Examples of using Managed computer in English and their translations into German
{-}
-
Colloquial
-
Official
-
Ecclesiastic
-
Medicine
-
Financial
-
Ecclesiastic
-
Political
-
Computer
-
Programming
-
Official/political
-
Political
Detailed information for each managed computer.
Initially, managed computers are placed in a default group, called Not Grouped.
Statistical data regarding all or groups of managed computers.
Visualize the entire network managed computers, unprotected computers detected in the network.
Wakeup, shutdown, reboot or reinstall managed computers.
To create a new sub-group in the Managed Computers group or in a custom group, follow these steps.
Security for Endpoints stores the quarantined files on each managed computer.
For example, you can choose to view only the managed computers with issues and using a specified policy.
Encrypts files uploaded to cloud storage services from managed computers.
You can organize managed computers by creating specific groups according to the structure of your organization.
In the Configuration window select: Events on managed computers, Antivirus detection.
The computer details screen for mobile devicesis different from the Computer details screen for managed computers.
The master server does not have its own managed computers, but it indirectly manages those of its slave servers by assigning policies and tasks to them.
Clients overview list now shows current progress of running jobs on each managed computer.
You will not be able to access the managed computers if the addresses of the old and new Administration Servers will not be the same.
Display of the progress of distribution of user application categories on managed computers has been implemented.
The Software requires a component installed on managed computer, which enables transfer of information between managed computer and remote management software.
You can use the status icons to filter clients by the severity of issues detected red for errors, yellow for warnings, green for notices,and gray for un managed computers.
If there isn't any placeholder with the same name,the computer will be paired to the first found managed computer(alert or check icon) located anywhere in ERA tree.
When you have a policy in place and decide to removeit later on, the resulting configuration of the client computers will depend on the version of installed ESET security product on the managed computers.
The idea is that wheneverERA Agent is reinstalled on an already managed computer, it would be automatically paired and thus correctly placed into ERA without your intervention.
Management of ESET Security products requires and locally stores information such as seat ID and name, product name, license information, activation and expiration information,hardware and software information concerning managed computer with ESET Security product installed.
For each new query,Cloud Security Console divides the managed computers space into visibility areas and then designates one Endpoint Client in each area to perform the task.
Management of ESET Security products requires and locally stores information such as seat ID and name, product name, license information, activation and expiration information,hardware and software information concerning managed computer with ESET Security product installed.
Permissions can bechanged by adding a user to the Administrators group on the managed computer or by authorizing users or groups in WMI and setting their permission level.
After removing a computer from the Managed computers folder, Kaspersky Endpoint Security 10 for Mac continues to perform local tasks and group tasks for computers not included into administration groups, which were created for this computer. .
We recommend that you EnableAudit Mode for a short period on a new managed computer so that you can exclude legitimate applications that are detected as ransomware based on their behavior false positives.
Network Profile Manager Lite- Manage computer proxy settings based upon the availability of your networks.
The MSc in Computer Networking program provides the knowledge needed to design,implement and manage computer communications systems.