Examples of using Configuration changes in English and their translations into Russian
{-}
-
Official
-
Colloquial
Site setting requirements may have changed due to site hierarchy configuration changes or because of new features introduced by Configuration Manager 2007.
When a maintenance window is applied to the collection, configuration changes to collection member systems cannot normally be made outside of this timeframe through Configuration Manager.
To ensure that Server for NFS configuration changes are properly replicated,
Live modification, even most sophisticated configuration changes are applied without downtime
This will ensure that Server for NFS configuration changes will be replicated properly among the nodes of the cluster.
Solution: Verify that automatically created reverse lookup zones have been created for the server or that advanced configuration changes have not been previously made to the server.
Our testing shows that there are no configuration changes available that reliably prevent the behavior caused by Apple's Quick Look
You may want to delay starting the Web site if you must make other configuration changes, such as changes to authentication or authorization.
The network object created will be used by the application only after the configuration changes have been applied.
Firmware updates and configuration changes can be pushed across multiple APs simultaneously- at the push of a button.
The new order of priority of Kaspersky Anti-Virus policy rules will be used only after the configuration changes have been applied.
New Kaspersky Anti-Virus settings will be used only after the configuration changes have been applied.
Setting The Access Mode For MxEasy To protect a camera from unwanted configuration changes, select a Control Mode.
Easy access to screws to reduce changeover time by simplifying product configuration changes, with sleeve openings that allow immediate access for clean and reconfiguring screws.
replicas to mitigate the risks associated with application deployment and configuration changes by testing them in a secure and trusted, production-like environment.
you can track user attempts to perform fax operations and configuration changes, log on and off computers,
Firewall and Web proxy administrators to make configuration changes on firewalls and network devices required to support Internet-based connections.
performing erroneous configuration changes, deleting important files,