任何终端用户、开发人员和网络架构师,如果其行为违反了本策略或任何其他相关的IT策略或法规,供应商有权限制或者停止服务。
Any end users, developers and network architects whose actions violate this policy or any other related it policy or regulations shall be subject to limitations or loss of service with the provider.
拥有这些过程的EXECUTE权限的任何用户均可以读取或更新自动维护策略。
Any user who has EXECUTE privilege on these procedures can read or update automatic maintenance policies.
下一步,如清单11所示,创建一个策略,不赋给db 2实例用户db2ins95和根用户结束进程的权限。
Next, as shown in Listing 11, create a policy that does not give db2 instance user db2ins95 and root user permission to kill the process.
若要向某个用户授予备份和还原权限,请使用“组策略”管理单元。
To grant a user backup and restore rights, use the Group Policy snap-in.
与设置用户存取权限控制、冗余备份恢复、网络安全等多种安全策略共同建立有机的安全体系。
Together with the technology of Access Control, redundant backup recovery and network security, it makes an allround security system.
在本地安全策略设置控制台,展开本地策略,选择用户权限指派。
In the Local Security Settings console, expand Local Policies, and select User Rights Assignment.
此策略有助于在保护机密信息的同时,减少管理用户对部署的访问权限所涉及的管理开销。
This strategy helps protect confidential information while reducing the administrative overhead of managing user access to the deployment.
在部署此策略的计算机上,系统会自动授予权限而不会提示用户授予权限。
On computers where this policy is deployed, permissions will automatically be granted and the user will not be prompted.
安全策略向代码授予的有效权限集是由计算机策略和用户策略授予的权限集的交集确定的。
The effective permission set that the security policy grants to code is determined by the intersection of the permission sets granted by the machine and user policies.
向应用程序域授予权限时,运行时使用企业级策略、计算机策略和用户策略。
When granting permissions to application domains, the runtime USES the enterprise, machine, and user policies.
用户发送报告的能力取决于计算机和用户策略权限。
A user's ability to send reports depends on machine and user policy permissions.
用户策略级别向程序集提供的权限不能多于较高策略级别所指定的权限。
The user policy level is not able to give more permissions to an assembly than is specified in the higher policy levels.
基于以上的安全策略,可以防止非法用户访问数据库,限制合法用户操纵数据库的权限;
The safety that is based on above is politic, can visit a database in order to prevent illegal user, restrict lawful user to operate after the attributive;
基于以上的安全策略,可以防止非法用户访问数据库,限制合法用户操纵数据库的权限;
The safety that is based on above is politic, can visit a database in order to prevent illegal user, restrict lawful user to operate after the attributive;
应用推荐