Примеры использования Protected data на Английском языке и их переводы на Русский язык
{-}
-
Official
-
Colloquial
Undelete Protected Data.
Choose whether to retain or delete protected data.
Undelete Protected Data.
Choose whether to retain or delete protected data.
Undelete Protected Data.
Люди также переводят
For FAT orFAT32 recovery for Mac, try Undelete Protected Data first.
Undelete Protected Data.
Thereafter, the replica is periodically synchronized with changes to the protected data.
To recover protected data for file servers.
To make an encrypted CD, I go to the Tools menu andchoose Write Protected Data to Disc/USB.
To recover protected data for desktop computers.
The Browse view displays the protected data as follows.
To recover protected data from an Exchange-based server.
Select the disk space required for the protected data on each client computer.
To recover protected data for computers running SQL Server.
Disk Drill includes such options as Undelete Protected Data, Quick Scan and Deep Scan.
To recover protected data for file servers using DPM Management Shell.
You can browse through the recovery points to find, select, andrecover previous versions of your protected data.
If you can't Undelete Protected Data, Quick Scan is your next best option.
Protected data is encrypted with the symmetric algorithm using a one-time key of the container symmetric encryption;
In the Protection task area, select the protected data and then locate the Replica path in the Details pane.
You can also schedule a daily consistency check during off-peak hours to ensure that the replica remains consistent with the protected data.
To recover protected data for a SQL Server database by using DPM Management Shell.
With DPM, protecting data is easy and recovering protected data is intuitive and fast.
When you select Delete protected data, tapes become free for use by other protection groups.
When you delete an active replica, you are also deleting all recovery points for the previously protected data and removing the associated member from the protection group.
As part of the synchronization process,a consistency check performs block-by-block verification to ensure that all the data on the replica is consistent with the protected data.
When you click an Exchange Server database in the Protected data pane in the wizard, DPM displays the mailboxes that belong to that database.
To delete protected data of any data source, you must remove inactive protection, which you can do by deleting the replica or expiring the data on the associated tapes.
You would be searching for unsaved Word and Excel documents among protected data if you had enabled these Disk Drill's features prior to data loss.