Examples of using Administration console in English and their translations into French
{-}
-
Colloquial
-
Official
It is recommended to update the application in a sequence on all Security Servers and Administration Console deployed on the corporate network.
ADMINISTRATOR'S WORKSTATION Computers on which the Administration Console component is installed are referred to as administrator's workstations.
Use the Administration Console, a web application,
If this check box is selected, the Administration Console tree will display the nodes of slave
The websites developed by our web agency always have an administration console available on the internet from any computer.
The antivirus can be managed remotely, through a web administration console based on GLPI for log,
Terms Used in the Administration Console The Horizon Cloud Administration Console replaced the Enterprise Center,
If you want to connect the Administration Console to a Security Server deployed on a local computer,
If you want to connect the Administration Console to a Security Server deployed on a remote Microsoft Exchange Server,
The table below contains a list of Administration Console objects and the columns displayed for them in the standard view results pane.
the Security Server and Administration Console should be installed together on each server belonging to the DAG.
exit the Administration Console if it is started.
The administrator should have the following privileges in order for the Administration Console to work properly with the remote Security Servers and profiles.
To install and run the Administration Console on a server, you must have Microsoft.
Center, Administration Console shows the status, which is the most critical to the device security.
The Administration Console assigns the active status to the policy in effect for a group at any given time.
In the Administration Console, you can choose individual users
After installing Administration Console, you must connect to the Administration Server.
In the Administration Console tree, select the device to which you need to obtain access.
In the right hand side of the administration console window, select the List of folders for encryption policy.