Voorbeelden van het gebruik van Security logs in het Engels en hun vertalingen in het Nederlands
{-}
-
Colloquial
-
Official
-
Ecclesiastic
-
Medicine
-
Financial
-
Computer
-
Ecclesiastic
-
Official/political
-
Programming
I will alter the security logs.
The security logs have been wiped clean.
Take her name off the security logs.
Security logs license plates of guests Parked in the garage overnight.
Sir, I have the security logs as you asked.
I want you and Reynolds to check the security logs.
Security logs on servers and firewalls are kept for a period of at least 6 months.
debugging and security logs.
Mr. Ambassador, according to your security logs, A secret service agent hurst came to see you. Yes.
Monitor usage of default system accounts by reviewing the security logs.
George, I need you to fetch the security logs for the Toronto Electric
the last six months of security logs, we have got nothing to hide.
I need copies of personnel records, security logs for the past three months
got nothing to hide. and besides, the last six months of security logs.
Furthermore many security logs write down the timestamp to ensure no data package has been intercepted and(maybe) changed.
Use these settings to configure how Windows Firewall with Advanced Security logs events, how big the log file can grow,
Searchable security logs allow administrators to target specific actions, users, dates
Looking into the security logs in the database, 55 people worldwide managed to crack the code yesterday,
Security logs confirm reports that Ms. Locke and the President were
Security log the day of the disappearance.- No. You?
No. You? Security log the day of the disappearance.
Security log the day of the disappearance. You?- No.
Supports remote management System status and security log.
To view the security log, youyou must call the Windows Firewall component.
In the Security Logging area, click Settings.
Computer, play security log entry stardate 47944.2, weapons locker.
Check the JAG security log.
I checked the JAG security log, and what do you know?
According to the security log… this is when T'Pau's biometric signature was recorded.
The security log shows that Allison activated the isolation protocols.