Com•pli•ance Dictionary
Submit
  • Home
  • About
  • Subscribe
  • Log In
Submit
  • CCH account
  • Users
  • CCD
  • CCS
  • CCO
  • Fusers
  • User settings: Users with duplicate UIDs
  • CCP
  • ccc
  • ACH
  • userns
  • user
  • csh shell settings: Default umask for all users
  • User settings: Users running the uucico daemon
  • ACH authorization
  • CCI component
  • users account
  • Authenticated Users
  • users' name
  • ACH debit
  • ACH item
  • ACH credit
  • CCM v4.0.6
  • ACH return
  • CCI assembly
  • ACH operator
  • ACH payment
  • ACH batch
  • ACH router
  • ACH capture
  • ACH instruction
  • ACH device
  • CCM v4.0
  • C/CE
  • CCI equipment
  • ACH activity
  • ACH transaction
  • ACH file
  • ACH service
  • ACH entry
  • ACH process
  • ACH service provider
  • uncollected ACH transaction
  • unauthorized ACH transaction
  • Remote desktop Users
  • Container settings: Users in the 'Users' container
  • Group settings: Users in the 'Users' group
  • objects and users
  • Administrators, Authenticated Users
  • list of users
  • users with privilege
  • 'Administrators, Authenticated Users'
  • exception users list
  • ACH settlement date
  • ACH debit activity
  • uncollected ACH deposit
  • ACH credit transaction
  • unauthorized ACH debit
  • ACH contingency plan
  • ACH processing activity
  • ACH debit activity
  • international ACH requirement
  • Group settings: Users in the 'Power Users' group
  • Group settings: Users in the 'Domain Users' group
  • ACH single-entry
  • ACH debit return
  • ACH exposure limit
  • ACH credit activity
  • The '/etc/security/user' file: Default umask for new users
  • cc
  • CCE v5 - Apache 1.3
  • CCE v5 - Tomcat 4
  • CCE v5 - Tomcat 5
  • CCE v5 - Tomcat 6
  • internet initiated ACH transaction
  • Ushers uniforms
  • user's responsibility
  • user's guide
  • user's manual
  • Federal Wireless Users Forum
  • protected users security group
  • User Account Control: Behavior of the elevation prompt for standard users
  • secured XP users OU
  • Administrators and Interactive Users
  • specific group of users
  • Administrators, Remote Desktop Users
  • 'Administrators, Remote Desktop Users'
  • Administrators and Power Users
  • Security Features Users Guide
  • 'User Account Control: Behavior of the elevation prompt for standard users'
  • CCE v5 - Windows XP
  • CCE v5 - IIS 5
  • high risk ACH transaction
  • Regulation CC
  • telephone-initiated ACH debit
  • CCE v5 - AIX 5.3
  • CCE v5 - Windows 2000
  • CCE v5 - Windows 7
  • internet-initiated ACH transaction
  • 3 CCR 702-6
  • Internet-initiated ACH debit
  • CCE v5 - Apache 2.2
  • high-risk ACH transaction
  • telephone initiated ACH transaction
  • telephone-initiated ACH transaction
  • ACH debit return volume
  • internet user
  • user permission
  • user data
  • user attribute
  • computer user
  • user interface
  • User Right
  • user organization
  • user support
  • user directory
  • concurrent user
  • user entity
  • user deletion
  • user profile
  • user ID
  • user-friendly
  • train user
  • user acknowledgement
  • external user
  • internal user
  • user application
  • user management
  • user manager
  • authorised user
  • cloud user
  • emergency user
  • active user
  • user interaction
  • user testing
  • user namespace
  • user ownership
  • user motion
  • user associated
  • user provisioning
  • DRM user
  • user safeguard
  • admin user
  • CCE v5 - Windows Vista
  • CCE v5 - Apache 2.0
  • CCE v5 - IIS 6
  • ACH transaction processing procedure
  • user education
  • general user
  • unauthorized user
  • drug user
  • snuff user
  • multi-user
  • mobile user
  • root user
  • organizational user
  • user awareness
  • anonymous user
  • user password
  • user modification
  • untied user
  • privileged user
  • User Advocacy
  • affected user
  • user credential
  • end-user
  • user name
  • IT user
  • user group
  • user-id
  • standard user
  • human user
  • 'root' user
  • user setup
  • information user
  • user detail
  • approved user
  • system user
  • user control
  • user identifier
  • user key
  • GNOME user
  • power user
  • remote user
  • end user
  • terminated user
  • user functionality
  • calling user
  • data user
  • user study
  • service user
  • user error
  • user documentation
  • user session
  • user type
  • suspicious user
  • user guide
  • User Experience
  • new user
  • user information
  • enterprise user
  • user agent
  • user-agent
  • user training
  • token user
  • user involvement
  • backup user
  • user infrastructure
  • technical user
  • TCA user
  • user log
  • user authentication
  • user auditor
  • user privilege
  • user initialization
  • user registration
  • authorized user
  • user representative
  • tied user
  • user mode
  • user action
  • user identity
  • user acceptance
  • business user
  • user activity
  • user role
  • database user
  • unique user
  • user validation
  • user entitlement
  • unprivileged user
  • report user
  • intended user
  • user inactivity
  • temporary user
  • user .forward
  • local user
  • deceased user
  • user access
  • user administration
  • user authenticator
  • user request
  • prompt user
  • user creation
  • user account
  • authenticated user
  • tobacco user
  • user manual
  • user department
  • user identification
  • user query
  • user input
  • user risk
  • user need
  • user list
  • administrative user
  • user confirmation
  • user agreement
  • nonprivileged user
  • malicious user
  • user certificate
  • user verification
  • nonorganizational user
  • CCE v5 - Microsoft Office 2007
  • Cloud Security Alliance CCM V1.3
  • CCE v5 - Microsoft Exchange 2007
  • contraceptive device for female users
  • Prevent users from modifying settings
  • contraceptive accessory for female users
  • user's Swift infrastructure
  • ambiguous to users in general
  • Contraceptive devices for female users
  • users without wide-ranging authorisation
  • Core dumps for all users
  • 'Prevent users from modifying settings'
  • CCE v5 - Microsoft Exchange 2010
  • CCE v5 - Sun Solaris 9
  • CCE v5 - Sun Solaris 10
  • CCE v5 - Windows Server 2008
  • CCE v5 - MS SQL 2005
  • ICH Q10 Pharmaceutical Quality System
  • user's network location
  • Group settings: Users in the 'Distributed COM Users' group on the domain
  • The '/bin/csh' file: Permissions
  • CCE v5 - HP-UX 11.23
  • CCE v5 - Sun Solaris 8
  • CCE v5 - Microsoft Office 2010
  • CCE v5 - Polycom HDX 3
  • CCE v5 - Internet Explorer 7
  • CCE v5 - Windows Server 2003
  • Group settings: Users in the 'Performance Log Users' group on the domain
  • Group settings: Users in the 'Performance Monitor Users' group on the domain
  • Group settings: Users in the 'Remote Desktop Users' group on the domain
  • The "csh shell" configurable item
  • The '/sbin/csh' file: Permissions
  • The '/etc/csh' file: Permissions
  • CCE v5 - MS SQL 2000
  • Group settings: Users in the 'Incoming Forest Trust Builders' group user on the domain
  • User Access Management
  • User Definable Field
  • User account alias
  • User Name Mapping
  • User Data Protocol
  • privileged user ID
  • user-authentication management
  • generic user ID
  • shared user ID
  • shared user identifier
  • user ID list
  • computer user identification
  • computer user ID
  • external party user
  • distinct user ID
  • user access program
  • privileged access user
  • user awareness programme
  • group account user
  • malicious user testing
  • privileged user access
  • other data user
  • user authentication mechanism
  • shared user access
  • user entity system
  • domain user account
  • user identification directory
  • user account list
  • terminated user ID
  • compromised user account
  • user ID account
  • mechanized user ID
  • no user activity
  • user-uploaded file
  • unique user identifier
  • without user authorisation
  • Information Technology user
  • inactive user account
  • user-subject binding
  • user-defined processing
  • user satisfaction inquiry
  • Common User Interface
  • user access privilege
  • User Principle Name
  • remote VPN user
  • vendor managed user
  • Mail User Agent
  • privileged user identifier
  • third party user
  • long user session
  • OSG-SSLF-User
  • Office2010SP1 User Security
  • interactive user access
  • user interface standard
  • user is authenticated
  • end-user system
  • strong user authentication
  • user registration process
  • shared user account
  • unnecessary user identifier
  • host's user namespace
  • multi-user system
  • user account name
  • user-defined module
  • default user account
  • user-provided data
  • end-user computing
  • training user identifier
  • root user account
  • user access list
  • mechanized user identifier
  • unprivileged user account
  • user identity confidentiality
  • client user access
  • User account activity
  • user file quota
  • user-added metadata
  • Fast User Switching
  • User Interface Accessibility
  • end user instruction
  • user dot-file
  • user reference documentation
  • non-organizational user
  • Graphical User Interface
  • User Education Professional
  • User Support Specialist
  • affected user department
  • end user community
  • manage user access
  • cloud service user
  • user access review
  • active user account
  • unique user identification
  • unauthorized vSphere user
  • user environment setting
  • local user authentication
  • privileged user account
  • unnecessary user account
  • end user policy
  • user-level information
  • default user identifier
  • disabled user ID
  • user namespace support
  • user query event
  • privileged user administration
  • User Access Administration
  • human user interface
  • User ID directory
  • end-user asset
  • testing user identifier
  • end user account
  • high-risk user
  • user access setting
  • total user downtime
  • user account password
  • administrator user account
  • normal user account
  • Group settings: Users in the 'Distributed COM Users' group on the local machine
  • single user mode
  • allow user decision
  • end user computing
  • User Partnership Program
  • The user umask
  • User Datagram Protocol
  • uses and capabilities
  • assign user permission
  • user account authentication
  • privileged user identification
  • user-installed software
  • dedicated user account
  • user computing session
  • user account provisioning
  • user account credential
  • information system user
  • user activity log
  • OSG-EC-User
  • physical user access
  • payment service user
  • user awareness program
  • default user name
  • unique user ID
  • user registration procedure
  • non-administrator user
  • invalid user access
  • end-user device
  • user entity responsibility
  • issue user identifier
  • user behavior analytic
  • user interface component
  • user-controllable data
  • end user certificate
  • previous user ID
  • default user umask
  • duplicate user name
  • 'root' user account
  • user account lifecycle
  • user financial institution
  • The "Power Users Group" configurable item
  • The .netrc files for all users
  • The .shosts files for all users
  • user awareness training
  • user fee collection
  • user access right
  • application file user
  • local User account
  • user privilege management
  • privileged user command
  • non-consumer user
  • user .rhosts file
  • security aware user
  • User Account Control
  • user account management
  • User Manual Developer
  • User Manual Tester
  • Develop User Manuals
  • User Defined Function
  • issue user ID
  • temporary user account
  • generic user identifier
  • user identifier list
  • customer/user documentation
  • user interface documentation
  • non-privileged user
  • third-party user
  • user interface document
  • provisioning user access
  • user-based incident
  • end user system
  • User Identification Number
  • set user ID
  • end user device
  • default user ID
  • generic user account
  • disabled user identifier
  • user audit logging
  • user-centered design
  • user centered design
  • user management control
  • user behavioural analytic
  • user test response
  • user activity data
  • inactive user identification
  • inactive user ID
  • intra-territorial user
  • previous user identifier
  • standard user account
  • terminated user identifier
  • internal system user
  • vCenter Server user
  • no user activtiy
  • closed user group
  • non-organisational user
  • user-based certificate
  • database user account
  • non-user account
  • Group settings: Users in the 'Performance Log Users' group on the local machine
  • The .rhosts files for all users
  • Warning banners for gui login users
  • Contraceptive device accessories for female users
  • Group settings: Users in the 'Remote Desktop Users' group on the local machine
  • Group settings: Users in the 'Performance Monitor Users' group on the local machine
  • Classic - local users authenticate as themselves
  • 'Classic - local users authenticate as themselves'
  • %SystemDrive%\Documents and Settings\All Users
  • The default umask for ftp users
  • classic – local users authenticate as themselves
  • The "/etc/csh file" configurable item
  • CCE v5 - Microsoft Internet Explorer 8
  • The "Disable commands - Database Tools | Administer | Users and Permission | User and Group Permissions" configurable item
  • The "Disable commands - Database Tools | Administer | Users and Permissions | User and Group Accounts" configurable item
  • Public Key Cryptography Based User-to-User protocol
  • The "Disable commands - Database Tools | Administer | Users and Permission | User-Level Security Wizard..." configurable item
  • The "/bin/csh file" configurable item
  • The "/sbin/csh file" configurable item
  • The daemon user's umask
  • The '/usr/bin/csh' file: Permissions
  • CCE v5 - Oracle WebLogic Server 11g
  • list of users with their corresponding permissions
  • Account settings: Default umask for all users
  • Group settings: Users in the 'Guests' group
  • Group settings: Users in the 'Replicator' group
  • The "default umask for users" configurable item
  • The '/etc/vsftpd/vsftpd.conf' file: Users referenced
  • Group settings: Users in the 'DnsAdmins' group
  • Group settings: Users in the 'IIS_IUSRS' group
  • financial interests of its payment service users
  • Devices: Prevent users from installing printer drivers
  • A warning banner for all FTP users
  • Removable User Identity Module
  • user rights assignment setting
  • Account settings: User accounts
  • User Access Logging Service
  • User account is disabled
  • User account is enabled
  • User account is read
  • User Access Management procedure
  • list of user identifiers
  • employee's computer user identification
  • employee's computer user ID
  • WinXPSP3 User Security Compliance
  • Win7SP1 User Security Compliance
  • OSG-EC-User, 1.0
  • non-shared user account
  • Direct Console User Interface
  • service account user ID
  • non-individual user account
  • user-centered design process
  • Per-User Session Limit
  • responsibility of external user
  • portable end-user device
  • end user computing activity
  • end-user computing activity
  • vendor group user ID
  • disaster recovery user account
  • Graphical User Interface operation
  • user-provided authentication device
  • Enumerate local users on domain-joined computers
  • Group settings: Users in the 'DnsUpdateProxy' group
  • 'Devices: Prevent users from installing printer drivers'
  • 'Enumerate local users on domain-joined computers'
  • User account activity audit
  • User-Mode Driver Framework
  • User account is unlocked
  • Autoplay for Current User
  • Electronic software user manual
  • Software User Reference Documentation
  • vulnerability management user interface
  • risk posed by user
  • IE10 User Security Compliance
  • OSG-SSLF-User, 1.0
  • user account management procedure
  • review of user access
  • end-user computing equipment
  • special purpose user ID
  • user access management control
  • portable end user device
  • previously used user identifier
  • user average interruption duration
  • end user developed application
  • Digital Rights Management user
  • customer group user ID
  • user-supplied scriptable content
  • non-customer user ID
  • Group settings: Users in the 'Administrators' group
  • processes acting on behalf of authorized users
  • NetBIOS Extended User Interface
  • user identification and authentication
  • User account is deleted
  • User permission is assigned
  • User Account Reporting standard
  • user access provisioning process
  • end-user messaging technology
  • end user messaging technology
  • unique User Identification Number
  • special purpose user ID
  • external mechanized user identifier
  • user ID tracking system
  • internal mechanized user ID
  • external mechanized user ID
  • user access review process
  • end-user computing application
  • user account management tool
  • cloud service user identifier
  • User Datagram Protocol port
  • mobile end-user device
  • customer group user identifier
  • Telco Cloud Automation user
  • CCE v5 - Microsoft Windows Server 2k8 R2
  • Enforce user logon restrictions
  • owned by appropriate user
  • User account is created
  • su (switch user) activity
  • Hardware User Reference Documentation
  • list of user IDs
  • customer (tenant) user access
  • IE8 User Security Compliance
  • Win8 User Security Compliance
  • activity of authorized user
  • Office2010SP1 User Security, 1.0
  • role and user access
  • service account user identifier
  • end user computing application
  • cloud service user ID
  • user acceptance testing environment
  • user life cycle management
  • user of the report
  • mobile end user device
  • keyboard operable user interface
  • non-employee User ID
  • previously used user ID
  • Audit User Account Management
  • user account life cycle
  • virtual machine user role
  • vendor group user identifier
  • non-customer user identifier
  • Web Services User Interface
  • user-machine interaction specification
  • User account is updated
  • User permission is removed
  • complementary user entity control
  • end user computing device
  • end user support communication
  • manage a user account
  • Lock Inactive User Account
  • IE9 User Security Compliance
  • WinVistaSP2 User Security Compliance
  • interface with user/customer
  • special purpose user identifier
  • user account access reviewer
  • user identifier tracking system
  • internal mechanized user identifier
  • user account review process
  • user identity creation request
  • non-employee user identification
  • user-based cardholder activation
  • 'Audit User Account Management'
  • default user shell timeout
  • privileged user access right
  • The "/usr/bin/csh file" configurable item
  • ACH Operating Rules OCC Bulletin 2004 58
  • CCE v5 - Red Hat Enterprise Linux 4
  • CCE v5 - Red Hat Enterprise Linux 5
  • The "default umask for ftp users" configurable item
  • The "warning banner for GNOME users" configurable item
  • Always require users to connect to verify permission
  • The 'Screensaver timeout' setting for GNOME users: Status
  • Group settings: Users in the 'Domain Guests' group
  • 'Allow users to enable online speech recognition services'
  • 'Prevent users and apps from accessing dangerous websites'
  • Allow users to demote attachments to Level 2
  • %SystemDrive%\Documents and Settings\All Users\Documents\DrWatson
  • The ability for users to perform interactive startups
  • Group settings: Users in the 'DHCP Administrators' group
  • Group settings: Users in the 'Domain Admins' group
  • Group settings: Users in the 'Account Operators' group
  • Group settings: Users in the 'Cert Publisher' group
  • Group settings: Users in the 'Network Services' group
  • Group settings: Users in the 'Print Operators' group
  • Removable media that is mountable by console users
  • Account settings: Users having access to 'ALL_' views
  • Classified Document Container Security File - Combinations and Users
  • The 'Screensaver lock' setting for GNOME users: Status
  • The 'vold.conf' file: Authorized users of removable media
  • Group settings: Users in the 'Enterprise Admins' group
  • 'Prevent users from sharing files within their profile'
  • The "Prevent Users from Installing Printer Drivers" policy
  • Group settings: Users in the 'Backup Operators' group
  • Group settings: Users in the 'Cryptographic Operators' group
  • Group settings: Users in the 'Schema Admins' group
  • Group settings: Users in the 'Server Operators' group
  • Allow users to enable online speech recognition services
  • Prevent users and apps from accessing dangerous websites
  • Prevent users from sharing files within their profile
  • ICH Q10 Pharmaceutical Quality System, Step 2 Version
  • The "CDE user" configurable item
  • The "user stack" configurable item
  • Account settings: Default User accounts
  • Turn off all user customizations
  • Windows All-User Install Agent
  • Office Multilingual User Interface Pack
  • User Identification and Authentication Reporting
  • Win8 User Security Compliance, 1.0
  • user with administrative account access
  • user without wide-ranging authorization
  • 'Allow user control over installs'
  • user of telecommunications billing service
  • time-based user access restriction
  • The "user configuration" configurable item
  • The "XP user" configurable item
  • Visio Multilingual User Interface Pack
  • Administration and End User Manual
  • continuous user account management procedure
  • user access policy and procedure
  • WinVistaSP2 User Security Compliance, 1.0
  • training and testing user identifier
  • affected internal and external user
  • Allow user control over installs
  • Enable User Control Over Installs
  • critical End User Developed Application
  • authorized End User Developed Application
  • The "FTP user" configurable item
  • Windows User Mode Driver Framework
  • Maximum lifetime for user ticket
  • User account name is changed
  • Autoplay for Default User/Profile
  • The User Profile service: Status
  • user registration and deregistration function
  • WinXPSP3 User Security Compliance, 1.0
  • IE9 User Security Compliance, 1.0
  • User Identity (ID) creation request
  • Direct Console User Interface functionality
  • user identification lifecycle management policy
  • create and manage User accounts
  • The "user information" configurable item
  • The "\"nobody\" user" configurable item
  • prompt user to use defaults
  • User account password is changed
  • User account is locked out
  • Audit Log field: User ID
  • Account settings: Inactive User accounts
  • training and testing user ID
  • user with administrative access permissions
  • end user computing device control
  • intended user of the report
  • Disable user name and password
  • The "standard user" configurable item
  • The user configuration file: Permissions
  • Graphical user interface development software
  • Project Multilingual User Interface Pack
  • opt out by a user
  • User and Administrator Access List
  • User and Administrator Access Request
  • user and administrator privilege management
  • user account management metrics program
  • user-machine interaction specification document
  • suspicious user account activity procedure
  • formal user access provisioning process
  • IE8 User Security Compliance, 1.0
  • IE10 User Security Compliance, 1.0
  • Win7SP1 User Security Compliance, 1.0
  • Check for Duplicate User Names
  • Allow upload of User Activities
  • 'Allow upload of User Activities'
  • Direct Console User Interface account
  • user-supplied expression template language
  • up-to-date record of the users or profiles of users who have authorized access to the information system
  • develop product and service solution with customers and users
  • Network access: Let Everyone permissions apply to anonymous users
  • The "Prevent users from configuring background color" configurable item
  • Allow users to connect remotely using Remote Desktop Services
  • Group settings: Users in the 'Network Configuration Operator' group
  • Account settings: Users with Root-Level Privileges (UID=0)
  • 'Network access: Let Everyone permissions apply to anonymous users'
  • Add e-mail recipients to users' Safe Senders Lists
  • The "default screen lock for GNOME users" configurable item
  • The "Prevent users from configuring text color" configurable item
  • Users can't add or log on with Microsoft accounts
  • X-Windows: write .Xauthority files to users' home directories
  • Group settings: Users in the 'Event Log Readers' group
  • The %SystemDrive%\Documents and Settings\All Users directory: Permissions
  • Do not enumerate connected users on domain-joined computers
  • Disallow standard users from changing the PIN or password
  • The "Let Everyone permissions apply to anonymous users" policy
  • SQL Server settings: Users assigned to fixed database roles
  • enrollment process to add new users to the system
  • Security Zones: Do Not Allow Users to Change Policies
  • The "default screen lock for CDE users" configurable item
  • 'Do not enumerate connected users on domain-joined computers'
  • 'Users can't add or log on with Microsoft accounts'
  • culture that fosters responsible and controlled access for users
  • User Account Control: Virtualize file and registry write failures to per-user locations
  • 'User Account Control: Virtualize file and registry write failures to per-user locations'
  • prompt user based on computer security
  • Audit Policy settings: User Account Management
  • user registration and de-registration process
  • end user developed or acquired application
  • independent End User Developed Application specialist
  • idle direct console user interface session
  • Remote Authentication Dial In User Service
  • The "local user logon" configurable item
  • Screen Lock settings: User Authentication Required
  • The "Set User ID" configurable item
  • The "per-user location" configurable item
  • prompt user to use persisted data
  • The "Maximum User Renewal Lifetime" policy
  • The Each user home directory: Permissions
  • The 'system' and 'user' accounts (logins)
  • The "User Rights Assignment" configurable item
  • The "remote desktop user" configurable item
  • The "user profile service" configurable item
  • The "User Profile Service" configurable item
  • Maximum lifetime for user ticket renewal
  • The "Enforce user login restrictions" policy
  • The user home directories file: Permissions
  • Audit settings: 'root user' activity (audit_user)
  • user identification and authentication metrics program
  • end user computing device security guideline
  • 'Toggle user control over Insider builds'
  • user identification lifecycle change management policy
  • The "user dot file" configurable item
  • The "user audit file" configurable item
  • The "user mounted device" configurable item
  • The "user home directory" configurable item
  • The "user .netrc file" configurable item
  • Directories owned by the root user
  • not changeable by the end user
  • The "Maximum User Ticket Lifetime" policy
  • The PATH for the root user
  • The screensaver for the current user
  • Auditing for User accounts as appropriate
  • Remote Authentication Dial-In User Service
  • Product or Solution User Experience Training
  • access right granted to each user
  • user ID lifecycle change management policy
  • %SystemDrive%\Documents and Settings\All Users\Documents\DrWatson\drwts32.log
  • The "Prevent users from customizing attachment security settings" configurable item
  • The "Message text for users attempting to log on" policy
  • Group settings: Users in the 'Denied RODC Password Replication' group
  • 'Interactive logon: Message text for users attempting to log on'
  • %SystemDrive%\Documents and Settings\Default User
  • %SystemDrive%\Documents and Setting\Default User
  • must be independent of User accounts
  • The vsftpd service: Local user logon
  • The screensaver for the default user
  • Prompt for user name and password
  • record user/group information modification events
  • Toggle user control over Insider builds
  • remote access dial-in user service
  • %SystemDrive%\Documents and Settings\All Users\Documents\DrWatson\drwtsn32.log
  • Group settings: Users in the 'Read-Only Domain Controllers' group
  • types of transactions that authorized users are permitted to execute
  • Allow a Windows app to share application data between users
  • 'Interactive logon: Message title for users attempting to log on'
  • Do not allow users to enable or disable add-ons
  • The "Prevent users from configuring the hover color" configurable item
  • Terminal Services: The "Limit Users to One Remote Session" policy
  • Group settings: Users in the 'IIS Worker Process' (IIS_WPG) group
  • Group settings: Users in the 'Allowed RODC Password Replication' group
  • 'Allow a Windows app to share application data between users'
  • "Devices: Restrict floppy access to locally logged on users only"
  • Prevents users from uploading document templates to the Office.com Community
  • The gdm.conf file: 'Greeter' parameter (Warning Banner for GDM Users)
  • "Devices: Restrict CD-ROM access to locally logged on users"
  • The "Prevent Users from Changing Office Encryption Settings" configurable item
  • The "Prevent users from choosing default text size" configurable item
  • Security Zones: Do Not Allow Users to Add/Delete Sites
  • Interactive logon: Message text for users attempting to log on
  • Interactive logon: Message title for users attempting to log on
  • The default umask for all users for the bash shell
  • Group settings: Users in the 'Group Policy Creator Owners' group
  • Group settings: Users in the 'Pre-Windows 2000 Compatible' group
  • types of functions that authorized users are permitted to execute
  • Require domain users to elevate when setting a network's location
  • 'Require domain users to elevate when setting a network's location'
  • ICH Guidance for Industry, E6 Good Clinical Practice: Consolidated Guidance
  • The "Automatically Log Off Users When login Time Expires (local)" policy
  • Allow users with earlier versions of Office to read with browsers
  • Never allow users to specify groups when restricting permission for documents
  • The "Logon" configurable item: Do not allow anonymous users or accounts
  • The "Prevent users from sharing files within their profile" configurable item
  • Group settings: Users in the 'Telnet Clients' group on the domain
  • manage solution definition process and user expectations
  • Account settings: The "debug programs" user right
  • The ALTER USER privilege: Auditing on usage
  • failure to restrict user access to functions
  • formal user registration and de-registration process
  • bind new authenticator to a user account
  • 'Block all consumer Microsoft account user authentication'
  • Account settings: The "enable computer and User accounts to be trusted for delegation" user right
  • The "Restrict level of calendar details users can publish" configurable item
  • The "Behavior of the elevation prompt for standard users" configurable item
  • process to independently monitor administrators and other users with higher privileges
  • Group Policy settings: Prevent users from sharing files within their profile
  • PCI Mobile Payment Acceptance Security Guidelines for Merchants as End-Users
  • The "general user ID parameter" configurable item
  • Allow mix of policy and user locations
  • Disable Per-User Installation of ActiveX Controls
  • Audit Policy: Account Management: User Account Management
  • Prevent per-user installation of ActiveX controls
  • The current user: The "screensaver timeout" policy
  • The Fast User Switching service: Startup Type
  • Display Last User Name in login Screen
  • The home directory for each User account
  • The maximum lifetime for Kerberos user tickets
  • Block all consumer Microsoft account user authentication
  • The %SystemDrive%\Documents and Settings\All Users\Documents\DrWatson directory: Permissions
  • Inter-TSF user data confidentiality transfer protection
  • Inter-TSF user data integrity transfer protection
  • The "user-initiated system crashes" configurable item
  • The Disable user name and password setting
  • Audit Log event: User Account Management success
  • The "Disable user name and password" setting
  • Account settings: PATH variable for root user
  • Account settings: The built-in 'Guest' user
  • The loginlog file: Account Ownership user right
  • read all User accounts command is issued
  • user and administrator privilege management metrics program
  • authenticator is added to a user account
  • Data base user interface and query software
  • The "subadministrators user ID parameter" configurable item
  • The "Master user ID parameter" configurable item
  • The "locally logged-on user" configurable item
  • The 'DROP USER' privilege: Auditing on usage
  • The '/etc/cups/cupsd.conf' file: 'User' setting
  • Audit Log event: User Account Management failure
  • The home directories for all User accounts.
  • The screen saver for the current user
  • The screen saver for the default user
  • The home directory of the root user
  • Audit Log event: su (switch user) activity
  • procedure for user registration and de-registration
  • authenticator for a user account is changed
  • The "Single-user mode authentication" configurable item
  • The 'CREATE USER' privilege: Auditing on usage
  • The "Customize User Agent String" configurable item
  • The "user dot file permissions" configurable item
  • The "Enable User Control Over Installs" policy
  • Account settings: The built-in 'Administrator' user
  • User Identification, Profiles, Authorizations, and Password File
  • delete all User accounts command is issued
  • allow everywhere except To and CC field
  • The "Prevent users from changing permissions on rights managed content" configurable item
  • The "\"Restrict Terminal Server users to a single remote session\"" configurable item
  • Prevent users from allowing unsafe file types to be attached to forms
  • Group settings: Users in the 'Windows Authorization Access' group on the domain
  • Restrict Remote Desktop Services users to a single Remote Desktop Services session
  • 'Restrict Remote Desktop Services users to a single Remote Desktop Services session'
  • .forward files should be allowed or disallowed as appropriate for all users
  • types of transactions and functions that authorized users are permitted to execute
  • The "Do not allow users to change permissions on folders" configurable item
  • No auto-restart with logged on users for scheduled automatic updates installations
  • 'No auto-restart with logged on users for scheduled automatic updates installations'
  • %SystemDrive%\Documents and Settings\All Users\Application Data\Microsoft\HTML Help ACL
  • Group settings: Users in the 'Telnet Clients' group on the local machine
  • Disable all user customization of Quick Access Toolbar
  • Account settings: The "increase scheduling priority" user right
  • Account settings: The "profile system performance" user right
  • Account settings: The "Create global objects" user right
  • Account settings: the "launch DCOM applications" user right
  • user under the responsibility of the cloud provider
  • Simple Traversal of User Datagram Protocol Through NATS
  • The "Disable Channel User Interface Completely" configurable item
  • HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\User Shell

Scope, Define, and Maintain Regulatory Demands Online in Minutes.

LEARN MORE
Contact

Unified Compliance
10161 Park Run Drive, Suite 150
Las Vegas, Nevada 89145

PHONE 702.776.9898
FAX 866.924.3791
info@unifiedcompliance.com

Quick Links
  • Home
  • Company
  • Products
  • Partners
  • Peer Review
  • Contact
  • Support
  • Legal

Stay connected with UCF Twitter Facebook LinkedIn

Subscribe to WotW, news and alerts

Copyright © 2025 Network Frontiers LLC
All right reserved.

Stay connected with UCF
Twitter Facebook LinkedIn

Subscribe to WotW, news and alerts