Search results

From Guidance Share

You searched for Administrators

Jump to: navigation, search

There is no page titled "Administrators". You can create this page.

For more information about searching Guidance Share, see Searching Guidance Share.

Showing below up to 20 results starting with #1.


View (previous 20) (next 20) (20 | 50 | 100 | 250 | 500).

No page title matches

Page text matches

  1. Application Architecture Guide - Chapter 1 - Fundamentals of Application Architecture (26,030 bytes)
    165: ...s, including system designers, developers, system administrators, and management.
  2. IIS 5/5.1 Security Checklist (7,295 bytes)
    39: * Accounts are not shared among administrators.
    42: * Users and administrators do not share accounts.
    43: * No more than two accounts exist in the Administrators group.
    44: * Administrators are required to log on locally OR the remote admi...
  3. When and how do I use Kerberos authentication in ASP.NET 2.0? (2,059 bytes)
    18: ...et Options''' menu, and then restart the browser. Administrators can enable Integrated Windows authentication by s...
  4. How do I use URL Authorization in ASP.NET 2.0? (1,802 bytes)
    20: ...l administrators group is referred to as "BUILTIN\Administrators". The local users group is referred to as "BUILTI...
  5. How do I lock authorization settings? (570 bytes)
    4: Server administrators can lock authorization settings by placing the ''...
  6. How do I protect audit and log files? (660 bytes)
    4: ...s used by your application, grant full control to administrators, and read-only access to operators.
    5: ...ze access only to highly trusted accounts such as administrators.
  7. What is Constrained Delegation? (1,021 bytes)
    5: ...03 introduces constrained delegation. This allows administrators to specify exactly which services on a downstream...
  8. How do I protect sensitive data in the database? (1,853 bytes)
    9: ...ect the registry key that allows full control for administrators and read only access for your ASP.NET process acc...
  9. How do I protect sensitive data in configuration files? (1,853 bytes)
    9: ...ect the registry key that allows full control for administrators and read only access for your ASP.NET process acc...
  10. Protect log files. (570 bytes)
    3: ...ze access only to highly trusted accounts such as administrators.
  11. Protect your administration interfaces. (938 bytes)
    3: ...ty is accessible only by authorized operators and administrators. A key part is to enforce strong authentication o...
    5: ...void the use of remote administration and require administrators to log on locally. If you need to support remote ...
  12. Secure your connection strings (3,981 bytes)
    17: Administrators: Full Control
  13. Secure UDL files with restricted ACLs (646 bytes)
    5: Administrators: Full Control
  14. Protect sensitive data in storage (3,051 bytes)
    5: ...in a registry key with a restricted ACL that only administrators and your application process account can use.
  15. Encrypt sensitive data if you need to store it (2,754 bytes)
    15: Administrators: Full Control
  16. Explained: Windows Authentication in ASP.NET 2.0 (28,487 bytes)
    282: ...3 introduces constrained delegation. This enables administrators to specify exactly which services another server ...
  17. LDAP Injection Attack (956 bytes)
    2: ...ive of this paper is to inform developers, system administrators and security professionals about various techniqu...
  18. Vulnerability Index (2,183 bytes)
    24: * Too many administrators
  19. Configuration Management Vulnerabilities (592 bytes)
    2: ...interfaces and functionality to all operators and administrators to change configuration parameters, update Web si...
  20. ASP.NET 1.1 - Web Services to SQL Server (11,474 bytes)
    190: ...wn as constrained delegation. This feature allows administrators to specify exactly which services can be accessed...

View (previous 20) (next 20) (20 | 50 | 100 | 250 | 500).



Search in namespaces:

List redirects
Search for
Views
Personal tools