英語 での Security policies の使用例とその 日本語 への翻訳
{-}
-
Colloquial
-
Ecclesiastic
-
Computer
-
Programming
If you have security policies that reference these resources, update those policies. .
The university security policies described above are not imaginary.
Site-by-site manually configured security policies expose entire enterprise to risk.
Allows easy enforcement of your security policies, controls access and tracks activities.
Secure: Sensitive data is secured in adherence with security policies and ensure regulatory compliance.
Whether it's for parental controls or enterprise management, creating central whitelists, rolling out security policies, customizing trusted users/groups, and more;
Add and remove users, instantly block access, and turn on basic security policies to control who has access to what.
External elements exploit an unsuspecting internal user's adherence to sound security policies to find their way in.
GPlus' s internal privacy and security policies are reviewed on a regular basis.
Security policies can be configured to inherently distrust unsigned drivers.
For this reason, origin-based security policies are sensitive to the IDNA algorithm employed by the user agent.
Many corporate and academic networks' security policies will block UDP 53, as it provides DNS.
We will also travel to Berlin to discuss how Central European issues continue to influence security policies worldwide.
In this document a framework for enterprises is provided by Mobileiron to proactively assess their mobile privacy, security policies and enforcement models.
The entity's security policies are established and periodically reviewed and approved by a designated individual or group.
Each of these companies uses this cookie information according to their own privacy and security policies.
This document provides a framework for enterprises to proactively assess their mobile privacy and security policies and enforcement models.
Default security policies prevent Internet or intranet applications from accessing files on the user's computer.
So, this speaks to a bigger picture here that certainly scares me in terms of our national security policies.
In the following example, security policies are defined to allow and deny traffic matching the following criteria.