This process is often applied to the complete dataset in the sources — that is, without security restrictions.
通常将这个过程应用于数据源中完整的数据集,即没有任何安全限制。
2
Policies can also force strong passwords and setsecurity features such as the number of times a password attempt can fail before the device wipes its data.