Примеры использования Protected virtual на Английском языке и их переводы на Русский язык
{-}
-
Official
-
Colloquial
outbound traffic of the protected virtual machine transmitted via protocols of IM clients.
To be able to select an SVM to connect to, the protected virtual machine has to receive information about SVMs available on the network.
If you are using a licensing scheme based on the number of protected virtual machines, the type of additional key must match the guest operating system of the virtual machines.
Determines the parameters of operation of Light Agents installed on protected virtual machines with Windows guest operating systems.
start Light Agent on the protected virtual machine.
If a protected virtual machine is disabled
Total keys used as active for workstations- the number of protected virtual machines with a desktop operating system on which the key is used as an active key.
A policy defines the parameters of operation of Light Agents installed on protected virtual machines with Linux guest operating systems.
You can also start a Full Scan of all objects in the file system of the protected virtual machine.
outbound traffic of protected virtual machines and redirects them to the Network Attack Blocker component installed on the SVM.
The protected virtual machine selects an SVM to which an optimal connection can be established according to the SVM selection algorithm.
If you have chosen the Inactive policy option, the created policy is not applied on the protected virtual machines.
You can save the trace file that has been created to a different folder on the protected virtual machine.
If you choose the option of licensing by the number of protected virtual machines, the type of additional key must match the guest operating system of the virtual machines.
You can configure the SVM discovery settings that are used by the protected virtual machine see section"Configuring SVM discovery settings" on page 33.
Virus scan see section"Creating tasks to be performed on protected virtual machines" on page 114.
disables the generation of trace files on the protected virtual machine;
outbound traffic of protected virtual machines and redirects them to the Network threat detection component installed on the SVM.
If this option is selected, the protected virtual machine connects to the Integration Server to receive a list of SVMs available for connection
Turn on the protected virtual machine whose template was used to create the pool of temporary protected virtual machines.