Com•pli•ance Dictionary
Submit
  • Home
  • About
  • Subscribe
  • Log In
Submit
  • CCH account
  • Users
  • CCD
  • CCS
  • CCO
  • Fusers
  • User settings: Users with duplicate UIDs
  • CCP
  • ccc
  • ACH
  • userns
  • user
  • csh shell settings: Default umask for all users
  • User settings: Users running the uucico daemon
  • ACH authorization
  • CCI component
  • users account
  • Authenticated Users
  • users' name
  • ACH debit
  • ACH item
  • ACH credit
  • CCM v4.0.6
  • ACH return
  • CCI assembly
  • ACH operator
  • ACH payment
  • ACH batch
  • ACH router
  • ACH capture
  • ACH instruction
  • ACH device
  • CCM v4.0
  • C/CE
  • CCI equipment
  • ACH activity
  • ACH transaction
  • ACH file
  • ACH service
  • ACH entry
  • ACH process
  • ACH service provider
  • uncollected ACH transaction
  • unauthorized ACH transaction
  • Remote desktop Users
  • Container settings: Users in the 'Users' container
  • Group settings: Users in the 'Users' group
  • objects and users
  • list of users
  • Administrators, Authenticated Users
  • users with privilege
  • 'Administrators, Authenticated Users'
  • exception users list
  • ACH settlement date
  • ACH debit activity
  • uncollected ACH deposit
  • ACH credit transaction
  • unauthorized ACH debit
  • ACH contingency plan
  • ACH processing activity
  • ACH debit activity
  • international ACH requirement
  • Group settings: Users in the 'Power Users' group
  • Group settings: Users in the 'Domain Users' group
  • ACH single-entry
  • ACH debit return
  • ACH exposure limit
  • ACH credit activity
  • The '/etc/security/user' file: Default umask for new users
  • cc
  • CCE v5 - Apache 1.3
  • CCE v5 - Tomcat 4
  • CCE v5 - Tomcat 5
  • CCE v5 - Tomcat 6
  • internet initiated ACH transaction
  • user's guide
  • Ushers uniforms
  • user's responsibility
  • user's manual
  • Federal Wireless Users Forum
  • protected users security group
  • User Account Control: Behavior of the elevation prompt for standard users
  • Administrators and Power Users
  • Security Features Users Guide
  • Administrators and Interactive Users
  • secured XP users OU
  • specific group of users
  • Administrators, Remote Desktop Users
  • 'Administrators, Remote Desktop Users'
  • 'User Account Control: Behavior of the elevation prompt for standard users'
  • CCE v5 - Windows XP
  • CCE v5 - IIS 5
  • high risk ACH transaction
  • Regulation CC
  • telephone-initiated ACH debit
  • CCE v5 - AIX 5.3
  • CCE v5 - Windows 2000
  • CCE v5 - Windows 7
  • internet-initiated ACH transaction
  • 3 CCR 702-6
  • Internet-initiated ACH debit
  • CCE v5 - Apache 2.2
  • high-risk ACH transaction
  • telephone initiated ACH transaction
  • telephone-initiated ACH transaction
  • ACH debit return volume
  • user directory
  • user organization
  • user support
  • internet user
  • user deletion
  • concurrent user
  • user entity
  • user interface
  • User Right
  • user profile
  • user ID
  • user permission
  • user data
  • user attribute
  • computer user
  • user-friendly
  • train user
  • user acknowledgement
  • external user
  • internal user
  • user application
  • user management
  • user manager
  • authorised user
  • cloud user
  • emergency user
  • active user
  • user interaction
  • user testing
  • user namespace
  • user ownership
  • user motion
  • user associated
  • user provisioning
  • DRM user
  • user safeguard
  • admin user
  • CCE v5 - Windows Vista
  • CCE v5 - Apache 2.0
  • CCE v5 - IIS 6
  • ACH transaction processing procedure
  • organizational user
  • user awareness
  • user education
  • general user
  • unauthorized user
  • user modification
  • privileged user
  • anonymous user
  • user password
  • untied user
  • multi-user
  • mobile user
  • root user
  • drug user
  • snuff user
  • User Advocacy
  • affected user
  • user credential
  • end-user
  • user name
  • IT user
  • user group
  • user-id
  • standard user
  • human user
  • 'root' user
  • user setup
  • information user
  • user detail
  • approved user
  • user representative
  • tied user
  • user initialization
  • user registration
  • authorized user
  • user log
  • user authentication
  • user auditor
  • user privilege
  • user mode
  • user action
  • user identity
  • user acceptance
  • business user
  • user activity
  • user role
  • database user
  • unique user
  • user validation
  • user entitlement
  • unprivileged user
  • report user
  • intended user
  • user inactivity
  • temporary user
  • user .forward
  • local user
  • deceased user
  • user study
  • user functionality
  • calling user
  • user control
  • user identifier
  • data user
  • end user
  • terminated user
  • system user
  • user key
  • GNOME user
  • power user
  • remote user
  • service user
  • user error
  • user documentation
  • user session
  • user type
  • suspicious user
  • user guide
  • User Experience
  • new user
  • user information
  • enterprise user
  • user agent
  • user-agent
  • user training
  • token user
  • user involvement
  • backup user
  • user infrastructure
  • technical user
  • TCA user
  • user administration
  • prompt user
  • user creation
  • user access
  • user account
  • authenticated user
  • user authenticator
  • user request
  • tobacco user
  • user manual
  • user department
  • user identification
  • user query
  • user input
  • user risk
  • user need
  • user list
  • administrative user
  • user confirmation
  • user agreement
  • nonprivileged user
  • malicious user
  • user certificate
  • user verification
  • nonorganizational user
  • CCE v5 - Microsoft Office 2007
  • Cloud Security Alliance CCM V1.3
  • CCE v5 - Microsoft Exchange 2007
  • contraceptive device for female users
  • Prevent users from modifying settings
  • contraceptive accessory for female users
  • user's Swift infrastructure
  • Contraceptive devices for female users
  • users without wide-ranging authorisation
  • ambiguous to users in general
  • Core dumps for all users
  • 'Prevent users from modifying settings'
  • CCE v5 - Microsoft Exchange 2010
  • CCE v5 - Sun Solaris 9
  • CCE v5 - Sun Solaris 10
  • CCE v5 - Windows Server 2008
  • CCE v5 - MS SQL 2005
  • ICH Q10 Pharmaceutical Quality System
  • user's network location
  • Group settings: Users in the 'Distributed COM Users' group on the domain
  • The '/bin/csh' file: Permissions
  • CCE v5 - HP-UX 11.23
  • CCE v5 - Sun Solaris 8
  • CCE v5 - Microsoft Office 2010
  • CCE v5 - Polycom HDX 3
  • CCE v5 - Internet Explorer 7
  • CCE v5 - Windows Server 2003
  • Group settings: Users in the 'Performance Log Users' group on the domain
  • Group settings: Users in the 'Performance Monitor Users' group on the domain
  • Group settings: Users in the 'Remote Desktop Users' group on the domain
  • The "csh shell" configurable item
  • The '/sbin/csh' file: Permissions
  • The '/etc/csh' file: Permissions
  • CCE v5 - MS SQL 2000
  • Group settings: Users in the 'Incoming Forest Trust Builders' group user on the domain
  • User account alias
  • User Name Mapping
  • User Access Management
  • User Definable Field
  • User Data Protocol
  • privileged user ID
  • user-authentication management
  • generic user ID
  • shared user ID
  • shared user identifier
  • user ID list
  • computer user identification
  • computer user ID
  • external party user
  • distinct user ID
  • user access program
  • privileged access user
  • user awareness programme
  • group account user
  • malicious user testing
  • privileged user access
  • other data user
  • user authentication mechanism
  • shared user access
  • user entity system
  • domain user account
  • user identification directory
  • user account list
  • terminated user ID
  • compromised user account
  • user ID account
  • mechanized user ID
  • no user activity
  • user-uploaded file
  • unique user identifier
  • without user authorisation
  • social media user
  • real-world user
  • user-subject binding
  • user-defined processing
  • user satisfaction inquiry
  • User Principle Name
  • Information Technology user
  • inactive user account
  • user access privilege
  • remote VPN user
  • vendor managed user
  • Mail User Agent
  • Common User Interface
  • privileged user identifier
  • third party user
  • long user session
  • OSG-SSLF-User
  • Office2010SP1 User Security
  • interactive user access
  • user interface standard
  • user is authenticated
  • end-user system
  • strong user authentication
  • user registration process
  • shared user account
  • unnecessary user identifier
  • host's user namespace
  • multi-user system
  • user account name
  • user-defined module
  • default user account
  • user-provided data
  • end-user computing
  • training user identifier
  • root user account
  • user access list
  • mechanized user identifier
  • unprivileged user account
  • user identity confidentiality
  • client user access
  • user verified flag
  • Group settings: Users in the 'Distributed COM Users' group on the local machine
  • The user umask
  • allow user decision
  • User Partnership Program
  • User Datagram Protocol
  • end user computing
  • single user mode
  • uses and capabilities
  • assign user permission
  • user account authentication
  • privileged user identification
  • user-installed software
  • dedicated user account
  • user computing session
  • user account provisioning
  • user account credential
  • information system user
  • user activity log
  • OSG-EC-User
  • physical user access
  • payment service user
  • user awareness program
  • default user name
  • unique user ID
  • user registration procedure
  • non-administrator user
  • invalid user access
  • end-user device
  • user entity responsibility
  • issue user identifier
  • user behavior analytic
  • user interface component
  • user-controllable data
  • end user certificate
  • previous user ID
  • default user umask
  • duplicate user name
  • 'root' user account
  • user account lifecycle
  • user financial institution
  • user plane traffic
  • privilege user ID
  • user dot-file
  • user file quota
  • user reference documentation
  • non-organizational user
  • end user instruction
  • User account activity
  • Graphical User Interface
  • user-added metadata
  • Fast User Switching
  • User Interface Accessibility
  • User Education Professional
  • User Support Specialist
  • affected user department
  • end user community
  • manage user access
  • cloud service user
  • user access review
  • active user account
  • unique user identification
  • unauthorized vSphere user
  • user environment setting
  • local user authentication
  • privileged user account
  • unnecessary user account
  • end user policy
  • user-level information
  • default user identifier
  • disabled user ID
  • user namespace support
  • user query event
  • privileged user administration
  • User Access Administration
  • human user interface
  • User ID directory
  • end-user asset
  • testing user identifier
  • end user account
  • high-risk user
  • user access setting
  • total user downtime
  • user account password
  • administrator user account
  • normal user account
  • interactive user logon
  • user owned device
  • user fee collection
  • user access right
  • user awareness training
  • user privilege management
  • privileged user command
  • user account management
  • user .rhosts file
  • security aware user
  • User Account Control
  • non-consumer user
  • application file user
  • local User account
  • User Manual Developer
  • User Manual Tester
  • Develop User Manuals
  • User Defined Function
  • issue user ID
  • temporary user account
  • generic user identifier
  • user identifier list
  • customer/user documentation
  • user interface documentation
  • non-privileged user
  • third-party user
  • user interface document
  • provisioning user access
  • user-based incident
  • end user system
  • User Identification Number
  • set user ID
  • end user device
  • default user ID
  • generic user account
  • disabled user identifier
  • user audit logging
  • user-centered design
  • user centered design
  • user management control
  • user behavioural analytic
  • user test response
  • user activity data
  • inactive user identification
  • inactive user ID
  • intra-territorial user
  • previous user identifier
  • standard user account
  • terminated user identifier
  • internal system user
  • vCenter Server user
  • no user activtiy
  • closed user group
  • non-organisational user
  • user-based certificate
  • database user account
  • non-user account
  • user interaction alert
  • The "Power Users Group" configurable item
  • The .netrc files for all users
  • The .shosts files for all users
  • Group settings: Users in the 'Performance Log Users' group on the local machine
  • The .rhosts files for all users
  • Warning banners for gui login users
  • Contraceptive device accessories for female users
  • Group settings: Users in the 'Remote Desktop Users' group on the local machine
  • Group settings: Users in the 'Performance Monitor Users' group on the local machine
  • %SystemDrive%\Documents and Settings\All Users
  • Classic - local users authenticate as themselves
  • 'Classic - local users authenticate as themselves'
  • The default umask for ftp users
  • classic – local users authenticate as themselves
  • The "/etc/csh file" configurable item
  • CCE v5 - Microsoft Internet Explorer 8
  • The "Disable commands - Database Tools | Administer | Users and Permission | User and Group Permissions" configurable item
  • The "Disable commands - Database Tools | Administer | Users and Permissions | User and Group Accounts" configurable item
  • The "Disable commands - Database Tools | Administer | Users and Permission | User-Level Security Wizard..." configurable item
  • Public Key Cryptography Based User-to-User protocol
  • The "/bin/csh file" configurable item
  • The "/sbin/csh file" configurable item
  • The daemon user's umask
  • The '/usr/bin/csh' file: Permissions
  • CCE v5 - Oracle WebLogic Server 11g
  • list of users with their corresponding permissions
  • Account settings: Default umask for all users
  • Group settings: Users in the 'Guests' group
  • Group settings: Users in the 'Replicator' group
  • Group settings: Users in the 'DnsAdmins' group
  • Group settings: Users in the 'IIS_IUSRS' group
  • The '/etc/vsftpd/vsftpd.conf' file: Users referenced
  • The "default umask for users" configurable item
  • financial interests of its payment service users
  • User Access Logging Service
  • User account is disabled
  • User account is enabled
  • Account settings: User accounts
  • user rights assignment setting
  • Removable User Identity Module
  • User account is read
  • User Access Management procedure
  • list of user identifiers
  • employee's computer user identification
  • employee's computer user ID
  • WinXPSP3 User Security Compliance
  • Win7SP1 User Security Compliance
  • OSG-EC-User, 1.0
  • non-shared user account
  • Direct Console User Interface
  • service account user ID
  • non-individual user account
  • user-centered design process
  • Per-User Session Limit
  • responsibility of external user
  • portable end-user device
  • end user computing activity
  • end-user computing activity
  • vendor group user ID
  • disaster recovery user account
  • Graphical User Interface operation
  • user-provided authentication device
  • Devices: Prevent users from installing printer drivers
  • A warning banner for all FTP users
  • Group settings: Users in the 'DnsUpdateProxy' group
  • Enumerate local users on domain-joined computers
  • 'Devices: Prevent users from installing printer drivers'
  • 'Enumerate local users on domain-joined computers'
  • Group settings: Users in the 'Administrators' group
  • processes acting on behalf of authorized users
  • User account activity audit
  • Autoplay for Current User
  • User account is unlocked
  • User-Mode Driver Framework
  • Electronic software user manual
  • Software User Reference Documentation
  • vulnerability management user interface
  • risk posed by user
  • IE10 User Security Compliance
  • OSG-SSLF-User, 1.0
  • user account management procedure
  • review of user access
  • end-user computing equipment
  • special purpose user ID
  • user access management control
  • portable end user device
  • previously used user identifier
  • user average interruption duration
  • end user developed application
  • Digital Rights Management user
  • customer group user ID
  • user-supplied scriptable content
  • non-customer user ID
  • CCE v5 - Microsoft Windows Server 2k8 R2
  • Enforce user logon restrictions
  • owned by appropriate user
  • User account is created
  • su (switch user) activity
  • Hardware User Reference Documentation
  • list of user IDs
  • customer (tenant) user access
  • IE8 User Security Compliance
  • Win8 User Security Compliance
  • activity of authorized user
  • Office2010SP1 User Security, 1.0
  • role and user access
  • service account user identifier
  • end user computing application
  • cloud service user ID
  • user acceptance testing environment
  • user life cycle management
  • user of the report
  • mobile end user device
  • keyboard operable user interface
  • non-employee User ID
  • previously used user ID
  • Audit User Account Management
  • user account life cycle
  • virtual machine user role
  • vendor group user identifier
  • non-customer user identifier
  • user identification and authentication
  • NetBIOS Extended User Interface
  • User account is deleted
  • User permission is assigned
  • User Account Reporting standard
  • user access provisioning process
  • end-user messaging technology
  • end user messaging technology
  • unique User Identification Number
  • special purpose user ID
  • external mechanized user identifier
  • user ID tracking system
  • internal mechanized user ID
  • external mechanized user ID
  • user access review process
  • end-user computing application
  • user account management tool
  • cloud service user identifier
  • User Datagram Protocol port
  • mobile end-user device
  • customer group user identifier
  • Telco Cloud Automation user
  • key user developed application
  • User account is updated
  • User permission is removed
  • Web Services User Interface
  • complementary user entity control
  • user-machine interaction specification
  • end user computing device
  • end user support communication
  • manage a user account
  • Lock Inactive User Account
  • IE9 User Security Compliance
  • WinVistaSP2 User Security Compliance
  • interface with user/customer
  • special purpose user identifier
  • user account access reviewer
  • user identifier tracking system
  • internal mechanized user identifier
  • user account review process
  • user identity creation request
  • non-employee user identification
  • user-based cardholder activation
  • 'Audit User Account Management'
  • default user shell timeout
  • privileged user access right
  • The "/usr/bin/csh file" configurable item
  • ACH Operating Rules OCC Bulletin 2004 58
  • CCE v5 - Red Hat Enterprise Linux 4
  • CCE v5 - Red Hat Enterprise Linux 5
  • Always require users to connect to verify permission
  • The 'Screensaver timeout' setting for GNOME users: Status
  • Group settings: Users in the 'Domain Guests' group
  • The "default umask for ftp users" configurable item
  • The "warning banner for GNOME users" configurable item
  • 'Allow users to enable online speech recognition services'
  • 'Prevent users and apps from accessing dangerous websites'
  • The ability for users to perform interactive startups
  • Group settings: Users in the 'DHCP Administrators' group
  • Group settings: Users in the 'Domain Admins' group
  • %SystemDrive%\Documents and Settings\All Users\Documents\DrWatson
  • Allow users to demote attachments to Level 2
  • Group settings: Users in the 'Account Operators' group
  • Group settings: Users in the 'Cert Publisher' group
  • Group settings: Users in the 'Network Services' group
  • Group settings: Users in the 'Print Operators' group
  • Removable media that is mountable by console users
  • Account settings: Users having access to 'ALL_' views
  • Classified Document Container Security File - Combinations and Users
  • Group settings: Users in the 'Enterprise Admins' group
  • The 'Screensaver lock' setting for GNOME users: Status
  • The 'vold.conf' file: Authorized users of removable media
  • 'Prevent users from sharing files within their profile'
  • The "Prevent Users from Installing Printer Drivers" policy
  • Group settings: Users in the 'Backup Operators' group
  • Group settings: Users in the 'Cryptographic Operators' group
  • Group settings: Users in the 'Schema Admins' group
  • Group settings: Users in the 'Server Operators' group
  • Allow users to enable online speech recognition services
  • Prevent users and apps from accessing dangerous websites
  • Prevent users from sharing files within their profile
  • ICH Q10 Pharmaceutical Quality System, Step 2 Version
  • The "user stack" configurable item
  • Turn off all user customizations
  • Windows All-User Install Agent
  • Account settings: Default User accounts
  • The "CDE user" configurable item
  • Office Multilingual User Interface Pack
  • User Identification and Authentication Reporting
  • Win8 User Security Compliance, 1.0
  • user with administrative account access
  • user without wide-ranging authorization
  • 'Allow user control over installs'
  • user of telecommunications billing service
  • time-based user access restriction
  • The "user configuration" configurable item
  • The "XP user" configurable item
  • Visio Multilingual User Interface Pack
  • Administration and End User Manual
  • continuous user account management procedure
  • user access policy and procedure
  • WinVistaSP2 User Security Compliance, 1.0
  • training and testing user identifier
  • affected internal and external user
  • Allow user control over installs
  • Enable User Control Over Installs
  • critical End User Developed Application
  • authorized End User Developed Application
  • create and manage User accounts
  • The "user information" configurable item
  • Audit Log field: User ID
  • Account settings: Inactive User accounts
  • prompt user to use defaults
  • User account password is changed
  • User account is locked out
  • The "\"nobody\" user" configurable item
  • training and testing user ID
  • user with administrative access permissions
  • end user computing device control
  • intended user of the report
  • The "FTP user" configurable item
  • Windows User Mode Driver Framework
  • Maximum lifetime for user ticket
  • User account name is changed
  • Autoplay for Default User/Profile
  • The User Profile service: Status
  • user registration and deregistration function
  • WinXPSP3 User Security Compliance, 1.0
  • IE9 User Security Compliance, 1.0
  • User Identity (ID) creation request
  • Direct Console User Interface functionality
  • user identification lifecycle management policy
  • The user configuration file: Permissions
  • The "standard user" configurable item
  • Disable user name and password
  • Graphical user interface development software
  • Project Multilingual User Interface Pack
  • opt out by a user
  • User and Administrator Access List
  • User and Administrator Access Request
  • user and administrator privilege management
  • user account management metrics program
  • user-machine interaction specification document
  • suspicious user account activity procedure
  • formal user access provisioning process
  • IE8 User Security Compliance, 1.0
  • IE10 User Security Compliance, 1.0
  • Win7SP1 User Security Compliance, 1.0
  • Check for Duplicate User Names
  • Allow upload of User Activities
  • 'Allow upload of User Activities'
  • Direct Console User Interface account
  • user-supplied expression template language
  • up-to-date record of the users or profiles of users who have authorized access to the information system
  • develop product and service solution with customers and users
  • Network access: Let Everyone permissions apply to anonymous users
  • The "Prevent users from configuring background color" configurable item
  • Allow users to connect remotely using Remote Desktop Services
  • Group settings: Users in the 'Network Configuration Operator' group
  • Account settings: Users with Root-Level Privileges (UID=0)
  • 'Network access: Let Everyone permissions apply to anonymous users'
  • X-Windows: write .Xauthority files to users' home directories
  • Group settings: Users in the 'Event Log Readers' group
  • The "Prevent users from configuring text color" configurable item
  • Users can't add or log on with Microsoft accounts
  • The "default screen lock for GNOME users" configurable item
  • Add e-mail recipients to users' Safe Senders Lists
  • Do not enumerate connected users on domain-joined computers
  • Disallow standard users from changing the PIN or password
  • The %SystemDrive%\Documents and Settings\All Users directory: Permissions
  • The "Let Everyone permissions apply to anonymous users" policy
  • SQL Server settings: Users assigned to fixed database roles
  • enrollment process to add new users to the system
  • Security Zones: Do Not Allow Users to Change Policies
  • The "default screen lock for CDE users" configurable item
  • 'Do not enumerate connected users on domain-joined computers'
  • 'Users can't add or log on with Microsoft accounts'
  • culture that fosters responsible and controlled access for users
  • prompt user based on computer security
  • Audit Policy settings: User Account Management
  • user registration and de-registration process
  • end user developed or acquired application
  • independent End User Developed Application specialist
  • idle direct console user interface session
  • Remote Authentication Dial In User Service
  • User Account Control: Virtualize file and registry write failures to per-user locations
  • 'User Account Control: Virtualize file and registry write failures to per-user locations'
  • Screen Lock settings: User Authentication Required
  • The "Maximum User Renewal Lifetime" policy
  • The Each user home directory: Permissions
  • The 'system' and 'user' accounts (logins)
  • prompt user to use persisted data
  • The "Set User ID" configurable item
  • The "per-user location" configurable item
  • The "local user logon" configurable item
  • The "user audit file" configurable item
  • The "Maximum User Ticket Lifetime" policy
  • The PATH for the root user
  • The screensaver for the current user
  • Auditing for User accounts as appropriate
  • Directories owned by the root user
  • not changeable by the end user
  • The "user mounted device" configurable item
  • The "user home directory" configurable item
  • The "user .netrc file" configurable item
  • Remote Authentication Dial-In User Service
  • The "user dot file" configurable item
  • Product or Solution User Experience Training
  • access right granted to each user
  • user ID lifecycle change management policy
  • Audit settings: 'root user' activity (audit_user)
  • The "User Profile Service" configurable item
  • Maximum lifetime for user ticket renewal
  • The "Enforce user login restrictions" policy
  • The user home directories file: Permissions
  • The "User Rights Assignment" configurable item
  • The "remote desktop user" configurable item
  • The "user profile service" configurable item
  • user identification and authentication metrics program
  • end user computing device security guideline
  • 'Toggle user control over Insider builds'
  • user identification lifecycle change management policy
  • %SystemDrive%\Documents and Settings\All Users\Documents\DrWatson\drwts32.log
  • The "Prevent users from customizing attachment security settings" configurable item
  • The "Message text for users attempting to log on" policy
  • Group settings: Users in the 'Denied RODC Password Replication' group
  • 'Interactive logon: Message text for users attempting to log on'
  • must be independent of User accounts
  • The vsftpd service: Local user logon
  • The screensaver for the default user
  • %SystemDrive%\Documents and Settings\Default User
  • %SystemDrive%\Documents and Setting\Default User
  • Prompt for user name and password
  • record user/group information modification events
  • Toggle user control over Insider builds
  • remote access dial-in user service
  • Group settings: Users in the 'Read-Only Domain Controllers' group
  • %SystemDrive%\Documents and Settings\All Users\Documents\DrWatson\drwtsn32.log
  • types of transactions that authorized users are permitted to execute
  • Allow a Windows app to share application data between users
  • 'Interactive logon: Message title for users attempting to log on'
  • Do not allow users to enable or disable add-ons
  • The "Prevent users from configuring the hover color" configurable item
  • Terminal Services: The "Limit Users to One Remote Session" policy
  • Group settings: Users in the 'IIS Worker Process' (IIS_WPG) group
  • Group settings: Users in the 'Allowed RODC Password Replication' group
  • 'Allow a Windows app to share application data between users'
  • "Devices: Restrict floppy access to locally logged on users only"
  • The gdm.conf file: 'Greeter' parameter (Warning Banner for GDM Users)
  • Prevents users from uploading document templates to the Office.com Community
  • The "Prevent users from choosing default text size" configurable item
  • Security Zones: Do Not Allow Users to Add/Delete Sites
  • Interactive logon: Message text for users attempting to log on
  • Interactive logon: Message title for users attempting to log on
  • The default umask for all users for the bash shell
  • Group settings: Users in the 'Group Policy Creator Owners' group
  • Group settings: Users in the 'Pre-Windows 2000 Compatible' group
  • "Devices: Restrict CD-ROM access to locally logged on users"
  • The "Prevent Users from Changing Office Encryption Settings" configurable item
  • types of functions that authorized users are permitted to execute
  • Require domain users to elevate when setting a network's location
  • 'Require domain users to elevate when setting a network's location'
  • ICH Guidance for Industry, E6 Good Clinical Practice: Consolidated Guidance
  • The "Automatically Log Off Users When login Time Expires (local)" policy
  • The "Logon" configurable item: Do not allow anonymous users or accounts
  • The "Prevent users from sharing files within their profile" configurable item
  • Group settings: Users in the 'Telnet Clients' group on the domain
  • Allow users with earlier versions of Office to read with browsers
  • Never allow users to specify groups when restricting permission for documents
  • manage solution definition process and user expectations
  • The ALTER USER privilege: Auditing on usage
  • Account settings: The "debug programs" user right
  • failure to restrict user access to functions
  • formal user registration and de-registration process
  • bind new authenticator to a user account
  • 'Block all consumer Microsoft account user authentication'
  • Account settings: The "enable computer and User accounts to be trusted for delegation" user right
  • The "Restrict level of calendar details users can publish" configurable item
  • The "Behavior of the elevation prompt for standard users" configurable item
  • process to independently monitor administrators and other users with higher privileges
  • Group Policy settings: Prevent users from sharing files within their profile
  • PCI Mobile Payment Acceptance Security Guidelines for Merchants as End-Users
  • The current user: The "screensaver timeout" policy
  • The Fast User Switching service: Startup Type
  • Display Last User Name in login Screen
  • The home directory for each User account
  • The maximum lifetime for Kerberos user tickets
  • Disable Per-User Installation of ActiveX Controls
  • Audit Policy: Account Management: User Account Management
  • Prevent per-user installation of ActiveX controls
  • The "general user ID parameter" configurable item
  • Allow mix of policy and user locations
  • Block all consumer Microsoft account user authentication
  • The %SystemDrive%\Documents and Settings\All Users\Documents\DrWatson directory: Permissions
  • The "user-initiated system crashes" configurable item
  • Inter-TSF user data confidentiality transfer protection
  • Inter-TSF user data integrity transfer protection
  • The "Disable user name and password" setting
  • The Disable user name and password setting
  • Audit Log event: User Account Management success
  • Account settings: PATH variable for root user
  • Account settings: The built-in 'Guest' user
  • The loginlog file: Account Ownership user right
  • read all User accounts command is issued
  • user and administrator privilege management metrics program
  • authenticator is added to a user account
  • Data base user interface and query software
  • The "subadministrators user ID parameter" configurable item
  • The "Master user ID parameter" configurable item
  • Audit Log event: User Account Management failure
  • The home directories for all User accounts.
  • The screen saver for the current user
  • The screen saver for the default user
  • The home directory of the root user
  • Audit Log event: su (switch user) activity
  • The 'DROP USER' privilege: Auditing on usage
  • The '/etc/cups/cupsd.conf' file: 'User' setting
  • The "locally logged-on user" configurable item
  • procedure for user registration and de-registration
  • authenticator for a user account is changed
  • The "Single-user mode authentication" configurable item
  • The 'CREATE USER' privilege: Auditing on usage
  • The "Customize User Agent String" configurable item
  • The "Enable User Control Over Installs" policy
  • Account settings: The built-in 'Administrator' user
  • The "user dot file permissions" configurable item
  • User Identification, Profiles, Authorizations, and Password File
  • delete all User accounts command is issued
  • allow everywhere except To and CC field
  • The "Prevent users from changing permissions on rights managed content" configurable item
  • Group settings: Users in the 'Windows Authorization Access' group on the domain
  • The "\"Restrict Terminal Server users to a single remote session\"" configurable item
  • Prevent users from allowing unsafe file types to be attached to forms
  • Restrict Remote Desktop Services users to a single Remote Desktop Services session
  • 'Restrict Remote Desktop Services users to a single Remote Desktop Services session'
  • .forward files should be allowed or disallowed as appropriate for all users
  • types of transactions and functions that authorized users are permitted to execute
  • The "Do not allow users to change permissions on folders" configurable item
  • No auto-restart with logged on users for scheduled automatic updates installations
  • 'No auto-restart with logged on users for scheduled automatic updates installations'
  • Group settings: Users in the 'Telnet Clients' group on the local machine
  • %SystemDrive%\Documents and Settings\All Users\Application Data\Microsoft\HTML Help ACL
  • Disable all user customization of Quick Access Toolbar

Scope, Define, and Maintain Regulatory Demands Online in Minutes.

LEARN MORE
Contact

Unified Compliance
10161 Park Run Drive, Suite 150
Las Vegas, Nevada 89145

PHONE 702.776.9898
FAX 866.924.3791
info@unifiedcompliance.com

Quick Links
  • Home
  • Company
  • Products
  • Partners
  • Peer Review
  • Contact
  • Support
  • Legal

Stay connected with UCF Twitter Facebook LinkedIn

Subscribe to WotW, news and alerts

Copyright © 2025 Network Frontiers LLC
All right reserved.

Stay connected with UCF
Twitter Facebook LinkedIn

Subscribe to WotW, news and alerts