Whether an access violation occurred (the wrong person performed a harvest operation, for example)
是否有访问入侵发生(例如,一个未授权的人执行了一次获取操作)
Note Do not use this procedure in a production environment to allow unauthorized access to user data in violation of corporate policies regarding privacy and security.
小心请不要在生产环境中使用此过程允许未经授权的用户访问用户数据。这样做可能会违反贵公司的隐私和安全政策。
With monitored security, the models all reside in the same repository, and a model manager USES reports and queries to determine after the fact whether an access violation has occurred.
对于监控的安全性,模型都位于同一存储库中,模型管理员使用报告和查询来决定是否有访问入侵发生。
应用推荐