Voorbeelden van het gebruik van User or computer in het Engels en hun vertalingen in het Nederlands
{-}
-
Colloquial
-
Official
-
Ecclesiastic
-
Medicine
-
Financial
-
Computer
-
Ecclesiastic
-
Official/political
-
Programming
Authenticate the identity of a user or computer.
If the user or computer inherited membership,
Open the Certificate snap-in for a user or computer.
If a user or computer is not a member of an OU, but is a member of a security group that is a member of the OU, the user or computer is not a member of the OU.
Create a new data source name for the user or computer.
If a user or computer appears under both Authorized and Excepted, the exception takes priority, and the network traffic from that user or computer is not subject to this rule.
Delete and recreate a data source name for the user or computer.
After the RODC receives a user or computer logon request, it attempts to replicate the credentials for that account from a writable domain controller that runs Windows Server 2008 or Windows Server 2008 R2.
Audit actions performed using the user or computer account.
then the settings in the preference item are not applied to the user or computer.
During the authorization process, NPS determines whether the user or computer is allowed to access the network.
it can provide you with important information regarding the history of a user or computer.
During the authentication process, NPS verifies the identity of the user or computer that is connecting to the network.
the policy setting is not within scope of the user or computer.
the targeting item returns true only if the user or computer is a direct member of the specified OU.
removes a policy setting when it is no longer within scope of the user or computer.
it allows the preference item to be applied only if the user or computer is a not member of the OU specified in the targeting item.
Makes it easier to determine which instance of the application applies to the user or computer.
The preference extension applies this setting's value to the user or computer.
The preference extension does not apply this setting's value to the user or computer.
The lastLogonTimestamp attribute will be updated with the last logon time of the user or computer.
You are effectively stating that network traffic that matches this rule is allowed because it is authenticated as coming from an authorized and trusted user or computer.
also known as"background refresh," occurs every 90 to 120 minutes to apply new Group Policy settings to the user or computer.
so the preference extension applies the results of the preference item to the user or computer only once.
NPS immediately sends an Access-Accept message to the RADIUS client and the user or computer is granted network access.
Delete and re-create scheduled tasks for users or computers.
This description is visible for users or computers to which this preference item is applied.
Deploy printer connections to users or computers as needed.
Using Group Policy to deploy printer connections to users or computers.
Remove a scheduled task for users or computers.