Windows Server 2008

  1. Note: If a program does not respond to your choice to enable or remove access to it, please contact the vendor of that program. ...
  2. NOTE: If any of the applications in the partitions are queued, then each application user must have a valid MSMQ certificate ...
  3. NOTE: If any of these applications are queued, then each application user must have a valid MSMQ certificate on this machine. ...
  4. Note: If conditional forwarders are defined for a given domain, they will be used instead of server-level forwarders. To ...
  5. Note: If neither of these boxes are selected, then then the transmission will not start until you manually start the transmission. ...
  6. Note: If the default level is Disallowed, applying software restriction policies to libraries requires you to set rules for ...
  7. NOTE: If this application is already running, you will need to restart the application before any changes made here will ...
  8. Note: If you are configuring the log file name on Group Policy object, ensure that the Windows Firewall service account has ...
  9. Note: If you are using a terminal server farm, the name of the farm and the name of each member must be specified in the ...
  10. Note: If you have an unreliable network connection, you should perform this operation by running Group Policy Management ...
  11. Note: If you have limited hard disk space or you want to reduce synchronization time, it's a good idea to limit the number ...
  12. NOTE: In order to COMPLETE the restoration of cluster associated with this node, 1. the cluster service must be started on ...
  13. Note: Key archival is not available for certificates based on a custom certificate request, even when this option is specified ...
  14. NOTE: Key protectors have been disabled on volume %1!v! to allow continued access to BitLocker-encrypted data. Type \"manage-bde ...
  15. NOTE: Please make sure that you use the same platform to import the program settings as the target platform. For more details, ...
  16. Note: Settings that are external to the GPO, such as WMI filters and IPsec policies, are independent objects in Active Directory ...
  17. NOTE: Telephony administrators have administrative privileges to the telephony service only, not to any other resources on ...
  18. Note: The application name specified here must be the name that the managed application uses when initializing the Authorization ...
  19. Note: The associated private key is inside a cryptographic service provider that may not allow exporting of the key. Exporting ...
  20. Note: The default schedule creates two shadow copies per day. Avoid creating shadow copies more frequently than once per ...
  21. Note: The GPT partition style is not recognized by all previous versions of Windows. It is recommended for disks larger than ...
  22. NOTE: The name of this computer, %1, contains one or more characters that are not allowed. You can rename this computer using ...
  23. NOTE: The name of this computer, %1, does not conform to Internet Domain Name System specifications because it contains extended ...
  24. NOTE: The name of this computer, %1, is a number. Computer names should not be numbers. You can rename this computer using ...
  25. NOTE: The recovery operation will cause all replicated content on the local machine to re-sync after recovery. This may cause ...
  26. NOTE: This command did not create any new key protectors. Type \"manage-bde -protectors -add -?\" for information on adding ...
  27. Note: This component only reports overall status information. It does not report information about its individual policy ...
  28. NOTE: This dummy error message is necessary to force MC to output the above defines inside the FACILITY_WINDOWS guard instead ...
  29. Note: This game has been counted as a loss in your statistics. If you return to the game, the loss will not be counted again. ...
  30. Note: This information is intended for a network administrator. If you are not your network's administrator, notify the administrator ...
  31. Note: This information is intended for a network administrator. If you are not your network's administrator, notify the administrator ...
  32. Note: This option applies most commonly to programs that require administrative privileges, such as installers and system ...
  33. Note: This registry setting is not stored in a policies key and thus considered a preference. Therefore if the Group Policy ...
  34. NOTE: This will create an LCE implemented event class. If you wish to install your component implementation, hit the back ...
  35. NOTE: This will create an LCE implemented event class. If you wish to install your component implementation, hit the back ...
  36. Note: To make this Analytic, Debug or Classic event log easier to navigate and manipulate, first save it in .evtx format ...
  37. Note: To protect against computer viruses, e-mail programs may prevent sending or receiving certain types of file attachments. ...
  38. Note: Try not to use your computer until you have repaired or replaced the hard disk. If you change any documents, they won't ...
  39. Note: Two or more firewalls running at the same time can conflict with each other. For more information, see Why you should ...
  40. Note: Two or more firewalls running at the same time can conflict with each other. How does a firewall help protect my computer? ...
  41. Note: Windows Update may update itself automatically before it checks for other updates. Read our privacy statement online ...
  42. Note: Without the system check, there is a risk that you will need to enter the recovery password manually to access your ...
  43. Note: You have only removed the request from the list of pending requests stored in your web browser. This does not affect ...
  44. Note: You need to have Internet Explorer 7 installed before continuing on with this wizard. Although the wizard may seem ...
  45. Note: You should now add records to the zone or ensure that records are updated dynamically. You can then verify name resolution ...
  46. Nothing can be read from or written to the Windows registry. Message Queuing may not be properly installed. Please reinstall ...
  47. NOTICE: Single notification receipts for multiple recipient transmissions cannot include cover pages as attachments, and ...
  48. Notification of policy change from LSA/SAM was processed without verifying PDC. Older security policy from this machine may ...
  49. Notifications for the scope %2 are not active. The event logging threshold for this scope was exceeded. No further events ...
  50. Notifications for the scope %2 were reactivated. The event logging threshold for this scope was exceeded. No further events ...
  51. NPS applies settings to the connection request if all of the connection request policy conditions for the policy are matched. ...
  52. NPS applies settings to the connection request if all of the network policy conditions and constraints for the policy are ...
  53. NPS configured as a NAP policy server processes connection requests and enforces NAP client health policy locally by performing ...
  54. NPS configured as a RADIUS proxy forwards connection requests to other RADIUS servers that are members of a remote RADIUS ...
  55. NPS configured as a RADIUS server processes connection requests locally by performing authentication and authorization. To ...
  56. NSAP Network Service Access Point (NSAP) address record. Maps a DNS domain name to a single NSAP address of any supported ...
  57. NSAPPTR Network Service Access Point pointer (NSAP-PTR) record. The function of the NSAP-PTR record is similar to that of ...
  58. NSPI max connection limit for the user has reached. You need to do NSPI unbind on old connections before making new connections. ...
  59. NT image checksum (usually set at link time), as listed in the NT image header; it is a hash used to verify the image was ...
  60. NT image timestamp (usually set at link time), as listed in the NT image header; it is a used to identify the binary image ...
  61. NTFS compression is not supported for allocation unit sizes above 4096. Please select a smaller allocation unit size and ...
  62. NTFS file system is not supported on this device optimized for removal. To change the way this device is optimized, select ...
  63. NTFS Volume Serial Number : 1 Version : %2!d!.%3!d! Number Sectors : 4 Total Clusters : 5 Free Clusters : 6 Total Reserved ...
  64. NTLMv2 authentication requires client computers to have the lmcompatibilitylevel registry value set to at least 3 (Emit only ...
  65. NtpClient was unable to set a domain peer to use a time source because of an unexpected error. NtpClient will try again in ...
  66. NtpClient was unable to set a domain peer to use as a time source because of discovery error. NtpClient will try again in ...
  67. NtpClient was unable to set a domain peer to use as a time source because of DNS resolution error on '%3'. NtpClient will ...
  68. NtpClient was unable to set a domain peer to use as a time source because of duplicate error on '%3'. The same time source ...
  69. NtpClient was unable to set a domain peer to use as a time source because of failure in establishing a trust relationship ...
  70. NtpClient was unable to set a manual peer to use as a time source because of an unexpected error. NtpClient will try again ...
  71. NtpClient was unable to set a manual peer to use as a time source because of DNS resolution error on '%3'. NtpClient will ...
  72. NtpClient was unable to set a manual peer to use as a time source because of duplicate error on '%3'. The same time source ...
  73. Number of cache entries: %1!u! Estimated cloud size: %2!u! Number of registered names: %3!u! Throttled resolves: %4!I64u! ...
  74. Number of contiguous ProtectedSpaceExtents counted before looping back to the first ProtectedSpaceExtent of the current stripe. ...
  75. Number of days after which an event can be overwritten. Values are: 0 = Any entry can be overwritten when necessary.1.365 ...