英文字典中文字典


英文字典中文字典51ZiDian.com



中文字典辞典   英文字典 a   b   c   d   e   f   g   h   i   j   k   l   m   n   o   p   q   r   s   t   u   v   w   x   y   z       







请输入英文单字,中文词皆可:

chary    音标拼音: [tʃ'ɑri]
a. 细心的,吝啬的,谨慎的

细心的,吝啬的,谨慎的

chary
adj 1: characterized by great caution and wariness; "a cagey
avoidance of a definite answer"; "chary of the risks
involved"; "a chary investor" [synonym: {cagey}, {cagy},
{chary}]

Chary \Char"y\ (ch[^a]r"[y^] or ch[=a]"r[y^]; 277), a. [AS.
cearig careful, fr. cearu care. See {Care}.]
1. Careful; wary; cautious; not rash, or reckless; as, the
latest internet IPO's were shunned by investors made chary
by the poor performance of the first wave of companies
that went public.
[1913 Webster PJC]

His rising reputation made him more chary of his
fame. --Jeffrey.
[1913 Webster]

2. Saving; frugal; sparing; not spendthrift; -- often used
with of; as, chary of his praise.
[1913 Webster PJC]

3. Fastidious; picky; choosy.
[PJC]

47 Moby Thesaurus words for "chary":
Scotch, cagey, calculating, canny, careful, cheeseparing,
circumspect, conserving, considerate, constrained, discreet,
disinclined, distrustful, economic, economical, economizing,
forehanded, frugal, gingerly, guarded, hesitant, inhibited,
labor-saving, leery, loath, mistrustful, money-saving,
parsimonious, penny-wise, provident, prudent, prudential,
reluctant, restrained, safe, saving, scrimping, shy, skimping,
spare, sparing, suspecting, suspicious, thrifty, time-saving,
unwasteful, wary


请选择你想看的字典辞典:
单词字典翻译
chary查看 chary 在百度字典中的解释百度英翻中〔查看〕
chary查看 chary 在Google字典中的解释Google英翻中〔查看〕
chary查看 chary 在Yahoo字典中的解释Yahoo英翻中〔查看〕





安装中文字典英文字典查询工具!


中文字典英文字典工具:
选择颜色:
输入中英文单字

































































英文字典中文字典相关资料:


  • Intune endpoint detection and response policy. | Microsoft Learn
    About Intune policy for endpoint detection and response Intune's endpoint detection and response policies include platform-specific profiles to manage the onboarding installation of Microsoft Defender for Endpoint Each profile includes an onboarding package that applies to the device platform that the policy targets
  • Create Intune Endpoint detection and response policy - Prajwal Desai
    Sign in to the Microsoft Intune admin center Select Endpoint Security > Endpoint Detection and Response > Create Policy Create a manually configured EDR policy Select the platform and profile for your policy The following information identifies your options: Intune: Intune deploys the policy to devices in your assigned groups
  • What Is EDR? Endpoint Detection and Response | Microsoft Security
    EDR gives security teams the visibility and automation they need to speed up incident response and keep attacks on endpoints from spreading They’re used to: Monitor endpoints and keep an exhaustive record of activity to detect suspicious activity in real time Analyze this data to determine whether threats warrant investigation and remediation
  • Deploy an endpoint detection and response (EDR) solution with Microsoft
    Deploy an endpoint detection and response (EDR) solution with Microsoft Architect Microsoft Defender for Endpoint for your organization, onboard devices, and integrate it with your Security Operations Center (SOC) For more architecture resources like this, see aka ms cloudarch This topic is 1 of 6 Page 1 Microsoft Endpoint Manager
  • What is EDR? Endpoint Detection Response Defined - CrowdStrike
    A: EDR is an endpoint security solution that continuously monitors end-user devices to detect and respond to cyber threats like ransomware and malware Q: How does EDR work? A: EDR security solutions record the activities and events taking place on endpoints and all workloads, providing security teams with the visibility they need to uncover incidents that would otherwise remain invisible
  • Defender for Endpoint Onboardingprofile Conflicts
    The profiles include an onboarding package for Microsoft Defender for Endpoint Defender for endpoint enabled and connected with Intune MEM Service to service sync is up and running MEM>Endpoint Security>Endpoint Detection and Response; Create Profile Platform: Windows 10, Windows 11 and Windows Server; Profile: Endpoint Detection and response
  • Endpoint Detection and Response - Broadcom
    This policy introduces the Endpoint Activity Recorder component that is embedded on the managed devices to detect granular threats in files, folders, processes, or any IOCs of the devices This capability of identifying threats preemptively on your devices by the EAR, and also suggesting a response as an action to perform on the device adds value to the security posture of your network devices
  • What Is Endpoint Detection And Response (EDR)? - Fortinet
    Endpoint detection and response (EDR) cybersecurity software is used by security operations teams to detect, contain, investigate, and remediate cyberattacks—such as ransomware and other malware EDR tools secure hosts and endpoints that are connected to the network—such as mobile phones, desktops, laptops, and virtual machines—to prevent the spread of malware
  • What Is EDR? - Endpoint Detection and Response - Cisco
    An endpoint detection and response solution, or EDR, detects threats across your network It investigates the entire lifecycle of the threat, providing insights into what happened, how it got in, where it has been, what it is doing now, and how to stop it An EDR solution can help in eliminating the threat and preventing it from spreading
  • Manage endpoint security policies in Microsoft Defender for Endpoint
    Endpoint detection and response - When you integrate Microsoft Defender for Endpoint with Intune, use the endpoint security policies for endpoint detection and response (EDR) to manage the EDR settings and onboard devices to Microsoft Defender for Endpoint





中文字典-英文字典  2005-2009