入侵检测以及安全日志审核。
日志模块分为安全日志、调试日志和跟踪日志;
The log module is divided into safe record, debugging record and trace record.
系统对安全日志审核功能也提供了一定的支持。
And the system also provides certain support for the auditing function of security Log.
反过来,这意味着大量的安全日志中的审核条目。
This in turn means a lot of audit entries in the security logs.
此算法会导致安全日志填满,与密码无效的登录尝试。
This algorithm resulted in security logs filling up with "invalid password" logon attempts.
安全日志的分析可以检测可疑行为,并且允许管理员采取行动。
Analysis of the security logs can detect patterns of suspicious behavior, allowing the administrator to take action.
以下是安全日志中的绝大部分事件,部分仅仅是域控制器的记录。
Most of the events below are in the Security log; many are only logged on the domain controller.
网络安全日志管理中心由转换模块、统计分析模块和策略再配置模块组成。
Network security log management center is made up of transform module, statistics analysis module, and policy reconfiguration module.
这一事件也应该被记录在系统中,还要给管理员发送邮件,将事件写入安全日志。
This event should also be logged in the system, either by sending an email to the administrator, writing the event to a security log, or both.
当事务开始等待答复的顺序不同于事务写入全日志的顺序时,可能发生这种情况。
This can occur when the order in which transactions start waiting for a reply is different from the order in which their binary log events are written.
所设计的安全机制能够满足网管系统安全性所需要的授权与验证、保密性、完整性、安全日志等要求。
This security mechanism could satisfied all needs a network management system requests on security, such as authorization and verification, confidentiality, integrity and security log.
所设计的安全机制能够满足网管系统安全性所需要的授权与验证、保密性、完整性、安全日志等要求。
This security mechanism could satisfied all needs a network management system requests on security, such as authorization and verification, confidentiality, integrity and security log.
应用推荐