• Describes security practices that apply to the user policy level.

    描述适用使用者原则层级的安全常规

    youdao

  • This policy is always subject to the enterprise, machine and user policy.

    这个原则必须受制于企业电脑使用原则。

    youdao

  • A user's ability to send reports depends on machine and user policy permissions.

    用户发送报告能力取决于计算机用户策略权限

    youdao

  • A user's ability to send reports depends on computer and user policy permissions.

    使用者是否能够传送报告,完全是电脑使用者的原则权限而定。

    youdao

  • Provides an enumerator to access the security policy hierarchy by levels, such as computer policy and user policy.

    提供枚举级别(计算机策略用户策略)访问安全策略层次结构

    youdao

  • The user policy level is not able to give more permissions to an assembly than is specified in the higher policy levels.

    用户策略级别程序提供权限不能多于较高策略级别指定的权限。

    youdao

  • Set user policy to enforce strong passwords to protect against brute force, social engineering attempts, and dictionary attacks.

    设置用户策略实施强大的密码防御强力攻击、社会工程企图(social engineering attempts)字典攻击

    youdao

  • Code access security policy configuration state consists of three administrative policy levels: enterprise, machine, and user policy.

    代码访问安全性策略配置状态分为三个管理策略级别企业计算机用户策略。

    youdao

  • The policy levels are a hierarchy, with enterprise policy on top, machine policy below that, user policy below that, and application domain policy on the bottom.

    策略级别这样一个层次结构企业级策略顶部其下计算机策略,再往用户策略,最下面是应用程序策略。

    youdao

  • It starts with information on what the user can do if he or she feels you have violated this privacy policy.

    如果认为违背隐私策略,开头信息说明用户可以些什么

    youdao

  • Do the realized business services provide flexible and adaptable behavior based on business policy and user context?

    已实现业务服务提供基于业务政策用户上下文的灵活调节行为吗?

    youdao

  • The end user rents on a specific application within a threshold level set by user threshold Policy.

    最终用户是否用户策略设置的阈值水平租用特定的应用程序

    youdao

  • Select the user and click OK to add the user to the policy (Figure 7).

    选择用户单击OK用户添加策略见图 7)。

    youdao

  • Generating code from WSDL works the same from the user perspective whether WS-Policy is included or not.

    不管是否包含WS - Policy用户角度来看,从WSDL生成代码效果是相同的。

    youdao

  • This identity originated on imageboard 4chan.org, as a byproduct of a user interface policy called forced anonymity, also known for short as "forced anon".

    这个身份最早出现图片网站4chan.org上,他是一个叫做forcedanonymity用户政策界面产物简称为“forcedanon

    youdao

  • I suggest that it is only good policy if the user can remember their own password.

    认为只有用户能够记住自己密码的前提下,才是策略

    youdao

  • The password policy should be in place on all active user accounts.

    应该所有活跃用户账户上设置密码策略

    youdao

  • If the user holds an exemption to every rule used by a security policy, then the user will have complete access to all data protected by that security policy.

    如果用户拥有安全策略使用每个规则豁免权那么用户拥有受那个安全策略保护所有数据完全访问权。

    youdao

  • This policy reference file enables the user agent to find the policy, but how does it know where to find the policy reference file?

    这个策略引用文件使用户代理能够找到策略,如何知道到哪里找到策略引用文件呢?

    youdao

  • If a user holds an exemption on a particular rule of a particular security policy, that rule is not enforced when the user tries to access data protected by that security policy.

    如果用户拥有特定安全策略特定规则豁免权那么用户试图访问受该安全策略保护数据时,该规则将不起作用。

    youdao

  • You can either develop each policy type individually or combine all three policy types - resource, user, data request - into one threshold policy.

    可以分别开发每个策略类型或者三个策略类型资源用户数据请求—结合一个阀值策略。

    youdao

  • Then one can gradually lift the security of that user as your security policy demands.

    以后可以根据安全策略要求逐渐放松用户的安全限制。

    youdao

  • Without a user threshold policy, you do not know if the number of concurrent users is approaching the maximum and how many users have not logged off when they are done with the cloud service.

    如果没有用户阈值策略无法知道当前用户数量是否接近最大数量,以及多少用户使用服务之后没有退出

    youdao

  • Some people suggest using random passwords for ordinary user accounts is good security policy.

    一些认为对于普通用户账户使用随机密码良好安全策略

    youdao

  • This use case explores a scenario for identity management and user provisioning with policy enablement that illustrates that re-use can enable business and IT to optimize common processing.

    这个研究一个启用了策略身份管理用户提取的场景说明重用可以使业务IT 实现优化常见信息处理

    youdao

  • User threshold policy: the provider sets user threshold levels below the maximum number of users that can access concurrently.

    用户策略供应商用户阀值水平,设置为低于可以并发访问最大用户数量

    youdao

  • This security policy grants access to every user for every project.

    这个安全策略授权一个都可以访问项目。

    youdao

  • User threshold policy to ensure users can access concurrently cloud applications at a specified threshold level below the maximum limit specified in a user license from the provider.

    用户策略确保当阀值水平低于供应商所提供用户许可定义最大限度时,用户可以并发访问应用程序

    youdao

  • User threshold policy: Ensures users can access concurrently the application up to the limit specified in a user license from the provider below or at the threshold level.

    用户策略确保用户并发访问应用程序数量可以达到供应商用户许可中所指定的、低于或者等于阀值水平的最大限额

    youdao

  • After verifying the customer's identity, the rep could look up and relay the policy number to the user.

    验证这个客户身份之后,客户服务代表可以查询保单编号告知该用户

    youdao

$firstVoiceSent
- 来自原声例句
小调查
请问您想要如何调整此模块?

感谢您的反馈,我们会尽快进行适当修改!
进来说说原因吧 确定
小调查
请问您想要如何调整此模块?

感谢您的反馈,我们会尽快进行适当修改!
进来说说原因吧 确定