Base services are available to support security and privacy, search, audit logging, and workflow.
基本服务用于支持安全性和私密性、搜索、审计日志记录和工作流。
You may also use a standard IBM Cognos 8 audit logging database, which should also have been configured in this way.
可能还需要使用一个标准的IBMCognos8审计记录数据库,且此数据库也要以这种方式配置。
If you are using a database that has already been set up for IBM Cognos 8 audit logging, you may already have done this.
如果使用的数据库已经针对IBMCognos8审计记录设置,那么可能已经完成了。
Base services can be implemented to integrate with common enterprise components that support workflow, security, and audit logging.
基本服务可以与支持工作流、安全性和审计日志记录的通用企业组件集成。
Finally, the AuditLogger import represents a dependency on an Audit logging service that is also not provided as part of this module.
最后,AuditLogger导入表示对审核记录服务的依赖,该服务也不是此模块的一部分。
Audit logging is usually used in security-sensitive environments where changes made to the portal's run time configuration are recorded.
审计日志通常在安全敏感的环境中使用,其中记录对门户运行时配置的更改。
It is recommended that you restrict audit logging to only those events that are really relevant to the business and omit all others to keep the amount of logging overhead as small as possible.
建议将审计日志记录限制为只与业务真正相关的那些事件并忽略其他事件,以便尽量减小日志记录开销。
However, be aware that the database system has to maintain these indexes and this, particularly for audit logging, slows down the overall performance of process navigation if audit logging is enabled.
但是,应该知道数据库系统必须要维持这些索引,并且该操作,尤其是对于审核的记录来说,在审核记录已启用的情况下会减慢整个系统的性能。
These mediations may include any or all of validation, logging, audit, authentication and authorization.
这些中介可以包含任何或全部验证、日志记录、审核、身份验证和授权。
These services might include data services, logging services, fault handing services, audit, search, notification, and session management services.
这些服务可能包括数据服务、日志服务、故障处理服务、审计、搜索、通知以及会话管理服务。
You ensure that the audit facility is using asynchronous logging by setting the size of the AUDIT_BUF_SZ database manager parameter to 40
通过将数据库管理器参数 AUDIT_BUF_SZ的大小设置为40,确保审计功能将使用异步日志记录
This option enables keyboard logging of any user and can be configured to store the audit information locally or remotely using Korn Shell networking.
这个选项可以对任何用户的键盘操作进行日志记录,它可以配置为在本地存储审计信息,也可以使用KornShell连网功能执行远程存储。
Policy-related requirements, such as security requirements on the users' and external system's access, ID management policies, audit and logging.
政策相关的需求,例如用户访问及外部系统访问的安全性需求,ID管理政策,审计和登录。
The audit information can be stored locally on each system in a file designated by the system administrator, or can be sent to a remote system for centralized logging.
审计信息可以存储在每个系统上系统管理员指定的本地文件中,也可以发送到远程系统以便进行集中的日志记录。
To configure the audit facility to monitor all event types, logging both successful and failed attempts, as well as using the audit error processing option, issue the following db2audit command.
为了将审计功能配置成监视所有事件类型,同时记录成功的和失败的尝试,并且使用audit错误处理选项,可发出以下db2audit命令。
This security audit system mainly consists of three parts: data collection, data analysis and logging.
本文的安全审计系统主要由数据采集、数据分析、日志记录三部分组成。
The core of the system is to enforce the law permits logging, revised module, which permits law enforcement and audit Table Table changes will impact on each other.
系统的核心是执法证的录入、修改模块,其中执法证表和审核表的修改都将相互影响。
The core of the system is to enforce the law permits logging, revised module, which permits law enforcement and audit Table Table changes will impact on each other.
系统的核心是执法证的录入、修改模块,其中执法证表和审核表的修改都将相互影响。
应用推荐