Windows Server 2008
- Allows control of file operations via transactions to commit or abort changes. TRANSACTION /START | /COMMIT | /ROLLBACK | ...
- Allows errors to be reported when programs stop working or responding and allows existing solutions to be delivered. Also ...
- Allows files to be automatically copied and maintained simultaneously on multiple servers. If this service is stopped, file ...
- Allows or Denies new TS Connections. The second parameter is optional, if specified and set to TRUE, then adds or removes ...
- Allows or Denies retrieving IP address of SessionDirectory according as whether Value is set to 1 or 0 respectively. The ...
- Allows programs to execute as a user that does not have Administrator access rights, but can still access resources accessible ...
- Allows programs to execute with only access to resources granted to open well-known groups, blocking access Administrator ...
- Allows programs to open data files in specified directories as if they were in the current directory. APPEND drive:]path[;. ...
- Allows the adapter to compute the TCP or UDP checksum of outgoing packets. This improves TCP and UDP transmit performance. ...
- Allows this computer to receive unicast responses to its outgoing multicast or broadcast messages. Note: This setting has ...
- Allows unrestricted network access for clients when the connection request matches the policy. Use this option for reporting ...
- Allows unrestricted network access until the specified date and time. After the specified date and time, health policy is ...
- Allows UPnP devices to be hosted on this computer. If this service is stopped, any hosted UPnP devices will stop functioning ...
- Allows users in other Directory environments that have federated trust relationships established with your enterprise's Active ...
- Allows users to connect interactively to a remote computer. Remote Desktop and Terminal Server depend on this service. To ...
- Allows you to analyze current systems settings against baseline settings that are stored in a database. The analysis results ...
- Allows you to configure a system with security settings stored in a database. The syntax of this command is: secedit /configure ...
- Allows you to export security settings stored in a database. The syntax of this command is: secedit /export /db filename ...
- Allows you to generate a rollback template with respect to a configuration template. The syntax of this command is: secedit ...
- Allows you to import a security template into a database so that the settings specified in the template can be applied to ...
- Allows you to set up an online responder based on the Online Certificate Status Protocol (OCSP) to provide revocation information ...
- Allows you to validate the syntax of a security template. The syntax of this command is: secedit /validate filename /cfg ...
- Also apply redirection policy to Windows 2000, Windows 2000 server, Windows XP, and Windows Server 2003 operating systems ...
- Also apply redirection policy to Windows 2000, Windows 2000 Server, Windows XP, and Windows Server 2003 operating systems. ...
- Also include the SCWAudit.inf security template. SCWAudit.inf sets System Access Control Lists (SACLS) in order to audit ...
- Also, confirm that both the wireless network adapter and the wireless network access point are using the same encryption ...
- Although files from the meeting can be useful, files from unknown sources can potentially harm your computer. If you do not ...
- Although Routing and Remote Access can authenticate connection requests, large networks that include multiple remote access ...
- Although the Active Directory database is automatically defragmented while it is running (known as online defragmentation), ...
- Although the files were successfully added to the archive, Compressed (zipped) Folders was unable to completely remove the ...
- Although the Guid DNS name (%1) could not be resolved, the server name (%2) resolved to the IP address (%3) but was not pingable. ...
- Although the Guid DNS name (%1) couldn't be resolved, the server name (%2) resolved to the IP address (%3) and was pingable. ...
- Although the Guid DNS name (%1) resolved to the IP address (%2), the server name (%3) could not be resolved by DNS. Check ...
- Although the Guid DNS name (%1) resolved to the IP address (%2), the server name (%3) resolved to the IP address (%4) and ...
- Although the Guid DNS name (%1) resolved to the IP address (%2), which could not be pinged, the server name (%3) resolved ...
- Always prefer Certificate Revocation Lists (CRL) over Online Certificate Status Protocol (OCSP) responses (not recommended) ...
- America Online (AOL) might not function properly with this version of Windows. For information about a compatible version ...
- AM_DVD_EVR_ONLY cannot be passed to RenderDvdVideoVolume if the graph builder's filter graph contains a renderer which is ...
- An abnormal error occurred during the WINS initialization. Check the application and system logs for information on the cause. ...
- An abstraction or emulation of a hardware entity, that may or may not be Realized in physical hardware. Any characteristics ...
- An abstraction or emulation of a hardware entity, that may or may not be realized in physical hardware. Any characteristics ...
- An access point for a service. Access points are dependent in this relationship since they have no function without a corresponding ...
- An access to a user buffer failed at an "expected" point in time. This code is defined since the caller does not want to ...
- An Access-Request message was received from RADIUS client %1 with an Extensible Authentication Protocol (EAP) message but ...
- An Access-Request message was received from RADIUS client %1 without a message authenticator attribute when a message authenticator ...
- An account failed to log on. Subject: Security ID: %1 Account Name: %2 Account Domain: %3 Logon ID: %4 Logon Type: %11 Account ...
- An account for this domain and user could not be found. Check that the user has a valid user account in the specified domain. ...
- An account was logged off. Subject: Security ID: %1 Account Name: %2 Account Domain: %3 Logon ID: %4 Logon Type: %5 This ...
- An account was successfully logged on. Subject: Security ID: %1 Account Name: %2 Account Domain: %3 Logon ID: %4 Logon Type: ...
- An accurate clock enables administrators to better correlate audit events. Also, many security protocols use time to prevent ...
- An acquire is a request by the IPSEC driver to have IKE perform a task. The active acquire statistic includes the outstanding ...
- An Active Directory domain controller for the domain %1 could not be contacted. Ensure that the correct DNS domain name was ...
- An Active Directory domain controller for the domain %1 could not be contacted. Ensure that the DNS domain name is typed ...
- An Active Directory Domain Controller for the domain %1 could not be contacted. Ensure that the domain name is typed correctly. ...
- An Active Directory domain controller for the domain %1 could not be contacted. Ensure that you supplied the correct DNS ...
- An Active Directory domain controller for the forest root domain %1 could not be contacted. Ensure that the domain name that ...
- An Active Directory domain controller for the forest root domain %1 could not be contacted. Ensure that the domain name you ...
- An Active Directory Domain Services replication connection from a source directory service to a destination directory service ...
- An Active Directory Lightweight Directory Services replication connection from a source directory service to a destination ...
- An Active Directory replica destination naming context was modified. Destination DRA: %1 Source DRA: %2 Destination Address: ...
- An Active Directory replica source naming context was established. Destination DRA: %1 Source DRA: %2 Source Address: %3 ...
- An Active Directory replica source naming context was modified. Destination DRA: %1 Source DRA: %2 Source Address: %3 Naming ...
- An Active Directory replica source naming context was removed. Destination DRA: %1 Source DRA: %2 Source Address: %3 Naming ...
- An Active Directory Rights Management Services (AD RMS) client issuance license does not contain a valid cluster. Ensure ...
- An Active Directory Rights Management Services (AD RMS) client requested a rights policy template that is not recognized ...
- An Active Directory Rights Management Services (AD RMS) operation failed due to insufficient memory. Free up some memory ...
- An active partition was detected on the selected disk, and it is not the active partition used to boot the currently running ...
- An active transaction is already in progress. A new one cannot be started until the current one is committed or rolled back. ...
- An ActiveX control on this page is not safe. Your current security settings prohibit running unsafe controls on this page. ...
- An ActiveX control on this page might be unsafe to interact with other parts of the page. Do you want to allow this interaction? ...
- An ad hoc network (sometimes called a computer-to-computer network) is a temporary network used for sharing files, presentations, ...
- An address could not bind to a socket. Make sure the TCP/IP stack is installed And running properly. This event might mean ...
- An administrator has changed the type and zone storage options of zone %1. The zone is now type %2. The zone will be stored ...
- An administrator has changed the type and/or Active Directory location of zone %1. The zone is now type %2. The zone will ...
- An administrator has moved the zone %1 to a new location in Active Directory. The zone will be stored in Active Directory ...