英語 での The security policy の使用例とその 日本語 への翻訳
{-}
-
Colloquial
-
Ecclesiastic
-
Computer
-
Programming
Enhancing the Security Policy Base The government must cultivate the core personnel who are permanently responsible for security and crisis management to make the decision-making system truly function as intended.
On Windows, depending on the security policy of your system, a popup window titled"Windows protected your PC" may appear when trying to execute the batch files located in the bin folder.
The-E(preserve environment) option indicates to the security policy that the user wishes to preserve their existing environment variables.
It is also possible to change the security policy of your system to never show this popup, but we don't recommend this solution as this will apply to all programs executed on the machine, decreasing the whole security level of the machine.
Attack An assault on system security that derives from an intelligent threat, i.e., an intelligent act that is a deliberate attempt(especially in the sense of a method or technique) to evade security services and violate the security policy of a system.
As IDC pointed out in their Smart City: Secure by design report from last year,‘it is also about ensuring that all the parties involved in the city ecosystem management follow the security policy standards'.
Through the optional functions which the policy check of AdminITy(*2) is applied, the software prevents unauthorized access from PCs not complied with the Security Policy(*2)(below, the policy) specified for a web-based business system.
If an I/O logging plugin is configured or if the security policy explicitly requests it, a new pseudo-terminal(‘‘pty'') is created and a second sudo process is used to relay job control signals between the user's existing pty and the new pty the command is being run in.
Removes the data associated with the Avalanche payloads and also deletes the device from the Avalanche inventory. For Windows Phone 8.1 and Windows Embedded Handheld 8.1 devices, users receive a prompt that the security policy has been removed and they are no longer required to have a password to unlock the device.
In addition, Symantec Endpoint Protection Manager installation and configuration checks the security policies for the required rights to allow the virtual service accounts to run correctly.
They shall immediately notify VisitKoreaforme of any leakage or unauthorized use of their IDs and passwords, and fully comply with the security policies of VisitKoreaforme.
Prior to KEPServerEX Version 6, the Security Policies advanced plug-in was an independently-licensed feature.
Products using the authentication protocol retain control the security policies to be implemented and enforced.
Products using the authentication protocol retain control the security policies to be implemented and enforced.
Products using the authentication protocol retain control the security policies to be implemented and enforced.
Sentry enforces the security policies set by IT in MobileIron Core, enabling it to allow or deny access to corporate information and resources in real time.
The Security Policies plug-in for KEPServerEX allows administrators to assign security access permissions on individual objects(such as channels, devices, and tags) based on the role of the user interacting with the runtime project.
This group is chartered with many roles, one of which is defining the security policies for the mobile apps and devices as well as its enforcement.
Robust Security: Now included as a complimentary core server component, the Security Policies advanced plug-in complements an industrial defense-in-depth strategy by enabling customers to assign security access permissions on individual objects based on user role.