Windows Server 2003

  1. This policy setting controls whether local sites which are not explicitly mapped into any Security Zone are forced into the ...
  2. This policy setting controls whether sites which bypass the proxy server are mapped into the local Intranet security zone. ...
  3. This policy setting controls whether URLs representing UNCs are mapped into the local Intranet security zone. If you enable ...
  4. This policy setting defines whether a reference to an object is accessible when the user navigates within the same domain ...
  5. This policy setting defines whether a reference to an object is accessible when the user navigates within the same domain ...
  6. This policy setting defines whether a reference to an object is accessible when the user navigates within the same domain ...
  7. This policy setting determines whether Internet Explorer MIME sniffing will prevent promotion of a file of one type to a ...
  8. This policy setting determines whether Internet Explorer MIME sniffing will prevent promotion of a file of one type to a ...
  9. This policy setting determines whether Internet Explorer MIME sniffing will prevent promotion of a file of one type to a ...
  10. This policy setting determines whether the desktop is always displayed after a client connects to a remote computer or an ...
  11. This policy setting determines whether users will be prompted for non user-initiated file downloads. Regardless of this setting, ...
  12. This policy setting determines whether users will be prompted for non user-initiated file downloads. Regardless of this setting, ...
  13. This policy setting enables applications hosting the Web Browser Control to block automatic prompting of ActiveX control ...
  14. This policy setting enables applications hosting the Web Browser Control to block automatic prompting of ActiveX control ...
  15. This policy setting enables applications hosting the Web Browser Control to block automatic prompting of file downloads that ...
  16. This policy setting enables applications hosting the Web Browser Control to block automatic prompting of file downloads that ...
  17. This policy setting enables blocking of ActiveX control installation prompts for Internet Explorer processes. If you enable ...
  18. This policy setting enables blocking of file download prompts that are not user initiated. If you enable this policy setting, ...
  19. This policy setting lists network files and folders that are always available for offline use. This ensures that the the ...
  20. This policy setting manages whether users will be automatically prompted for ActiveX control installations. If you enable ...
  21. This policy setting manages whether users will be automatically prompted for ActiveX control installations. If you enable ...
  22. This policy setting restricts the servers that a client can connect to for point and print. The policy setting applies only ...
  23. This policy specifies whether Windows searches Windows Update for device drivers when no local drivers for a device are present. ...
  24. This port allows SQL clients that are configured with the Multiprotocol network library to communicate with the SQL Server ...
  25. This port allows SQL clients that are configured with the TCP/IP Sockets network library to communicate with the SQL Server ...
  26. This port is used by the Remote Procedure Call (RPC) endpoint mapper to allow RPC clients that use UDP to discover the ports ...
  27. This port is used by the Remote Procedure Call (RPC) endpoint mapper to allow RPC clients to discover the ports that their ...
  28. This pre-release version of "Internet Explorer 4.0" Desktop/Explorer has expired. Please update to the latest release of ...
  29. This printer cannot be published. To publish printers on computers running the Windows 2000 or Windows Server 2003 operating ...
  30. This problem could be caused by a disabled or malfunctioning network interface card. This will prevent this node from hosting ...
  31. This product is licensed. Copyright 1996-2001 Microsoft Corporation. . This program is protected by U.S. and international ...
  32. This product is not currently registered on the target server. Please install the product before entering this license certificate. ...
  33. This product needs to be reinstalled before it will work correctly on Windows XP. Some applications may need to be uninstalled ...
  34. This profile cannot be installed without the correct PIN. The installation is cancelled. If you need a PIN, contact your ...
  35. This profile translation automatically switches from replace mode to add mode if the user is currently logged on or if the ...
  36. This profile translation will not switch from replace mode to add mode if the user is currently logged on or if the profile ...
  37. This profile was not built for this processor architecture. Please contact your Administrator to get the appropriate profile ...
  38. This program came with your computer, and does not support Windows XP. Check with your computer manufacturer to find out ...
  39. This program can determine what components are installed on your computer, and whether new components, upgrades, or enhancements ...
  40. This program does not run correctly on this version of Windows. To continue, click Run Program. To exit, click Cancel. For ...
  41. This program does not support Windows XP. Similar functionality is provided by Windows XP, so this program isn't required ...
  42. This program might not run as expected on this version of Windows. To continue, click Run Program. To exit, click Cancel. ...
  43. This program requires you to print documents with the default printer. Do you want this printer to become your default printer? ...
  44. This program supports your computer hardware; however, it is incompatible with Windows XP. To see whether updated versions ...
  45. This property contains the name of a Win32_Property having a value that resolves to the full path to the source directory. ...
  46. This property contains the name of the source files to be moved or copied. This property may be left blank. See the description ...
  47. This property contains the name to be given to the original file after it is moved or copied. If this field is blank, then ...
  48. This property contains the registry value name. If this is Null, then the data entered into the Value proeprty are written ...
  49. This property has been deprecated in favor of PrinterStatus, DetectedErrorState and ErrorInformation CIM properties that ...
  50. This property has been deprecated in favour of the GetAccessMask method of this class due to the expense of calling GetEffectiveRightsFromAcl. ...
  51. This property has the value of the lower 16-bits of the EventIdentifier property. It is present to match the value displayed ...
  52. This property indicates a number that identifies the job object. As a Kernel object job object names are case sensitive. ...
  53. This property is a set of bit flags that specify the type of service. One of the following service types must be specified ...
  54. This property is a set of bit flags that specify when to start the service. One of the following types of service start must ...
  55. This property is optional only when the Context property is set to the LocalServer or LocalServer32 server context. The text ...
  56. This property page is only accessible from Windows 2000. Certificate templates may no longer be edited from this properties ...
  57. This property specifies a full Internet name for the Network Load Balancing cluster (for example, cluster.domain.com). This ...
  58. This property specifies a host's unique priority for handling default network traffic for TCP and UDP ports that are not ...
  59. This property specifies a host's unique priority for handling default network traffic for TCP and UDP ports that are not ...
  60. This property specifies if the cluster that this network adapter is a part of, is operating in theBi-Directional Affinity ...
  61. This property specifies that the host accepts an equal portion of the load-balanced traffic in multiple-host filtering mode ...
  62. This property specifies the Bi-Directional Affinity team identifier of the cluster that this network adapter is a part of. ...
  63. This property specifies the deny-only SIDs that will be added to the access token, if SecurityLimitFlags is Filter Tokens. ...
  64. This property specifies the local host's priority for handling the networking traffic for this port rule. The host with the ...
  65. This property specifies the privileges to delete from the token, if SecurityLimitFlags is Filter Tokens. This property can ...
  66. This property specifies the relative weight of load-balanced network traffic that this host should handle for the associated ...
  67. This property specifies the SIDs to disable for access checking, if SecurityLimitFlagss is Filter Tokens.This property can ...
  68. This property specifies the UDP port that is used to receive remote control commands. By default, these are ports 1717 and ...
  69. This property specifies this host's unique IP address used for network traffic not associated with the cluster (for example, ...
  70. This property specifies whether or not a multicast MAC address should be used for cluster operations. If this option is enabled, ...
  71. This property specifies whether remote-control operations are enabled. When disabled, the Service methods will not functionfor ...
  72. This query cannot be completed because it requires information that is not supported by the Active Directory domain that ...
  73. This receipt verifies that your message was delivered and that the recipient was able to verify the signature. This receipt ...
  74. This reduces the incidents of programs taking processor resources away from one another and slowing down the performance ...
  75. This registry setting does not correspond to an Administrative Template policy (e.g. they did not originate from a .adm file). ...