Windows Server 2008
- Note: If a program does not respond to your choice to enable or remove access to it, please contact the vendor of that program. ...
- NOTE: If any of the applications in the partitions are queued, then each application user must have a valid MSMQ certificate ...
- NOTE: If any of these applications are queued, then each application user must have a valid MSMQ certificate on this machine. ...
- Note: If conditional forwarders are defined for a given domain, they will be used instead of server-level forwarders. To ...
- Note: If neither of these boxes are selected, then then the transmission will not start until you manually start the transmission. ...
- Note: If the default level is Disallowed, applying software restriction policies to libraries requires you to set rules for ...
- NOTE: If this application is already running, you will need to restart the application before any changes made here will ...
- Note: If you are configuring the log file name on Group Policy object, ensure that the Windows Firewall service account has ...
- Note: If you are using a terminal server farm, the name of the farm and the name of each member must be specified in the ...
- Note: If you have an unreliable network connection, you should perform this operation by running Group Policy Management ...
- Note: If you have limited hard disk space or you want to reduce synchronization time, it's a good idea to limit the number ...
- NOTE: In order to COMPLETE the restoration of cluster associated with this node, 1. the cluster service must be started on ...
- Note: Key archival is not available for certificates based on a custom certificate request, even when this option is specified ...
- NOTE: Key protectors have been disabled on volume %1!v! to allow continued access to BitLocker-encrypted data. Type \"manage-bde ...
- NOTE: Please make sure that you use the same platform to import the program settings as the target platform. For more details, ...
- Note: Settings that are external to the GPO, such as WMI filters and IPsec policies, are independent objects in Active Directory ...
- NOTE: Telephony administrators have administrative privileges to the telephony service only, not to any other resources on ...
- Note: The application name specified here must be the name that the managed application uses when initializing the Authorization ...
- Note: The associated private key is inside a cryptographic service provider that may not allow exporting of the key. Exporting ...
- Note: The default schedule creates two shadow copies per day. Avoid creating shadow copies more frequently than once per ...
- Note: The GPT partition style is not recognized by all previous versions of Windows. It is recommended for disks larger than ...
- NOTE: The name of this computer, %1, contains one or more characters that are not allowed. You can rename this computer using ...
- NOTE: The name of this computer, %1, does not conform to Internet Domain Name System specifications because it contains extended ...
- NOTE: The name of this computer, %1, is a number. Computer names should not be numbers. You can rename this computer using ...
- NOTE: The recovery operation will cause all replicated content on the local machine to re-sync after recovery. This may cause ...
- NOTE: This command did not create any new key protectors. Type \"manage-bde -protectors -add -?\" for information on adding ...
- Note: This component only reports overall status information. It does not report information about its individual policy ...
- NOTE: This dummy error message is necessary to force MC to output the above defines inside the FACILITY_WINDOWS guard instead ...
- Note: This game has been counted as a loss in your statistics. If you return to the game, the loss will not be counted again. ...
- Note: This information is intended for a network administrator. If you are not your network's administrator, notify the administrator ...
- Note: This information is intended for a network administrator. If you are not your network's administrator, notify the administrator ...
- Note: This option applies most commonly to programs that require administrative privileges, such as installers and system ...
- Note: This registry setting is not stored in a policies key and thus considered a preference. Therefore if the Group Policy ...
- NOTE: This will create an LCE implemented event class. If you wish to install your component implementation, hit the back ...
- NOTE: This will create an LCE implemented event class. If you wish to install your component implementation, hit the back ...
- Note: To make this Analytic, Debug or Classic event log easier to navigate and manipulate, first save it in .evtx format ...
- Note: To protect against computer viruses, e-mail programs may prevent sending or receiving certain types of file attachments. ...
- Note: Try not to use your computer until you have repaired or replaced the hard disk. If you change any documents, they won't ...
- Note: Two or more firewalls running at the same time can conflict with each other. For more information, see Why you should ...
- Note: Two or more firewalls running at the same time can conflict with each other. How does a firewall help protect my computer? ...
- Note: Windows Update may update itself automatically before it checks for other updates. Read our privacy statement online ...
- Note: Without the system check, there is a risk that you will need to enter the recovery password manually to access your ...
- Note: You have only removed the request from the list of pending requests stored in your web browser. This does not affect ...
- Note: You need to have Internet Explorer 7 installed before continuing on with this wizard. Although the wizard may seem ...
- Note: You should now add records to the zone or ensure that records are updated dynamically. You can then verify name resolution ...
- Nothing can be read from or written to the Windows registry. Message Queuing may not be properly installed. Please reinstall ...
- NOTICE: Single notification receipts for multiple recipient transmissions cannot include cover pages as attachments, and ...
- Notification of policy change from LSA/SAM was processed without verifying PDC. Older security policy from this machine may ...
- Notifications for the scope %2 are not active. The event logging threshold for this scope was exceeded. No further events ...
- Notifications for the scope %2 were reactivated. The event logging threshold for this scope was exceeded. No further events ...
- NPS applies settings to the connection request if all of the connection request policy conditions for the policy are matched. ...
- NPS applies settings to the connection request if all of the network policy conditions and constraints for the policy are ...
- NPS configured as a NAP policy server processes connection requests and enforces NAP client health policy locally by performing ...
- NPS configured as a RADIUS proxy forwards connection requests to other RADIUS servers that are members of a remote RADIUS ...
- NPS configured as a RADIUS server processes connection requests locally by performing authentication and authorization. To ...
- NSAP Network Service Access Point (NSAP) address record. Maps a DNS domain name to a single NSAP address of any supported ...
- NSAPPTR Network Service Access Point pointer (NSAP-PTR) record. The function of the NSAP-PTR record is similar to that of ...
- NSPI max connection limit for the user has reached. You need to do NSPI unbind on old connections before making new connections. ...
- NT image checksum (usually set at link time), as listed in the NT image header; it is a hash used to verify the image was ...
- NT image timestamp (usually set at link time), as listed in the NT image header; it is a used to identify the binary image ...
- NTFS compression is not supported for allocation unit sizes above 4096. Please select a smaller allocation unit size and ...
- NTFS file system is not supported on this device optimized for removal. To change the way this device is optimized, select ...
- NTFS Volume Serial Number : 1 Version : %2!d!.%3!d! Number Sectors : 4 Total Clusters : 5 Free Clusters : 6 Total Reserved ...
- NTLMv2 authentication requires client computers to have the lmcompatibilitylevel registry value set to at least 3 (Emit only ...
- NtpClient was unable to set a domain peer to use a time source because of an unexpected error. NtpClient will try again in ...
- NtpClient was unable to set a domain peer to use as a time source because of discovery error. NtpClient will try again in ...
- NtpClient was unable to set a domain peer to use as a time source because of DNS resolution error on '%3'. NtpClient will ...
- NtpClient was unable to set a domain peer to use as a time source because of duplicate error on '%3'. The same time source ...
- NtpClient was unable to set a domain peer to use as a time source because of failure in establishing a trust relationship ...
- NtpClient was unable to set a manual peer to use as a time source because of an unexpected error. NtpClient will try again ...
- NtpClient was unable to set a manual peer to use as a time source because of DNS resolution error on '%3'. NtpClient will ...
- NtpClient was unable to set a manual peer to use as a time source because of duplicate error on '%3'. The same time source ...
- Number of cache entries: %1!u! Estimated cloud size: %2!u! Number of registered names: %3!u! Throttled resolves: %4!I64u! ...
- Number of contiguous ProtectedSpaceExtents counted before looping back to the first ProtectedSpaceExtent of the current stripe. ...
- Number of days after which an event can be overwritten. Values are: 0 = Any entry can be overwritten when necessary.1.365 ...