Com•pli•ance Dictionary
Submit
  • Home
  • About
  • Subscribe
  • Log In
Submit
  • CCH account
  • Users
  • CCD
  • CCS
  • CCO
  • Fusers
  • User settings: Users with duplicate UIDs
  • CCP
  • ccc
  • ACH
  • userns
  • user
  • csh shell settings: Default umask for all users
  • User settings: Users running the uucico daemon
  • CCI component
  • ACH authorization
  • users account
  • Authenticated Users
  • users' name
  • ACH debit
  • ACH item
  • ACH credit
  • CCM v4.0.6
  • ACH return
  • CCI assembly
  • ACH operator
  • ACH payment
  • ACH batch
  • ACH router
  • CCM v4.0
  • ACH capture
  • ACH instruction
  • ACH device
  • C/CE
  • CCI equipment
  • ACH activity
  • ACH transaction
  • ACH file
  • ACH service
  • ACH entry
  • ACH process
  • ACH service provider
  • uncollected ACH transaction
  • unauthorized ACH transaction
  • Remote desktop Users
  • Container settings: Users in the 'Users' container
  • Group settings: Users in the 'Users' group
  • objects and users
  • Administrators, Authenticated Users
  • list of users
  • 'Administrators, Authenticated Users'
  • exception users list
  • users with privilege
  • ACH settlement date
  • ACH debit activity
  • uncollected ACH deposit
  • ACH credit transaction
  • unauthorized ACH debit
  • ACH contingency plan
  • ACH processing activity
  • ACH debit activity
  • international ACH requirement
  • Group settings: Users in the 'Power Users' group
  • Group settings: Users in the 'Domain Users' group
  • ACH single-entry
  • ACH debit return
  • ACH exposure limit
  • ACH credit activity
  • The '/etc/security/user' file: Default umask for new users
  • cc
  • CCE v5 - Apache 1.3
  • CCE v5 - Tomcat 4
  • CCE v5 - Tomcat 5
  • CCE v5 - Tomcat 6
  • internet initiated ACH transaction
  • Ushers uniforms
  • user's responsibility
  • user's guide
  • user's manual
  • Federal Wireless Users Forum
  • protected users security group
  • User Account Control: Behavior of the elevation prompt for standard users
  • secured XP users OU
  • Administrators and Interactive Users
  • specific group of users
  • Administrators, Remote Desktop Users
  • 'Administrators, Remote Desktop Users'
  • Administrators and Power Users
  • Security Features Users Guide
  • 'User Account Control: Behavior of the elevation prompt for standard users'
  • CCE v5 - Windows XP
  • CCE v5 - IIS 5
  • high risk ACH transaction
  • Regulation CC
  • telephone-initiated ACH debit
  • 3 CCR 702-6
  • CCE v5 - AIX 5.3
  • CCE v5 - Windows 2000
  • CCE v5 - Windows 7
  • internet-initiated ACH transaction
  • Internet-initiated ACH debit
  • CCE v5 - Apache 2.2
  • high-risk ACH transaction
  • telephone initiated ACH transaction
  • telephone-initiated ACH transaction
  • ACH debit return volume
  • user interface
  • User Right
  • user organization
  • user support
  • internet user
  • user directory
  • concurrent user
  • user entity
  • user deletion
  • user profile
  • user ID
  • computer user
  • user permission
  • user data
  • user attribute
  • user-friendly
  • train user
  • user acknowledgement
  • external user
  • internal user
  • user application
  • user management
  • user manager
  • authorised user
  • cloud user
  • emergency user
  • active user
  • user interaction
  • user testing
  • user namespace
  • user ownership
  • user motion
  • user associated
  • user provisioning
  • DRM user
  • user safeguard
  • admin user
  • CCE v5 - Windows Vista
  • CCE v5 - Apache 2.0
  • CCE v5 - IIS 6
  • ACH transaction processing procedure
  • unauthorized user
  • organizational user
  • user awareness
  • user modification
  • untied user
  • privileged user
  • user education
  • general user
  • anonymous user
  • user password
  • 'root' user
  • user setup
  • information user
  • user detail
  • approved user
  • standard user
  • human user
  • multi-user
  • mobile user
  • root user
  • drug user
  • snuff user
  • User Advocacy
  • affected user
  • user credential
  • end-user
  • user name
  • IT user
  • user group
  • user-id
  • user key
  • GNOME user
  • power user
  • remote user
  • end user
  • terminated user
  • system user
  • user study
  • user functionality
  • calling user
  • service user
  • user control
  • user identifier
  • data user
  • user error
  • user documentation
  • user session
  • user type
  • suspicious user
  • user guide
  • User Experience
  • new user
  • user information
  • enterprise user
  • user agent
  • user-agent
  • user training
  • token user
  • user involvement
  • backup user
  • user infrastructure
  • technical user
  • TCA user
  • authorized user
  • tied user
  • user initialization
  • user registration
  • user log
  • user authentication
  • user auditor
  • user privilege
  • user representative
  • user mode
  • user action
  • user identity
  • user acceptance
  • business user
  • user activity
  • user role
  • database user
  • unique user
  • user validation
  • user entitlement
  • unprivileged user
  • report user
  • intended user
  • user inactivity
  • temporary user
  • user .forward
  • local user
  • deceased user
  • user administration
  • user creation
  • user account
  • prompt user
  • user access
  • authenticated user
  • user authenticator
  • user request
  • user verification
  • user confirmation
  • user agreement
  • nonprivileged user
  • malicious user
  • user certificate
  • administrative user
  • nonorganizational user
  • tobacco user
  • user manual
  • user department
  • user identification
  • user query
  • user input
  • user risk
  • user need
  • user list
  • CCE v5 - Microsoft Office 2007
  • Cloud Security Alliance CCM V1.3
  • CCE v5 - Microsoft Exchange 2007
  • contraceptive device for female users
  • Prevent users from modifying settings
  • contraceptive accessory for female users
  • ambiguous to users in general
  • user's Swift infrastructure
  • Contraceptive devices for female users
  • users without wide-ranging authorisation
  • Core dumps for all users
  • 'Prevent users from modifying settings'
  • CCE v5 - Microsoft Exchange 2010
  • CCE v5 - Sun Solaris 9
  • CCE v5 - Sun Solaris 10
  • CCE v5 - Windows Server 2008
  • CCE v5 - MS SQL 2005
  • ICH Q10 Pharmaceutical Quality System
  • user's network location
  • Group settings: Users in the 'Distributed COM Users' group on the domain
  • The '/bin/csh' file: Permissions
  • CCE v5 - HP-UX 11.23
  • CCE v5 - Sun Solaris 8
  • CCE v5 - Microsoft Office 2010
  • CCE v5 - Polycom HDX 3
  • CCE v5 - Internet Explorer 7
  • CCE v5 - Windows Server 2003
  • Group settings: Users in the 'Performance Log Users' group on the domain
  • Group settings: Users in the 'Performance Monitor Users' group on the domain
  • Group settings: Users in the 'Remote Desktop Users' group on the domain
  • The "csh shell" configurable item
  • The '/sbin/csh' file: Permissions
  • The '/etc/csh' file: Permissions
  • CCE v5 - MS SQL 2000
  • Group settings: Users in the 'Incoming Forest Trust Builders' group user on the domain
  • User account alias
  • User Name Mapping
  • User Access Management
  • User Definable Field
  • User Data Protocol
  • privileged user ID
  • user-authentication management
  • generic user ID
  • shared user ID
  • shared user identifier
  • user ID list
  • computer user identification
  • computer user ID
  • external party user
  • distinct user ID
  • user access program
  • privileged access user
  • user awareness programme
  • group account user
  • malicious user testing
  • privileged user access
  • other data user
  • user authentication mechanism
  • shared user access
  • user entity system
  • domain user account
  • user identification directory
  • user account list
  • terminated user ID
  • compromised user account
  • user ID account
  • mechanized user ID
  • no user activity
  • user-uploaded file
  • unique user identifier
  • without user authorisation
  • social media user
  • real-world user
  • user-subject binding
  • user-defined processing
  • user satisfaction inquiry
  • User Principle Name
  • remote VPN user
  • vendor managed user
  • Mail User Agent
  • Information Technology user
  • inactive user account
  • root user account
  • user access list
  • mechanized user identifier
  • unprivileged user account
  • user identity confidentiality
  • client user access
  • end-user system
  • strong user authentication
  • user registration process
  • unnecessary user identifier
  • host's user namespace
  • multi-user system
  • user account name
  • user-defined module
  • default user account
  • user-provided data
  • end-user computing
  • training user identifier
  • shared user account
  • Common User Interface
  • user access privilege
  • privileged user identifier
  • third party user
  • long user session
  • OSG-SSLF-User
  • Office2010SP1 User Security
  • interactive user access
  • user interface standard
  • user is authenticated
  • Fast User Switching
  • User Interface Accessibility
  • end user instruction
  • User account activity
  • user dot-file
  • Graphical User Interface
  • user-added metadata
  • user file quota
  • user reference documentation
  • non-organizational user
  • active user account
  • unique user identification
  • User Education Professional
  • User Support Specialist
  • affected user department
  • end user community
  • manage user access
  • cloud service user
  • user access review
  • unauthorized vSphere user
  • user environment setting
  • local user authentication
  • privileged user account
  • unnecessary user account
  • end user policy
  • user-level information
  • default user identifier
  • disabled user ID
  • user namespace support
  • user query event
  • privileged user administration
  • User Access Administration
  • human user interface
  • User ID directory
  • end-user asset
  • testing user identifier
  • end user account
  • high-risk user
  • user access setting
  • total user downtime
  • user account password
  • administrator user account
  • normal user account
  • Group settings: Users in the 'Distributed COM Users' group on the local machine
  • The user umask
  • allow user decision
  • User Datagram Protocol
  • end user computing
  • User Partnership Program
  • single user mode
  • payment service user
  • uses and capabilities
  • assign user permission
  • user account authentication
  • privileged user identification
  • user-installed software
  • dedicated user account
  • user computing session
  • user account provisioning
  • user account credential
  • information system user
  • user activity log
  • OSG-EC-User
  • physical user access
  • user awareness program
  • default user name
  • unique user ID
  • user registration procedure
  • non-administrator user
  • invalid user access
  • end-user device
  • user entity responsibility
  • issue user identifier
  • user behavior analytic
  • user interface component
  • user-controllable data
  • end user certificate
  • previous user ID
  • default user umask
  • duplicate user name
  • 'root' user account
  • user account lifecycle
  • user financial institution
  • user plane traffic
  • user awareness training
  • user fee collection
  • user access right
  • non-consumer user
  • user account management
  • user .rhosts file
  • security aware user
  • User Account Control
  • application file user
  • local User account
  • user privilege management
  • privileged user command
  • terminated user identifier
  • internal system user
  • vCenter Server user
  • no user activtiy
  • closed user group
  • non-organisational user
  • user-based certificate
  • default user ID
  • generic user account
  • disabled user identifier
  • user audit logging
  • user-centered design
  • user centered design
  • user management control
  • user behavioural analytic
  • user test response
  • user activity data
  • inactive user identification
  • inactive user ID
  • intra-territorial user
  • previous user identifier
  • standard user account
  • end user system
  • User Identification Number
  • set user ID
  • database user account
  • non-user account
  • end user device
  • User Manual Developer
  • User Manual Tester
  • Develop User Manuals
  • User Defined Function
  • issue user ID
  • temporary user account
  • generic user identifier
  • user identifier list
  • customer/user documentation
  • user interface documentation
  • non-privileged user
  • third-party user
  • user interface document
  • provisioning user access
  • user-based incident
  • Group settings: Users in the 'Performance Log Users' group on the local machine
  • The "Power Users Group" configurable item
  • The .netrc files for all users
  • The .shosts files for all users
  • The .rhosts files for all users
  • Warning banners for gui login users
  • Contraceptive device accessories for female users
  • Group settings: Users in the 'Remote Desktop Users' group on the local machine
  • Group settings: Users in the 'Performance Monitor Users' group on the local machine
  • Classic - local users authenticate as themselves
  • 'Classic - local users authenticate as themselves'
  • %SystemDrive%\Documents and Settings\All Users
  • The default umask for ftp users
  • classic – local users authenticate as themselves
  • The "/etc/csh file" configurable item
  • CCE v5 - Microsoft Internet Explorer 8
  • The "Disable commands - Database Tools | Administer | Users and Permission | User and Group Permissions" configurable item
  • The "Disable commands - Database Tools | Administer | Users and Permissions | User and Group Accounts" configurable item
  • The "Disable commands - Database Tools | Administer | Users and Permission | User-Level Security Wizard..." configurable item
  • Public Key Cryptography Based User-to-User protocol
  • The "/bin/csh file" configurable item
  • The "/sbin/csh file" configurable item
  • The daemon user's umask
  • The '/usr/bin/csh' file: Permissions
  • CCE v5 - Oracle WebLogic Server 11g
  • Account settings: Default umask for all users
  • Group settings: Users in the 'Guests' group
  • Group settings: Users in the 'Replicator' group
  • list of users with their corresponding permissions
  • Group settings: Users in the 'DnsAdmins' group
  • Group settings: Users in the 'IIS_IUSRS' group
  • The '/etc/vsftpd/vsftpd.conf' file: Users referenced
  • The "default umask for users" configurable item
  • financial interests of its payment service users
  • Devices: Prevent users from installing printer drivers
  • A warning banner for all FTP users
  • Enumerate local users on domain-joined computers
  • Group settings: Users in the 'DnsUpdateProxy' group
  • 'Devices: Prevent users from installing printer drivers'
  • 'Enumerate local users on domain-joined computers'
  • user rights assignment setting
  • Account settings: User accounts
  • User Access Logging Service
  • User account is disabled
  • User account is enabled
  • Removable User Identity Module
  • User account is read
  • User Access Management procedure
  • list of user identifiers
  • employee's computer user identification
  • employee's computer user ID
  • WinXPSP3 User Security Compliance
  • Win7SP1 User Security Compliance
  • OSG-EC-User, 1.0
  • non-shared user account
  • Direct Console User Interface
  • service account user ID
  • non-individual user account
  • user-centered design process
  • Per-User Session Limit
  • responsibility of external user
  • portable end-user device
  • end user computing activity
  • end-user computing activity
  • vendor group user ID
  • disaster recovery user account
  • Graphical User Interface operation
  • user-provided authentication device
  • Group settings: Users in the 'Administrators' group
  • processes acting on behalf of authorized users
  • User account is unlocked
  • Autoplay for Current User
  • User-Mode Driver Framework
  • User account activity audit
  • user average interruption duration
  • end user developed application
  • Digital Rights Management user
  • customer group user ID
  • review of user access
  • user access management control
  • portable end user device
  • previously used user identifier
  • user-supplied scriptable content
  • non-customer user ID
  • end-user computing equipment
  • special purpose user ID
  • Electronic software user manual
  • Software User Reference Documentation
  • vulnerability management user interface
  • risk posed by user
  • IE10 User Security Compliance
  • OSG-SSLF-User, 1.0
  • user account management procedure
  • NetBIOS Extended User Interface
  • user identification and authentication
  • User account is deleted
  • User permission is assigned
  • User Account Reporting standard
  • user access provisioning process
  • end-user messaging technology
  • end user messaging technology
  • unique User Identification Number
  • special purpose user ID
  • external mechanized user identifier
  • user ID tracking system
  • internal mechanized user ID
  • external mechanized user ID
  • user access review process
  • end-user computing application
  • user account management tool
  • cloud service user identifier
  • User Datagram Protocol port
  • mobile end-user device
  • customer group user identifier
  • Telco Cloud Automation user
  • CCE v5 - Microsoft Windows Server 2k8 R2
  • User account is created
  • su (switch user) activity
  • Enforce user logon restrictions
  • owned by appropriate user
  • Hardware User Reference Documentation
  • list of user IDs
  • customer (tenant) user access
  • IE8 User Security Compliance
  • Win8 User Security Compliance
  • activity of authorized user
  • Office2010SP1 User Security, 1.0
  • role and user access
  • service account user identifier
  • end user computing application
  • cloud service user ID
  • user acceptance testing environment
  • user life cycle management
  • user of the report
  • mobile end user device
  • keyboard operable user interface
  • non-employee User ID
  • previously used user ID
  • Audit User Account Management
  • user account life cycle
  • virtual machine user role
  • vendor group user identifier
  • non-customer user identifier
  • User account is updated
  • User permission is removed
  • complementary user entity control
  • Web Services User Interface
  • user-machine interaction specification
  • user-based cardholder activation
  • 'Audit User Account Management'
  • default user shell timeout
  • user account access reviewer
  • user identifier tracking system
  • internal mechanized user identifier
  • user account review process
  • user identity creation request
  • non-employee user identification
  • privileged user access right
  • special purpose user identifier
  • end user computing device
  • end user support communication
  • manage a user account
  • Lock Inactive User Account
  • IE9 User Security Compliance
  • WinVistaSP2 User Security Compliance
  • interface with user/customer
  • The "/usr/bin/csh file" configurable item
  • ACH Operating Rules OCC Bulletin 2004 58
  • CCE v5 - Red Hat Enterprise Linux 4
  • CCE v5 - Red Hat Enterprise Linux 5
  • The "default umask for ftp users" configurable item
  • The "warning banner for GNOME users" configurable item
  • Always require users to connect to verify permission
  • Group settings: Users in the 'Domain Guests' group
  • The 'Screensaver timeout' setting for GNOME users: Status
  • 'Allow users to enable online speech recognition services'
  • 'Prevent users and apps from accessing dangerous websites'
  • The ability for users to perform interactive startups
  • Group settings: Users in the 'DHCP Administrators' group
  • Group settings: Users in the 'Domain Admins' group
  • %SystemDrive%\Documents and Settings\All Users\Documents\DrWatson
  • Allow users to demote attachments to Level 2
  • Group settings: Users in the 'Account Operators' group
  • Group settings: Users in the 'Cert Publisher' group
  • Group settings: Users in the 'Network Services' group
  • Group settings: Users in the 'Print Operators' group
  • Removable media that is mountable by console users
  • Account settings: Users having access to 'ALL_' views
  • Classified Document Container Security File - Combinations and Users
  • Group settings: Users in the 'Enterprise Admins' group
  • The 'Screensaver lock' setting for GNOME users: Status
  • The 'vold.conf' file: Authorized users of removable media
  • 'Prevent users from sharing files within their profile'
  • The "Prevent Users from Installing Printer Drivers" policy
  • Group settings: Users in the 'Backup Operators' group
  • Group settings: Users in the 'Cryptographic Operators' group
  • Group settings: Users in the 'Schema Admins' group
  • Group settings: Users in the 'Server Operators' group
  • Allow users to enable online speech recognition services
  • Prevent users and apps from accessing dangerous websites
  • Prevent users from sharing files within their profile
  • ICH Q10 Pharmaceutical Quality System, Step 2 Version
  • The "CDE user" configurable item
  • The "user stack" configurable item
  • Account settings: Default User accounts
  • Turn off all user customizations
  • Windows All-User Install Agent
  • Office Multilingual User Interface Pack
  • User Identification and Authentication Reporting
  • Win8 User Security Compliance, 1.0
  • user with administrative account access
  • user without wide-ranging authorization
  • 'Allow user control over installs'
  • user of telecommunications billing service
  • time-based user access restriction
  • The "user configuration" configurable item
  • The "XP user" configurable item
  • Allow user control over installs
  • Enable User Control Over Installs
  • critical End User Developed Application
  • authorized End User Developed Application
  • affected internal and external user
  • training and testing user identifier
  • Visio Multilingual User Interface Pack
  • Administration and End User Manual
  • continuous user account management procedure
  • user access policy and procedure
  • WinVistaSP2 User Security Compliance, 1.0
  • Autoplay for Default User/Profile
  • The User Profile service: Status
  • Windows User Mode Driver Framework
  • Maximum lifetime for user ticket
  • User account name is changed
  • The "FTP user" configurable item
  • user registration and deregistration function
  • WinXPSP3 User Security Compliance, 1.0
  • IE9 User Security Compliance, 1.0
  • User Identity (ID) creation request
  • Direct Console User Interface functionality
  • user identification lifecycle management policy
  • User account password is changed
  • User account is locked out
  • The "\"nobody\" user" configurable item
  • create and manage User accounts
  • The "user information" configurable item
  • Audit Log field: User ID
  • Account settings: Inactive User accounts
  • prompt user to use defaults
  • training and testing user ID
  • user with administrative access permissions
  • end user computing device control
  • intended user of the report
  • The user configuration file: Permissions
  • The "standard user" configurable item
  • Disable user name and password
  • Check for Duplicate User Names
  • Allow upload of User Activities
  • 'Allow upload of User Activities'
  • Direct Console User Interface account
  • user-supplied expression template language
  • Graphical user interface development software
  • Project Multilingual User Interface Pack
  • opt out by a user
  • User and Administrator Access List
  • User and Administrator Access Request
  • user and administrator privilege management
  • user account management metrics program
  • user-machine interaction specification document
  • suspicious user account activity procedure
  • formal user access provisioning process
  • IE8 User Security Compliance, 1.0
  • IE10 User Security Compliance, 1.0
  • Win7SP1 User Security Compliance, 1.0
  • up-to-date record of the users or profiles of users who have authorized access to the information system
  • develop product and service solution with customers and users
  • Network access: Let Everyone permissions apply to anonymous users
  • Group settings: Users in the 'Network Configuration Operator' group
  • Account settings: Users with Root-Level Privileges (UID=0)
  • The "Prevent users from configuring background color" configurable item
  • Allow users to connect remotely using Remote Desktop Services
  • 'Network access: Let Everyone permissions apply to anonymous users'
  • Users can't add or log on with Microsoft accounts
  • X-Windows: write .Xauthority files to users' home directories
  • Group settings: Users in the 'Event Log Readers' group
  • The "Prevent users from configuring text color" configurable item
  • The "default screen lock for GNOME users" configurable item
  • Add e-mail recipients to users' Safe Senders Lists
  • The %SystemDrive%\Documents and Settings\All Users directory: Permissions
  • The "Let Everyone permissions apply to anonymous users" policy
  • SQL Server settings: Users assigned to fixed database roles
  • Do not enumerate connected users on domain-joined computers
  • Disallow standard users from changing the PIN or password
  • enrollment process to add new users to the system
  • The "default screen lock for CDE users" configurable item
  • Security Zones: Do Not Allow Users to Change Policies
  • 'Do not enumerate connected users on domain-joined computers'
  • 'Users can't add or log on with Microsoft accounts'
  • culture that fosters responsible and controlled access for users
  • User Account Control: Virtualize file and registry write failures to per-user locations
  • 'User Account Control: Virtualize file and registry write failures to per-user locations'
  • Audit Policy settings: User Account Management
  • prompt user based on computer security
  • user registration and de-registration process
  • end user developed or acquired application
  • independent End User Developed Application specialist
  • idle direct console user interface session
  • Remote Authentication Dial In User Service
  • Screen Lock settings: User Authentication Required
  • The "Maximum User Renewal Lifetime" policy
  • The Each user home directory: Permissions
  • The 'system' and 'user' accounts (logins)
  • prompt user to use persisted data
  • The "Set User ID" configurable item
  • The "per-user location" configurable item
  • The "local user logon" configurable item
  • The "User Rights Assignment" configurable item
  • The "remote desktop user" configurable item
  • The "user profile service" configurable item
  • The "Enforce user login restrictions" policy
  • The user home directories file: Permissions
  • Audit settings: 'root user' activity (audit_user)
  • The "User Profile Service" configurable item
  • Maximum lifetime for user ticket renewal
  • user identification and authentication metrics program
  • end user computing device security guideline
  • 'Toggle user control over Insider builds'
  • user identification lifecycle change management policy
  • The "user mounted device" configurable item
  • The "user home directory" configurable item
  • The "user .netrc file" configurable item
  • The "user audit file" configurable item
  • The "Maximum User Ticket Lifetime" policy
  • The PATH for the root user
  • The screensaver for the current user
  • Auditing for User accounts as appropriate
  • Directories owned by the root user
  • not changeable by the end user
  • Remote Authentication Dial-In User Service
  • The "user dot file" configurable item
  • Product or Solution User Experience Training
  • access right granted to each user
  • user ID lifecycle change management policy
  • %SystemDrive%\Documents and Settings\All Users\Documents\DrWatson\drwts32.log
  • The "Prevent users from customizing attachment security settings" configurable item
  • The "Message text for users attempting to log on" policy
  • Group settings: Users in the 'Denied RODC Password Replication' group
  • 'Interactive logon: Message text for users attempting to log on'
  • The vsftpd service: Local user logon
  • The screensaver for the default user
  • must be independent of User accounts
  • %SystemDrive%\Documents and Settings\Default User
  • %SystemDrive%\Documents and Setting\Default User
  • Toggle user control over Insider builds
  • remote access dial-in user service
  • record user/group information modification events
  • Prompt for user name and password
  • Group settings: Users in the 'Read-Only Domain Controllers' group
  • Allow a Windows app to share application data between users
  • 'Interactive logon: Message title for users attempting to log on'
  • %SystemDrive%\Documents and Settings\All Users\Documents\DrWatson\drwtsn32.log
  • types of transactions that authorized users are permitted to execute
  • Do not allow users to enable or disable add-ons
  • Terminal Services: The "Limit Users to One Remote Session" policy
  • Group settings: Users in the 'IIS Worker Process' (IIS_WPG) group
  • Group settings: Users in the 'Allowed RODC Password Replication' group
  • The "Prevent users from configuring the hover color" configurable item
  • 'Allow a Windows app to share application data between users'
  • Prevents users from uploading document templates to the Office.com Community
  • "Devices: Restrict floppy access to locally logged on users only"
  • The gdm.conf file: 'Greeter' parameter (Warning Banner for GDM Users)
  • Security Zones: Do Not Allow Users to Add/Delete Sites
  • Interactive logon: Message text for users attempting to log on
  • Interactive logon: Message title for users attempting to log on
  • The default umask for all users for the bash shell
  • Group settings: Users in the 'Group Policy Creator Owners' group
  • Group settings: Users in the 'Pre-Windows 2000 Compatible' group
  • The "Prevent users from choosing default text size" configurable item
  • "Devices: Restrict CD-ROM access to locally logged on users"
  • The "Prevent Users from Changing Office Encryption Settings" configurable item
  • Require domain users to elevate when setting a network's location
  • 'Require domain users to elevate when setting a network's location'
  • types of functions that authorized users are permitted to execute
  • ICH Guidance for Industry, E6 Good Clinical Practice: Consolidated Guidance
  • The "Automatically Log Off Users When login Time Expires (local)" policy
  • The "Logon" configurable item: Do not allow anonymous users or accounts
  • The "Prevent users from sharing files within their profile" configurable item
  • Group settings: Users in the 'Telnet Clients' group on the domain
  • Allow users with earlier versions of Office to read with browsers
  • Never allow users to specify groups when restricting permission for documents
  • Account settings: The "enable computer and User accounts to be trusted for delegation" user right
  • The "Restrict level of calendar details users can publish" configurable item
  • The "Behavior of the elevation prompt for standard users" configurable item
  • process to independently monitor administrators and other users with higher privileges
  • manage solution definition process and user expectations
  • Account settings: The "debug programs" user right
  • The ALTER USER privilege: Auditing on usage
  • failure to restrict user access to functions
  • formal user registration and de-registration process
  • bind new authenticator to a user account
  • 'Block all consumer Microsoft account user authentication'
  • Group Policy settings: Prevent users from sharing files within their profile
  • PCI Mobile Payment Acceptance Security Guidelines for Merchants as End-Users
  • Prevent per-user installation of ActiveX controls
  • The current user: The "screensaver timeout" policy
  • The Fast User Switching service: Startup Type
  • Display Last User Name in login Screen
  • The home directory for each User account
  • The maximum lifetime for Kerberos user tickets
  • Disable Per-User Installation of ActiveX Controls
  • Audit Policy: Account Management: User Account Management
  • Block all consumer Microsoft account user authentication
  • The "general user ID parameter" configurable item
  • Allow mix of policy and user locations
  • The %SystemDrive%\Documents and Settings\All Users\Documents\DrWatson directory: Permissions
  • The "user-initiated system crashes" configurable item
  • The Disable user name and password setting
  • Audit Log event: User Account Management success
  • Account settings: PATH variable for root user
  • Account settings: The built-in 'Guest' user
  • The loginlog file: Account Ownership user right
  • The "Disable user name and password" setting
  • Inter-TSF user data confidentiality transfer protection
  • Inter-TSF user data integrity transfer protection
  • read all User accounts command is issued
  • user and administrator privilege management metrics program
  • authenticator is added to a user account
  • Data base user interface and query software
  • The "locally logged-on user" configurable item
  • The "subadministrators user ID parameter" configurable item
  • The "Master user ID parameter" configurable item
  • Audit Log event: User Account Management failure
  • The home directories for all User accounts.
  • The screen saver for the current user
  • The screen saver for the default user
  • The home directory of the root user
  • Audit Log event: su (switch user) activity
  • The 'DROP USER' privilege: Auditing on usage
  • The '/etc/cups/cupsd.conf' file: 'User' setting
  • authenticator for a user account is changed
  • procedure for user registration and de-registration
  • The "user dot file permissions" configurable item
  • The "Enable User Control Over Installs" policy
  • Account settings: The built-in 'Administrator' user
  • The "Single-user mode authentication" configurable item
  • The 'CREATE USER' privilege: Auditing on usage
  • The "Customize User Agent String" configurable item
  • User Identification, Profiles, Authorizations, and Password File
  • delete all User accounts command is issued
  • allow everywhere except To and CC field
  • The "Prevent users from changing permissions on rights managed content" configurable item
  • Group settings: Users in the 'Windows Authorization Access' group on the domain
  • Restrict Remote Desktop Services users to a single Remote Desktop Services session
  • 'Restrict Remote Desktop Services users to a single Remote Desktop Services session'
  • The "\"Restrict Terminal Server users to a single remote session\"" configurable item
  • Prevent users from allowing unsafe file types to be attached to forms
  • .forward files should be allowed or disallowed as appropriate for all users
  • types of transactions and functions that authorized users are permitted to execute
  • The "Do not allow users to change permissions on folders" configurable item
  • No auto-restart with logged on users for scheduled automatic updates installations
  • 'No auto-restart with logged on users for scheduled automatic updates installations'
  • Group settings: Users in the 'Telnet Clients' group on the local machine
  • %SystemDrive%\Documents and Settings\All Users\Application Data\Microsoft\HTML Help ACL
  • Disable all user customization of Quick Access Toolbar
  • Account settings: The "increase scheduling priority" user right
  • Account settings: The "profile system performance" user right
  • Account settings: The "Create global objects" user right
  • Account settings: the "launch DCOM applications" user right
  • user under the responsibility of the cloud provider
  • Account settings: The "deny login locally" user right

Scope, Define, and Maintain Regulatory Demands Online in Minutes.

LEARN MORE
Contact

Unified Compliance
10161 Park Run Drive, Suite 150
Las Vegas, Nevada 89145

PHONE 702.776.9898
FAX 866.924.3791
info@unifiedcompliance.com

Quick Links
  • Home
  • Company
  • Products
  • Partners
  • Peer Review
  • Contact
  • Support
  • Legal

Stay connected with UCF Twitter Facebook LinkedIn

Subscribe to WotW, news and alerts

Copyright © 2025 Network Frontiers LLC
All right reserved.

Stay connected with UCF
Twitter Facebook LinkedIn

Subscribe to WotW, news and alerts