Windows Server 2008

  1. This operation will delete superscope %1 without deleting any child scopes. Are you sure you want to delete superscope %1? ...
  2. This operation will delete the namespace "{0}". Clients will no longer be able to access "{0}". Do you want to continue? ...
  3. This operation will delete the namespace {0}. Clients will no longer be able to access {0}. The underlying folder targets ...
  4. This operation will delete the replication group {0} and stop replicating the associated replicated folders. No replicated ...
  5. This operation will delete the selected folder from the namespace. All child folders will also be deleted. This operation ...
  6. This operation will delete the selected folders from the namespace. All child folders will also be deleted. This operation ...
  7. This operation will delete your index (including custom index locations and excluded locations) next time your computer restarts ...
  8. This operation will make the volume available for use but the data on it may be corrupted or stale. If you have another disk ...
  9. This operation will make Windows Vista Service Pack 1 permanent on this computer. Upon completion you will not be able to ...
  10. This operation will move all the computer security principals from the Auth2 list of the RODC to the Allow list. Do you wish ...
  11. This operation will move all the security principals from the Auth2 list of the RODC to the Allow list. Do you wish to continue? ...
  12. This operation will move all user security principals from the Auth2 list of the RODC to the Allow list. Do you wish to continue? ...
  13. This operation will remove the namespace server "{0}" from this namespace. If it is the only namespace server of this namespace, ...
  14. This operation will remove the selected folder target from this folder. If this is the last folder target, then the folder ...
  15. This operation will remove the selected folder targets from this folder. If all of the targets are selected, then the folder ...
  16. This operation will stop replicating the replicated folder "{0}" and will delete the replicated folder from the replication ...
  17. This operation will stop sharing the selected shares. Users will no longer be able to access files from these shared folders ...
  18. This operation will stop sharing the selected shares. Users will no longer be able to access files from these shared folders ...
  19. This option allows the computer to be trusted for delegation. Trusting the computer for delegation is a security-sensitive ...
  20. This option audits both successful changes and failed attempts to system and configuration files, allowing you to determine ...
  21. This option audits successful changes to system and configuration files, allowing you to reconstruct events after the fact ...
  22. This option automatically creates a new instance of AD LDS that uses the default configuration and schema partitions. The ...
  23. This option configures two-way replication between two servers, such as a branch server and a hub (destination) server. This ...
  24. This option copies a new unattended Setup answer file to an existing image. You can copy the answer file from an existing ...
  25. This option copies the contents of a supported Windows CD and associates a standard unattended Setup answer file with the ...
  26. This option creates a new instance of AD LDS that uses the configuration and schema partitions replicated from another instance ...
  27. This option deletes all printers on this server, including shared printers, which prevents users from printing through this ...
  28. This option deletes the member from the replication group and stops replicating the folder on the member. However, users ...
  29. This option deletes the member from the replication group, stops replicating the replicated folder on the member, and removes ...
  30. This option deletes the replication group and stops replicating the folder. However, users can still use the namespace to ...
  31. This option deletes the replication group, stops replicating the replicated folder, and removes the replicated folder from ...
  32. This option digitally signs all file and print traffic. This signing is processor intensive, so it is recommended only if ...
  33. This option does not need to be selected if you remotely manage this server using Terminal Server for Remote Desktop Administration. ...
  34. This option enables higher-quality audio CDs, such as HDCDs, to play back at their full audio quality. The audio quality ...
  35. This option increases the backup speed, but might decrease performance of the volume because shadow copies are left behind. ...
  36. This option installs a minimal installation of Windows Server without the standard Windows user interface, and with a subset ...
  37. This option installs the complete installation of Windows Server. This installation includes the entire user interface, and ...
  38. This option is less secure than when Network Level Authentication is used because user authentication occurs later in the ...
  39. This option is not available when the snap-in is targeted at a Read-only Domain Controller. You must connect to a writable ...
  40. This option is only available from the server console, and only if the server meets one of these conditions: - The server ...
  41. This option is recommended for most production scenarios. You can use a certificate issued by your own internal certification ...
  42. This option is recommended for most production scenarios. You can use a certificate issued by your own internal certification ...
  43. This option is recommended for most production scenarios. You should use a certificate issued by an external certification ...
  44. This option is recommended for most production scenarios. You should use a certificate issued by an external certification ...
  45. This option is recommended for small-scale deployments or test scenarios only. After installing AD FS, you must manually ...
  46. This option is recommended for small-scale deployments or test scenarios only. After installing AD RMS, you must manually ...
  47. This option is recommended for small-scale deployments or test scenarios only. After installing HCAP, you must manually install ...
  48. This option is recommended for small-scale deployments or test scenarios only. After installing HRA and HCAP, you must manually ...
  49. This option is recommended for small-scale deployments or test scenarios only. After installing HRA, you must manually install ...
  50. This option is recommended for small-scale deployments or test scenarios only. After installing TS Gateway, you must manually ...
  51. This option is recommended for small-scale deployments or test scenarios only. After installing WS-AT, you must manually ...
  52. This option is recommended if you don't have your own internal CA or don't want to use a certificate issued by an external ...
  53. This option is recommended if you don't want to use SSL, or if you plan to request a certificate from a CA and import it ...
  54. This option is used mainly by technical support centers. To use this option, the other computer must be configured to accept ...
  55. This option requires a 24-bit audio device. If you experience sound or computer problems while playing audio CDs, clear this ...
  56. This option requires less management overhead as every fax user can access all received faxes, but provides less privacy ...
  57. This option retains all printers including shared printers. Users can still print through this server unless you manually ...
  58. This option shares the replicated folder, applies shared folder permissions to new shared folders, and publishes the replicated ...
  59. This option should be used to recover an AD RMS cluster only if the configuration database is unrecoverable and had content ...
  60. This option stops replicating the replicated folder and deletes the replicated folder from the replication group. The replicated ...
  61. This option stops replicating the replicated folder, deletes the replicated folder from the replication group, and removes ...
  62. This option will copy all the application data to the specified location. This option will not recover your application themselves. ...
  63. This optional class allows the author to 'reserve' a specified amount of disk space in any directory, depending on the installation ...
  64. This package does not apply to the Windows PE image specified. Please ensure you are importing optional component packages ...
  65. This package will no longer be placed on the desktop of every user. It will continue to be installed for users who have already ...
  66. This page has been rated by a rating system that you do not have installed. For more information about these ratings, connect ...
  67. This page is a backup of Trusted Platform Module (TPM) owner authorization information. Upon request, use the authorization ...
  68. This page is a backup of Trusted Platform Module (TPM) security hardware owner password information. Upon request, use the ...
  69. This page is attempting to make or monitor telephone calls or other multimedia connections on your computer. Do you want ...
  70. This page lists Windows Firewall rules that are needed for the roles and other options you have selected. Selected rules ...
  71. This page provides potentially unsafe information to an ActiveX control. Your current security settings prohibit running ...
  72. This page uses fonts that need to be temporarily installed. This is usually safe. Do you want to allow these fonts to be ...
  73. This parameter indicates whether the bad sectors should be located and the readable information should be recovered from ...
  74. This parameter indicates whether the chkdsk operation should be performed at next boot up time, in case the operation could ...
  75. This parameter indicates whether the volume should be dismounted to a no-automount (offline) state. The volume may be returned ...