Search: "rule"
Delete a security group rule - Elastic Compute Service Documentation
the security group management page, select the rule direction and find the rule you want to delete. If the security ...
Create an alert rule for pods in Container Service for Kubernetes - CloudMonitor Documentation
This topic describes how to create an alert rule for one or more pods in Container Service for Kubernetes ...
Template rule - DataWorks Documentation
. For example, rule is the number of rows in the SQL task table and one-day fluctuation detection, then the ...
FAQs about forwarding rule configurations - Game Shield Documentation
1025 to 65535 Supported forwarding rule: TCP What is the forwarding entry limit on Game Shield ports ...
[Basic rule] Remote code execution vulnerabilities in ThinkPHP versions earlier than 5.0.24 - Cloud Firewall Documentation
webshell directly. ThinkPHP versions from 5.0.0 to 5.0.23 are affected. Rule-based defense: Cloud Firewall has been able to ...
[Basic rule] PHPCMS 2008 code injection vulnerability (CVE-2018-19127) - Cloud Firewall Documentation
. Rule-based defense: Cloud Firewall has been able to defend against this vulnerability. We recommend that you enable ...
Set an alarm rule for a bandwidth package - Cloud Enterprise Network Documentation
to set an alarm rule for a bandwidth package in a CEN instance. By doing so, you can monitor the usage of the ...
[Basic rule] Update of mining pool communication detection rules - Cloud Firewall Documentation
servers that hackers are using to mine cryptocurrency. Rule type: cryptocurrency mining Risk level: High Cloud ...
[Basic rule] Malicious MySQL UDF execution - Cloud Firewall Documentation
, ransom, cryptocurrency mining, and Distributed Denial of Service (DDoS) attacks to external systems. Rule-based defense: Cloud ...
Set an alarm rule for a physical connection - Cloud Enterprise Network Documentation
to set an alarm rule for the physical connection in a CEN instance. By doing so, you can monitor the usage of ...