Your browser does not allow storing cookies. We recommend enabling them.


Defining Security Settings

The security settings can be configured using the Security page of the Settings dialog.

The Security page of the Settings dialog

Figure B.10. The Security page of the Settings dialog

Terminal Connections

The following options are available:

Empty Clipboard on Exit

Select this check box to remove anything that was recently copied using the cut and paste operations from the clipboard.

Empty Scrollback Buffer on Session Close

Select this check box to empty any remains of the terminal output from the scrollback buffer.




What to read next:

  • Reduce Secure Shell risk. Get to know the NIST 7966.

    The NISTIR 7966 guideline from the Computer Security Division of NIST is a direct call to action for organizations regardless of industry and is a mandate for the US Federal government.
    Download now
  • ISACA Practitioner Guide for SSH

    With contributions from practitioners, specialists and SSH.COM experts, the ISACA “SSH: Practitioner Considerations” guide is vital best practice from the compliance and audit community.
    Download now