security log

英 [sɪˈkjʊərəti lɒɡ] 美 [sɪˈkjʊrəti lɔːɡ]

网络  安全日志; 安全日誌; 登录日志; 安全记录

计算机



双语例句

  1. The Security Architect will log into the TSPM UI and author a policy which requires that messages are encrypted and authenticated with a SAML assertion.
    安全架构师将登录到TSPMUI并编写一个策略,该策略要求通过SAML断言对消息进行加密和身份验证。
  2. A Hybrid Clustering Algorithm for Information Security Evaluation Log Data
    信息安全评估日志数据的一种混合聚类算法
  3. The security log on this system is full.
    此系统上的安全日志已满。
  4. No failure is returned, but audit entries will not be written to the security log.
    不返回任何失败记录,但审核项也不会写入安全日志。
  5. Research on Technique of the Network Security Audit Based on Log Data Mining
    基于日志数据挖掘的网络安全审计技术研究
  6. To start logging events to the security log, you must enable the'audit object access'setting in group policy.
    要开始记录事件到安全日志,您必须在组策略中启用“审核对象访问”设置。
  7. After you turn on logging, events are written to the security event log.
    在启用日志记录后,事件将写入安全事件日志。
  8. If the auditloglocation property is set to security and audit object access is not set in the local security policy, audit events will not be written to the security log.
    如果auditloglocation属性已设为security,而“本地安全策略”中并没有设置“审核对象访问”,审核事件将不会记录到安全日志中。
  9. Centralizing the implementation of security policies, log analysis and reporting is a good thing.
    安全策略、日志分析与报告的中心化实现是个不错的主义。
  10. The security log file is full, logging must be disabled to continue using the system. However, a problem prevented the disabling of logging.
    安全日志文件已满,必须停用日志以继续使用系统。然而,某一问题使得系统无法停用日志。
  11. For example, attempts to log on to the system may be recorded in the security log, depending on the audit settings in the user manager.
    例如,对系统的登录尝试可能记录在安全日志中,具体情况取决于用户管理器中的审核设置。
  12. For example, if logon auditing is enabled, attempts to log on to the system are recorded in the security log.
    例如,如果启用登录审核,则对登录到系统所进行的尝试会记录在安全日志中。
  13. This property is often blank for events in logs other than the security log.
    对于security日志之外的日志中的事件,此属性通常为空白。
  14. Database provides multipurpose information, for example, application parameters, private data, project records, auditing and security log, even users 'access credentials.
    数据库通常存储着各种类型的数据,包括应用程序参数、个人私密数据、企业记录、审核和安全日志等,甚至还包括用户访问应用程序所需的凭证。
  15. Auditing: operations performed by users are stored in security log; administrator could audit user behavior based on the log.
    用户行为审计:以日志的形式记录用户的操作行为,管理员可通过日志进行安全审计;
  16. The running management system of mobile official portal is an import security system. Log management takes on import function in the whole portal, it logs visiting behaviors.
    移动办公门户运行管理系统是一个安全性因素很重要的系统,日志管理在整个系统中担任着重要功能,用于记录访问行为。
  17. On the basis of a thorough analysis and research on the products of the existing security audit in log recording, the middle log formats is presented, which is suitable for log conversion and various log fusion.
    对现有基于日志的安全审计类产品进行了深入分析与研究基础上,提出了适于网络日志转换的中间日志格式,较好地解决多种日志融合问题;
  18. In the last paper, the key distribution of the key management system in our security audit log server and the selection of cross certificate models are discussed especially.
    最后重点讨论了安全日志服务器的密钥管理系统中密钥的分配问题和多个CA之间交叉认证模式的选择。
  19. Research on Security Log and Audit Policy for Grid System
    网格安全日志及其审计策略研究
  20. A Security Log Analysis Model Based on Rough Set Theory
    基于粗糙集理论的安全日志分析模型
  21. A model for managing activities in design procedure of engineering drawings is developed. The design of security management and log management are explained.
    提出一个支持工程图档设计过程的设计事务管理模型,并详细介绍了设计过程管理组件的安全管理方法和日志管理方法的设计与实现。
  22. Network security log management center is made up of transform module, statistics analysis module, and policy reconfiguration module.
    网络安全日志管理中心由转换模块、统计分析模块和策略再配置模块组成。
  23. Network security log file database is a kind of historical database.
    网络安全日志数据库是一种历史数据,对它的分析具有十分重要的实际价值。
  24. MASF supports a wide span of security mechanisms such as storage protection, confidentiality, authentication, integrity, authorization and security log, all these mechanisms are seamlessly integrated to secure the network management.
    MASF无缝集成了存储保护、加密、鉴别、完整性验证、授权、访问控制、安全日志等安全机制。
  25. This paper presents an application of rough set theory for security log analysis of Linux systems.
    叙述了利用粗糙集(RoughSet)理论实现的Linux系统安全日志分析方法。
  26. Because of the range of the research is too widthy, this research only takes charge of the security event log with the illegality incursion.
    由于研究范围较大,本人只负责非法入侵产生的安全事件日志的分析工作。病毒日志,系统误报等事件日志的分析为其他人完成。
  27. Main function of the security log audit system is real-time security monitoring and self response after the event occurred and the system access behavior analysis of a second time audit to find out the attacks and invasions of the system.
    安全审计系统的主要功能是对系统进行实时的安全监控和响应以及在事后对已发生的系统访问行为进行二次审计分析,找出系统受到的攻击和入侵。
  28. In addition, the security of log user authentication, the legality of the page user authentication, log records management of user login and operation, and so on.
    此外,本系统在一般的三层体系结构的基础上引入了安全层,主要实现登录用户的安全验证,页面用户的合法性验证,用户登录日志的记录管理,用户操作日志的记录管理等。
  29. This paper introduces subject context and object context of the model, and focuses on research of the properties, mechanisms and interactions between the two, and explores the dynamic context-based exception handling mechanism and the security log audit mechanism.
    在模型中,引入了主体语境和对象语境的概念,着重研究了主体语境和对象语境的相关属性、机制及两者之间的交互关系,探讨了基于动态语境的异常处理机制和安全日志审计机制。
  30. Mobile client achieve the following function, SMS status monitoring, SMS reminders, system security Log, decrypted by entering the password, and this system provided to the user a good operating window. 7.
    手机客户端实现短信状态的监听、短信提醒、系统安全登录及输入密码解密的功能,并提供给用户良好的操作窗口。