You can now configure or analyze your computer by using the security settings in this database.
To Configure Your Computer
NOTE: After configuration is complete, you must perform an analysis to view the information in your database
- Right-click the Security Configuration and Analysis scope item
- Select Configure Computer Now
- In the dialog, type the name of the log file you wish to view, and then click OK
To Analyze Your Computer Security Settings
- Right-click the Security Configuration and Analysis scope item
- Select Analyze Computer Now
- In the dialog, type the log file path, and then click OK
NOTE: To view the log file created during a configuration or analysis, select View Log File on the Security Configuration and Analysis context menu.
You can map UNIX identities to Windows identities by including UNIX identity data in a directory service, such as Active ...
You can modify the number of virtual processors based on the number of processors on the physical computer. You can also ...
You can move an item quickly in front of or behind others. To do this, click the item, click the Layout menu, and then click ...
You can never change the UserName parameter for the primary Microsoft account on the device. For any other account, you can't ...
You can now configure or analyze your computer by using the security settings in this database. To Configure Your Computer ...
You can only begin receiving data on a PSJobProxy instance when it has been created with data streaming disabled. This operation ...
You can only extend the volume to the available space shown below because your disk cannot be converted to dynamic or the ...
You can only have one wired connection on the touchscreen at the same time. To switch between them, use the Task view button ...
You can only read and copy files from the BitLocker To Go Reader. To save or change files on your drive, insert it into a ...