Windows Server 2008
- Aligning for standard resolution. Inspect the printed pattern and determine the number of the pattern where the black and ...
- Aligning for standard resolution. Inspect the printed pattern and determine the number of the pattern where the upper and ...
- All application directory partitions on this Active Directory domain controller will be removed. This domain controller holds ...
- All approved applications must have a path. For each application in the list marked with "[No path!]", either edit the item ...
- All available "%1!s!" Terminal Services client access licenses (TS CALs) for product "%2!s!" on Terminal Services license ...
- All available disks are dynamic disks and cannot be used to back up system volumes. Attach another disk to use for backups. ...
- All available storage in the new cluster have already been assigned to other groups. Storage can only be shared between resources ...
- All certificate authentication methods in each list must be grouped together. There cannot be any other authentication methods ...
- All certificates must be the same type. You cannot specify a combination of certificate authentications where some require ...
- All clients configured to use this server for DNS resolution, including this server, must be configured to use a different ...
- All connections to the Global Catalog servers are unresponsive or there are fewer connections than are required to run the ...
- All connections to the new member will use a custom connection schedule. To set up a custom connection schedule, click Edit ...
- All connections to the new member will use the replication group schedule. To view the replication group schedule, click ...
- All cookies will be saved on this computer - Existing cookies on this computer can be read by the Web sites that created ...
- All data sent between the client and the server is protected by encryption based on the maximum key strength supported by ...
- All data sent between the client and the server is protected by encryption based on the server's maximum key strength. Clients ...
- All data sent between the client and the server is protected by using Federal Information Processing Standard 140-1 validated ...
- All data sent from client to server is protected by encryption based on the maximum key strength supported by the client. ...
- All directory servers in the following site that can replicate the directory partition over this transport are currently ...
- All directory-enabled computers that access the Active Directory in the selected server's domain satisfy the following minimum ...
- All Domain Controllers have migrated successfully to Global state (%1$?). Migration has reached a consistent state on all ...
- All event subscription computer names must be unique. The following names are already in the list and will not be added again: ...
- All existing connections ({0}) will be deleted at the end of the New Topology Wizard so that the new topology can be created. ...
- All existing UDDI authentication tokens will be invalidated. Are you sure you want to reset the cryptography settings for ...
- All files on this computer of the type that you select will be backed up, including files that belong to other users of this ...
- All files on your computer will be erased, and then will be restored from a backup image. For server computers, the backup ...
- All inbound replication connections for the partition %1 are disabled. Inbound replication of this partition cannot be performed. ...
- All incoming COM ports are in use. To assign a COM port to this Bluetooth device, you must first delete an existing incoming ...
- All information about which channels you access most frequently will be deleted if you turn off the Most Viewed filter in ...
- All instances of a program will be visible (for example, if you share a Microsoft Office Word document, all other open Microsoft ...
- All Internet and intranet sites are assigned to the Internet zone by default. If you trust an Internet or intranet site and ...
- All Internet and intranet sites are assigned to the Internet zone by default. Intranet sites are not part of the Local intranet ...
- All Internet Explorer add-ons, such as ActiveX controls or toolbars, are turned off. Some webpages might not display correctly. ...
- All Internet security settings are set to their recommended levels. How do Internet security settings help protect my computer? ...
- All notification of policy changes from LSA/SAM were ignored by policy engine because it timed out to wait for PDC synchronization. ...
- All of Active Directory Domain Services's LDAP send queues are full. This can be caused by clients that continue to send ...
- All of Active Directory Lightweight Directory Services's LDAP send queues are full. This can be caused by clients that continue ...
- All of the computer's names have properly registered host Service Principal Names in the Active Directory Domain Services. ...
- All other Internet Explorer tasks can be completed by all user groups, unless the server administrator chooses to further ...
- All previous versions of Connection Manger will be upgraded to Connection Manager 1.4 when this Connection Manager profile ...
- All privileges that may be required to perform the operation whether currently held or not. This may be a subset or all of ...
- All problems preventing updates to the Active Directory Domain Services database have been cleared. New updates to the Active ...
- All problems preventing updates to the Active Directory Lightweight Directory Services database have been cleared. New updates ...
- All registered providers failed to initialize. Please review the Event Log for specific error messages for each provider. ...
- All registered providers failed to initialize. Review Event Log for specific error messages for each provider. Windows Deployment ...
- All requests for Terminal Services client access licenses (TS CALs) will be denied due to an initialization error in policy ...
- All tests except DcPromo and RegisterInDNS must be run on computers after they have been promoted to directory server. Note: ...
- All the following tasks require administrator privileges on the computer running Client for NFS and possibly on other servers ...
- All the following tasks require administrator privileges on the computer running Server for NFS and possibly on other servers ...
- All the resource groups selected for migration were migrated successfully. Please go to the "Possible Issues" section to ...
- All the resource groups selected for migration were migrated successfully. You may now take the resource groups offline in ...
- All user accounts, files, and settings (recommended). Use this option to set up your new computer like your old one. For ...
- All wave devices that can play files in the current format are in use. Wait until a wave device is free, and then try again. ...
- All wave devices that can record files in the current format are in use. Wait until a wave device is free, and then try again. ...
- All Windows Deployment Services PXE providers are required to export an initialization function 'PxeProviderInitialize'. ...
- Allocate a piece of available media. RSM ALLOCATE /M /L[G|F | /P[G|F /O[ERRUNAVAIL|NEW|NEXT /T /LN /LD /PN /PD /B /M : media ...
- Allow any authenticated user to update all DNS records with the same name. This setting applies only to DNS records for a ...
- Allow log on locally This logon right determines which users can interactively log on to this computer. Logons initiated ...
- Allow log on through Terminal Services This security setting determines which users or groups have permission to log on as ...
- Allow only connections that have been authenticated and integrity-protected through the use of IPsec. Connections will be ...
- Allow remote clients to connect to this server through either a dial-up connection or a secure virtual private network (VPN) ...
- Allow remote clients to connect to this server through the Internet and local clients to connect to the Internet using a ...
- Allow the focus of the Group Policy Snap-in to be changed when launching from the command line. This only applies if you ...
- Allow the selected computer to be changed when launching from the command line. This only applies if you save the console. ...
- Allow the selected computer to be changed when launching from the command line. This only applies if you save the console. ...
- Allow users who do not have administrative rights to scan the computer, choose actions to apply to potentially unwanted software, ...
- Allow-Bypass action specified, but the rule does not meet allow-bypass criteria (inbound, authenticate/encrypt flags set, ...
- Allowed Classifies per second is the rate of Windows Filtering Platform security rule evaluations which allow network activity. ...
- Allowed to write systemPossSuperiors and systemAuxClasses as possSuperiors and auxClasses, if schema circular dependencies ...
- Allowing a proxy address from a federated user could allow a malicious user to spoof an authorized user's credentials and ...
- Allowing active content such as script and ActiveX controls can be useful, but active content might also harm your computer. ...
- Allowing connections to any port is a less secure configuration because it might allow access to all services inside the ...
- Allowing executable files to run with no restrictions on the command-line arguments will open the terminal server to attack. ...
- Allowing nonsecure dynamic updates is a significant security vulnerability because updates can be accepted from untrusted ...
- Allowing unsecured communication may expose your network to security risks by allowing IP traffic to be sent with no authentication ...