Examples of using Suspicious activity in English and their translations into Russian
{-}
-
Official
-
Colloquial
This means that many reports are received on suspicious activity that has taken place without knowledge or suspicion that the money or arrangement relates to illicit tobacco trade.
When scanning a program, the analyzer emulates its execution and logs all suspicious activity, such as, opening or writing to a file,
It is very necessary to constantly analyze the logs for suspicious activity and take immediate action.
Some of them screen applications for suspicious activity patterns and take further action according to initial risk scores.
If you notice suspicious activity or transactions in your my paysafecard account, please change your account password immediately
such as detection of a probably infected object or suspicious activity in the operating system.
Thus, valid indicators may help in identifying suspicious activity that should be reported to competent national authorities according to AML/CFT legislation.
Some screen applications for suspicious activity patterns and take further action according to initial risk scores see paragraphs 33-38.
detect suspicious activity, protect virtual machines,
If available, install a mobile security app which will alert you of any suspicious activity.
These rules restrict suspicious activity of applications, including access by applications to protected resources,
If the Client notices any suspicious activity on his/her Account
including suspicious activity monitoring and reporting.
disable them remotely in case of any suspicious activity.
When suspicious activity is detected, you can block the potential threat with GlassWire's built in firewall management tool.
This would make it easier for law enforcement to monitor and investigate suspicious activity, while protecting user privacy until a determination is made that more information is needed.
Better detect evasive or suspicious activity with network and endpoint event correlation.
monitoring requirements as part of their ongoing CDD to detect suspicious activity.
Local and remote ports for data transfer are correctly defined when a rule is being created directly from a notification of suspicious activity.
Suspicious activity detection is both automated by our security infrastructure