Portal nioc ir

Author: n | 2025-04-24

★★★★☆ (4.4 / 2009 reviews)

balabolka portable 2.15.0.847

The purpose of Portal Nioc Ir (National Iranian Oil Company Portal) is to serve as an online platform for the National Iranian Oil Company (NIOC) to provide information, news, and

hp flash drive

Portal Nioc Ir - Nethercraft.net

PIV credentialsManual, Disabled1.1.0Acceptance of External AuthenticatorsID: NIST SP 800-53 Rev. 5 IA-8 (2)Ownership: SharedName(Azure portal)DescriptionEffect(s)Version(GitHub)Accept only FICAM-approved third-party credentialsCMA_C1348 - Accept only FICAM-approved third-party credentialsManual, Disabled1.1.0Use of Defined ProfilesID: NIST SP 800-53 Rev. 5 IA-8 (4)Ownership: SharedName(Azure portal)DescriptionEffect(s)Version(GitHub)Conform to FICAM-issued profilesCMA_C1350 - Conform to FICAM-issued profilesManual, Disabled1.1.0Incident ResponsePolicy and ProceduresID: NIST SP 800-53 Rev. 5 IR-1Ownership: SharedName(Azure portal)DescriptionEffect(s)Version(GitHub)Review and update incident response policies and proceduresCMA_C1352 - Review and update incident response policies and proceduresManual, Disabled1.1.0Incident Response TrainingID: NIST SP 800-53 Rev. 5 IR-2Ownership: SharedName(Azure portal)DescriptionEffect(s)Version(GitHub)Provide information spillage trainingCMA_0413 - Provide information spillage trainingManual, Disabled1.1.0Simulated EventsID: NIST SP 800-53 Rev. 5 IR-2 (1)Ownership: SharedName(Azure portal)DescriptionEffect(s)Version(GitHub)Incorporate simulated events into incident response trainingCMA_C1356 - Incorporate simulated events into incident response trainingManual, Disabled1.1.0Automated Training EnvironmentsID: NIST SP 800-53 Rev. 5 IR-2 (2)Ownership: SharedName(Azure portal)DescriptionEffect(s)Version(GitHub)Employ automated training environmentCMA_C1357 - Employ automated training environmentManual, Disabled1.1.0Incident Response TestingID: NIST SP 800-53 Rev. 5 IR-3Ownership: SharedName(Azure portal)DescriptionEffect(s)Version(GitHub)Conduct incident response testingCMA_0060 - Conduct incident response testingManual, Disabled1.1.0Establish an information security programCMA_0263 - Establish an information security programManual, Disabled1.1.0Run simulation attacksCMA_0486 - Run simulation attacksManual, Disabled1.1.0Coordination with Related PlansID: NIST SP 800-53 Rev. 5 IR-3 (2)Ownership: SharedName(Azure portal)DescriptionEffect(s)Version(GitHub)Conduct incident response testingCMA_0060 - Conduct incident response testingManual, Disabled1.1.0Establish an information security programCMA_0263 - Establish an information security programManual, Disabled1.1.0Run simulation attacksCMA_0486 - Run simulation attacksManual, Disabled1.1.0Incident HandlingID: NIST SP 800-53 Rev. 5 IR-4Ownership: SharedName(Azure portal)DescriptionEffect(s)Version(GitHub)Assess information security eventsCMA_0013 - Assess information security eventsManual, Disabled1.1.0Azure Defender for App Service should be enabledAzure Defender for App Service leverages the scale of the cloud, and the visibility that Azure has as a cloud provider, to monitor for common web app attacks.AuditIfNotExists, Disabled1.0.3Azure Defender for Azure SQL Database servers should be enabledAzure Defender for SQL provides functionality for surfacing and mitigating potential database vulnerabilities, detecting anomalous activities that could indicate threats to SQL databases, and. The purpose of Portal Nioc Ir (National Iranian Oil Company Portal) is to serve as an online platform for the National Iranian Oil Company (NIOC) to provide information, news, and pmhr فیش حقوقی portal nioc ir portal nioc میز کار portal.nioc.ir 443 portal.nioc.ir فیش حقوق وزارت نفت فیش حقوقی سامانه جامع فناوری اطلاعات و ارتباطات شرکت ملی نفت ایران مشاهده خلاصه پرونده کارکنان شرکت نفت نمونه فیش مدیر; موضوع; ; pmhr فیش حقوقی portal nioc ir portal nioc میز کار portal.nioc.ir 443 portal.nioc.ir فیش حقوق وزارت نفت فیش حقوقی سامانه جامع فناوری اطلاعات و ارتباطات شرکت ملی نفت ایران مشاهده خلاصه پرونده کارکنان شرکت نفت نمونه National Iranian Oil Company (NIOC; em persa: شرکت ملّی نفت ایران‎‎ Sherkat-e Melli-ye Naft-e Īrān) uma companhia petrol fera estatal, sediada em Teer, Ir . O NIOC exclusivamente portal.nioc.ir NIOC-AS, IR. Seen 2 times between August 25th, 2025 and August 25th, 2025. General Info Open in Search Geo: Iran, Islamic Republic Of (IR)Domain: nioc.ir Deputy CEO of NIOC for Production Affairs ( ) CEO and Vice-Chairman of NICO ( ) Deputy Director of Corporate Planning Division of NIOC ( ) Attach JPEG from camera To send a JPEG image from a particular video channel, check the appropriate box. Page 45: Alarm Outputs FLEXIDOME IP 3000i IR | FLEXIDOME IP micro 3000i | DINION IP 3000i IR | FLEXIDOME IP turret Configuration | en 3000i IR Action Select a type of action to be performed when an alarm input occurs: – None –... Page 46 FLEXIDOME IP 3000i IR | FLEXIDOME IP micro en | Configuration 3000i | DINION IP 3000i IR | FLEXIDOME IP turret 3000i IR For certain applications, the DHCP server must support the fixed assignment between IP address and MAC address, and must be appropriately set up so that, once an IP address is assigned, it is retained each time the system is rebooted. Page 47: Dyndns FLEXIDOME IP 3000i IR | FLEXIDOME IP micro 3000i | DINION IP 3000i IR | FLEXIDOME IP turret Configuration | en 3000i IR To limit connections to SSL encryption, set the Off option in the HTTP browser port and the RCP+ port. Page 48: Advanced This field identifies any cloud-based services with which the camera communicates. – If you have registered the device on a cloud-based service such as Bosch Remote Portal, then this field identifies this fact (“Registered on Bosch Remote Portal”). Note: The button (Connect to Bosch Remote Portal) to connect to the device with that service is active. Page 49: Network Management FLEXIDOME IP 3000i IR | FLEXIDOME IP micro 3000i | DINION IP 3000i IR |

Comments

User1506

PIV credentialsManual, Disabled1.1.0Acceptance of External AuthenticatorsID: NIST SP 800-53 Rev. 5 IA-8 (2)Ownership: SharedName(Azure portal)DescriptionEffect(s)Version(GitHub)Accept only FICAM-approved third-party credentialsCMA_C1348 - Accept only FICAM-approved third-party credentialsManual, Disabled1.1.0Use of Defined ProfilesID: NIST SP 800-53 Rev. 5 IA-8 (4)Ownership: SharedName(Azure portal)DescriptionEffect(s)Version(GitHub)Conform to FICAM-issued profilesCMA_C1350 - Conform to FICAM-issued profilesManual, Disabled1.1.0Incident ResponsePolicy and ProceduresID: NIST SP 800-53 Rev. 5 IR-1Ownership: SharedName(Azure portal)DescriptionEffect(s)Version(GitHub)Review and update incident response policies and proceduresCMA_C1352 - Review and update incident response policies and proceduresManual, Disabled1.1.0Incident Response TrainingID: NIST SP 800-53 Rev. 5 IR-2Ownership: SharedName(Azure portal)DescriptionEffect(s)Version(GitHub)Provide information spillage trainingCMA_0413 - Provide information spillage trainingManual, Disabled1.1.0Simulated EventsID: NIST SP 800-53 Rev. 5 IR-2 (1)Ownership: SharedName(Azure portal)DescriptionEffect(s)Version(GitHub)Incorporate simulated events into incident response trainingCMA_C1356 - Incorporate simulated events into incident response trainingManual, Disabled1.1.0Automated Training EnvironmentsID: NIST SP 800-53 Rev. 5 IR-2 (2)Ownership: SharedName(Azure portal)DescriptionEffect(s)Version(GitHub)Employ automated training environmentCMA_C1357 - Employ automated training environmentManual, Disabled1.1.0Incident Response TestingID: NIST SP 800-53 Rev. 5 IR-3Ownership: SharedName(Azure portal)DescriptionEffect(s)Version(GitHub)Conduct incident response testingCMA_0060 - Conduct incident response testingManual, Disabled1.1.0Establish an information security programCMA_0263 - Establish an information security programManual, Disabled1.1.0Run simulation attacksCMA_0486 - Run simulation attacksManual, Disabled1.1.0Coordination with Related PlansID: NIST SP 800-53 Rev. 5 IR-3 (2)Ownership: SharedName(Azure portal)DescriptionEffect(s)Version(GitHub)Conduct incident response testingCMA_0060 - Conduct incident response testingManual, Disabled1.1.0Establish an information security programCMA_0263 - Establish an information security programManual, Disabled1.1.0Run simulation attacksCMA_0486 - Run simulation attacksManual, Disabled1.1.0Incident HandlingID: NIST SP 800-53 Rev. 5 IR-4Ownership: SharedName(Azure portal)DescriptionEffect(s)Version(GitHub)Assess information security eventsCMA_0013 - Assess information security eventsManual, Disabled1.1.0Azure Defender for App Service should be enabledAzure Defender for App Service leverages the scale of the cloud, and the visibility that Azure has as a cloud provider, to monitor for common web app attacks.AuditIfNotExists, Disabled1.0.3Azure Defender for Azure SQL Database servers should be enabledAzure Defender for SQL provides functionality for surfacing and mitigating potential database vulnerabilities, detecting anomalous activities that could indicate threats to SQL databases, and

2025-03-29
User7944

Attach JPEG from camera To send a JPEG image from a particular video channel, check the appropriate box. Page 45: Alarm Outputs FLEXIDOME IP 3000i IR | FLEXIDOME IP micro 3000i | DINION IP 3000i IR | FLEXIDOME IP turret Configuration | en 3000i IR Action Select a type of action to be performed when an alarm input occurs: – None –... Page 46 FLEXIDOME IP 3000i IR | FLEXIDOME IP micro en | Configuration 3000i | DINION IP 3000i IR | FLEXIDOME IP turret 3000i IR For certain applications, the DHCP server must support the fixed assignment between IP address and MAC address, and must be appropriately set up so that, once an IP address is assigned, it is retained each time the system is rebooted. Page 47: Dyndns FLEXIDOME IP 3000i IR | FLEXIDOME IP micro 3000i | DINION IP 3000i IR | FLEXIDOME IP turret Configuration | en 3000i IR To limit connections to SSL encryption, set the Off option in the HTTP browser port and the RCP+ port. Page 48: Advanced This field identifies any cloud-based services with which the camera communicates. – If you have registered the device on a cloud-based service such as Bosch Remote Portal, then this field identifies this fact (“Registered on Bosch Remote Portal”). Note: The button (Connect to Bosch Remote Portal) to connect to the device with that service is active. Page 49: Network Management FLEXIDOME IP 3000i IR | FLEXIDOME IP micro 3000i | DINION IP 3000i IR |

2025-03-28
User4852

An incident response planCMA_0145 - Develop an incident response planManual, Disabled1.1.0Implement incident handlingCMA_0318 - Implement incident handlingManual, Disabled1.1.0Maintain data breach recordsCMA_0351 - Maintain data breach recordsManual, Disabled1.1.0Maintain incident response planCMA_0352 - Maintain incident response planManual, Disabled1.1.0Protect incident response planCMA_0405 - Protect incident response planManual, Disabled1.1.0Information Spillage ResponseID: NIST SP 800-53 Rev. 5 IR-9Ownership: SharedName(Azure portal)DescriptionEffect(s)Version(GitHub)Alert personnel of information spillageCMA_0007 - Alert personnel of information spillageManual, Disabled1.1.0Develop an incident response planCMA_0145 - Develop an incident response planManual, Disabled1.1.0Eradicate contaminated informationCMA_0253 - Eradicate contaminated informationManual, Disabled1.1.0Execute actions in response to information spillsCMA_0281 - Execute actions in response to information spillsManual, Disabled1.1.0Identify contaminated systems and componentsCMA_0300 - Identify contaminated systems and componentsManual, Disabled1.1.0Identify spilled informationCMA_0303 - Identify spilled informationManual, Disabled1.1.0Isolate information spillsCMA_0346 - Isolate information spillsManual, Disabled1.1.0TrainingID: NIST SP 800-53 Rev. 5 IR-9 (2)Ownership: SharedName(Azure portal)DescriptionEffect(s)Version(GitHub)Provide information spillage trainingCMA_0413 - Provide information spillage trainingManual, Disabled1.1.0Post-spill OperationsID: NIST SP 800-53 Rev. 5 IR-9 (3)Ownership: SharedName(Azure portal)DescriptionEffect(s)Version(GitHub)Develop spillage response proceduresCMA_0162 - Develop spillage response proceduresManual, Disabled1.1.0Exposure to Unauthorized PersonnelID: NIST SP 800-53 Rev. 5 IR-9 (4)Ownership: SharedName(Azure portal)DescriptionEffect(s)Version(GitHub)Develop security safeguardsCMA_0161 - Develop security safeguardsManual, Disabled1.1.0MaintenancePolicy and ProceduresID: NIST SP 800-53 Rev. 5 MA-1Ownership: SharedName(Azure portal)DescriptionEffect(s)Version(GitHub)Review and update system maintenance policies and proceduresCMA_C1395 - Review and update system maintenance policies and proceduresManual, Disabled1.1.0Controlled MaintenanceID: NIST SP 800-53 Rev. 5 MA-2Ownership: SharedName(Azure portal)DescriptionEffect(s)Version(GitHub)Control maintenance and repair activitiesCMA_0080 - Control maintenance and repair activitiesManual, Disabled1.1.0Employ a media sanitization mechanismCMA_0208 - Employ a media sanitization mechanismManual, Disabled1.1.0Implement controls to secure all mediaCMA_0314 - Implement controls to secure all mediaManual, Disabled1.1.0Manage nonlocal maintenance and diagnostic activitiesCMA_0364 - Manage nonlocal maintenance and diagnostic activitiesManual, Disabled1.1.0Automated Maintenance ActivitiesID: NIST SP 800-53 Rev. 5 MA-2 (2)Ownership: SharedName(Azure portal)DescriptionEffect(s)Version(GitHub)Automate remote maintenance activitiesCMA_C1402 - Automate remote maintenance activitiesManual, Disabled1.1.0Produce complete records of remote maintenance activitiesCMA_C1403 - Produce complete records of remote maintenance activitiesManual, Disabled1.1.0Maintenance ToolsID:

2025-03-25
User8111

OperationsManual, Disabled1.1.0Vulnerabilities Related to IncidentsID: NIST SP 800-53 Rev. 5 IR-6 (2)Ownership: CustomerName(Azure portal)DescriptionEffect(s)Version(GitHub)Email notification for high severity alerts should be enabledTo ensure the relevant people in your organization are notified when there is a potential security breach in one of your subscriptions, enable email notifications for high severity alerts in Security Center.AuditIfNotExists, Disabled1.2.0Email notification to subscription owner for high severity alerts should be enabledTo ensure your subscription owners are notified when there is a potential security breach in their subscription, set email notifications to subscription owners for high severity alerts in Security Center.AuditIfNotExists, Disabled2.1.0Subscriptions should have a contact email address for security issuesTo ensure the relevant people in your organization are notified when there is a potential security breach in one of your subscriptions, set a security contact to receive email notifications from Security Center.AuditIfNotExists, Disabled1.0.1Incident Response AssistanceID: NIST SP 800-53 Rev. 5 IR-7Ownership: SharedName(Azure portal)DescriptionEffect(s)Version(GitHub)Document security operationsCMA_0202 - Document security operationsManual, Disabled1.1.0Automation Support for Availability of Information and SupportID: NIST SP 800-53 Rev. 5 IR-7 (1)Ownership: SharedName(Azure portal)DescriptionEffect(s)Version(GitHub)Develop an incident response planCMA_0145 - Develop an incident response planManual, Disabled1.1.0Enable network protectionCMA_0238 - Enable network protectionManual, Disabled1.1.0Eradicate contaminated informationCMA_0253 - Eradicate contaminated informationManual, Disabled1.1.0Execute actions in response to information spillsCMA_0281 - Execute actions in response to information spillsManual, Disabled1.1.0Implement incident handlingCMA_0318 - Implement incident handlingManual, Disabled1.1.0Perform a trend analysis on threatsCMA_0389 - Perform a trend analysis on threatsManual, Disabled1.1.0View and investigate restricted usersCMA_0545 - View and investigate restricted usersManual, Disabled1.1.0Coordination with External ProvidersID: NIST SP 800-53 Rev. 5 IR-7 (2)Ownership: SharedName(Azure portal)DescriptionEffect(s)Version(GitHub)Establish relationship between incident response capability and external providersCMA_C1376 - Establish relationship between incident response capability and external providersManual, Disabled1.1.0Identify incident response personnelCMA_0301 - Identify incident response personnelManual, Disabled1.1.0Incident Response PlanID: NIST SP 800-53 Rev. 5 IR-8Ownership: SharedName(Azure portal)DescriptionEffect(s)Version(GitHub)Assess information security eventsCMA_0013 - Assess information security eventsManual, Disabled1.1.0Develop

2025-04-10
User4847

Classes of Incidents and Actions takenCMA_C1365 - Identify classes of Incidents and Actions takenManual, Disabled1.1.0Information CorrelationID: NIST SP 800-53 Rev. 5 IR-4 (4)Ownership: SharedName(Azure portal)DescriptionEffect(s)Version(GitHub)Implement incident handlingCMA_0318 - Implement incident handlingManual, Disabled1.1.0Insider ThreatsID: NIST SP 800-53 Rev. 5 IR-4 (6)Ownership: SharedName(Azure portal)DescriptionEffect(s)Version(GitHub)Implement Incident handling capabilityCMA_C1367 - Implement Incident handling capabilityManual, Disabled1.1.0Correlation with External OrganizationsID: NIST SP 800-53 Rev. 5 IR-4 (8)Ownership: SharedName(Azure portal)DescriptionEffect(s)Version(GitHub)Coordinate with external organizations to achieve cross org perspectiveCMA_C1368 - Coordinate with external organizations to achieve cross org perspectiveManual, Disabled1.1.0Incident MonitoringID: NIST SP 800-53 Rev. 5 IR-5Ownership: SharedName(Azure portal)DescriptionEffect(s)Version(GitHub)Azure Defender for App Service should be enabledAzure Defender for App Service leverages the scale of the cloud, and the visibility that Azure has as a cloud provider, to monitor for common web app attacks.AuditIfNotExists, Disabled1.0.3Azure Defender for Azure SQL Database servers should be enabledAzure Defender for SQL provides functionality for surfacing and mitigating potential database vulnerabilities, detecting anomalous activities that could indicate threats to SQL databases, and discovering and classifying sensitive data.AuditIfNotExists, Disabled1.0.2Azure Defender for Key Vault should be enabledAzure Defender for Key Vault provides an additional layer of protection and security intelligence by detecting unusual and potentially harmful attempts to access or exploit key vault accounts.AuditIfNotExists, Disabled1.0.3Azure Defender for Resource Manager should be enabledAzure Defender for Resource Manager automatically monitors the resource management operations in your organization. Azure Defender detects threats and alerts you about suspicious activity. Learn more about the capabilities of Azure Defender for Resource Manager at . Enabling this Azure Defender plan results in charges. Learn about the pricing details per region on Security Center's pricing page: .AuditIfNotExists, Disabled1.0.0Azure Defender for servers should be enabledAzure Defender for servers provides real-time threat protection for server workloads and generates hardening recommendations as well as alerts about suspicious activities.AuditIfNotExists, Disabled1.0.3Azure Defender for SQL servers on machines should be

2025-03-28

Add Comment