Examples of using Replication protection in English and their translations into Russian
{-}
-
Official
-
Colloquial
You can enable and disable replication protection as required.
REPLICATION PROTECTION MODE Kaspersky Anti-Virus can filter objects attached to documents see section"Attachment filtering algorithm" on page 19.
During scanning the following replication protection settings are used.
TESTING REPLICATION PROTECTION We recommend testing the ability of Kaspersky Anti-Virus to detect viruses in the text of Rich Text and MIME documents, in document attachments and in embedded OLE objects.
To configure the settings of attachment filtering in replication protection mode.
You can view replication protection statistics and messages sent to administrators.
The application then performs the action selected in the replication protection settings for such objects.
The tab is used to configure replication protection for servers contained in the profile see section"Replication protection" on page 57.
Server protection consistsof the following components: mail protection, replication protection, and database scanning see figure below.
ENABLING AND DISABLING REPLICATION PROTECTION Replication protection is enabled by default and starts automatically when the Lotus Domino server is launched.
Actions to be taken by the application are defined separately for each status of the object in the mail protection, replication protection and database scanning settings.
On the control panel, open the Mail protection, Replication protection or Database scanning tab and select the Actions tab.
The settings for notifications about infected, potentially infected, protected, ornot scanned objects are configured for each status individually in the mail protection, replication protection and database scanning settings.
On the control panel, open the Mail protection, Replication protection or Database scanning tab and select the General tab see figure below.
Replication protection(see page 53) This section describes how to enable or disable replication protection, how to select replication objects for scanning, how to configure filtering of attachments, and how to configure the processing of replication objects after an anti-virus scan.
The attachment filter settings are configured in the mail protection, replication protection and database scan settings for each protection component individually.
ACTIONS OBJECTS IN REPLICATION PROTECTION MODE Kaspersky Anti-Virus processes objects in accordance with their assigned status following anti-virus scanning and filtering of attachments see section"Processing objects and taking actions on them" on page 21.
Server protection comprises the following components:mail protection(see page 48), replication protection(see page 53), and database scan(see page 57) see figure below.
SELECTING REPLICATION PROTECTION OBJECTS If anti-virus replication protection is enabled, Kaspersky Anti-Virus scans the content of the Rich Text and MIME fields in the modified document, attached files in any format, and embedded OLE objects by default.
Uninfected objects are returned without any modifications to the Lotus Domino server databases(the replication protection and database scan components) or to the Lotus Domino mail system the mail protection component.
After filtering, objects are processed according to status labels assigned to them during filtering: objects are subjected to actions(see section"Processing objects and taking actions on them" on page 21)configured for objects with the relevant status in the mail protection, replication protection, or database scan settings.
The templates of notification emails are specified in the replication protection settings(see section"Actions on objects in replication protection mode" on page 55) and database scan settings see section"Actions on objects in database scanning mode" on page 60.
After filtering, objects are processed according to status labels assigned to them during filtering: actions are applied to objects(see section"Processing objects and applying actions to them" on page 19)based on their assigned statuses according to the actions specified in the mail protection, replication protection, or database scan settings.
ID authentication, data replication authentication and password protection.
This edition includes vMotion, High Availability,Data Protection and Replication, Hot Add, Fault Tolerance, Storage vMotion, Virtual Volumes and Storage-Policy Based Management.
This edition includes vMotion, High Availability,Data Protection and Replication, Hot Add, Fault Tolerance, Storage vMotion, Virtual Volumes, Storage-Policy Based Management, Host Profiles, Auto Deploy, Distributed Switch and vSphere Integrated Containers.
Protection against reverse engineering and software replication when partners or customers use your software.
Data protection against disasters is implemented by asynchronous replication between two or more EMC Centera systems.
Telomeres are regions of repetitive DNA at the end of a chromosome,which provide protection from chromosomal deterioration during DNA replication.
The connections of every node are duplicated. Data protection against disasters is implemented by asynchronous replication between two or more EMC Centera systems.