security log造句
例句與造句
- The " manage auditing and security log " user right
“管理審核和security日志”用戶權(quán)限。 - The security log is read - only
Security日志是只讀的。 - Security log , which tracks security changes and possible breaches
Security日志,它跟蹤安全性的變化和可能出現(xiàn)的違規(guī); - This property is often blank for events in logs other than the security log
對(duì)于security日志之外的日志中的事件,此屬性通常為空白。 - When the system security log reaches its maximum size it will stop recording security events
當(dāng)系統(tǒng)安全達(dá)到它的最大的限度時(shí),它將停止記錄安全事件。 - It's difficult to find security log in a sentence. 用security log造句挺難的
- Read in addition , users can read and clear the security log if they have been granted one of the following
另外,如果用戶已獲準(zhǔn)具有下列權(quán)限之一,他們就可以讀取和清除security日志: - This can improve performance and reduce activities such as security logging on enterprise systems that occur for each new connection
可以緩沖和重用非常耗時(shí)的連接,從而提高性能,減少新建連接時(shí)要執(zhí)行的活動(dòng)(如安全登錄到企業(yè)系統(tǒng)) 。 - By default , the application , system , and security logs are set to a default maximum size of 4992 k . custom logs are set to a default maximum of 512 k
默認(rèn)情況下, application 、 system和security日志設(shè)為默認(rèn)最大值4992 k 。自定義日志設(shè)為默認(rèn)最大值512 k 。 - Many of the actions an individual might take , including rebooting the machine , copying files from the server , and reviewing security logs , can alter the drive data
一些單獨(dú)的活動(dòng)可能要進(jìn)行,包括重新啟動(dòng)機(jī)器,從服務(wù)器拷貝文件,回顧安全日志,改變驅(qū)動(dòng)器數(shù)據(jù)。 - Finally , the essay presents analysis and research on the function demand of the safety audit , other audit techniques as well as the security log analysis principle
最后,本文對(duì)安全審計(jì)的功能需求和各種審計(jì)技術(shù)及日志分析原理進(jìn)行了分析研究,給出了郵件服務(wù)器日志分析的具體實(shí)現(xiàn)過程和方法。