On systems running Windows Server 2003,Internet Explorer Enhanced Security Configuration is enabled by default, which helps to mitigate against this issue.
EventLogAnalyzer会持续监控和跟踪用户组级别的安全配置设置更改情况。
EventLog Analyzer continuously monitors and tracks the changes in security configuration settings at the user group level.
此解决方案还提供了实时电子邮件或短信告警,用于提醒任何关键安全配置更改情况。
This solution provides real-time email orSMS alerts for any critical security configuration changes, as well.
保护受监控系统免受黑客获取访问权限以更改事件日志可能需要新类型的安全配置。
Protecting the monitored system from hackers gaining access to alter the eventlogs may require a new type of security configuration.
AIXPert是一个通用的GUI和命令行安全工具,它包含了超过300个安全配置设置。
AIXPert is an all-purpose GUI andcommand-line security tool that incorporates over 300 security configuration settings.
Meanwhile, CERT Australia handled more than 8,100 incidents involving compromised websites,which are often breached due to poor maintenance or security configuration.
人们可能会注意到,具有差异的特性主要是安全配置和OAuth。
Items where people might notice a difference are security configuration and OAuth.
考虑德国车型的主要原因包括安全配置、工艺质量以及使用寿命长和故障率低。
The primary reasons for considering a German model include safety features; quality of workmanship; and durability and low failure rate.
安全配置错误使黑客能够访问私有数据或功能,并可能导致完整的系统泄密。
Failure to configure security gives hackers access to private data or functionality and can lead to a complete system compromise.
三点式安全带是人类最重要的发明之一,是汽车内最重要的保护性安全配置。
The three-point safety belt is one of the most important inventions for mankind andit is the most important protective safety feature in the car.
很明显这对安全使用一个给定程序是必要的,但已经有太多的其它文献讨论了安全配置。
This is clearly necessary for secure use of a given program,but a great many other documents discuss secure configurations.
而另外一些云应用或许无法改进其安全配置,无法与企业现有的安全措施相匹配,因此有可能使安全风险变大。
Other cloud applications may be unable to modify their security profiles, they may not fit with your existing security measures, and may increase your risk.
Secure Configuration- The configuration of the Amazon Linux AMI enhances security by focusing on two main security goals: limiting access and reducing software vulnerabilities.
SQL Server blocked access to procedure'sys. xp_cmdshell' ofcomponent'xp_cmdshell' because this component is turned off as part of the security configuration for this server.
The gap between cloud operations and security operations is growing: nearly 73% of public cloud instances had one ormore serious security misconfigurations.
中文
Bahasa indonesia
日本語
عربى
Български
বাংলা
Český
Dansk
Deutsch
Ελληνικά
Español
Suomi
Français
עִברִית
हिंदी
Hrvatski
Magyar
Italiano
Қазақ
한국어
മലയാളം
मराठी
Bahasa malay
Nederlands
Norsk
Polski
Português
Română
Русский
Slovenský
Slovenski
Српски
Svenska
தமிழ்
తెలుగు
ไทย
Tagalog
Turkce
Українська
اردو
Tiếng việt