Search:
Advanced search
|
Sub Categories
FAQ
![]() During
a remote support session for a customer I noticed that, at some stage
in sync configuration, it was possible to choose as sync targets only
two of the three available anonimizers in the infrastructure. How come?
![]() Why the collector logs show “hack alert” warnings?
![]() This is an example of document you can hand in to the clients. The only documents you can hand in to the customers are the ones marked:
In the absence of above-mentioned symbols, you must NOT communicate any document to customers unless you are given officially the permission. |
Powered by KBPublisher (Knowledge base software)