![]() However, you can use the Policy selection ( ) to view device-specific configuration changes to be deployed.īy selecting the device check box, all the changes for the device, which are listed under the device, are pushed for deployment. Search-Search for the device name, type, domain, group, or status in the search box.Identify and choose the devices on which you want to deploy configuration changes. For more information, see Deployment Status. The Status column provides the status for each deployment. For more information, see Deployment Preview. The Preview column allows you to preview the changes for the next deployment. The Last Modified Time column specifies when you last made the configuration changes. ![]() ![]() If the entry is blank in this column for a device, then it indicates that there will be no traffic inspection interruptions on that device during deployment. See Restart Warnings for the Threat Defense Devices for information to help you identify configurations that interrupt traffic inspection and might interrupt traffic when deployed to the threat Interruption may be caused in the device during deployment. The Inspect Interruption column indicates if traffic inspection Usernames are not provided for deleted policies and objects.
0 Comments
Leave a Reply. |
AuthorWrite something about yourself. No need to be fancy, just an overview. ArchivesCategories |