Need Help? We are right here!
Thanks for your Enquiry.
If you don't hear from us within 24 hours, please feel free to send a follow-up email to info@xecurify.com
Search Results:
×Term | Meaning |
---|---|
System User | A specialized account for automated system operations or privileged access requiring rotation. |
Resources | Any server or endpoint managed within PAM (Privileged Access Management). |
App | Privileged applications like databases or software. |
Web App | Online platforms managed within PAM. |
Resources Type | The type of asset, such as SSH, RDP, or VNC. |
Port | The network port through which the asset communicates. |
Target Machine | The system where the web app is hosted or accessed. |
Database Policy | A security rule set that governs access and actions on database applications. |
Session Timeout | The duration before an idle session is automatically terminated. |
Audit Events | Tracks all executed commands and actions for auditing purposes. |
Recorded Sessions | Log user activity for later review. |
Live Stream | Enables real-time monitoring of user actions. |
Enforce MFA | Requires multi-factor authentication for added security. |
Transaction Control | Determines whether commands are executed in a transactional manner. |
Password Policy | A set of rules defining password complexity, expiry, and reuse restrictions. |
Password Expiry | A time limit after which users must reset their passwords. |
Special Symbols | Non-alphanumeric characters (e.g., @, #, $, %). |
Force Reset | Users must change their password immediately upon expiry. |
Lock Account | Prevents user login until a new password is set. |
Password Rotation | The automated process of periodically changing passwords to prevent unauthorized access. |
Rotation Interval | The frequency at which passwords are rotated (e.g., every 30 days). |
Scheduled Rotation | A policy where passwords are updated at set intervals. |
After Every Use Rotation | Ensures passwords are changed immediately after each usage. |
SMTP | Simple Mail Transfer Protocol, a protocol for sending emails through servers. |
Port Number | The port used by your SMTP server to accept connections (e.g., 25, 465, 587). |
TLS/SSL | Encryption methods are used for securing email communication. |
Sender Email | The email address from which messages are sent. |
Test Configuration | Functionality to verify if your SMTP settings are working before saving. |