Windows Server 2003

  1. This page allows you to select a default backup type. Which options you select here depend on how often you back up, how ...
  2. This page has been rated by a rating system that you do not have installed. For more information about these ratings, connect ...
  3. This page is attempting to make or monitor telephone calls or other multimedia connections on your computer. Do you want ...
  4. This page provides potentially unsafe information to an ActiveX control. Your current security settings prohibit running ...
  5. This page uses fonts that need to be temporarily installed. This is usually safe. Do you want to allow these fonts to be ...
  6. This parameter indicates whether the bad sectors should be located and the readable information should be recovered from ...
  7. This parameter indicates whether the chkdsk operation should be performed at next boot up time, in case the operation could ...
  8. This parameter indicates whether the volume should be dismounted to a no-automount (offline) state. The volume may be returned ...
  9. This parameter is a Win32_DefragAnalysis object that contains properties describing the extent to which the volume is fragmented. ...
  10. This parameter is the volume that is to be shadowed. This parameter can be specified as a volume drive letter, mount point ...
  11. This parameter is the volume that is used for the shadow copy. This volume is sometimes referred to as the 'original' volume. ...
  12. This parameter is the volume to be used to store the shadow differential area. If this paramter is not supplied the specified ...
  13. This parameter is used to force the original volume to dismount before starting the revert operation. Forcing a volume to ...
  14. This parameter is used to specify the list of drives that should be excluded from autochk at next reboot. The string syntax ...
  15. This parameter is used to specify the list of drives that should be scheduled for autochk at next reboot. The string syntax ...
  16. This parameter is used to specify the list of volumes that should be excluded from autochk at next reboot. The string syntax ...
  17. This parameter is used to specify the list of volumes that should be scheduled for autochk at next reboot. The string syntax ...
  18. This patch package cannot be processed by the Windows Installer service. You must install a Windows service pack that contains ...
  19. This patch package could not be opened. Contact the application vendor to verify that this is a valid Windows Installer patch ...
  20. This patch package could not be opened. Verify that the patch package exists and that you can access it, or contact the application ...
  21. This Period mSec - Kernel mode shows the time, in milliseconds, of kernel mode processor time used by all the processes in ...
  22. This Period mSec - Processor shows the time, in milliseconds, of processor time used by all the processes in the Job object, ...
  23. This Period mSec - User mode shows the time, in milliseconds, of user mode processor time used by all the processes in the ...
  24. This permission is inherited from the %1 and controls access to this object. To stop inheriting permissions, clear the checkbox ...
  25. This permission is inherited from the %1 but does not control access to this object. It may control access to child objects ...
  26. This permission is inherited from the parent object and controls access to this object. To stop inheriting permissions, clear ...
  27. This permission is inherited from the parent object but does not control access to this object. It may control access to ...
  28. This physical disk is not cluster-capable and cannot be used by the cluster. Some physical disks are not cluster-capable ...
  29. This physical disk is not formatted with the NTFS file system and cannot be used in the cluster. If you want to use this ...
  30. This policy controls the percentage of disk space available to the Windows Installer baseline file cache. The Windows Installer ...
  31. This policy controls the state of the application compatibility engine in the system. The engine is part of the loader and ...
  32. This policy controls the state of the Program Compatibility Wizard. When enabled, this policy disables the start page of ...
  33. This policy controls the visibility of the Program Compatibility property page shell extension. This shell extension is visible ...
  34. This policy controls whether the print spooler will accept client connections. When the policy is unconfigured, the spooler ...
  35. This policy module cannot be configured from this computer. For information about enabling remote configuration, refer to ...
  36. This policy prevents a shortcut for the Player from being added to the Quick Launch bar. When this policy is not configured ...
  37. This policy prevents a shortcut icon for the Player from being added to the user's desktop. When this policy is not configured ...
  38. This policy requires a license to be issued to each user that connects to the Terminal Server. The allocation of licenses ...
  39. This policy setting allows you to configure the amount of functionality that the shell protocol can have. When using the ...
  40. This policy setting allows you to configure the list of high risk file types. If the file attachment is in the list of high ...
  41. This policy setting allows you to configure the list of low risk file types. If the attachment is in the list of low risk ...
  42. This policy setting allows you to configure the list of moderate risk file types. If the attachment is in the list of moderate ...
  43. This policy setting allows you to configure the logic that Windows uses to determine the risk for file attachments. Preferring ...
  44. This policy setting allows you to ensure that any Internet Explorer add-ons not listed in the 'Add-on List' policy setting ...
  45. This policy setting allows you to manage a list of add-ons to be allowed or denied by Internet Explorer. This list can be ...
  46. This policy setting allows you to manage a list of files or folders for which you wish to prohibit the 'Make Available Offline' ...
  47. This policy setting allows you to manage a list of sites that you want to associate with a particular security zone. These ...
  48. This policy setting allows you to manage a list of web sites that will be allowed to open pop-up windows regardless of the ...
  49. This policy setting allows you to manage ActiveX controls not marked as safe. If you enable this policy setting, ActiveX ...
  50. This policy setting allows you to manage ActiveX controls not marked as safe. If you enable this policy setting, ActiveX ...
  51. This policy setting allows you to manage dynamic binary and script behaviors: components that encapsulate specific functionality ...
  52. This policy setting allows you to manage dynamic binary and script behaviors: components that encapsulate specific functionality ...
  53. This policy setting allows you to manage dynamic binary and script behaviors: components that encapsulate specific functionality ...
  54. This policy setting allows you to manage MIME sniffing for file promotion from one type to another based on a MIME sniff. ...
  55. This policy setting allows you to manage MIME sniffing for file promotion from one type to another based on a MIME sniff. ...
  56. This policy setting allows you to manage permissions for Java applets. If you enable this policy setting, you can choose ...
  57. This policy setting allows you to manage permissions for Java applets. If you enable this policy setting, you can choose ...
  58. This policy setting allows you to manage permissions for Java applets. If you enable this policy setting, you can choose ...
  59. This policy setting allows you to manage permissions for Java applets. If you enable this policy setting, you can choose ...
  60. This policy setting allows you to manage pop-up management functionality in Internet Explorer. If you enable this policy ...
  61. This policy setting allows you to manage restrictions on script-initiated pop-up windows and windows that include the title ...
  62. This policy setting allows you to manage restrictions on script-initiated pop-up windows and windows that include the title ...
  63. This policy setting allows you to manage settings for logon options. If you enable this policy setting, you can choose from ...
  64. This policy setting allows you to manage settings for logon options. If you enable this policy setting, you can choose from ...
  65. This policy setting allows you to manage settings for logon options. If you enable this policy setting, you can choose from ...
  66. This policy setting allows you to manage software channel permissions. If you enable this policy setting, you can choose ...
  67. This policy setting allows you to manage software channel permissions. If you enable this policy setting, you can choose ...
  68. This policy setting allows you to manage software channel permissions. If you enable this policy setting, you can choose ...
  69. This policy setting allows you to manage the behavior for notifying registered antivirus programs. If multiple programs are ...
  70. This policy setting allows you to manage the crash detection feature of add-on Management. If you enable this policy setting, ...
  71. This policy setting allows you to manage the default risk level for file types. To fully customize the risk level for file ...
  72. This policy setting allows you to manage the opening of sub-frames and access of applications across different domains. If ...
  73. This policy setting allows you to manage the opening of sub-frames and access of applications across different domains. If ...
  74. This policy setting allows you to manage the preservation of information in the browser's history, in favorites, in an XML ...
  75. This policy setting allows you to manage the preservation of information in the browser's history, in favorites, in an XML ...