Windows Server 2003
- This page allows you to select a default backup type. Which options you select here depend on how often you back up, how ...
- This page has been rated by a rating system that you do not have installed. For more information about these ratings, connect ...
- This page is attempting to make or monitor telephone calls or other multimedia connections on your computer. Do you want ...
- This page provides potentially unsafe information to an ActiveX control. Your current security settings prohibit running ...
- This page uses fonts that need to be temporarily installed. This is usually safe. Do you want to allow these fonts to be ...
- This parameter indicates whether the bad sectors should be located and the readable information should be recovered from ...
- This parameter indicates whether the chkdsk operation should be performed at next boot up time, in case the operation could ...
- This parameter indicates whether the volume should be dismounted to a no-automount (offline) state. The volume may be returned ...
- This parameter is a Win32_DefragAnalysis object that contains properties describing the extent to which the volume is fragmented. ...
- This parameter is the volume that is to be shadowed. This parameter can be specified as a volume drive letter, mount point ...
- This parameter is the volume that is used for the shadow copy. This volume is sometimes referred to as the 'original' volume. ...
- This parameter is the volume to be used to store the shadow differential area. If this paramter is not supplied the specified ...
- This parameter is used to force the original volume to dismount before starting the revert operation. Forcing a volume to ...
- This parameter is used to specify the list of drives that should be excluded from autochk at next reboot. The string syntax ...
- This parameter is used to specify the list of drives that should be scheduled for autochk at next reboot. The string syntax ...
- This parameter is used to specify the list of volumes that should be excluded from autochk at next reboot. The string syntax ...
- This parameter is used to specify the list of volumes that should be scheduled for autochk at next reboot. The string syntax ...
- This patch package cannot be processed by the Windows Installer service. You must install a Windows service pack that contains ...
- This patch package could not be opened. Contact the application vendor to verify that this is a valid Windows Installer patch ...
- This patch package could not be opened. Verify that the patch package exists and that you can access it, or contact the application ...
- This Period mSec - Kernel mode shows the time, in milliseconds, of kernel mode processor time used by all the processes in ...
- This Period mSec - Processor shows the time, in milliseconds, of processor time used by all the processes in the Job object, ...
- This Period mSec - User mode shows the time, in milliseconds, of user mode processor time used by all the processes in the ...
- This permission is inherited from the %1 and controls access to this object. To stop inheriting permissions, clear the checkbox ...
- This permission is inherited from the %1 but does not control access to this object. It may control access to child objects ...
- This permission is inherited from the parent object and controls access to this object. To stop inheriting permissions, clear ...
- This permission is inherited from the parent object but does not control access to this object. It may control access to ...
- This physical disk is not cluster-capable and cannot be used by the cluster. Some physical disks are not cluster-capable ...
- This physical disk is not formatted with the NTFS file system and cannot be used in the cluster. If you want to use this ...
- This policy controls the percentage of disk space available to the Windows Installer baseline file cache. The Windows Installer ...
- This policy controls the state of the application compatibility engine in the system. The engine is part of the loader and ...
- This policy controls the state of the Program Compatibility Wizard. When enabled, this policy disables the start page of ...
- This policy controls the visibility of the Program Compatibility property page shell extension. This shell extension is visible ...
- This policy controls whether the print spooler will accept client connections. When the policy is unconfigured, the spooler ...
- This policy module cannot be configured from this computer. For information about enabling remote configuration, refer to ...
- This policy prevents a shortcut for the Player from being added to the Quick Launch bar. When this policy is not configured ...
- This policy prevents a shortcut icon for the Player from being added to the user's desktop. When this policy is not configured ...
- This policy requires a license to be issued to each user that connects to the Terminal Server. The allocation of licenses ...
- This policy setting allows you to configure the amount of functionality that the shell protocol can have. When using the ...
- This policy setting allows you to configure the list of high risk file types. If the file attachment is in the list of high ...
- This policy setting allows you to configure the list of low risk file types. If the attachment is in the list of low risk ...
- This policy setting allows you to configure the list of moderate risk file types. If the attachment is in the list of moderate ...
- This policy setting allows you to configure the logic that Windows uses to determine the risk for file attachments. Preferring ...
- This policy setting allows you to ensure that any Internet Explorer add-ons not listed in the 'Add-on List' policy setting ...
- This policy setting allows you to manage a list of add-ons to be allowed or denied by Internet Explorer. This list can be ...
- This policy setting allows you to manage a list of files or folders for which you wish to prohibit the 'Make Available Offline' ...
- This policy setting allows you to manage a list of sites that you want to associate with a particular security zone. These ...
- This policy setting allows you to manage a list of web sites that will be allowed to open pop-up windows regardless of the ...
- This policy setting allows you to manage ActiveX controls not marked as safe. If you enable this policy setting, ActiveX ...
- This policy setting allows you to manage ActiveX controls not marked as safe. If you enable this policy setting, ActiveX ...
- This policy setting allows you to manage dynamic binary and script behaviors: components that encapsulate specific functionality ...
- This policy setting allows you to manage dynamic binary and script behaviors: components that encapsulate specific functionality ...
- This policy setting allows you to manage dynamic binary and script behaviors: components that encapsulate specific functionality ...
- This policy setting allows you to manage MIME sniffing for file promotion from one type to another based on a MIME sniff. ...
- This policy setting allows you to manage MIME sniffing for file promotion from one type to another based on a MIME sniff. ...
- This policy setting allows you to manage permissions for Java applets. If you enable this policy setting, you can choose ...
- This policy setting allows you to manage permissions for Java applets. If you enable this policy setting, you can choose ...
- This policy setting allows you to manage permissions for Java applets. If you enable this policy setting, you can choose ...
- This policy setting allows you to manage permissions for Java applets. If you enable this policy setting, you can choose ...
- This policy setting allows you to manage pop-up management functionality in Internet Explorer. If you enable this policy ...
- This policy setting allows you to manage restrictions on script-initiated pop-up windows and windows that include the title ...
- This policy setting allows you to manage restrictions on script-initiated pop-up windows and windows that include the title ...
- This policy setting allows you to manage settings for logon options. If you enable this policy setting, you can choose from ...
- This policy setting allows you to manage settings for logon options. If you enable this policy setting, you can choose from ...
- This policy setting allows you to manage settings for logon options. If you enable this policy setting, you can choose from ...
- This policy setting allows you to manage software channel permissions. If you enable this policy setting, you can choose ...
- This policy setting allows you to manage software channel permissions. If you enable this policy setting, you can choose ...
- This policy setting allows you to manage software channel permissions. If you enable this policy setting, you can choose ...
- This policy setting allows you to manage the behavior for notifying registered antivirus programs. If multiple programs are ...
- This policy setting allows you to manage the crash detection feature of add-on Management. If you enable this policy setting, ...
- This policy setting allows you to manage the default risk level for file types. To fully customize the risk level for file ...
- This policy setting allows you to manage the opening of sub-frames and access of applications across different domains. If ...
- This policy setting allows you to manage the opening of sub-frames and access of applications across different domains. If ...
- This policy setting allows you to manage the preservation of information in the browser's history, in favorites, in an XML ...
- This policy setting allows you to manage the preservation of information in the browser's history, in favorites, in an XML ...