| 1. | The " manage auditing and security log " user right “管理审核和security日志”用户权限。 |
| 2. | The security log is read - only Security日志是只读的。 |
| 3. | Security log , which tracks security changes and possible breaches Security日志,它跟踪安全性的变化和可能出现的违规; |
| 4. | This property is often blank for events in logs other than the security log 对于security日志之外的日志中的事件,此属性通常为空白。 |
| 5. | When the system security log reaches its maximum size it will stop recording security events 当系统安全达到它的最大的限度时,它将停止记录安全事件。 |
| 6. | Read in addition , users can read and clear the security log if they have been granted one of the following 另外,如果用户已获准具有下列权限之一,他们就可以读取和清除security日志: |
| 7. | This can improve performance and reduce activities such as security logging on enterprise systems that occur for each new connection 可以缓冲和重用非常耗时的连接,从而提高性能,减少新建连接时要执行的活动(如安全登录到企业系统) 。 |
| 8. | By default , the application , system , and security logs are set to a default maximum size of 4992 k . custom logs are set to a default maximum of 512 k 默认情况下, application 、 system和security日志设为默认最大值4992 k 。自定义日志设为默认最大值512 k 。 |
| 9. | Many of the actions an individual might take , including rebooting the machine , copying files from the server , and reviewing security logs , can alter the drive data 一些单独的活动可能要进行,包括重新启动机器,从服务器拷贝文件,回顾安全日志,改变驱动器数据。 |
| 10. | Finally , the essay presents analysis and research on the function demand of the safety audit , other audit techniques as well as the security log analysis principle 最后,本文对安全审计的功能需求和各种审计技术及日志分析原理进行了分析研究,给出了邮件服务器日志分析的具体实现过程和方法。 |