All of the computers are specified in this list by their names
or IP addresses.
You have to select needed computers in the left list and then
move them to the right list by pressing the > button.
If you need to exclude some computers, select them in the right
list and then press the < button.
By using >> and
<< buttons, you can add and remove all available
computers at the same time (no need to select computers in the
list).
There are several flexible
ways to choose network computers from the left list:
Active Directory
- you browse Active Directory organizational units (OUs) and
select computers.
Computers - you browse
the network tree and select computers. This option is available
only for the monitoring.
From Database - you select
computers from the DeviceLock Enterprise Server database that shows
all computers from which the server has ever received audit and
shadow data. This option is available only for the reports.
LDAP - you browse
the LDAP (Lightweight Directory Access Protocol) tree and select
computers from the directory.
From File - you load a
predefined list of computers from the external text file and then
select the computers. To open an
external file, press the … button.
A text file must contain each
computer's name or IP address on separate lines and can be either
Unicode or non-Unicode.
Manual - you type
computer names manually to select the computers. Each computer's
name or IP address must be typed on a separate line.