Examples of using Configuration database in English and their translations into Russian
{-}
-
Official
-
Colloquial
Network node configuration database maintenance.
There are two approaches that you can use to maintain the configuration database.
Accepted SSH keys are stored in the configuration database to protect from MITM attack.
If you do not, those servers will be unable to decrypt the server key in the configuration database.
The disk's copy of the system's disk configuration database might be corrupted.
People also translate
Create a DNS alias(CNAME)record for the AD RMS cluster URL and a separate CNAME record for the computer that is hosting the AD RMS configuration database.
Deleting accounts from the configuration database.
Citect for DOS consisted of a configuration database(in dBase format), a bitmap(256 colour raw format) and an animation file.
Restore operations audit events will now adhere to global event retention rules to avoid overfilling the configuration database.
You can view all server roles in the Security Configuration Database by changing the view to All roles.
One of the configuration database tables is never cleaned up, which may cause user interface sluggishness after using the product for extended time.
If you choose this option, all services that are not in the Security Configuration Database or not installed on the selected server are disabled.
In the Welcome to the Security Configuration Wizard section of the Security Configuration Wizard(SCW), you can select which action to take for a security policy, select the server to use, andmanage the Security Configuration Database.
All the rights policy templates from the configuration database will be exported and overwrite the ones currently in this folder.
Configure the new AD RMS server(this will createa new single-server cluster) and use the same URL and configuration database as the retired AD RMS server.
Provides information about the configuration, database connectivity, and health of the WSUS server for the site.
The selected server might perform roles that require installed services that are not found in the Security Configuration Database and thus do not appear on any of the previous pages.
Additionally, Veeam Cloud Connect server configuration database migration is now fully supported by a configuration restore in Migration mode.
Type the name of the database server in the Database server box, choose the appropriate database server instance from the Select or enter database server instance box, type the name of the AD RMS configuration database in the Enter database name box, click Validate, and then click Next.
Configuration backup of very large configuration database fails with the“ Compressed or Uncompressed size, or offset exceeds the maximum value.
When you decommission, unprovision, and uninstall an AD RMS server, the server is removed from the ClusterServer table of the configuration database, and the directory services database is deleted from the database server.
Administrators can browse historical configuration database at any time and easily compare several configurations in a visual difference viewer.
When recovering a Windows SharePoint Services farm, DPM recovers the configuration database of the farm but does not display this recoverable item.
Configuration backup of very large configuration database fails with the“ Compressed or Uncompressed size, or offset exceeds the maximum value. Consider setting the UseZip64WhenSaving property on the ZipFile” error.
Significantly reduced load on SQL Server hosting the configuration database, and improved performance of various job activities and user interface operations.
When you delete a user account from AD DS, the configuration database entry in the user key table for the user's rights account certificate(RAC) is not automatically deleted.
You can write a script that deletes user keys from the configuration database when their associated SIDs no longer exist in AD DS and run it periodically.
Unspecified services are services that do not appear in the Security Configuration Database and are not currently installed on the selected server, but might be installed on other servers to which you want to apply the security policy.
By referencing these tags at animation points using other configuration databases, the user could show the state of equipment such as running, stopped or faulted in real-time.
If the security policy applies to services that are not found in the Security Configuration Database and instead were entered on the Select Additional Services or the Handling Unspecified Services pages of SCW, then the selected server must be restarted for the applied policy to take effect.