Примеры использования Protected computer на Английском языке и их переводы на Русский язык
{-}
-
Colloquial
-
Official
Verify COM permissions on the protected computer.
On the Protected Computer tab, enter a value in the Space Allocated box.
Copy updates to the selected protected computer.
Select the protected computer with the protection agent that you want to uninstall.
Url=/home/bases/- a directory on the protected computer.
The questions of the building protected computer systems on base SELinux are considered.
Uninstall the updated protection agent from the protected computer.
To copy data files from a protected computer to the DPM server.
These changes may indicate a security breach on the protected computer.
To uninstall a protection agent, the protected computer must be connected to the network.
These changes may indicate a security breach on the protected computer.
To save the file being restored on the protected computer, select one of the following options.
Changing the file location of protected items on a protected computer.
Expand the group containing the protected computer and select the Client computers node.
Kaspersky Embedded Systems Security Console will be connected to a protected computer.
Local tasks are executed only on the protected computer for which they are created.
Allows the DPM server to browse the shares, volumes,and folders on the protected computer.
Reinstall the previous protection agent on the protected computer by using the DPM Administrator Console.
The Restore to folder is used for storing restored objects on the protected computer.
The selected user must be registered on the protected computer or in the same domain as this computer. .
Embedded Systems Security to process an attempt to start applications on the protected computer.
If you use the protected computer only as a SAMBA server, you can specify the value SambaOnly.
This reduces the performance load on the protected computer significantly.
The Security Event Log contains information about events that associated with security breaches orattempted security breaches on the protected computer.
You can group alerts by protection group, protected computer, severity, or status.
Using the Application settings dialog box you can perform remote management of Kaspersky Endpoint Security orconfigure it on the selected protected computer.
Transfers the change journal from the protected computer to the DPM server to enable DPM to synchronize the replica.
You can configure scanning of removable drives connected to the protected computer via the USB port.
If the Console has been started on the protected computer, the Console window opens see section"Kaspersky Embedded Systems Security Console window interface" on page 18.
I know that you have cracked into some of the most complex and protected computer systems in the world.