Avanquest Acronis True Image Echo Workstation Guía de usuario Pagina 45

  • Descarga
  • Añadir a mis manuales
  • Imprimir
  • Pagina
    / 157
  • Tabla de contenidos
  • MARCADORES
  • Valorado. / 5. Basado en revisión del cliente
Vista de pagina 44
45 Copyright © Acronis, Inc., 2000-2009
for computers in the following domain” fields. If you do not remember the correct IP or
you want to expand the search results to several computers, you can use the IP masks.
To define the range of necessary digits, for example, 192.168.1.12 - 192.168.1.19, the IP
mask has to include patterns as in 192.168.1.[12-19]. If you use several masks, for
example for the 192.168.2.12 - 192.168.5.25 range, you have to separate them with the
vertical line as in 192.168.2.[12-255]|192.168.[3-4].*|192.168.5.[0-25].
In this window you can also:
1. Filter out from the list offline, inaccessible or unmanaged computers or filter out
online computers to see those that cannot be managed (use buttons in the Filter group).
2. Import computers into the group server in case they are not discovered
automatically due to network behavior. It makes sense to install Acronis components on
these computers first so that you will be able to create tasks for these computers.
To add a single computer:
click Add on the toolbar
type in the computer name or IP address.
To add computers from Active directory:
click Add on the toolbar
type in the exact domain names
or otherwise type in the name of the domain controller and when the active directory is
expanded, tick off the desired computers or the entire directory.
To add multiple computers from a file:
prepare a .txt or .csv file, listing semicolon-separated computers names and IP
addresses as follows: Name1; IP1; Name2; IP2;…
click Add on the toolbar
specify path to the above file.
3. Export computers from the group server to a .txt or .csv file that can be used by
other application or new versions of Acronis Group Server. To do so:
click Export on the toolbar
specify name of the file and a path to a folder where you want to create it.
4. Set and test credentials for access to each computer. To do so, select the computer,
then select on the sidebar Computer details -> Credentials: Set, type username and
password and click Test connection. The program will display the test result. Key icons
for successfully tested connections are colored gold.
5. Set (or change) the MAC address for each computer. To do so, select the computer,
then select on the sidebar Computer details -> MAC address: Set or Change and type
the hex MAC address as XXXXXXXXXXXX or XX-XX-XX-XX-XX. The program will test the
MAC address for validity and display the test result.
6. Hide computers that you do not wish to browse or make a hidden computer visible. To
hide a computer, select it, then select on the sidebar C
omputer details -> Visibility:
Hide. To make a hidden computer visible (and monitored), enable Show hidden
computers in the Filter group, select the hidden computer, then select on the sidebar
Computer details -> Visibility: Unhide.
Vista de pagina 44
1 2 ... 40 41 42 43 44 45 46 47 48 49 50 ... 156 157

Comentarios a estos manuales

Sin comentarios