Windows Server 2008

  1. There were password errors using the Credential Manager. To remedy, launch the Stored User Names and Passwords control panel ...
  2. There were some orphaned entries deleted in the configuration due to the deletion of a class or an option definition. Please ...
  3. There were some warnings when querying quota templates and datascreen templates. The relevant pages will not be shown. Do ...
  4. There won't be enough space in the new location for the currently downloaded content. Please either delete these files first ...
  5. Therefore, try to remove AD DS normally by running the Active Directory Domain Services Installation Wizard (dcpromo.exe) ...
  6. These are root certificates. Deleting these certificates will invalidate this CA. Are you certain you wish to delete these ...
  7. These are the devices exposed by iSCSI sessions to the target. Click Advanced to view information about the device and configure ...
  8. These are the old deprecated commands, that are being phased out, but are still presently supported for backwards compatibility. ...
  9. These authentication settings are used rather than the constraints and authentication settings in network policy. For VPN ...
  10. These changes may cause currently connected administrative clients to temporarily lose their connection to this cluster. ...
  11. These changes may cause currently connected clients to temporarily lose their connection to this service or application. ...
  12. These changes reduce the functionality in Web pages, Web-based applications, local network resources, and applications that ...
  13. These computers include all domain members, all domain members in trusted domains, and all computers that need to make LDAP ...
  14. These credentials will be used to connect to %s. However, if %s does not support Network Level Authentication, it will not ...
  15. These credentials will be used to connect to %s. If %s does not support Network Level Authentication, it will not accept ...
  16. These credentials will be used to connect to %s. If %s does not support Network Level Authentication, it will not accept ...
  17. These disks have conflicting information about the volumes contained on them. Review the list of volumes that will be imported ...
  18. These files are used by the operating system and by various programs. Editing or modifying them could damage your system. ...
  19. These issues do not prevent your upgrade, but some applications and/or devices might not work once your upgrade completes. ...
  20. These password synchronization settings override any settings for individual computers participating in password synchronization. ...
  21. These policies are being excluded since they are only defined with override-only attribute. Policy Names=%1 App Id=%2 Sku ...
  22. These program files are currently being used by one or more programs. Please close some programs, and try again. You may ...
  23. These settings affect the RequireSecuritySignature value in HKLM\System\CurrentControlSet\Services\LanManServer\Parameters. ...
  24. These settings are disabled because one or more namespace servers are running Windows Server 2003 without Service Pack 1 ...
  25. These settings can be changed without restarting this computer. Any changes made here will be lost when this computer is ...
  26. These settings can be exported to an answer file for use with other unattended operations. More about using an answer file ...
  27. These settings can be useful in reducing the cost of supporting applications in your corporation. Using the settings in this ...
  28. These settings can help you set up your computer to meet your needs. Review the recommended settings below and select the ...
  29. These settings have an impact on the performance of this terminal server. For best results, please select the default settings. ...
  30. These settings were applied only by GPOs that contain Internet Explorer Enhanced Security Configuration (ESC) settings because ...
  31. These settings were applied only by GPOs that do not contain Internet Explorer Enhanced Security Configuration (ESC) settings ...
  32. These settings will not apply to users that log on to computers that have the Internet Explorer Enhanced Security Configuration ...
  33. These settings will only apply to users when they log on to computers that have the Internet Explorer Enhanced Security Configuration ...
  34. These versions of Microsoft IntelliPoint were released prior to this version of Windows, and are therefore incompatible with ...
  35. They will be able to view and change the file(s) you shared. Also, they will be able to add additional files to the following ...
  36. Thick Paper and Envelopes checkbox is selected. Use this option only when printing on thick paper or when your previous printouts ...
  37. This abstract class represents any resources that are used by the MSI installer durring the course of an installation, patch ...
  38. This account is an administrator account and its password was NOT reset. The password for this account should be manually ...
  39. This action brings the service or application online. Note that it may take time for the service or application to come completely ...
  40. This action can not be undone because a store that uses the version 2.0 schema can not be downgraded to version 1.0. Clients ...
  41. This action cannot be completed because the other program is busy. Choose 'Switch To' to activate the busy program and correct ...
  42. This action causes a simulated failure of the resource. This is useful for testing failover settings for a service or application. ...
  43. This action creates an empty clustered service or application. Cluster resources will need to be added manually. This option ...
  44. This action enables you to migrate selected services and applications (groups) from a Windows Server 2003 cluster to this ...
  45. This action evicts this node from the cluster membership, after which the node will no longer participate in the cluster. ...
  46. This action launches the validation wizard, which guides you through the process of testing the hardware configuration for ...
  47. This action might ERASE backup data from the disks listed above. You can use the -excludeDisks option to specifically exclude ...
  48. This action refreshes the cluster configuration of this virtual machine role from the current guest configuration. This action ...
  49. This action starts the Cluster service on this node, after which the node can participate in the cluster and host resources. ...
  50. This action stops the Cluster service on this node. While the service is stopped, the node cannot participate in the cluster. ...
  51. This action takes the service or application offline. Note that it may take time for the service or application to go completely ...
  52. This action will reduce the shared staging quota for all replicated folders that use this same staging path. Do you wish ...
  53. This Active Accessibility Redistribution Kit will install only on systems running Windows 95 or Windows NT 4.0 with Service ...
  54. This Active Directory domain controller appears to be the last DNS server for the following Active Directory-integrated zones: ...
  55. This Active Directory domain controller appears to be the last DNS server for the following Active Directory-integrated zones: ...
  56. This Active Directory Domain Controller cannot be promoted because of a space in the NetBIOS computer name. Rename the computer ...
  57. This Active Directory domain controller currently performs the domain naming master role. If you remove Active Directory ...
  58. This Active Directory domain controller currently performs the domain naming master role. If you remove Active Directory ...
  59. This Active Directory domain controller currently performs the infrastructure master role. If you remove Active Directory ...
  60. This Active Directory domain controller currently performs the infrastructure master role. If you remove Active Directory ...
  61. This Active Directory domain controller currently performs the primary domain controller (PDC) emulator operations master ...
  62. This Active Directory domain controller currently performs the primary domain controller (PDC) emulator operations master ...
  63. This Active Directory domain controller currently performs the RID operations master role. If you remove Active Directory ...
  64. This Active Directory domain controller currently performs the RID operations master role. If you remove Active Directory ...
  65. This Active Directory domain controller currently performs the schema master role. If you remove Active Directory Domain ...
  66. This Active Directory domain controller currently performs the schema master role. If you remove Active Directory Domain ...
  67. This Active Directory domain controller holds the last replica of the following application directory partitions: %1 Deleting ...
  68. This Active Directory domain controller is a DNS server. If you remove Active Directory Domain Services (AD DS) from this ...
  69. This Active Directory domain controller is a DNS server. If you remove Active Directory Domain Services from this computer, ...
  70. This Active Directory domain controller is a global catalog server. Global catalog servers are used to process user logons. ...
  71. This Active Directory domain controller is a global catalog server. If you remove Active Directory Domain Services (AD DS) ...
  72. This Active Directory domain controller is a global catalog server. If you remove Active Directory Domain Services from this ...
  73. This Active Directory domain controller is assigned to the site %1. You can manage sites with the Active Directory Sites ...
  74. This Active Directory Domain Controller is the last domain controller in the domain. Do you want to continue with this deletion? ...
  75. This Active Directory Domain Controlller is serving as the infrastructure master role for this domain. The infrastructure ...