Examples of using Selected server in English and their translations into Swedish
{-}
-
Colloquial
-
Official
-
Medicine
-
Ecclesiastic
-
Ecclesiastic
-
Official/political
-
Computer
-
Programming
-
Political
P2P is allowed on selected servers.
On the Fibre Channel Ports tab, select all the ports that you want to enable on the selected server.
End-to-end for selected servers.
On the iSCSI Initiator Adapters tab, select all the initiator adapters that you want to enable on the selected server.
They might also be installed on the selected server in the future.
On this page, information is gathered about the computers from which users might try to authenticate to the selected server.
No changes are made to the selected server until you apply the security policy.
Right now, we're offering 40% off on selected servers.
These are server roles that the selected server can perform without installing additional components.
Apply the security policy to servers other than the selected server.
SCW does not change the configuration of the selected server until you apply the security policy.
trusted domains of the selected server.
successful connection to the selected server, you will instantly gain access to your account.
The Security Configuration Wizard(SCW) helps you create a security policy based on the installed roles for the selected server.
On this page, you supply information about the selected server and the clients with which it communicates.
not installed on the selected server are disabled.
After login and successful connection to the selected server, you will instantly gain access to your account
Select“Edit“in the“Server” menu, choose the“Custom Attribute” tab and then double-click the attribute's value to assign a value to a selected server.
For the following services to be disabled, you must restart the selected server after applying the SCW policy.
All computers that the selected server connects to by using local accounts must have clocks that are synchronized with the selected server's clock.
Providing inaccurate information might disrupt communication between the selected server and other computers on the network.
To do so, SCW checks the selected server for installed roles to determine how to configure services
When you make this selection, you enter information about the computers used by the selected server to authenticate to other computers.
Open the authentication dialog for the selected server or share. The button is disabled if a workgroup
In the Role-Based Service Configuration section of the Security Configuration Wizard(SCW), you can configure services based on the roles and features of the selected server.
The selected server might perform roles that require installed services that are not found in the Security Configuration Database
decide if it needs to run for the selected server(or for other servers to which you intend to apply the policy) to perform as desired.
If the selected server has both a private and a public network address, a message box is displayed asking whether you are using a computer located in the private network of the selected server.
The Custom Options dialog is opened. You can set several custom options for the selected server or share. If no item
If you plan to install other server roles on the selected server or if you plan to apply this security policy to other computers that have slight differences in role configuration, in View,

