Windows Server 2008

  1. Microsoft Support Diagnostic Tool is ready to collect data about the problem. When the data collection process is completed, ...
  2. Microsoft Support Diagnostic Tool is ready to collect data about the problem. When the data collection process is completed, ...
  3. Microsoft Support Diagnostic Tool was not able to safely extract security data for validation of your diagnostic manifest. ...
  4. Microsoft Support Diagnostic Tool was not able to verify that your diagnostic manifest came from Microsoft. Please contact ...
  5. Microsoft Visual J++ has a known compatibility issue described in Microsoft Knowledge Base article number Q299764. Microsoft ...
  6. Microsoft Windows Server includes Identity Management for UNIX, which facilitates populating and managing UNIX identity data ...
  7. Microsoft Windows System Resource Manager (WSRM) enables you to assign computer resources through policies to multiple programs, ...
  8. Microsoft's implementation of an Host Credential Authorization Protocol (HCAP) server. This feature adds HCAP as an ISAPI ...
  9. Microsoft(R) Windows(R) Operating System Default Group Policy Restore Utility v5.1 Copyright (C) Microsoft Corporation. 1981-2003 ...
  10. Microsoft(R) Windows(TM) Directory Service Utilities Version 2.0 Copyright (C) Microsoft Corporation 1991-2002. All Rights ...
  11. Migrating a DNS server can improve the performance, security, and reliability of your DNS infrastructure by giving you access ...
  12. Migration has not yet reached a consistent state on all Domain Controllers. State information might be stale due to AD latency. ...
  13. Migration was cancelled by the user. You may either attempt to manually complete the migration or you may delete any partially ...
  14. Minimal safeguards and warning prompts are provided - Most content is downloaded and run without prompts - All active content ...
  15. Minimum password age This security setting determines the period of time (in days) that a password must be used before the ...
  16. Minimum password length This security setting determines the least number of characters that a password for a user account ...
  17. Miniport does not have any recommendation regarding the request to provide a functional VidPN given the current display adapter ...
  18. MinNumberNeeded indicates the smallest number of elements that must be operational in order to have redundancy. For example, ...
  19. Mirrors the simple volume with focus to the specified disk. Syntax: ADD DISK= ALIGN= WAIT NOERR DISK= Specifies a disk, other ...
  20. Missed Mailslot Datagrams is the number of Mailslot Datagrams that have been discarded due to configuration or allocation ...
  21. Missed Server Announcements is the number of server announcements that have been missed due to configuration or allocation ...
  22. Missed Server List Requests is the number of requests to retrieve a list of browser servers that were received by this workstation, ...
  23. Missing either a VALUEON or VALUEOFF keyword. Policies using the unnamed registry value must have both VALUEON and VALUEOFF ...
  24. Missing NIS Domain. The NIS Domain assigned to the object could not be found in the Active Directory Domain Services. Assign ...
  25. MMC cannot create this view because it contains a Web browser control. Be sure Internet Explorer 5.0 or greater is installed. ...
  26. MMC cannot initialize because the MMC installation or a portion of the registry is corrupted. You can attempt to fix the ...
  27. MMC cannot initialize because the MMC installation or a portion of the registry is corrupted. You can attempt to fix the ...
  28. MMC cannot initialize the snap-in because the snap-in requires version %1!s! of the .Net Framework and version %2!s! is already ...
  29. MMC cannot open the file %1. This may be because the file does not exist, is not an MMC console, or was created by a later ...
  30. MMC could not enumerate existing services from the Service Control Manager. The service dependencies configuration list will ...
  31. Moderated user-generated content in any context. Unmoderated user-generated content only in artistic, medical, educational, ...
  32. Modfies the ntdssettings object of the domain controller targeted by the "[DC]"parameter . Capabilities include Add or remove ...
  33. Modification Made Assigning Object Type: %1 Assigning Object Name: %2 Assigning Object GUID: %3 Logon ID: %4 Assigned Member ...
  34. Modification Made Assigning Object Type: %1 Assigning Object Name: %2 Assigning Object GUID: %3 Logon ID: %4 Referenced Object ...
  35. Modification Made Creating Object Type: %1 Creating Object Name: %2 Creating Object GUID: %3 Logon ID: %4 New Object Type: ...
  36. Modification Made Database Name: %1 SQL Role: %2 Object ID: %3 Object Type: %4 Logon ID: %5 Member Name: %6 Modification ...
  37. Modification Made Deleting Object Type: %1 Deleting Object Name: %2 Deleting Object GUID: %3 Logon ID: %4 Deleted Object ...
  38. Modification Made Removing Object Type: %1 Removing Object Name: %2 Removing Object GUID: %3 Logon ID: %4 Removed Member ...
  39. Modification Made Removing Object Type: %1 Removing Object Name: %2 Removing Object GUID: %3 Logon ID: %4 Unreferenced Object ...
  40. Modifications or transforms allow you to customize the package and are applied to the package in the order shown in the following ...
  41. Modified Page List Bytes is the amount of physical memory, in bytes, that is assigned to the modified page list. This memory ...
  42. Modifies or displays the replication authentication mode in use by an ADAM configuration set. SYNTAX /replauthmode DSA_LIST ...
  43. Modifies the specified 24-hour schedule. 1. wsrmc /Modify:Sched /i: /Force must be a valid XML file. /Force overrides time-stamp ...
  44. Modifies the specified Policy. 1. wsrmc /Modify:Pol /i: /Force must be a valid XML file. /Force overrides time-stamp checking. ...
  45. Modify an object label This privilege determines which user accounts can modify the integrity label of objects, such as files, ...
  46. Modify auto apply quotas. The syntax of this command is: Dirquota Autoquota Modify /Path:PATH /SourceTemplate:TEMPLATE /Apply:{None|All|Matching} ...
  47. Modify existing file groups. The syntax of this command is: Filescrn Filegroup Modify /Filegroup:FG_NAME /New-Filegroup:FG_NAME_NEW ...
  48. Modify existing file screen exceptions. The syntax of this command is: Filescrn Exception Modify /Path:PATH /Add-Filegroup:ADD_FG ...
  49. Modify existing file screen templates. The syntax of this command is: Filescrn Template Modify /Template:TEMPLATE_NAME /New-Template:TEMPLATE_NEW ...
  50. Modify existing file screens. The syntax of this command is: Filescrn Screen Modify /Path:PATH /SourceTemplate:TEMPLATE /Type:{Active|Passive} ...
  51. Modify existing quota templates. The syntax of this command is: Dirquota Template Modify /Template:TEMPLATE_NAME /New-Template:TEMPLATE_NEW ...
  52. Modify existing quotas. The syntax of this command is: Dirquota Quota Modify /Path:PATH /Limit:LIMIT[kb|mb|gb /Type:{Hard|Soft} ...
  53. Modify existing storage report jobs. The syntax of this command is: Storrept Reports Modify /Task:TASK /New-Task:NEW_TASK ...
  54. Modify firmware environment values This security setting determines who can modify firmware environment values. Firmware ...
  55. Modify the configuration of a log. Usage: wevtutil { sl | set-log } LOGNAME /OPTION:VALUE /OPTION:VALUE . LOGNAME String ...
  56. Modify the specified Calendar Event. 1. wsrmc /Modify:Cal /i: /Force must be a valid XML file. /Force overrides time-stamp ...
  57. Modify the specified Process Matching Criteria. 1. wsrmc /Modify:Pmc /i: /Force must be a valid XML file. /Force overrides ...
  58. ModuleInstance represents the Win32 instance handle.The ModuleInstance property has been deprecated. There is no replacement ...
  59. Monitor's refresh rate in hertz. If a range of rates is supported, use the MinRefreshRate and MaxRefreshRate properties, ...
  60. More cake orders have come in. Can you help us out? Watch the TV and make cakes that match the ones on the screen. Good luck! ...
  61. More records remain to be enumerated! To enumerate ALL reissue the command with the \/Continue\ option. OR To enumerate remaining ...
  62. More than one adapter has been enabled on at least one of the servers currently logged on to the selected target. If the ...
  63. More than one I/O path has been enabled to access the LUN. If the server or cluster is not configured to use Multipath I/O, ...
  64. More than one object matches the following object name: "%1". Select an object from this list or, to reenter the name, click ...
  65. More than one port has been enabled to access the LUN. If the server or cluster is not configured to use Multipath I/O, data ...
  66. More than the maximum number of default gateways were specified for network adapter %2. Some remote networks may not be reachable ...
  67. More than the maximum number of files per group matched the report criteria. Only the top {0} files are shown in the following ...
  68. More than {1} programs were found with the Keyword Record {0}. There may not be enough room in Recorded TV to record all ...
  69. Most DVDs are encoded for play in specific regions. To play a regionalized DVD on your computer, you must set your DVD drive ...
  70. Most FTP servers allow users to log on anonymously with limited access to the server. Do you want to log on anonymously? ...
  71. Most organizations deploy an offline root certification authority (CA) and one or more subordinate CAs as a public key infrastructure ...
  72. Mount a specified piece of media. RSM MOUNT /L[G|F | /P[G|F | /S[G|F /C[G|F /D[G|F /O[ERRUNAVAIL|DRIVE|READ|WRITE|OFFLINE ...
  73. Mouse Keys lets you control the mouse pointer by using the numeric keypad on your keyboard. The keyboard shortcut to turn ...
  74. Move the mouse pointer over a category on the left or select it with the keyboard to see what types of files will be backed ...
  75. Move these files out of the folder, rename them without using these characters, then move them back into the folder and try ...