End-user Access
Customizing Error Messages
5-57
checkSoftwareNotAllowed.String.3
Do not specify the HKEY_LOCAL_MACHINE\SOFTWARE
registry key.,
checkSoftwareNotAllowed.String.4
The following software is not allowed: %s. Uninstall the
software listed. Also, remove any file types listed by double-
clicking My Computer>>select Tools>>Folder Options>>File
Types and remove the file type mentioned.,
checkSoftwareNotAllowed.String.5
%s, # placeholder for link location for each software
package.
checkSoftwareRequired.String.1
Could not import the re module required by this test.,
checkSoftwareRequired.String.2
All required software is installed.,
checkSoftwareRequired.String.3
The required software was not found: %s.,
checkSoftwareRequired.String.4
%s, # placeholder for link location for each software
package.
checkUniqueId.String.1
An unsupported operating system was encountered.,
checkUniqueId.String.2
Could not determine unique ID,
checkWindowsSecurityPolicy.String.1
All Windows security policies are acceptable.,
checkWindowsSecurityPolicy.String.2
An unsupported operating system was encountered.,
checkWindowsSecurityPolicy.String.3
The OS is not relevant to this test.,
checkWindowsSecurityPolicy.String.4
The security setting required parameter '%s' is invalid,
checkWindowsSecurityPolicy.String.5
The following Windows security policies are configured
incorrectly: %s. Set the Windows security policies by
selecting Start>>Control Panel>>Administrative
Tools>>Local Security Policy>>Local Policy>>Security
Options>>double-click the policy and select enable or
disable.,
checkWindowsStartupRegistryEntriesAllowed.String.1
All Windows startup registry entries are acceptable.,
checkWindowsStartupRegistryEntriesAllowed.String.2
The following Windows startup registry entries are not
allowed in the
HKEY_LOCAL_MACHINE>>Software>>Microsoft>>Windo
ws Run and RunOnce registry keys: %s. Contact your
network administrator for removal of these items from the
registry.,
checkWormsVirusesAndTrojans.String.1
No worms, viruses or trojans were found.,
Test name
Description
Table 5-1.
Default Test Names and Descriptions (cont.)
Содержание ProCurve NAC 800
Страница 1: ...HP ProCurve Network Access Controller 800 Users Guide ...
Страница 2: ......
Страница 3: ...ProCurve Network Access Controller 800 Release 1 1 Users Guide ...
Страница 32: ...Introduction Technical Support 1 14 Technical Support Technical support is available through www procurve com ...
Страница 43: ...2 1 2 Clusters and Servers Chapter Contents Overview 2 2 Installation Examples 2 3 ...
Страница 71: ...System Configuration Management Server 3 23 Figure 3 9 System Configuration Management Server ...
Страница 80: ...System Configuration User Accounts 3 32 Figure 3 12 System Configuration User Accounts ...
Страница 88: ...System Configuration User Roles 3 40 Figure 3 16 System Configuration User Roles ...
Страница 100: ...System Configuration Quarantining General 3 52 1 Select a cluster Figure 3 23 System Configuration Quarantining ...
Страница 171: ...System Configuration Cluster Setting Defaults 3 123 Figure 3 55 System Configuration Agentless Credentials ...
Страница 180: ... This page intentionally left blank ...
Страница 208: ... This page intentionally left blank ...
Страница 234: ...End user Access Mac OS X Endpoint Settings 5 26 Figure 5 14 Mac System Preferences ...
Страница 288: ... This page intentionally left blank ...
Страница 302: ... This page intentionally left blank ...
Страница 303: ...8 1 8 High Availability and Load Balancing Chapter Contents High Availability 8 2 Load Balancing 8 6 ...
Страница 306: ...High Availability and Load Balancing High Availability 8 4 Figure 8 2 DHCP Installation ...
Страница 307: ...High Availability and Load Balancing High Availability 8 5 Figure 8 3 802 1X Installation ...
Страница 309: ...9 1 9 Inline Quarantine Method Chapter Contents Inline 9 2 ...
Страница 312: ... This page intentionally left blank ...
Страница 315: ...DHCP Quarantine Method Overview 10 3 Figure 10 1 DHCP Installation ...
Страница 318: ... This page intentionally left blank ...
Страница 323: ...802 1X Quarantine Method NAC 800 and 802 1X 11 5 Figure 11 2 NAC 800 802 1X Enforcement ...
Страница 324: ...802 1X Quarantine Method NAC 800 and 802 1X 11 6 Figure 11 3 802 1X Communications ...
Страница 380: ... This page intentionally left blank ...
Страница 418: ... This page intentionally left blank ...
Страница 425: ...Reports Viewing Report Details 14 7 Figure 14 3 Test Details Report ...
Страница 459: ...System Administration Creating and Replacing SSL Certificates 15 31 10 Save and exit the file ...
Страница 468: ... This page intentionally left blank ...
Страница 480: ... This page intentionally left blank ...
Страница 526: ...Tests Help Security Settings Windows B 34 http www pcworld com article id 112138 article html ...
Страница 532: ... This page intentionally left blank ...
Страница 535: ...Important Browser Settings Pop up Windows C 3 1 Clear the Block Popup Windows check box 2 Close the Content window ...
Страница 562: ... This page intentionally left blank ...
Страница 590: ... This page intentionally left blank ...