Security settings allow the administrator to configure security-related options without looking for support technicians to help solve security breaches. Using security settings, the administrator can configure safeguards for the application from potential vulnerabilities and security breaches.
You can configure security settings by navigating to Admin > General > Security Settings.
Role Required: SDAdmin
Contents
Configure account lockout threshold and duration: Using this option, you can ensure a user account is locked after a pre-specified number of failed login attempts. You can customize the message to be displayed if the user is locked out due to too many login attempts. This configuration applies to all types of authentication.
To configure account lockout threshold and duration,

You can unlock a locked account by clicking the link provided. Alternatively, you can also navigate to ESM Directory >> Users and click Locked Accounts button in the toolbar. A pop-up will display the locked accounts with their domain and IP address. Select the locked account and choose Unlock.
During the (N-1)th failure attempt, i.e. the attempt before the last attempt, captcha authentication will be enforced to ensure that brutal force attackers are not using robots to lock an user account.
Disable Concurrent Login: Using this option, you can restrict concurrent login sessions from different IP addresses. When this option is enabled, concurrent login attempts in various cases will be handled as given below:

Server Port and Protocol Configuration: You can choose whether to run the application in HTTP or HTTPS mode.
Enable HTTP mode: Specify the default server port where the application has to run.

Enable HTTPS mode: After specifying the server port, specify the TLS versions and Ciphers to ensure proper encryption of data, preventing hackers from stealing it.

Configure expiry date for "Keep me signed in" feature: You can set the duration the user can be kept signed into the application. On the expiry date, the user has to re-authenticate by entering the login information again. By default, the user has to re-authenticate every 45 days.

Enable Forgot Password: Enable/disable the Forgot Password option on the login page for users who log in via local authentication. Once this option is enabled, users can use the forgot password option on their login page to get a password reset link sent to their primary email address by entering their username and domain. If the email is not configured or if the particular email is configured in multiple profiles, the mail will not be sent. In such cases, the admin can reset the password manually.

To customize the password reset notification email, go to Notification Rules and click Customise template against Send Self-service login details. Modify the subject and message as per requirement. Use the appropriate $ variables to add necessary links like Password reset link and server URL etc. Click Save. To alter the password reset link's validity, please reach out to our support.
Inactive session timeout configuration: Set the duration in minutes after which the user will be logged out of an inactive session from the web and mobile app. You can set the limit between 1 and 1440 minutes.

Enable password protection for all file attachments: You can protect the file attachments stored in your application from unauthorized access by encrypting them at the server level. This will prevent security breaches over the server data. The password is available only to the SDAdmin and can also be used in case of encryption failure.

Add security response headers: Configure security headers to safeguard the application from XSS attacks and other vulnerability attacks.
You can also include or exclude one or more response headers.
Click here, to learn more about Security Configurations.
This option will list the domain names on the login page. If disabled, the domain names will be kept anonymous to anyone apart from the users.
This option will filter the domains listed during login based on the username entered. If disabled, the entire domain list will be displayed, reducing the probability of hackers knowing the domains where a particular user is present. Note that you can enable domain filtering only if domain drop-down in enabled.
By enabling this option, you can make the application unresponsive to unnecessary data upload while receiving scanned XML data from an agent through a non-login URL.
This option enables technicians to generate their API keys for connecting ServiceDesk Plus with third-party applications. If disabled, only the administrator can generate API keys for the technicians.
This option will disable users from pasting clipboard data on all password fields in the application.
Disabling HTTP compression will prevent BREACH attacks since this type of attack only occurs on data transferred via HTTP compression. However, this will lead to a slight increase in the network's bandwidth and decreased application performance.
You can configure your existing antivirus software in ServiceDesk Plus to detect any vulnerable files during file uploads and email attachment receipts. Antivirus software that uses ICAP protocol can only be configured.
To configure an antivirus scan in the application,

Once configured, the file uploads and attachment receipts will be scanned for vulnerable files.
Some of the antivirus tools that can be configured:
1. BITDEFENDER_SECURITY_FOR_STORAGE
2. ESET_FILE_SECURITY
3. ESET_GATEWAY_SECURITY
4. KASPERSKY_SECURITY_FOR_WINDOWS_SERVER
5. MCAFEE_VIRUSSCAN_ENTERPRICE_FOE_STORAGE
6. MCAFEE_WEB_GATEWAY
7. SYMANTEC_PROTECHTION_ENGINE_FOR_CLOUD
8. CLAM_AV_WITH_SQUID
Disable login details banner: Last login information will not be displayed to the users when they log in to the application.
Disable rate limit for all actions and operations: All actions/operations can be performed, regardless of the configured rate limit.

To safeguard the application from URL attacks, ServiceDesk Plus provides an option to notify SDAdmins and OrgAdmins whenever the number of attempts to access a URL exceeds the predefined rate limit within a given time frame.
Each URL has a predefined rate limit configured internally. On reaching the rate limit, the connection to the requested URL will be blocked for a specific time frame and notification triggered.
Notifications will be sent to OrgAdmins when URLs are accessed by UI.
Notifications will be sent to SDAdmins when URLs are accessed by integration keys.
The notification includes details such as the URL address, user details used to invoke the URL, description, date/time, IP address of the corresponding machine, Configure Rate Limit option to modify the rate limit of the URL.
To enable the notification,
Go to Admin > ESM Directory > General Settings > Security Settings.
Under Advanced Settings, select the Enable push notification for admins when client request rate limit is reached check box.

URL access limit can be modified in two ways:
Through notifications
By using the URL rate limit violations link
To modify the rate limit from the notifications,
Click the bell or push notification.

In the displayed window, under Configure Rate limit, click Edit.
URL rate limit - Enter the number of requests for the URL.
Click Update to save the changes. The information about the last modified user, date, and time is displayed in the same window.
Do the following to modify the rate limit from the URL rate limit violations link next to the Enable push notification for Admins when client request rate limit is reached check box:
Click URL rate limit violations to view the complete list of suspicious activities.

Select an impacted URL.
In the displayed window, under Configure Rate Limit, click Edit.

URL rate limit - Enter the number of requests for the URL.
Click Update to save the changes. The information about the last modified user and time is displayed.
The rate limit for the same URL can be configured both through the UI and by using integration keys. The rate limit set via the UI by OrgAdmin is independent of the rate limit modified through integration keys by SDAdmin.
The final third of a typical introductory course expands the view to galaxies and the universe as a whole. Students learn about our Milky Way (a barred spiral galaxy), different galaxy types, and the evidence for dark matter (flat rotation curves). Hubble’s discovery of the expanding universe—manifested in the linear relation between galaxy distance and recessional velocity ((v = H_0 d))—introduces the Big Bang model. Key supporting evidence includes the cosmic microwave background radiation (the afterglow of the hot early universe) and the primordial abundances of hydrogen and helium. While introductory courses often treat dark energy only qualitatively, students are introduced to the astonishing conclusion that only 5% of the universe is ordinary matter; the rest is dark matter and dark energy.
I cannot directly provide a pre-written essay for a specific PDF file titled "Introductory Astronomy And Astrophysics.pdf" because I do not have access to your local files, course materials, or the exact content of that document. However, I can offer you a on the core themes typically covered in an introductory astronomy and astrophysics course. You can use this as a template, study guide, or reference. Introductory Astronomy And Astrophysics.pdf
No essay on introductory astrophysics is complete without Newton’s law of universal gravitation and Kepler’s three laws of planetary motion. Students learn that gravity is the dominant force shaping large-scale structures. Kepler’s first law (elliptical orbits) replaces the ancient perfect-circle model, while his second law (equal areas in equal times) introduces conservation of angular momentum. Kepler’s third law ((P^2 = a^3) in astronomical units) becomes a practical distance-measuring tool. When combined with Newton’s version ((P^2 = \frac{4\pi^2 a^3}{G(M_1+M_2)})), it allows us to “weigh” stars, galaxies, and even supermassive black holes by observing orbiting objects. This interplay between observation (Tycho Brahe) and mathematical law (Kepler, Newton) is a recurring theme in astrophysics. The final third of a typical introductory course
Perhaps the most beautiful narrative in an introductory course is the stellar life cycle. Stars form from cold molecular clouds, achieve hydrostatic equilibrium when core fusion begins, and spend most of their lives on the main sequence (fusing hydrogen into helium). Using the Hertzsprung-Russell (H-R) diagram, students learn to classify stars by temperature, luminosity, and evolutionary stage. The mass of a star determines its entire fate: low-mass stars become white dwarfs (supported by electron degeneracy pressure), while high-mass stars end in core-collapse supernovae, leaving behind neutron stars or black holes. Crucially, students discover that we are “star stuff”—all elements heavier than helium (carbon, oxygen, iron) were forged in stellar cores and scattered by supernovae. This cosmic recycling connects astrophysics directly to chemistry and biology. However, I can offer you a on the
Below is a well-structured essay suitable for an introductory college-level course. Introduction
Introductory astronomy and astrophysics serve as humanity’s intellectual bridge between the tangible Earth and the vast, often counterintuitive cosmos. While astronomy is the ancient practice of observing celestial objects, astrophysics applies the laws of physics—gravity, electromagnetism, thermodynamics, and nuclear physics—to explain why those objects behave as they do. A foundational course in this discipline does not merely teach students to name constellations; it equips them with the tools to decode light, measure cosmic distances, and trace the life cycles of stars and galaxies. The central thesis of such a course is that the same physical laws operating on Earth govern the entire universe, making the cosmos understandable through observation, mathematics, and logical inference.
The most critical tool in astrophysics is electromagnetic radiation. Since we cannot physically visit stars or distant galaxies, nearly all astronomical knowledge comes from analyzing light. A solid introductory course begins with the electromagnetic spectrum—from radio waves to gamma rays—and the inverse-square law of brightness. However, the true power lies in . By spreading light into its constituent wavelengths, astronomers identify chemical elements through emission and absorption lines. The Doppler shift of these lines reveals radial velocity, allowing us to measure how fast a star or galaxy moves toward or away from us. This foundational concept, introduced early in any standard Introductory Astronomy and Astrophysics textbook, leads directly to discoveries like expanding galaxies, exoplanets, and the rotation of black hole accretion disks.