Examples of using Selected server in English and their translations into German
{-}
-
Colloquial
-
Official
-
Ecclesiastic
-
Medicine
-
Financial
-
Ecclesiastic
-
Political
-
Computer
-
Programming
-
Official/political
-
Political
Remove selected server from list.
ECA offers you a list of available targets on the selected server.
Information about the selected server certificate is also shown.
Apply the security policy to servers other than the selected server.
Scan Targets- displays resources on the selected server that are available for scanning.
People also translate
All ERA components will be upgraded to versions compatible with the selected server.
No changes are made to the selected server until you apply the security policy.
The selected server performs scheduled synchronization of data with all servers on the retail security system.
They might also be installed on the selected server in the future.
Depending on the selected server certificate an IP address and port number is detected by a DNS request.
At the metadata cleanup: prompt, type remove selected server, and then press ENTER.
On the iSCSI Initiator Adapters tab,select all the initiator adapters that you want to enable on the selected server.
Click Connect or double-click the selected server to go to DSM's login screen.
To remove a server from the pool,select the server and click the Remove Selected Server icon.
On this page, you supply information about the selected server and the clients with which it communicates.
On the Confirm Service Changes page, you can see a list of all changes that thissecurity policy would make to services on the selected server.
After login and successful connection to the selected server, you will instantly gain access to your account.
If Internet access is available and the app,the Add-In or both still indicate connectivity problems, the selected server may be down.
These are server roles that the selected server can perform without installing additional components.
This page provides a list of all of the changes that will be made to the audit policy on the selected server if you apply the policy.
The distribution furthermore offers selected server daemons and can easily be expanded to a SOHO server. .
Providing inaccurate information might disrupt communication between the selected server and other computers on the network.
Apply the security policy to the selected server after the selected server configuration has changed for example, if new software is installed.
When you make this selection, you enter information about the computers used by the selected server to authenticate to other computers.
All computers that the selected server connects to by using local accounts must have clocks that are synchronized with the selected server's clock.
The list compares the current startup mode of the service on the selected server to the startup mode defined in the policy.
If you plan to install other client features on the selected server or if you will apply this security policy to other computers that have slightly different role configurations, in View, click All features, and then select the appropriate client features.
By default, only the client features that the selected server can provide without installing additional components are displayed.
If you plan to install other server roles on the selected server or if you plan to apply this security policy to other computers that have slight differences in role configuration, in View, click All roles, and then select the appropriate server roles.
To enable the services that are necessary for the selected server to perform its installed server roles,select the appropriate server roles in the list.