1 Cannot connect to admin$ share on target server with error: \n%1
2 Security Configuration Wizard
3 You must have administrator privileges on the selected local server. If your current user account does not have administrator privileges on the selected local server, click Cancel, rerun the wizard using Run As, and specify another account.
4 System Audit Policy
5 Determine an audit policy based on your auditing objectives.
6 To continue, click Next.
7 Processing security configuration database...
8 The wizard did not initialize.
9 Yes
10 Welcome
11 Welcome
12 You must have administrator privileges on the selected server. If your current user account does not have administrator privileges on the selected server, click Specify User Account below.
13 This wizard helps you create a security policy that you can apply to any server on your network. The security policy configures services and network security based on the server s role, as well as configures auditing and registry settings.
14 Finished
15 Finished subtitle.
16 Configuration Action
17 Rolling Back Security Configuration
18 The Security Configuration Wizard is rolling back the last applied security policy from the selected server.
19 SCW
20 Security Policy File Name
21 The security policy file will be saved with the name and description that you provide.
22 Description:
23 Security Policy (.xml)|*.xml|All Files|*.*||
24 %1 (%2)
25 Apply Security Policy
26 You can apply the security policy to the selected server now or later.
27 Applying Security Policy
28 The Security Configuration Wizard is applying the security policy to the selected server.
29 Select Server
30 The server that you select will be used to create a security policy that can be applied to that server or to any server with a similar configuration.
31 The Security Configuration Wizard cannot continue because it could not find a compatible version of the Microsoft XML Core Services file (msxml4.dll). To continue, install Microsoft XML Core Services file (msxml4.dll) version 4.10.9404.0 or later.
32 You can create a new security policy; edit or apply an existing security policy; or rollback the last applied security policy.
33 The selected security policy file cannot be found. Type in a different security policy file or click Browse to view the available files.
35 Select Server Roles
36 These server roles are used to enable services and open ports. A server can perform multiple roles.
37 Could not find %1. Try running the wizard again to regenerate the file.
38 Processing Security Configuration Database
39 The security configuration database contains information about roles and other features.
40 Select Client Features
41 Servers also act as clients. These client features are used to enable services. A server can support multiple client features.
42 Select Additional Services
43 There are services installed on the selected server that were found while processing the security configuration database.
44 Handling Unspecified Services
45 Unspecified services are services that are not installed on the selected server and not listed in the security configuration database.
46 The selected file is not a valid security policy file. Type in a different security policy file or click Browse to view the available files.
50 These administration and other options are used to enable services and open ports.
51 Confirm Service Changes
52 Before continuing, confirm that the service changes resulting from your role and other feature selections are correct.
53 Used by:
54 Authentication Methods
55 You configured ports to request or require security. Indicate how to authenticate remote computers when negotiating IP Security.
56 Not available
57 Description:
58 Required services:
59 Current startup mode:
60 Policy startup mode:
61 Protocols:
62 The OS version of the selected server is not supported
63 You do not have administrator privileges on the selected server. Click Specify User Account to provide an administrator account on the selected server.
64 Reading XML file %1 failed.
65 If you cancel the Security Configuration Wizard, no changes will be made.\nAre you sure that you want to cancel the wizard?
66 Preparing...
67 Applying security policy...
68 By default, the policy file is saved on this computer at %1.
69 Cannot Process XML Data
70 Cannot Process Security Configuration Database
71 The Security Configuration Wizard cannot continue because the security configuration database processing failed.\n\nProblem: %1
72 Writing the security policy file %1 failed with error:\n
73 The Security Configuration Wizard cannot continue because the security policy could not be applied to the selected server.\n\nProblem: %1
74 Cannot Apply Security Policy
75 The Security Configuration Wizard cannot continue because the last applied security policy could not be rolled back successfully.\n\nProblem: %1
76 Cannot Rollback Last Applied Security Policy
77 Application complete
78 Rollback complete
79 For the Technology Preview, the log file (back_end.log) cannot be viewed on remote computers. In a default installation, this file can be found at %windir%\security\msscw\logs\back_end.log.
80 %1 already exists.\nDo you want to replace it?
81 Installation Problem Found
82 The Security Configuration Wizard cannot continue because the required registry information was not found on this computer. Please reinstall the wizard and try again.
83 This security policy is not valid or using a file format that is no longer supported. Recreate the policy using the current version of the Security Configuration Wizard.
84 Connect to %1
85 This feature is not supported in Windows 2000. To use other credentials on the selected server, cancel the wizard and restart it using RunAs.
86 The configuration of the server you select will be used as a baseline for this security policy.
87 The configuration of the server that you select will be used to edit the selected security policy.
88 The security policy will be applied to the server you select.
89 The server that you select will be evaluated for compliance with the selected security policy.
90 The most recently applied security policy will be removed from the server you select.
91 Select a server to use as a baseline for this security policy. You can apply this policy to the selected server or to any other server with a similar configuration.
92 Select the server that was used as a baseline for this security policy. You can apply this policy to the selected server or to any server on your network with a similar configuration.
93 Select the server to which you want to apply the security policy.
94 Select the server to evaluate for compliance with the security policy.
95 Select the server from which you want to rollback the most recently applied security policy.
96 The selected server must have the Security Configuration Wizard installed before you can continue.\nInstall the wizard on the selected server and try again.
97 Require SMB Security Signatures
98 The following information determines whether Server Message Block (SMB) security signatures are enabled or required.
99 Outbound Authentication Methods
100 The following information is used to determine the LAN Manager authentication level used when making outbound connections.
101 Outbound Authentication using Domain Accounts
102 The following information is used to determine the LAN Manager authentication level used when making outbound connections.
103 Outbound Authentication using Local Accounts
104 The following information is used to determine the LAN Manager authentication level used when making outbound connections.
105 Inbound Authentication Methods
106 The following information is used to determine the inbound LAN Manager authentication level and whether LAN Manager hashes are stored.
107 Details:
108 Users with local accounts on the selected server need to connect from:
109 Users with accounts in this domain need to access member servers from:
110 Require LDAP Signing
111 The following information determines whether LDAP signing is required by the security policy.
112 All roles
113 Installed roles
114 Registry Settings Summary
115 Before continuing, confirm that your registry settings are correct.
116 Installed features
117 All options
118 Installed options
119 All features
120 Not Defined
121 Required roles:
122 Reading %1 failed with error:\n
123 Use this section to configure protocols used to communicate with other computers. When configured to communicate with computers running earlier versions of Windows, these protocols are vulnerable to exploits such as password cracking and man-in-the-middle attacks.
124 Answering these questions incorrectly might prevent computers running earlier versions of Windows from communicating with the selected server. If you do not know the characteristics of the computers that are communicating with the selected server, you should skip this section.
125 LAN Manager authentication
126 LAN Manager hashes
127 Setting
128 Registry Value
129 Current Data
130 Policy Data
131 Registry Key
132 Changed services
133 All services
134 Uninstalled roles
135 Selected roles
136 Uninstalled features
137 Selected features
138 Uninstalled options
139 Selected options
140 The selected server does not have a rollback file.\n\nProblem: %1
141 This option audits both successful changes and failed attempts to system and configuration files, allowing you to determine who changed system or configuration files, as well as detect attempts to make unauthorized changes. It will degrade system performance more than auditing just successful activities.
142 Audit Policy Summary
143 Before continuing, confirm that your auditing selections are correct.
144 Audit Event Type
145 Current Setting
146 Policy Setting
147 Use this section to configure auditing based on your auditing objectives. The auditing policy determines the success and failure events that are logged as well as the file system objects that are audited. Auditing file system objects can degrade system performance and can result in a large number of events generated.
148 System Events
149 Logon Events
150 Object Access
151 Privilege Use
152 Policy Change
153 Account Management
154 Process Tracking
155 Directory Service Access
156 Account Logon Events
157 Not audited
158 Success, failure
159 Success
160 Failure
161 Name
162 Description
163 The system cannot find the file: \n%1
164 Undefined
165 Manual
166 Automatic
167 Disabled
168 Ignored
169 Edge Trasversal
170 Protocol Number
171 Use this section to configure services based on the selected server s roles and other features. These roles and other features are also used to determine settings in other sections.
172 This option audits successful changes to system and configuration files, allowing you to reconstruct events after the fact to determine who changed system or configuration files. It will degrade system performance slightly.
173 %1 options
174 All Rules
175 Rules from Selected Roles
176 Rules Added by the User in SCW
177 Rules Auto-Generated by SCW
178 Rules with Additional Restrictions
179 Not Found!
180 Port %1 Restrictions
181 Open
182 Blocked
183 Network Security Rules
184 This page lists Windows Firewall rules that are needed for the roles and other options you have selected. Selected rules are enabled; rules that are not selected are disabled.
185 Confirm Rule Configuration
186 Before continuing, confirm that the Windows Firewall rule configuration resulting from your selections is correct.
187 Valid port numbers are between 1 and 65535. Type in a valid port number and try again.
188 Answering these questions incorrectly might disable desired functionality or enable undesired functionality. Before proceeding, make sure that you have thorough knowledge of the roles and other features performed by this server.
189 Use this section to save the policy you have created. You can apply it to the selected server now, or you can apply it to the selected server or other servers later.
190 This policy includes %1!d! security templates.
191 Protocol
192 Status
193 Security Options
194 Restrictions
195 Service
196 Current Startup Mode
197 Policy Startup Mode
198 Used By
199 Apply the selected security policy to the selected server.
200 Rollback Security Configuration
201 Roll back the last applied security policy from the selected server.
202 system32
203 Changed ports
204 The security policy you created is located at:
205 The security policy you just applied is located at:
206 The last applied security policy has been rolled back from the selected server.
207 IP Addresses and Subnets
208 Local Interface
209 DHCP
210 IP Address
211 IP address
212 Computer name
213 Subnet
214 Free form
215 Add IP Address or Subnet
216 Edit IP Address or Subnet
217 Add Rule (%1)
218 Edit Rule (%1)
219 Integrity requested with %1
220 No
221 Permit all traffic
222 Request signing
223 Require signing
224 An error with no description has occurred.
225 The system is low on memory. Close some programs, then click Retry.\nClick Cancel to attempt to continue.
226 Low Memory Error
227 The operation failed. (0x%1!08X!)
228 Require encryption
229 Request encryption
230 Path:
231 Accessed over %1 (%2)
232 Approved
233 [No path!]
234 [NOT FOUND!]
235 Ports used by
236 Cannot determine the IP address from the computer name. The lookup service is not available.
237 Cannot determine the IP address from the computer name. The given computer name was not found. Type in another name and try again.
238 [Security required]
239 [Security requested]
240 [Security requested/required]
241 [Local interface restrictions]
242 [Local/remote restrictions]
243 [Remote address restrictions]
244 The following input is not recognized as an IP address or subnet: %1\n\nEnter IP addresses using an X.X.X.X format and subnets using an X.X.X.X/Y.Y.Y.Y format, and try again.
245 Integrity required with %1
246 The specified port is already in the list
247 The specified application was not found on the selected server.
248 The specified application is already in the list.
249 Cannot add %1 because it is a system RPC application.
250 All approved applications must have a path. For each application in the list marked with "[No path!]", either edit the item to provide a valid path or remove the selection, then try again.
251 Executable Files (.exe)|*.exe|All Files|*.*||
252 You can provide either a port number or an approved application, but not both. Clear the data from the option that you do not intend to use and try again.
253 Remote Administration Options
254 Activate Named Pipe Firewall
255 [Local interface restrictions removed]
256 [Local(removed)/remote restrictions]
257 Port %1 supports only the Permit All Traffic security option, so the security option that you specified has been removed.
258 The IP address has been adjusted by the specified subnet mask.
259 The loopback address (127.0.0.1) is not a valid address.
261 A class E address (%1) is not allowed.
262 A multicast address (%1) is not allowed.
263 The subnet mask 255.255.255.255 is not allowed.
264 The subnet mask %1 is not valid for the specified IP address (%2).
265 The network portion of %1 must have a number greater than zero.
266 The host portion of %1 must have a number greater than zero.
267 The following input is not recognized as an IP address or subnet: %1\n\n%2
268 All IP addresses
269 Cannot add %1 because it is a system RPC application. Select the Ports used by system RPC applications option instead.
270 The given security policy file name is not valid. Type in a different file name.
271 Administrator Privileges Required
272 The Security Configuration Wizard requires administrator privileges on this server. Rerun the wizard using Run As and specify an administrator account.
273 The selected file is not a valid security policy file.
285 To change any of the above settings, go back to the previous pages and change the appropriate selections.
286 There is an existing IPsec policy that may be inconsistent with this policy. To change any of the above settings, go back to the previous pages and change the appropriate selections.
287 Application (%1) Restrictions
288 using inpass
289 Encryption required with %1
290 Encryption requested with %1
291 IPsec will be used to enforce the local interface restrictions defined for this port. Since IPsec is incompatible with dynamically assigned addresses, the DHCP assigned addresses must be explicitly reserved for the server. If not, you must convert to static IP addresses, remove the remote address restrictions, or remove the local interface restrictions.\n\nDo you want to fix the problem now by changing the port restrictions?
292 Use to author security policy based on server roles
293 Selected Object Restrictions
294 You cannot remove ports from this list unless they were added by a user. Port items added by the Security Configuration Wizard cannot be removed.
295 Remote (%1)
296 All approved applications must have a path.
297 Port
298 IP Address
299 Applying this security policy to the selected server\nwill require a reboot after the policy is applied. \nThis is required for the configured applications\nor services to run properly.
300 One or more applications were not found on the target server. It\nis recommended to edit these applications and add the correct system\nlocations. Do you want to continue without editing these applications?
301 Services
302 Applications
303 Short Name
304 Any
305 Custom
306 HOPOPT
307 ICMPv4
308 IGMP
309 TCP
310 UDP
311 RDP
312 IRTP
313 IPv6
314 GRE
315 ESP
316 AH
317 ICMPv6
318 PGM
319 IPv6 Route
320 IPv6 Fragment
321 IPv6 No Next
322 IPv6 Options
323 VRRP
324 L2TP
330 SystemRoot
331 ProgramFiles
332 Local Port
333 Remote Port
334 Program
335 Service
337 You must specify a name for the firewall rule
338 This is a predefined rule and some of its properties cannot be modified
339 The port list is not valid. Port numbers should be in the 0-65535 range and should be comma seperated.
340 Predefined set of computers
341 Firewall Rules
342 Roles
1098 Unable to add IP address (%1)
1301 Name:
1302 Description:
1303 Action:
1304 Direction:
1305 Program:
1306 Service:
1307 Protocol:
1308 Local Ports:
1309 Remote Ports:
1310 Local Addresses:
1311 Remote Addresses:
1312 Inbound
1313 Outbound
1314 Allow all connections
1315 Allow only secure connections
1316 Allow only secure connections + require encryption
1317 Block the connections
1318 Used By:
1319 All Ports
1320 Specific Ports
1321 Dynamic RPC
1322 RPC Endpoint Mapper
1323 Default Gateway
1324 WINS Servers
1325 DHCP Servers
1326 DNS Servers
1327 Local Subnet
1330 SCW failed to process the knowledge-base registration file: %1.
1331 SCW failed to parse the knowledge-base registration file: %1, reason: %2
1332 The knowledge-base registration file: %1 does not exist.
1333 \n" %1
1334 A specific role or task you selected for this server requires that Windows Firewall be disabled. In this scenario Network Security policy cannot be configured by the Security Configuration Wizard and must be skipped.\n\nThe wizard cannot configure network security for servers with the following roles:%1