About 30 results
Open links in new tab
  1. Dada la naturaleza de las operaciones de seguridad protectoras de Absolute y las posibles consecuencias de llevar a cabo una operación no autorizada, este procedimiento se implementa …

  2. Given the nature of the Absolute protective security operations and the potential consequences of performing an unauthorized operation, this procedure is instituted to help protect both of our …

  3. Accessing and authenticating APIs To access the Absolute APIs, you use the Secure Endpoint Console to perform the initial setup, which includes assigning user roles and providing access to the console. …

  4. Absolute Software Corporation reserves the right to revise this document and to periodically make changes in the content hereof without obligation of such revisions or changes unless required to do …

  5. The POST /v2/device-unenrollment/unenroll endpoint accepts a list of devices, validates whether each one is eligible for being unenrolled from Absolute, and if it is, initiates the unenrollment.

  6. この承認契約書が締結されると、システム・アドミニストレーターのユーザー役割には、Absolute の高度なセキュリティ・オペレーションの権限を他のユーザーに割り当てる権限が付与されます。

  7. IMPORTANT Before you can use this resource, you need to log in to the Absolute console, select the events to send to your Security Information and Event Management (SIEM) solution, and enable the …

  8. NOTE The system validates message content and automatically removes any HTML tags and attributes that may expose Absolute servers or agents to injection attacks, such as cross site scripting (XSS).

  9. This event is logged when the core agent on a Windows device is damaged, tampered with, or removed, and the Absolute Persistence module embedded in the device's firmware makes a call to the …

  10. Absolute Software Corporation reserves the right to revise this document and to periodically make changes in the content hereof without obligation of such revisions or changes unless required to do …