Examples of using Security log in English and their translations into Russian
{-}
-
Colloquial
-
Official
View the Security Log.
Security log wrap is found.
I will check security logs.
Security log cannot be accessed.
Can you show us your security log,?
Open the Security log to view these events.
Manage auditing and security log.
When the security log is full, the oldest audit entries are overwritten.
We checked the morgue security logs.
According to the security logs, your daughter entered your building at 7:18 p.m.
Rel file extension Norton Internet Security Log File.
You can view the Security log with Event Viewer.
All audit failure records will be logged to the Security log.
Security logs license plates of guests Parked in the garage overnight.
Anyway, it was she who checked the security log for me.
The Security log records each event as defined by the audit policies you set on each object.
I thought the Navy denied our request for the base's security logs.
Because the security log is limited in size, select the files and folders to be audited carefully.
You can view audited events in the Security log of the Event Viewer.
Administrators can specify what events are recorded in the security log.
Security Log adds two database tables to log all sorts of security related events.
A user with this privilege can also view and clear the Security log.
Run-time auditing events are in the security log of the client computer where the application is running.
After your audit policy is configured, events will be recorded in the Security log.
Authorization store change auditing events are in the security log of the computer where the store resides.
Also, consider the amount of disk space that you want to devote to the security log.
After object access auditing is enabled, view the security log in Event Viewer to review the results of your changes.
When selected, inheritable auditing entries from the object's parent will be written to the Security log.
In addition to the Windows Security Log, administrators can check the Internet Connection Firewall security log for clues.
In order to configure which application and scopes are to be audited,you must have the Manage auditing and security log privilege on the computer where the authorization store resides.