Security – Certificates
USEFUL TIP For step-by-step instructions to install a commercially signed SSL Certificate, go to How to Generate and Install a Commercially Signed SSL Certificate page. Generate CSRThe Generate Certificate Signing…
USEFUL TIP For step-by-step instructions to install a commercially signed SSL Certificate, go to How to Generate and Install a Commercially Signed SSL Certificate page. Generate CSRThe Generate Certificate Signing…
The Audit page displays a log of login attempts to the web interface, logout information, and information about all management pages accessed by users.To view the Audit log, perform the following steps:Open…
The Weak Secrets page allows you to view and fix a list of extensions with weak secrets. The list shows the Extension, Description, and Status.If the secret meets password strength requirements, the status…
IMPORTANT E-MetroTel AWS cloud instances are pre-configured with AWS security rules that minimize the exposure of the UCX software to the internet. Proceed with caution before activating and making changes…
Any computer system that is exposed to the internet risks being maliciously attacked through repeated attempts to login to the system, often refered to as brute force attacks. Brute force attackers…