Windows Server 2008

  1. If you're using removable media and the transfer requires more than one CD, DVD, USB drive, or external drive, make sure ...
  2. If you've created a previous IEAK package in this location, the settings from that package will be the default settings for ...
  3. If your AD RMS-enabled application uses extended rights values, provide the rights definitions here. In the Name box, type ...
  4. If your computer meets all of the client requirements but you do not see any programs listed, contact your systems administrator ...
  5. If your document looks similar to the example on the left, the print cartridges need to be cleaned. This takes about 2 minutes ...
  6. If your game controller is not functioning properly on the Test page, it may need to be calibrated. Click Calibrate and follow ...
  7. If your hardware came with an installation CD, it is recommended that you click Cancel to close this wizard and use the manufacturer's ...
  8. If your Internet service is provided through a cable modem, a DSL modem, or a similar broadband device, it is likely that ...
  9. If your Internet service is provided through a cable modem, a DSL modem, or a similar broadband device, it is likely that ...
  10. If your network has both a NAT server and multiple private interfaces, you should configure DHCP on all private segments. ...
  11. If your other computer is running Windows Vista, you can plug in the cable. If not, complete these steps. 1. On your old ...
  12. If your phone company provided only one phone number and SPID for each ISDN line, select channel 1 for that line, and type ...
  13. If your phone company provided only one phone number for each ISDN line, select channel 1 for that line, and type the phone ...
  14. If your phone company provided only one subaddress and phone number for each ISDN line, select logical terminal 1 for that ...
  15. If your RADIUS clients (authenticating switches and wireless access points) support VLANs, you can configure NPS to supply ...
  16. If your RADIUS clients (authenticating switches and wireless access points) support VLANs, you can configure NPS to supply ...
  17. If your remote access server is Microsoft Routing and Remote Access, you can define the filters to apply during this connection. ...
  18. If your user names and passwords are lost, damaged, or destroyed then you can use this backup to restore them. You can also ...
  19. If your users will need to sign up for your service, two options are available to you: server-based and server-less signup. ...
  20. IGMP could not schedule a task to be executed. This may have been caused by a memory allocation failure. The data is the ...
  21. IGMP discarded a version %1 packet received on the interface with IP address %2 from a neighbor with IP address %3. The above ...
  22. IGMP Interface Configuration Information for %1!s! - Version : 2!x! IGMP Protocol Type : %3!s! Interface Enabled Flag : %4!s! ...
  23. IGMP Interface Configuration Information for %1!s! - Version : 2!x! IGMP Router Type : %3!s! Interface Enabled Flag : %4!s! ...
  24. IGMP Interface Configuration Information for %1!s! - Version : 2!x! IGMP Router Type : %3!s! Interface Enabled Flag : %4!s! ...
  25. IGMP received a packet which was smaller than the minimum size allowed for IGMP packets. The packet has been discarded. It ...
  26. IGMP received a packet with an invalid header. The packet has been discarded. It was received on the local interface with ...
  27. IGMP received a packet with an invalid version in its header. The packet has been discarded. It was received on the local ...
  28. IGMP Statistics for %1!s! Interface - Interface name %2!s! IP Address %3!s! Type %4!s! Interface State %5!s! Querier State ...
  29. IGMP Statistics for Proxy Interface - Interface name %1!s! IP Address %2!s! Type %3!s! State %4!s! Current Group Memberships ...
  30. Igmpv2 detected an error on the local interface with IP address %1. The error occurred while the interface was receiving ...
  31. Igmpv2 was unable to request notification of events on the socket for the local interface with IP address %1. The data is ...
  32. IIS 6 Management Compatibility provides forward compatibility for your applications and scripts that use the two IIS APIs, ...
  33. IIS 6 Metabase Compatibility provides infrastructure to query and configure the metabase so that you can run applications ...
  34. IIS 6 Scripting Tools provide the ability to continue using IIS 6 scripting tools that you built to manage IIS 6 in IIS 7, ...
  35. IIS 6 WMI Compatibility provides Windows Management Instrumentation (WMI) scripting interfaces to programmatically manage ...
  36. IIS App-Pools could not be retrieved. Either the system does not have IIS installed or the connection to the machine failed ...
  37. IIS Client Certificate Mapping Authentication uses client certificates to authenticate users. A client certificate is a digital ...
  38. IIS Management Console provides infrastructure to manage IIS 7 by using a user interface. You can use the IIS management ...
  39. IIS Management Scripts and Tools provide infrastructure to programmatically manage an IIS 7 Web server by using commands ...
  40. IIS7 includes advances in diagnosing and troubleshooting Web applications. IIS supports buffering trace events for a given ...
  41. IKE failed to find valid machine certificate. Contact your Network Security Administrator about installing a valid certificate ...
  42. IKE Main Mode Negotiation Time is the number of milliseconds taken for the last IKE Main Mode security association negotiated. ...
  43. IKE negotiation failed because the machine certificate used does not have a private key. IPsec certificates require a private ...
  44. IKE Quick Mode Negotiation Time is the number of milliseconds taken for the last IKE Quick Mode security association negotiated. ...
  45. IKE security association establishment failed because peer could not authenticate. The certificate trust could not be established. ...
  46. IKE security association establishment failed because peer sent invalid proposal. Mode: %1 Filter: %2 Attribute: %3 Expected ...
  47. IKE security association negotiation failed. Mode: %1 Filter: %2 Peer Identity: %3 Failure Point: %4 Failure Reason: %5 Extra ...
  48. Illegal network control block (NCB) buffer length on SEND DATAGRAM, SEND BROADCAST, ADAPTER STATUS, or SESSION STATUS. The ...
  49. Illegal System DLL Relocation} The system DLL %hs was relocated in memory. The application will not run properly. The relocation ...
  50. Image File with the same name already exists. Do you want to append to the existing file? Click Yes to append, No to overwrite ...
  51. Image Relocated} An image file could not be mapped at the address specified in the image file. Local fixups must be performed ...
  52. Image Space is the virtual address space in use by the images being executed by the process. This is the sum of all the address ...
  53. Image Space is the virtual address space in use by the images being executed by the process. This is the sum of all the address ...
  54. Image Space is the virtual address space in use by the images being executed by the process. This is the sum of all the address ...
  55. Image Space is the virtual address space in use by the images being executed by the process. This is the sum of all the address ...
  56. Image Space is the virtual address space in use by the images being executed by the process. This is the sum of all the address ...
  57. Image Space is the virtual address space in use by the images being executed by the process. This is the sum of all the address ...
  58. Image Space is the virtual address space in use by the images being executed by the process. This is the sum of all the address ...
  59. Image Space is the virtual address space in use by the images being executed by the process. This is the sum of all the address ...
  60. Image Space is the virtual address space in use by the selected image with this protection. Executable memory is memory that ...
  61. Image Space is the virtual address space in use by the selected image with this protection. Execute Write Copy is memory ...
  62. Image Space is the virtual address space in use by the selected image with this protection. Execute/Read Only memory is memory ...
  63. Image Space is the virtual address space in use by the selected image with this protection. Execute/Read/Write memory is ...
  64. Image Space is the virtual address space in use by the selected image with this protection. No Access protection prevents ...
  65. Image Space is the virtual address space in use by the selected image with this protection. Read Only protection prevents ...
  66. Image Space is the virtual address space in use by the selected image with this protection. Read/Write protection allows ...
  67. Image Space is the virtual address space in use by the selected image with this protection. Write Copy protection is used ...
  68. Image with the same name already exists in the %s. If you choose to overwrite then all the images in the file will be lost. ...
  69. image`i`*`Specifies the provider image path. The matching PDB will be located in the Symbol Server. Multiple paths can be ...
  70. Immediate steps Because a disk failure will cause you to lose all programs, files and documents on the disk, you should back ...
  71. Impersonate a client after authentication Assigning this privilege to a user allows programs running on behalf of that user ...
  72. Import file groups from a file. The syntax of this command is: Filescrn Filegroup Import /File:PATH /Filegroup:FG_NAME | ...
  73. Import from backup is successful. %r Details - %r Backup%r Directory: %1%r Instance : %2%r Comment : %3%r %r Source GPO:%r ...
  74. Import from backup is successful. %r Details - %r Backup%r Directory: %1%r Instance : %2%r Comment : %3%r %r Source Template:%r ...
  75. Import from files in XML format resource allocation policies, process matching criteria, and calendar events and schedules ...