Search: Advanced search
Please enter a keyword or ID
During a remote support session for a customer I noticed that, at some stage in sync configuration, it was possible to choose as sync targets only two of the three available anonimizers in the infrastructure. How come?
Why the collector logs show “hack alert” warnings?
This is an example of document you can hand in to the clients.
The only documents you can hand in to the customers are the ones marked:
In the absence of above-mentioned symbols, you must NOT communicate any document to customers unless you are given officially the permission.