Select a collection to use as a limiting collection. The limiting collection establishes the resources that you can add to this collection by using membership rules.
Secondary sites are useful to control bandwidth across slow network connections but cannot have child sites and cannot be ...
Securable objects are associated with this/these scope/scopes. If you do not associate another administrative user with this/these ...
Security scopes in Configuration Manager 2012 support role-based administrative control for sets of securable objects in ...
Security scopes in Configuration Manager 2012 support role-based administrative control for sets of securable objects in ...
Select a collection to use as a limiting collection. The limiting collection establishes the resources that you can add to ...
Select a comma-separated values (CSV) file that contains user and device affinity mappings. Each user and device that is ...
Select a network interface to specify network settings. If you do not specify settings for the network interface, Dynamic ...
Select a platform and then click Add to specify a file that contains a VPN profile for that platform. You can add one file ...
Select a previously saved deployment template that defines configuration settings for this deployment. Before you complete ...