Com•pli•ance Dictionary
Submit
  • Home
  • About
  • Subscribe
  • Log In
Submit
  • Users
  • CCH account
  • ACH
  • CCO
  • Fusers
  • userns
  • User settings: Users with duplicate UIDs
  • CCS
  • csh shell settings: Default umask for all users
  • ccc
  • CCD
  • user
  • User settings: Users running the uucico daemon
  • ACH instruction
  • ACH router
  • ACH return
  • CCI component
  • CCI equipment
  • ACH payment
  • users' name
  • Authenticated Users
  • users account
  • ACH activity
  • ACH operator
  • ACH file
  • ACH authorization
  • ACH capture
  • ACH transaction
  • ACH service
  • ACH item
  • ACH process
  • C/CE
  • CCI assembly
  • ACH debit
  • ACH batch
  • ACH entry
  • ACH credit
  • ACH device
  • CCM v4.0
  • CCM v4.0.6
  • Container settings: Users in the 'Users' container
  • 'Administrators, Authenticated Users'
  • Group settings: Users in the 'Users' group
  • ACH debit return
  • Administrators, Authenticated Users
  • ACH debit activity
  • ACH debit activity
  • list of users
  • objects and users
  • users with privilege
  • exception users list
  • Remote desktop Users
  • ACH settlement date
  • ACH contingency plan
  • uncollected ACH deposit
  • ACH credit transaction
  • unauthorized ACH transaction
  • Group settings: Users in the 'Power Users' group
  • Group settings: Users in the 'Domain Users' group
  • The '/etc/security/user' file: Default umask for new users
  • ACH service provider
  • ACH exposure limit
  • uncollected ACH transaction
  • ACH processing activity
  • ACH single-entry
  • unauthorized ACH debit
  • ACH credit activity
  • international ACH requirement
  • user's guide
  • cc
  • User Account Control: Behavior of the elevation prompt for standard users
  • 'User Account Control: Behavior of the elevation prompt for standard users'
  • Security Features Users Guide
  • CCE v5 - Apache 2.2
  • ACH transaction processing procedure
  • internet initiated ACH transaction
  • Administrators and Interactive Users
  • secured XP users OU
  • CCE v5 - Windows Vista
  • CCE v5 - Windows 2000
  • CCE v5 - IIS 6
  • telephone-initiated ACH transaction
  • 3 CCR 702-6
  • user's responsibility
  • user's manual
  • Ushers uniforms
  • Federal Wireless Users Forum
  • protected users security group
  • Administrators, Remote Desktop Users
  • Administrators and Power Users
  • specific group of users
  • 'Administrators, Remote Desktop Users'
  • root user
  • user administration
  • user data
  • user identifier
  • user representative
  • computer user
  • service user
  • user initialization
  • user mode
  • train user
  • user documentation
  • IT user
  • user guide
  • User Experience
  • user key
  • power user
  • user access
  • active user
  • new user
  • standard user
  • user entitlement
  • user namespace
  • user agent
  • information user
  • Internet-initiated ACH debit
  • CCE v5 - AIX 5.3
  • CCE v5 - Windows XP
  • CCE v5 - Apache 2.0
  • high risk ACH transaction
  • multi-user
  • user authenticator
  • user entity
  • user control
  • user awareness
  • user functionality
  • user deletion
  • user account
  • remote user
  • general user
  • drug user
  • snuff user
  • tobacco user
  • user department
  • end-user
  • user input
  • user type
  • user name
  • unique user
  • unprivileged user
  • user agreement
  • nonprivileged user
  • human user
  • user inactivity
  • user motion
  • 'root' user
  • telephone-initiated ACH debit
  • CCE v5 - Windows 7
  • CCE v5 - IIS 5
  • CCE v5 - Tomcat 5
  • CCE v5 - Tomcat 6
  • user attribute
  • user auditor
  • data user
  • organizational user
  • user creation
  • calling user
  • untied user
  • user interface
  • authenticated user
  • user organization
  • user support
  • terminated user
  • user education
  • user log
  • unauthorized user
  • user permission
  • user-friendly
  • user error
  • business user
  • user risk
  • suspicious user
  • user application
  • user manual
  • user group
  • user list
  • administrative user
  • database user
  • cloud user
  • user ownership
  • intended user
  • user training
  • DRM user
  • user infrastructure
  • CCE v5 - Apache 1.3
  • CCE v5 - Tomcat 4
  • high-risk ACH transaction
  • telephone initiated ACH transaction
  • internet-initiated ACH transaction
  • ACH debit return volume
  • user password
  • GNOME user
  • authorized user
  • User Right
  • end user
  • system user
  • prompt user
  • user authentication
  • tied user
  • user registration
  • mobile user
  • user directory
  • concurrent user
  • affected user
  • external user
  • user activity
  • user-id
  • user certificate
  • user setup
  • user verification
  • user provisioning
  • user involvement
  • user interaction
  • user validation
  • user confirmation
  • malicious user
  • user-agent
  • user detail
  • approved user
  • anonymous user
  • internet user
  • user privilege
  • user study
  • user modification
  • user profile
  • user ID
  • privileged user
  • user request
  • User Advocacy
  • user action
  • user credential
  • user identity
  • user identification
  • user query
  • user acceptance
  • user acknowledgement
  • user session
  • internal user
  • user management
  • user need
  • user role
  • user manager
  • authorised user
  • emergency user
  • user information
  • enterprise user
  • user testing
  • report user
  • temporary user
  • user .forward
  • user associated
  • token user
  • backup user
  • local user
  • users without wide-ranging authorisation
  • The "csh shell" configurable item
  • The '/etc/csh' file: Permissions
  • CCE v5 - HP-UX 11.23
  • Prevent users from modifying settings
  • 'Prevent users from modifying settings'
  • ambiguous to users in general
  • The '/sbin/csh' file: Permissions
  • CCE v5 - Microsoft Exchange 2007
  • CCE v5 - Sun Solaris 9
  • CCE v5 - Windows Server 2008
  • CCE v5 - MS SQL 2000
  • Regulation CC
  • contraceptive device for female users
  • contraceptive accessory for female users
  • Contraceptive devices for female users
  • Group settings: Users in the 'Distributed COM Users' group on the domain
  • Core dumps for all users
  • Group settings: Users in the 'Remote Desktop Users' group on the domain
  • user's network location
  • CCE v5 - Microsoft Office 2007
  • CCE v5 - Internet Explorer 7
  • CCE v5 - Sun Solaris 10
  • CCE v5 - Windows Server 2003
  • Cloud Security Alliance CCM V1.3
  • CCE v5 - Microsoft Exchange 2010
  • CCE v5 - Sun Solaris 8
  • CCE v5 - Microsoft Office 2010
  • Group settings: Users in the 'Performance Monitor Users' group on the domain
  • Fast User Switching
  • security aware user
  • end user instruction
  • Information Technology user
  • User Access Management
  • vendor managed user
  • Graphical User Interface
  • User Manual Developer
  • end user community
  • assign user permission
  • privileged user ID
  • user ID list
  • non-privileged user
  • dedicated user account
  • third-party user
  • long user session
  • provisioning user access
  • user account credential
  • information system user
  • user access review
  • interactive user access
  • user dot-file
  • unique user identification
  • local user authentication
  • set user ID
  • user-defined module
  • user-provided data
  • User ID directory
  • intra-territorial user
  • previous user ID
  • internal system user
  • non-administrator user
  • user authentication mechanism
  • shared user account
  • shared user access
  • user management control
  • user account name
  • vCenter Server user
  • mechanized user identifier
  • administrator user account
  • user identity confidentiality
  • Group settings: Users in the 'Performance Log Users' group on the domain
  • Group settings: Users in the 'Distributed COM Users' group on the local machine
  • Group settings: Users in the 'Performance Log Users' group on the local machine
  • Group settings: Users in the 'Incoming Forest Trust Builders' group user on the domain
  • CCE v5 - Polycom HDX 3
  • CCE v5 - MS SQL 2005
  • ICH Q10 Pharmaceutical Quality System
  • The '/bin/csh' file: Permissions
  • application file user
  • user-subject binding
  • single user mode
  • user reference documentation
  • User Principle Name
  • end user computing
  • User Partnership Program
  • user account management
  • payment service user
  • User Account Control
  • user awareness training
  • User Manual Tester
  • User Support Specialist
  • manage user access
  • temporary user account
  • privileged user identifier
  • shared user ID
  • user computing session
  • user interface document
  • user awareness programme
  • unauthorized vSphere user
  • end-user system
  • User Identification Number
  • inactive user ID
  • end-user computing
  • end user account
  • high-risk user
  • duplicate user name
  • root user account
  • terminated user ID
  • total user downtime
  • user-level information
  • privileged user access
  • user centered design
  • user namespace support
  • privileged user administration
  • user entity responsibility
  • user-controllable data
  • non-organisational user
  • Classic - local users authenticate as themselves
  • %SystemDrive%\Documents and Settings\All Users
  • User Definable Field
  • user satisfaction inquiry
  • local User account
  • User account alias
  • User Name Mapping
  • User Defined Function
  • uses and capabilities
  • user account authentication
  • user-authentication management
  • generic user ID
  • shared user identifier
  • computer user identification
  • user interface documentation
  • user-installed software
  • third party user
  • OSG-SSLF-User
  • privileged access user
  • physical user access
  • strong user authentication
  • user registration procedure
  • group account user
  • default user identifier
  • user audit logging
  • end-user device
  • user-centered design
  • host's user namespace
  • user query event
  • User Access Administration
  • human user interface
  • inactive user identification
  • testing user identifier
  • previous user identifier
  • standard user account
  • 'root' user account
  • compromised user account
  • user financial institution
  • user ID account
  • closed user group
  • user account password
  • unprivileged user account
  • user-based certificate
  • The default umask for ftp users
  • Contraceptive device accessories for female users
  • The "Disable commands - Database Tools | Administer | Users and Permission | User-Level Security Wizard..." configurable item
  • Group settings: Users in the 'Remote Desktop Users' group on the local machine
  • Group settings: Users in the 'Performance Monitor Users' group on the local machine
  • user-defined processing
  • Common User Interface
  • user privilege management
  • user access privilege
  • allow user decision
  • User Datagram Protocol
  • remote VPN user
  • Mail User Agent
  • User Interface Accessibility
  • user access right
  • affected user department
  • issue user ID
  • User Data Protocol
  • privileged user identification
  • customer/user documentation
  • computer user ID
  • Develop User Manuals
  • external party user
  • user activity log
  • Office2010SP1 User Security
  • user is authenticated
  • user awareness program
  • default user name
  • user environment setting
  • unique user ID
  • end user device
  • default user ID
  • generic user account
  • issue user identifier
  • user entity system
  • user behavioural analytic
  • user interface component
  • user test response
  • domain user account
  • default user account
  • user activity data
  • user identification directory
  • end-user asset
  • end user certificate
  • training user identifier
  • default user umask
  • user access setting
  • no user activity
  • user file quota
  • non-organizational user
  • privileged user command
  • The user umask
  • non-consumer user
  • user-added metadata
  • active user account
  • user .rhosts file
  • User account activity
  • user fee collection
  • User Education Professional
  • generic user identifier
  • user identifier list
  • user account provisioning
  • cloud service user
  • distinct user ID
  • user access program
  • OSG-EC-User
  • user interface standard
  • user-based incident
  • end user system
  • user registration process
  • privileged user account
  • malicious user testing
  • unnecessary user account
  • end user policy
  • invalid user access
  • other data user
  • disabled user identifier
  • disabled user ID
  • unnecessary user identifier
  • multi-user system
  • user behavior analytic
  • user access list
  • user account list
  • terminated user identifier
  • user account lifecycle
  • mechanized user ID
  • no user activtiy
  • The .netrc files for all users
  • The .rhosts files for all users
  • The .shosts files for all users
  • Warning banners for gui login users
  • classic – local users authenticate as themselves
  • 'Classic - local users authenticate as themselves'
  • The daemon user's umask
  • The "Power Users Group" configurable item
  • The "Disable commands - Database Tools | Administer | Users and Permission | User and Group Permissions" configurable item
  • The "/sbin/csh file" configurable item
  • The "/bin/csh file" configurable item
  • The '/usr/bin/csh' file: Permissions
  • CCE v5 - Oracle WebLogic Server 11g
  • The "Disable commands - Database Tools | Administer | Users and Permissions | User and Group Accounts" configurable item
  • Public Key Cryptography Based User-to-User protocol
  • The "/etc/csh file" configurable item
  • CCE v5 - Microsoft Internet Explorer 8
  • A warning banner for all FTP users
  • Group settings: Users in the 'Administrators' group
  • Group settings: Users in the 'DnsUpdateProxy' group
  • list of users with their corresponding permissions
  • CCE v5 - Red Hat Enterprise Linux 5
  • user-machine interaction specification
  • complementary user entity control
  • user identification and authentication
  • User account is disabled
  • User account is deleted
  • User Access Management procedure
  • end user messaging technology
  • vulnerability management user interface
  • interface with user/customer
  • Office2010SP1 User Security, 1.0
  • Electronic software user manual
  • role and user access
  • Web Services User Interface
  • end-user computing equipment
  • service account user identifier
  • end-user computing application
  • non-employee User ID
  • end user computing activity
  • disaster recovery user account
  • Devices: Prevent users from installing printer drivers
  • Group settings: Users in the 'DnsAdmins' group
  • Enumerate local users on domain-joined computers
  • 'Enumerate local users on domain-joined computers'
  • ACH Operating Rules OCC Bulletin 2004 58
  • user rights assignment setting
  • User account activity audit
  • User account is read
  • manage a user account
  • list of user IDs
  • Software User Reference Documentation
  • customer (tenant) user access
  • IE10 User Security Compliance
  • Win7SP1 User Security Compliance
  • special purpose user ID
  • user ID tracking system
  • internal mechanized user ID
  • user-centered design process
  • Per-User Session Limit
  • user life cycle management
  • portable end-user device
  • Audit User Account Management
  • Account settings: Default umask for all users
  • Group settings: Users in the 'Guests' group
  • Group settings: Users in the 'Replicator' group
  • processes acting on behalf of authorized users
  • financial interests of its payment service users
  • Group settings: Users in the 'IIS_IUSRS' group
  • owned by appropriate user
  • User account is created
  • User account is unlocked
  • User account is enabled
  • User account is updated
  • Enforce user logon restrictions
  • User Account Reporting standard
  • end user computing device
  • user access provisioning process
  • employee's computer user ID
  • IE9 User Security Compliance
  • activity of authorized user
  • OSG-EC-User, 1.0
  • OSG-SSLF-User, 1.0
  • special purpose user identifier
  • internal mechanized user identifier
  • service account user ID
  • external mechanized user ID
  • user account management tool
  • user acceptance testing environment
  • mobile end-user device
  • user-based cardholder activation
  • user average interruption duration
  • default user shell timeout
  • customer group user ID
  • The '/etc/vsftpd/vsftpd.conf' file: Users referenced
  • The "default umask for users" configurable item
  • 'Devices: Prevent users from installing printer drivers'
  • Removable User Identity Module
  • su (switch user) activity
  • User-Mode Driver Framework
  • end user support communication
  • end-user messaging technology
  • WinXPSP3 User Security Compliance
  • WinVistaSP2 User Security Compliance
  • Win8 User Security Compliance
  • non-shared user account
  • Direct Console User Interface
  • user identifier tracking system
  • external mechanized user identifier
  • user access review process
  • user account review process
  • end user computing application
  • cloud service user identifier
  • user access management control
  • User Datagram Protocol port
  • responsibility of external user
  • portable end user device
  • previously used user identifier
  • 'Audit User Account Management'
  • end user developed application
  • customer group user identifier
  • Account settings: User accounts
  • Autoplay for Current User
  • User Access Logging Service
  • User permission is assigned
  • User permission is removed
  • NetBIOS Extended User Interface
  • Lock Inactive User Account
  • list of user identifiers
  • employee's computer user identification
  • Hardware User Reference Documentation
  • risk posed by user
  • IE8 User Security Compliance
  • user account management procedure
  • unique User Identification Number
  • review of user access
  • user account access reviewer
  • special purpose user ID
  • non-individual user account
  • cloud service user ID
  • user of the report
  • mobile end user device
  • keyboard operable user interface
  • user identity creation request
  • non-employee user identification
  • end-user computing activity
  • previously used user ID
  • user account life cycle
  • Digital Rights Management user
  • virtual machine user role
  • vendor group user identifier
  • vendor group user ID
  • The "/usr/bin/csh file" configurable item
  • CCE v5 - Microsoft Windows Server 2k8 R2
  • The "Prevent Users from Installing Printer Drivers" policy
  • The ability for users to perform interactive startups
  • Group settings: Users in the 'Cert Publisher' group
  • Group settings: Users in the 'Domain Guests' group
  • Classified Document Container Security File - Combinations and Users
  • The "default umask for ftp users" configurable item
  • Prevent users from sharing files within their profile
  • 'Prevent users from sharing files within their profile'
  • CCE v5 - Red Hat Enterprise Linux 4
  • Group settings: Users in the 'Account Operators' group
  • Group settings: Users in the 'Cryptographic Operators' group
  • Removable media that is mountable by console users
  • Prevent users and apps from accessing dangerous websites
  • 'Allow users to enable online speech recognition services'
  • Account settings: Users having access to 'ALL_' views
  • The 'Screensaver lock' setting for GNOME users: Status
  • Always require users to connect to verify permission
  • Group settings: Users in the 'Backup Operators' group
  • Group settings: Users in the 'Schema Admins' group
  • The "warning banner for GNOME users" configurable item
  • Allow users to enable online speech recognition services
  • Audit Log field: User ID
  • The "FTP user" configurable item
  • prompt user to use defaults
  • suspicious user account activity procedure
  • IE9 User Security Compliance, 1.0
  • Visio Multilingual User Interface Pack
  • end user computing device control
  • 'Allow user control over installs'
  • user identification lifecycle management policy
  • %SystemDrive%\Documents and Settings\All Users\Documents\DrWatson
  • Allow users to demote attachments to Level 2
  • Group settings: Users in the 'DHCP Administrators' group
  • Group settings: Users in the 'Domain Admins' group
  • Group settings: Users in the 'Network Services' group
  • Group settings: Users in the 'Print Operators' group
  • The 'vold.conf' file: Authorized users of removable media
  • Group settings: Users in the 'Enterprise Admins' group
  • Group settings: Users in the 'Server Operators' group
  • The 'Screensaver timeout' setting for GNOME users: Status
  • 'Prevent users and apps from accessing dangerous websites'
  • The "standard user" configurable item
  • Graphical user interface development software
  • user-machine interaction specification document
  • user access policy and procedure
  • Win8 User Security Compliance, 1.0
  • Win7SP1 User Security Compliance, 1.0
  • training and testing user ID
  • user with administrative access permissions
  • intended user of the report
  • affected internal and external user
  • 'Allow upload of User Activities'
  • Allow user control over installs
  • Direct Console User Interface functionality
  • time-based user access restriction
  • ICH Q10 Pharmaceutical Quality System, Step 2 Version
  • The "user configuration" configurable item
  • Turn off all user customizations
  • User account name is changed
  • User account is locked out
  • Disable user name and password
  • The "user stack" configurable item
  • The user configuration file: Permissions
  • Autoplay for Default User/Profile
  • user and administrator privilege management
  • continuous user account management procedure
  • Project Multilingual User Interface Pack
  • opt out by a user
  • User and Administrator Access List
  • User and Administrator Access Request
  • user without wide-ranging authorization
  • Allow upload of User Activities
  • X-Windows: write .Xauthority files to users' home directories
  • The "Prevent users from configuring text color" configurable item
  • create and manage User accounts
  • The "user information" configurable item
  • Account settings: Default User accounts
  • Windows User Mode Driver Framework
  • The "XP user" configurable item
  • User Identification and Authentication Reporting
  • user account management metrics program
  • Administration and End User Manual
  • formal user access provisioning process
  • user registration and deregistration function
  • IE8 User Security Compliance, 1.0
  • WinXPSP3 User Security Compliance, 1.0
  • user with administrative account access
  • training and testing user identifier
  • Enable User Control Over Installs
  • user of telecommunications billing service
  • authorized End User Developed Application
  • The User Profile service: Status
  • Account settings: Inactive User accounts
  • Maximum lifetime for user ticket
  • Windows All-User Install Agent
  • User account password is changed
  • The "\"nobody\" user" configurable item
  • The "CDE user" configurable item
  • Office Multilingual User Interface Pack
  • WinVistaSP2 User Security Compliance, 1.0
  • IE10 User Security Compliance, 1.0
  • User Identity (ID) creation request
  • Check for Duplicate User Names
  • critical End User Developed Application
  • The "Let Everyone permissions apply to anonymous users" policy
  • SQL Server settings: Users assigned to fixed database roles
  • Account settings: Users with Root-Level Privileges (UID=0)
  • Security Zones: Do Not Allow Users to Change Policies
  • Disallow standard users from changing the PIN or password
  • The "default screen lock for GNOME users" configurable item
  • Users can't add or log on with Microsoft accounts
  • Network access: Let Everyone permissions apply to anonymous users
  • Add e-mail recipients to users' Safe Senders Lists
  • enrollment process to add new users to the system
  • 'Network access: Let Everyone permissions apply to anonymous users'
  • up-to-date record of the users or profiles of users who have authorized access to the information system
  • Group settings: Users in the 'Network Configuration Operator' group
  • Do not enumerate connected users on domain-joined computers
  • develop product and service solution with customers and users
  • The %SystemDrive%\Documents and Settings\All Users directory: Permissions
  • Group settings: Users in the 'Event Log Readers' group
  • The "Prevent users from configuring background color" configurable item
  • Allow users to connect remotely using Remote Desktop Services
  • The "default screen lock for CDE users" configurable item
  • culture that fosters responsible and controlled access for users
  • 'Do not enumerate connected users on domain-joined computers'
  • 'Users can't add or log on with Microsoft accounts'
  • The "local user logon" configurable item
  • Audit Policy settings: User Account Management
  • The "Set User ID" configurable item
  • record user/group information modification events
  • "Devices: Restrict CD-ROM access to locally logged on users"
  • %SystemDrive%\Documents and Settings\All Users\Documents\DrWatson\drwts32.log
  • The "Message text for users attempting to log on" policy
  • 'Interactive logon: Message text for users attempting to log on'
  • %SystemDrive%\Documents and Setting\Default User
  • %SystemDrive%\Documents and Settings\Default User
  • Audit settings: 'root user' activity (audit_user)
  • must be independent of User accounts
  • prompt user based on computer security
  • The "user home directory" configurable item
  • The "user profile service" configurable item
  • independent End User Developed Application specialist
  • idle direct console user interface session
  • ICH Guidance for Industry, E6 Good Clinical Practice: Consolidated Guidance
  • User Account Control: Virtualize file and registry write failures to per-user locations
  • 'User Account Control: Virtualize file and registry write failures to per-user locations'
  • Interactive logon: Message title for users attempting to log on
  • Group settings: Users in the 'IIS Worker Process' (IIS_WPG) group
  • Group settings: Users in the 'Read-Only Domain Controllers' group
  • %SystemDrive%\Documents and Settings\All Users\Documents\DrWatson\drwtsn32.log
  • The "Prevent users from configuring the hover color" configurable item
  • not changeable by the end user
  • Maximum lifetime for user ticket renewal
  • The "user audit file" configurable item
  • The screensaver for the default user
  • Remote Authentication Dial-In User Service
  • The "per-user location" configurable item
  • user identification and authentication metrics program
  • user registration and de-registration process
  • Product or Solution User Experience Training
  • end user developed or acquired application
  • Screen Lock settings: User Authentication Required
  • The "Maximum User Renewal Lifetime" policy
  • The "Maximum User Ticket Lifetime" policy
  • The Each user home directory: Permissions
  • The screensaver for the current user
  • Auditing for User accounts as appropriate
  • The 'system' and 'user' accounts (logins)
  • prompt user to use persisted data
  • The "User Rights Assignment" configurable item
  • The "remote desktop user" configurable item
  • The "user .netrc file" configurable item
  • end user computing device security guideline
  • remote access dial-in user service
  • The "Prevent users from choosing default text size" configurable item
  • "Devices: Restrict floppy access to locally logged on users only"
  • Group settings: Users in the 'Group Policy Creator Owners' group
  • Group settings: Users in the 'Pre-Windows 2000 Compatible' group
  • types of transactions that authorized users are permitted to execute
  • Require domain users to elevate when setting a network's location
  • The "user dot file" configurable item
  • The vsftpd service: Local user logon
  • The "Enforce user login restrictions" policy
  • The user home directories file: Permissions
  • The PATH for the root user
  • Directories owned by the root user
  • The "User Profile Service" configurable item
  • The "user mounted device" configurable item
  • Prompt for user name and password
  • access right granted to each user
  • Toggle user control over Insider builds
  • 'Toggle user control over Insider builds'
  • user identification lifecycle change management policy
  • The "Prevent users from customizing attachment security settings" configurable item
  • Terminal Services: The "Limit Users to One Remote Session" policy
  • Group settings: Users in the 'Allowed RODC Password Replication' group
  • Prevents users from uploading document templates to the Office.com Community
  • types of functions that authorized users are permitted to execute
  • Allow a Windows app to share application data between users
  • Do not allow users to enable or disable add-ons
  • The "Prevent Users from Changing Office Encryption Settings" configurable item
  • Security Zones: Do Not Allow Users to Add/Delete Sites
  • Interactive logon: Message text for users attempting to log on
  • The default umask for all users for the bash shell
  • Group settings: Users in the 'Denied RODC Password Replication' group
  • The gdm.conf file: 'Greeter' parameter (Warning Banner for GDM Users)
  • 'Require domain users to elevate when setting a network's location'
  • 'Allow a Windows app to share application data between users'
  • 'Interactive logon: Message title for users attempting to log on'
  • PCI Mobile Payment Acceptance Security Guidelines for Merchants as End-Users
  • Allow mix of policy and user locations
  • The home directory for each User account
  • The home directories for all User accounts.
  • The maximum lifetime for Kerberos user tickets
  • Account settings: The "debug programs" user right
  • The loginlog file: Account Ownership user right
  • Audit Log event: su (switch user) activity
  • Inter-TSF user data integrity transfer protection
  • The 'CREATE USER' privilege: Auditing on usage
  • Audit Policy: Account Management: User Account Management
  • user and administrator privilege management metrics program
  • failure to restrict user access to functions
  • procedure for user registration and de-registration
  • Account settings: The "enable computer and User accounts to be trusted for delegation" user right
  • allow everywhere except To and CC field
  • The %SystemDrive%\Documents and Settings\All Users\Documents\DrWatson directory: Permissions
  • The "Logon" configurable item: Do not allow anonymous users or accounts
  • The "Behavior of the elevation prompt for standard users" configurable item
  • Group settings: Users in the 'Telnet Clients' group on the domain
  • Group Policy settings: Prevent users from sharing files within their profile
  • process to independently monitor administrators and other users with higher privileges
  • The "general user ID parameter" configurable item
  • The "user-initiated system crashes" configurable item
  • The "Enable User Control Over Installs" policy
  • The "Single-user mode authentication" configurable item
  • Prevent per-user installation of ActiveX controls
  • The "locally logged-on user" configurable item
  • authenticator for a user account is changed
  • Data base user interface and query software
  • Never allow users to specify groups when restricting permission for documents
  • The "Automatically Log Off Users When login Time Expires (local)" policy
  • The 'DROP USER' privilege: Auditing on usage
  • The "Master user ID parameter" configurable item
  • The Disable user name and password setting
  • Audit Log event: User Account Management success
  • Display Last User Name in login Screen
  • The screen saver for the default user
  • The home directory of the root user
  • Account settings: The built-in 'Administrator' user
  • The "user dot file permissions" configurable item
  • Allow users with earlier versions of Office to read with browsers
  • The "Prevent users from sharing files within their profile" configurable item
  • The "Restrict level of calendar details users can publish" configurable item
  • Inter-TSF user data confidentiality transfer protection
  • The "subadministrators user ID parameter" configurable item
  • manage solution definition process and user expectations
  • The current user: The "screensaver timeout" policy
  • The Fast User Switching service: Startup Type
  • The screen saver for the current user
  • Account settings: The built-in 'Guest' user
  • Disable Per-User Installation of ActiveX Controls
  • read all User accounts command is issued
  • delete all User accounts command is issued
  • formal user registration and de-registration process
  • authenticator is added to a user account
  • Block all consumer Microsoft account user authentication
  • 'Block all consumer Microsoft account user authentication'
  • Audit Log event: User Account Management failure
  • Account settings: PATH variable for root user
  • The ALTER USER privilege: Auditing on usage
  • The '/etc/cups/cupsd.conf' file: 'User' setting
  • The "Customize User Agent String" configurable item
  • The "Disable user name and password" setting
  • User Identification, Profiles, Authorizations, and Password File
  • bind new authenticator to a user account
  • .forward files should be allowed or disallowed as appropriate for all users
  • %SystemDrive%\Documents and Settings\All Users\Application Data\Microsoft\HTML Help ACL
  • The "Prevent users from changing permissions on rights managed content" configurable item
  • Group settings: Users in the 'Windows Authorization Access' group on the domain
  • The "\"Restrict Terminal Server users to a single remote session\"" configurable item
  • types of transactions and functions that authorized users are permitted to execute
  • Restrict Remote Desktop Services users to a single Remote Desktop Services session
  • ACH (Automated Clearing House) Operating Rules OCC Bulletin 2004-58, December 2004
  • Account settings: The "increase scheduling priority" user right
  • Account settings: The "profile single process" user right
  • The 'Graphical User Interface (GUI)' startup environment: Status
  • policies and procedures for user identification management control
  • Simple Traversal of User Datagram Protocol Through NATS
  • Prevent users from allowing unsafe file types to be attached to forms
  • 'No auto-restart with logged on users for scheduled automatic updates installations'
  • HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\User Shell
  • The authentication mechanism (SYSTEM attribute) for each user
  • Avahi publishing of local information by user applications
  • Account settings: The "bypass traverse checking" user right
  • Account settings: The "create a pagefile" user right
  • Account settings: The "deny login locally" user right
  • Account settings: 'Retry Limit' for User Account Lockout
  • World-writable folders in root user PATH ('.'): Existence
  • Prevent deleting websites that the user has visited
  • The "Do not allow users to change permissions on folders" configurable item
  • Group settings: Users in the 'Telnet Clients' group on the local machine
  • No auto-restart with logged on users for scheduled automatic updates installations
  • 'Restrict Remote Desktop Services users to a single Remote Desktop Services session'
  • Group settings: Users in the 'RAS and IAS Servers' group on the domain
  • PCI Mobile Payment Acceptance Security Guidelines for Merchants as End-Users, Version 1.0
  • The "user-mounted removable file system" configurable item
  • OLAP PivotTable User Defined Function (UDF) security setting
  • Account settings: The "generate security audits" user right
  • Account settings: the "launch DCOM applications" user right
  • ICH Guidance for Industry, Q7A Good Manufacturing Practice Guidance for Active Pharmaceutical Ingredients
  • The "Disable Channel User Interface Completely" configurable item
  • Disable all user customization of Quick Access Toolbar
  • Account settings: The "profile system performance" user right
  • The loginlog file group: Account Ownership user right
  • Account settings: Password Protection on Default User accounts
  • The '.shosts' file: Number in user home directories
  • The "permissions on user home directory" configurable item
  • end user developed program codes, scripts and macros
  • user under the responsibility of the cloud provider
  • End User Computing Security Policies OIS-1001, 1.0
  • Group Policy settings: Security Zones: Do Not Allow Users to Add/Delete Sites
  • The "\"Devices: Restrict floppy access to locally logged-on users only\"" configurable item
  • The "Prevents users from uploading document templates to the Office Online community." setting

Scope, Define, and Maintain Regulatory Demands Online in Minutes.

LEARN MORE
Contact

Unified Compliance
10161 Park Run Drive, Suite 150
Las Vegas, Nevada 89145

PHONE 702.776.9898
FAX 866.924.3791
info@unifiedcompliance.com

Quick Links
  • Home
  • Company
  • Products
  • Partners
  • Peer Review
  • Contact
  • Support
  • Legal

Stay connected with UCF Twitter Facebook LinkedIn

Subscribe to WotW, news and alerts

Copyright © 2023 Network Frontiers LLC
All right reserved.

Stay connected with UCF
Twitter Facebook LinkedIn

Subscribe to WotW, news and alerts