Windows Server 2008
- This parameter is a Win32_DefragAnalysis object that contains properties describing the extent to which the volume is fragmented. ...
- This parameter is the volume that is to be shadowed. This parameter can be specified as a volume drive letter, mount point ...
- This parameter is the volume that is used for the shadow copy. This volume is sometimes referred to as the 'original' volume. ...
- This parameter is the volume to be used to store the shadow differential area. If this paramter is not supplied the specified ...
- This parameter is used to force the original volume to dismount before starting the revert operation. Forcing a volume to ...
- This parameter is used to specify the list of drives that should be excluded from autochk at next reboot. The string syntax ...
- This parameter is used to specify the list of drives that should be scheduled for autochk at next reboot. The string syntax ...
- This parameter is used to specify the list of volumes that should be excluded from autochk at next reboot. The string syntax ...
- This parameter is used to specify the list of volumes that should be scheduled for autochk at next reboot. The string syntax ...
- This password does not meet your organization's password complexity requirements. Please type a password that meets these ...
- This password has already been used to request a (%1) certificate. Only one signing certificate and one exchange certificate ...
- This patch package cannot be processed by the Windows Installer service. You must install a Windows service pack that contains ...
- This patch package could not be opened. Contact the application vendor to verify that this is a valid Windows Installer patch ...
- This patch package could not be opened. Verify that the patch package exists and that you can access it, or contact the application ...
- This path references the %configsetroot% environment variable but the answer file does not appear to be part of a configuration ...
- This Period mSec - Kernel mode shows the time, in milliseconds, of kernel mode processor time used by all the processes in ...
- This Period mSec - Processor shows the time, in milliseconds, of processor time used by all the processes in the Job object, ...
- This Period mSec - User mode shows the time, in milliseconds, of user mode processor time used by all the processes in the ...
- This permission is inherited from the parent object. Make changes here to create a new permission that overrides the inherited ...
- This picture can't be displayed. You might not have enough memory available. Close some programs or, if your hard disk is ...
- This picture can't be rotated to fit the page. You might need to use Paint or another image editing program to save the picture ...
- This playlist is not valid or is corrupted. Create a new playlist using Windows Media Player, then sync the new playlist ...
- This playlist updates when new content is available. If you want changes in the playlist to sync to your device, you should ...
- This plex is present in the driver, but has not yet been loaded to the provider cache. A volume modified notification will ...
- This policy cannot be created because a policy with this name already exists. Specify another name for this policy, and then ...
- This policy cannot be updated because a policy with this name already exists. Specify another name for this policy, and then ...
- This policy contains settings that are not supported by this version of the interface. These settings were not exported. ...
- This policy contains settings that are not supported by this version of the interface. These settings were not imported. ...
- This policy has a profile configured with an EAP method not installed on this machine. The profile will be displayed with ...
- This policy has a profile configured with an EAP method not installed on this machine. The profile will be displayed with ...
- This policy has one or more profiles configured with EAP method(s) not installed on this machine. Those profiles have been ...
- This policy is configured with one or more health policies that are not valid. You must update this policy by removing the ...
- This policy module cannot be configured from this computer. For information about enabling remote configuration, refer to ...
- This policy requires a license to be issued to each user that connects to the Terminal Server. The allocation of licenses ...
- This printer cannot be published. To publish printers on computers running the Windows 2000 or Windows Server 2003 operating ...
- This printer has been redirected by the Remote Desktop Connection client. The printing preferences for the client printer ...
- This printer has been redirected by the Remote Desktop Connection client. To see the device settings of the client printer, ...
- This privacy statement indicates that if you choose to use Windows Meeting Space, certain identification information (such ...
- This privacy statement indicates that if you choose to use Windows Meeting Space, certain identification information (such ...
- This problem can occur if the remote computer is running a version of Windows that is earlier than Windows Vista, or if the ...
- This process is doing excessive disk activities and is impacting the performance of Windows: File Name : %3 Friendly Name ...
- This process is using up processor time and is impacting the performance of Windows: File Name : %3 Friendly Name : %5 Version ...
- This process is using up too much system memory: File Name : %3 Friendly Name : %5 Version : %7 Workingset size : %8Kb Percent ...
- This product needs to be reinstalled before it will work correctly on Windows Vista. Some applications may need to be uninstalled ...
- This profile "%s" should be edited using the language version of Windows that matches the profile. Do you want to continue ...
- This profile cannot be installed without the correct PIN. The installation is cancelled. If you need a PIN, contact your ...
- This profile is built for Longhorn and greater platforms only. This profile cannot be installed on the current platform. ...
- This profile is built for Windows Vista and greater platforms only. This profile cannot be installed on the current platform. ...
- This profile is set as machine default. If uninstalled, the profile will also get deleted from the machine. Continue with ...
- This profile was not built for this processor architecture. Please contact your Administrator to get the appropriate profile ...
- This program came with your computer, and does not support Windows Vista. Check with your computer manufacturer to find out ...
- This program can't remove a potentially harmful item from the contents of an archived file. To remove the item, you need ...
- This program does not have a valid digital signature that verifies its publisher. This program will open outside of Protected ...
- This program does not run correctly on this version of Windows. To continue, click Run Program. To exit, click Cancel. For ...
- This program does not support Windows Vista. Similar functionality is provided by Windows Vista, so this program isn't required ...
- This program experiences known problems on this version of Windows. Contact the program vendor regarding upgrades that are ...
- This program might not run as expected on this version of Windows. To continue, click Run Program. To exit, click Cancel. ...
- This program needs to run with administrative permissions. Use an administrator command prompt and then run the program again. ...
- This program replaces core system components, making this version of Windows unusable. Contact the program vendor regarding ...
- This program requires you to print documents with the default printer. Do you want this printer to become your default printer? ...
- This program supports your computer hardware; however, it is incompatible with Windows Vista. To see whether updated versions ...
- This program used more virtual memory than it needed to, which is called a memory leak. Memory leaks can cause the program ...
- This program will open outside of Protected mode. Internet Explorer's Protected mode helps protect your computer. If you ...
- This program's rating ({0}) exceeds the maximum allowed rating. To watch the program, press OK on the remote, and then enter ...
- This program's rating exceeds the maximum allowed rating. To watch the program, press OK on the remote, and then enter your ...
- This project contains source files that are missing or that have been modified after import. Your project cannot be published ...
- This property contains the name of a Win32_Property having a value that resolves to the full path to the source directory. ...
- This property contains the name of the source files to be moved or copied. This property may be left blank. See the description ...
- This property contains the name to be given to the original file after it is moved or copied. If this field is blank, then ...
- This property contains the registry value name. If this is Null, then the data entered into the Value proeprty are written ...
- This property has been deprecated in favour of the GetAccessMask method of this class due to the expense of calling GetEffectiveRightsFromAcl. ...
- This property has the value of the lower 16-bits of the EventIdentifier property. It is present to match the value displayed ...
- This property indicates a number that identifies the job object. As a Kernel object job object names are case sensitive. ...
- This property indicates the ref count of the profile. If the profile is loaded, the ref count is at least 1. Higher values ...
- This property indicates whether the user has a roaming profile configured. NOTE: User has a roaming profile configured does ...