Exchange Server 2010

  1. Either you or your organization's policy required the voice message to be protected, but protection couldn't be applied. ...
  2. Element "%1" is empty. Request processing stopped. The event is logged because the AcceptableResponseSchema element from ...
  3. Element "%1" is empty. Request processing stopped. The event is logged because the AcceptableResponseSchema element from ...
  4. Email Message Queue Accessed is the number of times subscribers accessed their e-mail message queue by using the telephone ...
  5. Empty Folder Contents Total is the total number of Empty Folder Contents requests that have been processed since the service ...
  6. Empty Folder Contents/sec is the number of Empty Folder commands that are processed each second. This command is used by ...
  7. Enable deduplication Enable deduplication if you want to save only one copy of duplicate messages in the search results. ...
  8. Enable full logging In addition to basic information about the search, full logging generates detailed information about ...
  9. Enable sharing policy. If you disable this policy, mailboxes that are assigned this policy won't be able to share calendar ...
  10. Enable the Resource Booking Attendant. The Resource Booking Attendant enables the resource mailbox to process requests and ...
  11. Enable Windows Identity filter for the availability service. The filter values should match the Windows identity (format ...
  12. Enabled replication for database '{0}', but couldn't perform automatic initial seeding because replication wasn't suspended. ...
  13. Enables Microsoft Exchange Unified Messaging features. This allows voice and fax messages to be stored in Microsoft Exchange ...
  14. Enabling both Basic authentication and LiveIdBasic (Windows Live ID Basic) authentication is not allowed. Virtual directory ...
  15. Enabling Outlook Anywhere "{0}" on server "{1}" with external host name "{2}", client authentication method "{3}", and IIS ...
  16. Enabling traces can cause performance degradation and should only be done under the supervision of a qualified Exchange expert. ...
  17. encodingStyle' indicates any canonicalization conventions followed in the contents of the containing element. For example, ...
  18. encodingStyle' indicates any canonicalization conventions followed in the contents of the containing element. For example, ...
  19. Encountered a problem when trying to fix all the replica lists after it was detected that the public store %1 has a new object ...
  20. Encountered a problem when trying to fix all the replica lists after it was detected that the public store %1 has a new object ...
  21. Encountered unexpected error %1 while registering for quarantine notifications for database %2. Will try again in two hours. ...
  22. Encountered unexpected error %1 while registering for quarantine notifications for database %2. Will try again in two hours. ...
  23. Encrypted messages can't be sent to groups whose membership is hidden. You have at least one group with hidden membership ...
  24. Encryption By default, the encryption method used to migrate mailbox data is set to None. To provide additional security ...
  25. Encryption By default, this is set to SSL (Secure Sockets Layer) to provide additional security for your e-mail as it is ...
  26. Encryption By default, this is set to SSL (Secure Sockets Layer) to provide additional security for your e-mail as it is ...
  27. End copying and removing transaction log files from {1} to {2} for resetting log generation number in storage group ({3}) ...
  28. End date If you enter a start date and leave the end date undefined, you can collect the latest items each time you restart ...
  29. End time period to look for in the agent log files. If not specified, look at all the logs beginning from startDate. If neither ...
  30. Ending the backup of the file %4. Not all data in the file has been read (read %5 bytes out of %6 bytes). For more information, ...
  31. Ending the backup of the file %4. Not all data in the file has been read (read %5 bytes out of %6 bytes). For more information, ...
  32. Ending the internal copy (for seeding or analysis purposes) of the file %4. Not all data in the file has been read (read ...
  33. Ending the internal copy (for seeding or analysis purposes) of the file %4. Not all data in the file has been read (read ...
  34. Enforce password lifetime Enforce a maximum lifetime for passwords. Users will be prompted to reset their password after ...
  35. Enforce PIN lifetime Enforce a maximum lifetime for Outlook Voice Access PINs. Users will be prompted to reset their PIN ...
  36. Enter a domain name to use to configure your Client Access servers for Internet-facing services (for example, Exchange ActiveSync, ...
  37. Enter a holiday for your organization. On holidays, the UM auto attendant uses the greeting and menu navigation you've provided ...
  38. Enter a new menu navigation option, including the prompt that callers will hear, the key that they must press, and the response ...
  39. Enter a parent domain name below if you would like to apply this certificate to all its sub-domains automatically using wildcards. ...
  40. Enter a value lower than '{1}'. The number of incorrect PIN entries before the PIN is automatically reset ('{0}') must be ...
  41. Enter a value lower than '{1}'. The number of incorrect PIN entries before the PIN is automatically reset ('{0}') must be ...
  42. Enter text to include in e-mails sent to users who have a device in quarantine, blocked, or in the process of being identified: ...
  43. Enter the connection settings for the server you want to migrate e-mail from. These settings will persist between migration ...
  44. Enter the delivery status notification (DSN) codes that are monitored for internal senders. NDRs with these DSN codes will ...
  45. Enter the IP addresses for servers deployed in the perimeter and the range of IP addresses for your organization. These IP ...
  46. Enter the paths to the database and transaction log files, for example C:\Databases\DB1.edb and C:\Logs. You can also enter ...
  47. Enterprise Admins' does not have 'Read' permission of folder '{3}' on server {2}. This will cause clients fail to download ...
  48. Entry '%1' has invalid or expired e-mail certificates. These certificates will not be included in the offline address list ...
  49. Entry '%1' has invalid or expired e-mail certificates. These certificates will not be included in the offline address list ...
  50. Enumeration of %1 entries for the ACL of folder %2 in database "%3" failed with error %5, and took an abnormally long time ...
  51. Enumeration of %1 entries for the ACL of folder %2 in database "%3" failed with error %5, and took an abnormally long time ...
  52. Error "%1" while loading assembly "%2". Stack Trace:%3. The event is logged because the Microsoft Exchange Autodiscover service ...
  53. Error "%1" while loading assembly "%2". Stack Trace:%3. The event is logged because the Microsoft Exchange Autodiscover service ...
  54. Error "%1" while loading assembly "%2". Stack Trace:%3. The event is logged when Autodiscover is unable to find an assembly ...
  55. Error "%1" while loading assembly "%2". Stack Trace:%3. The event is logged when Autodiscover is unable to find an assembly ...
  56. Error "%1" while loading assembly "%2". Stack Trace:%3. The event is logged when Autodiscover is unable to load an assembly ...
  57. Error "%1" while loading assembly "%2". Stack Trace:%3. The event is logged when Autodiscover is unable to load an assembly ...
  58. Error "%1" while loading assembly "%2". Stack Trace:%3. The event is logged when the Autodiscover provider is unable to load ...
  59. Error "%1" while loading assembly "%2". Stack Trace:%3. The event is logged when the Autodiscover provider is unable to load ...
  60. Error "%1" while loading assembly "%2". Stack Trace:%3. This event is logged when the loader that Autodiscover is using to ...
  61. Error "%1" while loading assembly "%2". Stack Trace:%3. This event is logged when the loader that Autodiscover is using to ...
  62. Error "%1" while loading the assembly "%2". Stack Trace:%3. This error may occur because the provider file is corrupt, is ...
  63. Error "%1" while loading the assembly "%2". Stack Trace:%3. This error may occur because the provider file is corrupt, is ...
  64. Error %1 occurred while attempting to enable the "Generate Security Audits" privilege during Microsoft Exchange Information ...
  65. Error %1 occurred while attempting to enable the "Generate Security Audits" privilege during Microsoft Exchange Information ...
  66. Error %1 occurred while logging an event related to an outgoing replication message that resulted in a non-delivery report. ...
  67. Error %1 occurred while logging an event related to an outgoing replication message that resulted in a non-delivery report. ...
  68. Error %2 occurred while synchronizing the Active Directory with the public folder store "%3" where folder %1 is located. ...
  69. Error %3 while disabling rule on public folder with rule ID %2. The folder ID of the public folder is in the data section ...
  70. Error %3 while disabling rule on public folder with rule ID %2. The folder ID of the public folder is in the data section ...
  71. Error %5 occurred while opening a newly-created logfile %4. For more information, click http://www.microsoft.com/contentredirect.asp. ...
  72. Error %5 occurred while opening a newly-created logfile %4. For more information, click http://www.microsoft.com/contentredirect.asp. ...
  73. Error (%4) during backup of a database (file %5). The database will be unable to restore. For more information, click ht ...
  74. Error (%4) during backup of a database (file %5). The database will be unable to restore. For more information, click ht ...
  75. Error (%4) occured during database headers update with the backup information. For more information, click http://www.mi ...