Windows Server 2008
- Making changes to your TV signal source may require you to reset your TV Program Guide listings. Select Set Up Guide listings ...
- Making the backup process even easier, the Back Up Files wizard provides additional options regarding backup destination, ...
- Making this folder private will prevent all of its subfolders from being shared on the network. Are you sure you want to ...
- Making your Windows-based workstations more versatile, Subsystem for UNIX-Based Applications (SUA) enables you to run UNIX-based ...
- Manage auditing and security log This security setting determines which users can specify object access auditing options ...
- Manage the certificate templates on a different writable domain controller by changing the writable domain controller that ...
- manage-bde -autounlock -enable Volume manage-bde -autounlock -disable Volume manage-bde -autounlock -clearallkeys OSVolume ...
- manage-bde -on Volume {-RecoveryPassword|-rp} NumericalPassword {-RecoveryKey|-rk} PathToExternalKeyDirectory {-StartupKey|-sk} ...
- manage-bde -protectors -add Volume {-RecoveryPassword|-rp} NumericalPassword {-RecoveryKey|-rk} PathToExternalKeyDirectory ...
- manage-bde -protectors -delete Volume {-Type|-t} {RecoveryPassword| ExternalKey| TPM| TPMAndStartupKey| TPMAndPIN TPMAndPINAndStartupKey} ...
- manage-bde -protectors -get Volume -parameter arguments manage-bde -protectors -add Volume -parameter arguments manage-bde ...
- manage-bde -protectors -get Volume {-Type|-t} {RecoveryPassword| ExternalKey| TPM| TPMAndStartupKey| TPMAndPIN| TPMAndPINAndStartupKey} ...
- manage-bde -unlock Volume {[{-RecoveryPassword| -rp} NumericalPassword | {-RecoveryKey|-rk} PathToExternalKeyFile]} {-ComputerName|-cn} ...
- ManagedElement is an abstract class that provides a common superclass (or top of the inheritance tree) for the non-association ...
- Management Rules specifying Equal Per Process or Equal Per User can only be applied for allocations that are not suballocated. ...
- Management Service provides infrastructure to configure the IIS 7.0 user interface, IIS Manager, for remote management in ...
- Management Tools provide infrastructure to manage a Web server that runs IIS 7. You can use the IIS user interface, command-line ...
- Manages access to smart cards read by this computer. If this service is stopped, this computer will be unable to read smart ...
- Manages and catalogs removable media and operates automated removable media devices. If this service is stopped, programs ...
- Manages and implements the backup infrastructure including shadow copies. If this service is disabled shadow copy creation ...
- Manages and implements Volume Shadow Copies used for backup and other purposes. If this service is stopped, shadow copies ...
- Manages audio devices for the Windows Audio service. If this service is stopped, audio devices and effects will not function ...
- Manages audio devices for the Windows Audio service. If this service is stopped, audio devices and effects will not function ...
- Manages audio for Windows-based programs. If this service is stopped, audio devices and effects will not function properly. ...
- Manages audio for Windows-based programs. If this service is stopped, audio devices and effects will not function properly. ...
- Manages authentication, authorization, auditing and accounting for virtual private network (VPN), dial-up, 802.1x wireless ...
- Manages authentication, authorization, auditing, and accounting for VPN, dial-up, 802.1x wireless or Ethernet switch connection ...
- Manages CD recording using Image Mastering Applications Programming Interface (IMAPI). If this service is stopped, this computer ...
- Manages CPU for a local or remote Microsoft Windows Server. Advanced options permit hard affinity of groups of processes ...
- Manages CPU for a local or remote Windows Server 2003, Enterprise and Datacenter Editions. Advanced options permit hard affinity ...
- Manages dial-up and virtual private network (VPN) connections from this computer to the Internet or other remote networks. ...
- Manages Internet SCSI (iSCSI) sessions from this computer to remote iSCSI target devices. If this service is stopped, this ...
- Manages objects in the Network and Dial-Up Connections folder, in which you can view both local area network and remote connections. ...
- Manages requests made by Pre-Boot eXecution Environment (PXE) - enabled client computers. If this service is stopped, PXE-enabled ...
- Manages requests made by Pre-Boot eXecution Environment (PXE) - enabled client computers. If this service is stopped, PXE-enabled ...
- Manages software-based volume shadow copies taken by the Volume Shadow Copy service. If this service is stopped, software-based ...
- Manages the configuration and tracking of Component Object Model (COM)+-based components. If the service is stopped, most ...
- Manual backup and restore allows you to perform an immediate backup or restoration of the WMI repository to/from a file you ...
- Manually configure settings Windows will open a configuration page. Under PPoE settings, type the router password (check ...
- Manually control the level of acceleration and performance supplied by your graphics hardware. Use the Display Troubleshooter ...
- Manually create a network profile This creates a new network profile or locates an existing network and saves a profile for ...
- Manufactured under license from Dolby Laboratories. "Dolby" and the double-D symbol are registered trademarks of Dolby Laboratories. ...
- Many APIs use much more stack space on NT than Win9x. This compatibility fix is command line driven and takes a list of APIs ...
- Many devices include sensors or have sensors installed nearby, in order to measure critical input and output properties. ...
- Many devices, such as processors or power supplies, require their own cooling devices. This association indicates where fans ...
- Many Internet sites use more than one domain to host their content. You may have to add several domains to the Trusted sites ...
- Many of the application compatibility strategies in Windows XP depend on "matching information", which will help to identify ...
- Many organizations have offices located in different geographical locations, requiring remote site connectivity. You can ...
- Many organizations use a registration authority (RA) to manage certificate requests. Use the following certificate to sign ...
- Many Windows 9x applications were not programmed to respond to task switches caused by pressing Alt-Tab, the Windows key, ...
- Map cache file doesn't exist or corrupted. Corrective action taken: Regenerating the map cache file. Domain: %1, Map Name: ...
- Map is already defined. Current field definition - Key Field Number = '%1',Field Separator = '%2', New field definition - ...
- Mapped Space is virtual memory that has been mapped to a specific virtual address (or range of virtual addresses) in the ...
- Mapped Space is virtual memory that has been mapped to a specific virtual address (or range of virtual addresses) in the ...
- Mapped Space is virtual memory that has been mapped to a specific virtual address (or range of virtual addresses) in the ...
- Mapped Space is virtual memory that has been mapped to a specific virtual address (or range of virtual addresses) in the ...
- Mapped Space is virtual memory that has been mapped to a specific virtual address (or range of virtual addresses) in the ...
- Mapped Space is virtual memory that has been mapped to a specific virtual address (or range of virtual addresses) in the ...
- Mapped Space is virtual memory that has been mapped to a specific virtual address (or range of virtual addresses) in the ...
- Mapped Space is virtual memory that has been mapped to a specific virtual address (or range of virtual addresses) in the ...
- Mapped View Alignment Incorrect} An attempt was made to map a view of a file, but either the specified base address or the ...
- Mapping from the Drive Information you provided to a piece of Physical Media failed. Either the Drive (+Changer) Information ...
- Mapping from the Slot Information you provided to a piece of Physical Media failed. Either the Slot (+Changer) Information ...
- March 2001 Application Compatibility Package is incompatible with this version of Windows. All of its features are currently ...
- Marking an FT (fault tolerant) volume active will only mark underlying partitions active if they are primary partitions. ...
- MASK MASK is relevant only for hardware shadow copies after import. The shadow copy disk is removed from the machine and ...
- Master Stats: - Notifies Sent = %1!10lu! Requests = %2!10lu! NameError = %3!10lu! FormError = %4!10lu! Refused = %5!10lu! ...
- Mastered - Readable on all computers and some CD/DVD players. Requires you to write all files at once, and individual files ...
- MaxBurstLength is not serially greater than FirstBurstLength. Dump data contains FirstBurstLength followed by MaxBurstLength. ...
- Maximum acceptable directory search response time (in milliseconds). This rule will issue a warning if the search response ...
- Maximum amount of time, in seconds, dirty lines or buckets may remain in the cache before they are flushed. A value of zero ...
- Maximum application log size This security setting specifies the maximum size of the application event log, which has a maximum ...
- Maximum command sequence number is not serially greater than expected command sequence number in login response. Dump data ...
- Maximum length of a filename component supported by the Windows drive. A filename component is that portion of a filename ...
- Maximum lifetime for service ticket This security setting determines the maximum amount of time (in minutes) that a granted ...