Search: "forwarding rule"
[Basic rule] Malicious MySQL UDF execution - Cloud Firewall Documentation
, ransom, cryptocurrency mining, and Distributed Denial of Service (DDoS) attacks to external systems. Rule-based defense: Cloud ...
Set an alarm rule for a physical connection - Cloud Enterprise Network Documentation
to set an alarm rule for the physical connection in a CEN instance. By doing so, you can monitor the usage of ...
[Basic rule] Remote command execution through Microsoft SQL Server xp_cmdshell - Cloud Firewall Documentation
text. Malicious users sometimes attempt to elevate their privileges by using xp_cmdshell to run system commands. Rule ...
Set an alarm rule for a region connection - Cloud Enterprise Network Documentation
to set an alarm rule for a region connection in a CEN instance. By doing so, you can monitor the usage of the ...
[Basic rule] Update of Bash reverse shell detection rules - Cloud Firewall Documentation
bring. Rule type: Reverse shell Risk level: High Rule-based defense: Cloud Firewall has been able to defend against ...
[Basic rule] Malicious file writing vulnerability of PostgreSQL - Cloud Firewall Documentation
. Rule type: Command execution Risk level: High Scope of impact: PostgreSQL databases Rule-based defense: Cloud ...
CreateRules - Server Load Balancer Documentation
forwarding rules in one request. Each rule contains the following parameters ...