Примеры использования Protected computers на Английском языке и их переводы на Русский язык
{-}
-
Colloquial
-
Official
Kaspersky Embedded Systems Security(one of the protected computers) Scheme 2.
You can filter protected computers names by alphabet by clicking Filter.
Generate rules list for devices trusted in the protected computers network.
After selecting the protected computers that you want to add to the DPM server, click Next.
Evaluate and optimize the performance of the DPM server and the protected computers.
Verify that your network infrastructure,the DPM server, and the protected computers meet the system requirements for protecting your data.
Kaspersky Embedded Systems Security will obtain updates via one of the protected computers.
Updating via one of the protected computers To configure Kaspersky Embedded Systems Security updates via one of the protected computers.
However, this option adds to the CPU load on both the DPM server and the protected computers.
The data is collected per protected computer and aggregated for all protected computers, or it is collected per protection group and aggregated for all protection groups.
Does the Storage Pool Details table include disk usage for protected computers?
The first page of the report, the summary page, shows recovery statistics for all protected computers or protection groups at a protected computer or protection group level, as specified in the report parameters.
DPM relies on synchronization to keep replicas synchronized with the data on the protected computers.
A policy applies all specified settings to all protected computers in one administration group.
Add and remove disks and tapes; install, update, and uninstall agents; perform routine maintenance tasks; andmanage network configuration changes that affect the DPM server and the protected computers.
You can use this report to identify the costs associated with backup for various protected computers plus identify trends in disk usage to plan for capacity.
For existing protection groups or protected computers, the Disk Utilization Report does not display the current information for replicas that were removed, added, or removed from protection on the day that the report is generated.
Storing of the personal information obtained from the User in encrypted form, at protected computers secured from unauthorized access.
The Select Agent Deployment Method page of the Protection Agent Installation Wizard guides you through the process of installing protection agents on your computers that you want to protect or adding protected computers to the DPM server.
The first page of the report, the summary page, shows disk utilization statistics for all protected computers or protection groups at a protected computer or protection group level, as specified in the report parameters.
Use the Select computers page of the Protection Agent Installation Wizard to select the protected computers you want to add to the DPM server.
Expand the group containing the protected computer and select the Client computers node.
To save the file being restored on the protected computer, select one of the following options.
Local tasks are executed only on the protected computer for which they are created.
To uninstall a protection agent, the protected computer must be connected to the network.
Select the protected computer with the protection agent that you want to uninstall.
Reinstall the previous protection agent on the protected computer by using the DPM Administrator Console.
To copy data files from a protected computer to the DPM server.
On the Protected Computer tab, enter a value in the Space Allocated box.
The questions of the building protected computer systems on base SELinux are considered.