27 results found for " delete ".
-
Deleting a Task - Data Security Center
From: Help > Data Security Center > User Guide > Sensitive Data Identification > Identification TasksDeleting a Task Delete a sensitive data identification task. Prerequisites You have obtained credentials for logging in to the management console. Identification tasks have been created. Constraints If the identification task is running, stop or delete the task after the task is complete
-
Deleting OBS Assets - Data Security Center
Constraints If the OBS assets to be deleted have been used in an ongoing sensitive data identification task, unbind the assets or delete the task, and then delete the OBS assets as instructed. Deleted assets including related templates, task results, and reports cannot be recovered. Exercise
-
Deleting a Rule Group - Data Security Center
From: Help > Data Security Center > User Guide > Sensitive Data Identification > Identification Rule GroupsDeleting a Rule Group Delete a customized sensitive data identification rule group. Prerequisites You have obtained credentials for logging in to the management console. Identification rule groups have been added. Constraints DSC built-in rule groups cannot be deleted. If the rule
-
Deleting a Database - Data Security Center
Constraints If the database asset to be deleted has been used in a sensitive data identification task, unbind the asset or delete the task and then delete the asset. Deleted assets cannot be recovered. After the deletion, the templates, results, and reports related to the asset will
-
Deleting a Big Data Asset - Data Security Center
jobs. Constraints If the big data asset to be deleted has been used in a sensitive data identification job, unbind the asset or delete the job and then delete the asset. Deleted assets cannot be recovered. After the deletion, the templates, results, and reports related to the asset will
-
Deleting a Rule - Data Security Center
From: Help > Data Security Center > User Guide > Sensitive Data Identification > Identification RulesDeleting a Rule Delete a rule you do not want to use. Prerequisites You have obtained credentials for logging in to the management console. Identification rules have been added. Rules to be deleted are not added to a rule group. Constraints DSC built-in rules cannot be deleted. If
-
Managing an Elasticsearch Data Masking Task - Data Security Center
From: Help > Data Security Center > User Guide > Data Masking > Static Data Masking > Managing a Data Masking TaskManaging an Elasticsearch Data Masking Task Scenario This section describes how to view, edit, and delete an Elasticsearch data masking task. Prerequisites You have obtained credentials for logging in to the management console. An Elasticsearch data masking task has been created.
-
Managing a Database Data Masking Task - Data Security Center
From: Help > Data Security Center > User Guide > Data Masking > Static Data Masking > Managing a Data Masking TaskManaging a Database Data Masking Task This section describes how to view, edit, and delete a database data masking task. Prerequisites You have obtained credentials for logging in to the management console. A data masking task has been created. Viewing a Database Data Masking Task
-
Operations Recorded by CTS - Data Security Center
downloadReport Delete a report dscReport deleteReport Add a scan rule dscRule addRule Modify a scan rule dscRule editRule Delete a scan rule dscRule deleteRule Add a scan rule group dscRuleGroup addRuleGroup Modify a scan rule group dscRuleGroup editRuleGroup Delete a scan rule group
-
DSC and Related Services - Data Security Center
downloadReport Delete a report dscReport deleteReport Add a scan rule dscRule addRule Modify a scan rule dscRule editRule Delete a scan rule dscRule deleteRule Add a scan rule group dscRuleGroup addRuleGroup Modify a scan rule group dscRuleGroup editRuleGroup Delete a scan rule group
-
DSC Permissions and Supported Actions - Data Security Center
Deleting identification tasks dsc:scanRule:delete Querying the overview page of DSC dsc:overview:list Querying the database list dsc:databaseAsset:list Deleting OBS assets dsc:obsAsset:delete Deleting big data assets dsc:bigdataAsset:delete Parent topic: Permissions Management
-
Viewing the Job List - Data Security Center
From: Help > Data Security Center > User Guide > Sensitive Data Identification > Identification Tasksidentification job. Click Start Identification to start an identification job. Click View Results to view the identification result. Click Delete to delete an identification job. Click the task name to view and download the identification job report. For details, see Downloading a Report
-
Viewing the Rule Group List - Data Security Center
From: Help > Data Security Center > User Guide > Sensitive Data Identification > Identification Rule GroupsOperations provided in the Operation column: Click Edit to modify an identification rule group. For details, see Editing a Rule Group. Click Delete to delete a customized identification rule group. For details, see Deleting a Rule Group. Parent topic: Identification Rule Groups
-
Handling an Abnormal Event - Data Security Center
are as follows: Manually Delete Access Key: Log in to GitHub and manually delete or hide the leaked access key and its related information. Manually Disable Access Key: Log in to the Access Key management console and disable and reset the access key (or delete it). Add Access Key to
-
Viewing the Rule List - Data Security Center
From: Help > Data Security Center > User Guide > Sensitive Data Identification > Identification RulesOperation Operations provided in the Operation column: Click Edit to modify an identification rule. For details, see Editing a Rule. Click Delete to delete a customized identification rule. For details, see Deleting a Rule. Click Add to Group to add a rule to the rule group. For details
-
Configuring a Data Masking Rule - Data Security Center
Encryption algorithm After the configuration is complete, click Generate Encryption Configuration. If you want to delete the configured encryption configuration, click Delete in the Operation column. Character Masking Use the specified character * or a random character to hide part of
-
Viewing an Abnormal Event - Data Security Center
and download sensitive data. Authorized users access, download, and modify sensitive data, as well as change and delete permissions. Authorized users change or delete permissions granted for buckets that contain sensitive data. Users who accessed sensitive files fail to log in to
-
Adding an RDS Database - Data Security Center
data identification task fails. Therefore, do not reset the password of this account. If you have reset the password of dsc_readonly in RDS, delete the authorized RDS DB instance in DSC and re-authorize the instance. Read and Write: Sensitive data identification and data masking functions
-
Which Types of Abnormal Events Can Be Identified by DSC? - Data Security Center
files without granted permissions. Download sensitive files. Abnormal data operations Update sensitive files. Append data to sensitive files. Delete sensitive files. Copy sensitive files. Abnormal data management When a bucket is added, the system detects that the bucket is a public read
-
Adding OBS Assets - Data Security Center
buckets Click OK. Related Operations Allow or disallow access to OBS assets. For details, see Allowing or Disallowing Access to Cloud Assets. Delete OBS assets. For details, see Deleting OBS Assets. Parent topic: OBS Assets