Windows Server 2003

  1. This method is used to add a mount point directory for the volume. The result of this method is the creation of a Win32_MountPoint ...
  2. This method is used to exclude volumes from the chkdsk operation to be run at the next reboot. If not excluded, chkdsk is ...
  3. This method provides an optimized means for obtaining the port rule which encapsulates the input Virtual IP address and Port ...
  4. This method requires a computer with a Web browser and Internet access. This computer does not have to be connected to the ...
  5. This method requires both computers to be members of the same domain or members of domains that have an established two-way ...
  6. This method resets all of the properties for this class to their default values. The values are not commited to the NLB driver. ...
  7. This method resets all of the properties for this class to their default values. The values are not committed to the NLB ...
  8. This method resets the node's port rule configuration to the default. The new configuration is not committed to the driver. ...
  9. This method returns the USBDevice Descriptor as specified by the input parameters. Each parameter is briefly described here ...
  10. This method will advertise an associated Win32_Product using the installation package provided through PackageLocation and ...
  11. This method will configure the associated instance of Win32_Product to the specified install state and level. The method ...
  12. This method will configure the associated instance of Win32_SoftwareFeature to the specified install state. The method can ...
  13. This method Will install an associated Win32_Product using the installation package provided through PackageLocation and ...
  14. This method will preform an administrative install of an associated Win32_Product using the installation package provided ...
  15. This method will reinstall the associated instance of Win32_Product using the specified reinstallation mode. The method can ...
  16. This method will reinstall the associated instance of Win32_SoftwareFeature using the specified reinstallation mode. The ...
  17. This method will uninstall the associated instance of Win32_Product. The method can return the following values: 0 - Success. ...
  18. This method will upgrade the associated Win32_Product using the upgrade package provided through PackageLocation and any ...
  19. This might have been caused by one of the following conditions: Your current security settings prevent this APPLET from being ...
  20. This might have been caused by one of the following conditions: Your current security settings prevent this EMBED from being ...
  21. This might have been caused by one of the following conditions: Your current security settings prevent this OBJECT from being ...
  22. This mirror cannot be removed because the mirrored volume is currently missing or regenerating. Retry this operation when ...
  23. This name suffix is defined as a user principal name (UPN) suffix in the local forest: %1. Therefore, Windows routes all ...
  24. This name suffix is enabled for routing to the forest: %1. Therefore, Windows routes all authentication requests that use ...
  25. This network adapter does not have any IP addresses and will not be used by the cluster. Ensure that the network adapter ...
  26. This news posting contains no text. Many news groups do not consider this appropriate. Are you sure you would like to post ...
  27. This newsgroup software had been configured to access more than one news server. You can import one of these accounts at ...
  28. This NFR (Not for Resale) version of %s is specifically designed for limited test and evaluation purposes only. This sample ...
  29. This node contains registry settings that do not correspond to an Administrative Template policy (e.g. they did not originate ...
  30. This node is already a member of a cluster, but the cluster service is not running. This node will not be configured at this ...
  31. This node was evicted from the cluster while it was down. The cluster state has been cleaned up. The cleanup status was %1. ...
  32. This now applies to the current adapter and has been automatically un-checked from the adapter it was previously associated ...
  33. This object contains the data identifying either the initial load device (its key) or the boot service that requested the ...
  34. This object contains the data needed to find either the initial load device (its key) or the boot service to request the ...
  35. This object contains the data needed to find either the initial load device (its key) or the boot service to request the ...
  36. This object is not allowed to change its grandparent container. Moves are not forbidden on this object, but are restricted ...
  37. This object may not be moved across domain boundaries either because cross-domain moves for this class are disallowed, or ...
  38. this one bit flag indicates whether or not the WBINVD instruction works properly,if this bit is not set we can not use S2, ...
  39. This opens %1!s!, a certificate request file. If the original source of this file is not trusted, this action might compromise ...
  40. This operation can only be performed on the Domain Naming Master. Please retry the operation after connecting to the Domain ...
  41. This operation cannot be performed because one or more of the selected objects have active property sheets. Close the active ...
  42. This operation cannot be performed on the cluster resource as it the quorum resource. You may not bring the quorum resource ...
  43. This operation has been cancelled due to restrictions in effect on this computer. Please contact your system administrator. ...
  44. This operation is not supported by the remote Message Queuing service. For example, MQReceiveMessageByLookupId is not supported ...
  45. This operation may cause other users to lose changes they have made to the current drawing. Other users cannot be automatically ...
  46. This operation retrieves owner-version maps from different WINS servers. It checks the consistency of the databases by ensuring ...
  47. This operation will attempt to repair your Windows system. Depending on the type of damage present, this operation may or ...
  48. This operation will attempt to terminate this process and any processes which were directly or indirectly started by it. ...
  49. This operation will delete superscope %1 without deleting any child scopes. Are you sure you want to delete superscope %1? ...
  50. This option allows the computer to be trusted for delegation. Trusting the computer for delegation is a security-sensitive ...
  51. This option allows you to connect to the Internet using your existing telephone line. You won't be able to use the telephone ...
  52. This option allows you to use your telephone while you're connected to the Internet. A cable modem uses a cable television ...
  53. This option audits both successful changes and failed attempts to system and configuration files, allowing you to determine ...
  54. This option audits successful changes to system and configuration files, allowing you to reconstruct events after the fact ...
  55. This option copies a new unattended Setup answer file to an existing image. You can copy the answer file from an existing ...
  56. This option copies the contents of a supported Windows CD and associates a standard unattended Setup answer file with the ...
  57. This option digitally signs all file and print traffic. This signing is processor intensive, so it is recommended only if ...
  58. This option does not need to be selected if you remotely manage this server using Terminal Server for Remote Desktop Administration. ...
  59. This option ensures this server is functioning correctly. If errors are detected, you may be prompted to insert the Windows ...
  60. This option installs Terminal Server, which configures the computer to run programs for multiple simultaneous users. Note: ...
  61. This option installs Terminal Server, which configures the computer to run programs for multiple simultaneous users. Note: ...
  62. This option is also needed to remotely manage the following server roles: Certificate server, DFS server, DHCP server, DNS ...
  63. This option is for advanced users only! If you disable a protocol via this option, you are stopping it from doing any work ...
  64. This option is for advanced users only! Temporary capture files are created by Network Monitor during a capture, and they ...
  65. This option is intended for advanced users who understand the ramifications of missing system files. If you skip this file, ...
  66. This option is only needed if you plan to use the Windows Firewall and the server must communicate with a remote FTP server ...
  67. This option lessens many of the security enhancements in Windows Server 2003. Under this configuration, users have access ...
  68. This option removes Terminal Server from your computer. Programs that you installed while Terminal Server was installed will ...
  69. This option should not be selected on front-end servers unless you also select the Exchange 2003 SMTP server option for the ...
  70. This option specifies the client affinity. The possible values are None, Single and Class C. Single and Class C are used ...
  71. This option uses the latest Windows Server 2003 security features and provides the most secure environment for your Terminal ...
  72. This option will install a new flat OS image on the server. This option associates the default unattended setup answer file ...
  73. This optional class allows the author to 'reserve' a specified amount of disk space in any directory, depending on the installation ...
  74. This package will no longer be placed on the desktop of every user. It will continue to be installed for users who have already ...
  75. This page allows the administrator to configure generic Web server settings. All Web sites are created on the Web site root ...