A Connection Security Rule was modified. Profile changed: %1 Modified Connection ...
  27. A change has been made to IPsec settings. A Connection Security Rule was modified. Profile Changed: %1 Modified Connection ...
  28. A change has been made to IPSec settings. A Crypto Set was deleted. Profile changed: %1 Deleted Crypto Set: Id: %2 Name: ...
  29. A change has been made to IPsec settings. A Crypto Set was deleted. Profile Changed: %1 Deleted Crypto Set: ID: %2 Name: ...
  30. A change has been made to IPSec settings. A Crypto Set was modified. Profile changed: %1 Modified Crypto Set: Id: %2 Name: ...
  31. A change has been made to IPsec settings. A Crypto Set was modified. Profile Changed: %1 Modified Crypto Set: ID: %2 Name: ...
  32. A change has been made to IPSec settings. An Authentication Set was added. Profile changed: %1 Added Authentication Set: ...
  33. A change has been made to IPsec settings. An Authentication Set was added. Profile Changed: %1 Added Authentication Set: ...
  34. A change has been made to IPSec settings. An Authentication Set was deleted. Profile changed: %1 Deleted Authentication Set: ...
  35. A change has been made to IPsec settings. An Authentication Set was deleted. Profile Changed: %1 Deleted Authentication Set: ...
  36. A change has been made to IPSec settings. An Authentication Set was modified. Profile changed: %1 Modified Authentication ...
  37. A change has been made to IPsec settings. An Authentication Set was modified. Profile Changed: %1 Modified Authentication ...
  38. A change has been made to the system that requires that you restart the computer. Do you want to restart the computer now? ...
  39. A change has been made to Windows Firewall exception list. A rule was added. Profile Changed: %1 Added Rule: Rule ID: %2 ...
  40. A change has been made to Windows Firewall exception list. A rule was added. Profile changed: %1 Added Rule: Rule Id: %2 ...
  41. A change has been made to Windows Firewall exception list. A rule was deleted. Profile Changed: %1 Deleted Rule: Rule ID: ...
  42. A change has been made to Windows Firewall exception list. A rule was deleted. Profile changed: %1 Deleted Rule: Rule Id: ...
  43. A change has been made to Windows Firewall exception list. A rule was modified. Profile Changed: %1 Modified Rule: Rule ID: ...
  44. A change has been made to Windows Firewall exception list. A rule was modified. Profile changed: %1 Modified Rule: Rule Id: ...
  45. A change to a Server for NFS configuration registry key requires the server to be restarted for the change take effect. The ...
  46. A change to the Guide listings or the Recorded TV Schedule has resolved the conflict. To verify which programs are scheduled ...
  47. A character that is not valid was found at the following position and string while processing an event log override registry ...
  48. A chassis can contain other packages, such as other chassis and cards. The CIM_PackageInChassis association makes explicit ...
  49. A check is a condition or characteristic that is expected to be true in an environment defined or scoped by an instance of ...
  50. A CIM_Action is an operation that is part of a process to either create a software element in its next state or to eliminate ...
  51. A CIM_FileSpecification identifies a file that is either to be on or off the system. The file is to be located in the directory ...
  52. A CIM_Service is a Logical Element that contains the information necessary to represent and manage the functionality provided ...
  53. A CIM_System is a LogicalElement that aggregates an enumerable set of Managed System Elements. The aggregation operates as ...
  54. A class derived from CIM_ComputerSystem that represents a desktop, mobile, network PC, server or other type of a single node ...
  55. A class derived from CIM_LogicalElement that is a special collection of managed system elements. This collection indicates ...
  56. A class derived from CIM_System that is a special collection of CIM_ManagedSystemElement instances. This collection provides ...
  57. A class derived from ComputerSystem that 'is made up of' two or more ComputerSystems which operate together as an atomic, ...
  58. A class derived from ComputerSystem that represents a Desktop, Mobile, NetPC, Server or other type of a single node Computer ...
  59. A class derived from FileSystem that represents access of the FileSystem via a network-related service. In this case, the ...
  60. A class derived from FileSystem that represents the file store controlled by a ComputerSystem through local means (e.g., ...
  61. A class derived from redundancy group containing mass storage-related redundancy information. Storage redundancy groups are ...
  62. A class derived from redundancy group indicating that the aggregated elements have more capacity or capability than is needed. ...
  63. A class derived from RedundancyGroup indicating that one or more of the aggregated elements can be spared. (The actual Spares ...
  64. A class derived from RemoteFileSystem representing that the FileSystem is mounted, using the NFS protocol, from a ComputerSystem. ...
  65. A class derived from System that is a special collection of ManagedSystemElements. This collection provides compute capabilities ...
  66. A cleaning cartridge is needed in %1 %2 before it can finish a drive cleaning. Please place a cleaning cartridge in the %1. ...
  67. A client application is using search referrals, indicating that its LDAP_OPT_REFERRALS option is on. LDAP client applications ...
  68. A client is attempting to continue a pending sign-in request, but the target of the continuing request differs from the target ...
  69. A client made a DirSync LDAP request for a directory partition that included attributes in the Read-Only DC Filtered Set. ...
  70. A client made a DirSync LDAP request for a directory partition. Access was denied due to the following error. Directory partition: ...
  71. A client request contained a version number that is not valid and cannot be processed. The following information is available: ...
  72. A client request to the Federation Service failed because the syntax of a Lightweight Directory Access Protocol (LDAP) attribute ...
  73. A cloud requested is not present; review the configured IPv6 addresses and verify there are addresses of appropriate scope.%0 ...
  74. A cluster address enables AD RMS clients to communicate with this cluster over the network. It is recommended that you configure ...
  75. A cluster can be administered by connecting to any of the member servers. The cluster connection point identifies which server ...