You can now configure or analyze your computer by using the security settings in this database.
To Configure Your Computer
NOTE: After configuration is complete, you must perform an analysis to view the information in your database
- Right-click the Security Configuration and Analysis scope item
- Select Configure Computer Now
- In the dialog, type the name of the log file you wish to view, and then click OK
To Analyze Your Computer Security Settings
- Right-click the Security Configuration and Analysis scope item
- Select Analyze Computer Now
- In the dialog, type the log file path, and then click OK
NOTE: To view the log file created during a configuration or analysis, select View Log File on the Security Configuration and Analysis context menu.
You can move an item quickly in front of or behind others. To do this, click the item, click the Layout menu, and then click ...
You can name your computer based on its owner or location, for example "DAVID" or "FAMILYROOM." The computer name below must ...
You can not send digitally signed mail using the certificate. This might be because it is not enabled for the purpose of ...
You can not sort the list while the Active Registrations are being downloaded from the server. Try after the Active Registrations ...
You can now configure or analyze your computer by using the security settings in this database. To Configure Your Computer ...
You can now connect to '%1'. You may continue working offline. To synchronize your offline changes on '%2' and begin working ...
You can now connect to the computers on the network. You may continue working offline. To synchronize your offline changes ...
You can only access ports properties on servers running Windows 2000 server family and servers running Windows Server 2003. ...
You can only save this log in .evt format on %s. If you want to save the log on %s, you must save it as a .txt or .csv file. ...