Search:
Advanced search
|
Sub Categories
FAQ
During
a remote support session for a customer I noticed that, at some stage
in sync configuration, it was possible to choose as sync targets only
two of the three available anonimizers in the infrastructure. How come?
Why the collector logs show “hack alert” warnings?
This is an example of document you can hand in to the clients. The only documents you can hand in to the customers are the ones marked:
In the absence of above-mentioned symbols, you must NOT communicate any document to customers unless you are given officially the permission. |
Powered by KBPublisher (Knowledge base software)