Search: "restrict"
Add an IP access control policy (AddIpControlPolicyItem) - API Gateway Documentation
each time. If this parameter is left blank, the policy does not restrict specific application IDs ...
SAP HANA Scale-out Deployment Guide - SAP Documentation
Log Volumes [/hana/log/BWS]: Restrict maximum memory allocation? [n]: Enter Certificate Host Name For Host 'hana01' ...
[Vulnerability notice] Windows multiple SMB/RDP remote command execution vulnerabilities - Security Documentation
of the Internet to restrict the source IP address of remote logon over Port 3389, thus preventing RDP-based port intrusions and ...
[Vulnerability notice] CVE-2017-3305: Man-in-the-middle attack riddle vulnerability in MySQL Documentation
restrict Port 3306 from remotely logging on to the source IP address. Reference [1]. http://securityaffairs.co/wordpress/58019/hacking/oracle-mysql-riddle-vulnerability.html ...
[Vulnerability notice] CVE-2017-15718: Information leakage vulnerability in Apache Hadoop YARN Documentation
JCEKS file appropriately to restrict the access from unauthorized users. Note: We recommend that you perform a test and use ECS ...
Step 3: Configure WAF protection policies - Web Application Firewall Documentation
strictness of the detection. You can also create protection rules to restrict the number of requests ...
Authorized access - Object Storage Service Documentation
temporary access. When you sign a URL, you can specify the expiration time of the URL to restrict the ...
Compliance with Financial Regulatory Requirements in Singapore - Alibaba Cloud Site
we allowed to enter into outsourcing arrangements outside of Singapore? MAS does not restrict the FIs from outsourcing services ...