Security scopes in Configuration Manager 2012 support role-based administrative control for sets of securable objects in the hierarchy. You can use security scopes to restrict the objects that administrative users can view and modify.
Secondary site server has insufficient disk space to continue - check SMS_BOOTSTRAP.log in the root of the secondary site ...
Secondary sites are useful to control bandwidth across slow network connections but cannot have child sites and cannot be ...
Securable objects are associated with this/these scope/scopes. If you do not associate another administrative user with this/these ...
Security scopes in Configuration Manager 2012 support role-based administrative control for sets of securable objects in ...
Security scopes in Configuration Manager 2012 support role-based administrative control for sets of securable objects in ...
Select a collection to use as a limiting collection. The limiting collection establishes the resources that you can add to ...
Select a comma-separated values (CSV) file that contains user and device affinity mappings. Each user and device that is ...
Select a network interface to specify network settings. If you do not specify settings for the network interface, Dynamic ...
Select a platform and then click Add to specify a file that contains a VPN profile for that platform. You can add one file ...