Примеры использования Remote computers на Английском языке и их переводы на Русский язык
{-}
-
Official
-
Colloquial
Kaspersky Endpoint Security uses the kernel level interceptor to intercept all other operations on files that are accessible on the protected computer including files on remote computers.
The key feature of centralized administration is the grouping of remote computers, which are managed by creating
Access remote computers on the go with the TeamViewer remote control apps for Android, iOS, Windows 10 Mobile,
the term"clients" includes not only client computers accessing clustered services and applications, but remote computers that you use to administer the cluster.
including directories on remote computers mounted using SMB/CIFS or NFS protocols.
VPN companies allow you to connect to remote computers outside of your own country's borders
Kaspersky Security 10.1 for Windows Server scans remote computers' calls to access files located in the shared network folders of the protected server.
select Skip this rule for connections from these computers to specify which remote computers are exceptions to this rule.
Start Run Programs on a local machine or remote computers.
Securely connect to remote computers, access files
The Anti-Cryptor task makes it possible to detect malicious encrypting of the network file resources of a protected server from remote computers on the corporate network.
it also protects remote computers that request secure access to a corporate network.
SCW allows administrators to define role-based security policies that can be applied to remote computers throughout an enterprise.
Members of the Administrators group have access to remote computers, but may not have access to all data.
they will not function for remote computers from a trusted zone.
that is, whether remote computers that are running Remote Desktop can connect to this computer. .
Procedures in this section describe how to perform BPA scans on roles installed on remote computers that are running Windows Server® 2008 R2.
Please note that you should have administrative access to remote computers to perform remote shutdown.
assign IPsec policies on this computer and remote computers.
select Skip this rule for connections to these computers to specify the remote computers that are exceptions to this rule.