I'm a bit confused. Does the question imply that Leslie has the consent, or is that something she needs to obtain? I want to make sure I understand the scenario correctly before answering.
Okay, I think I've got this. The key is to enable the VPC Flow Logs on both the frontend and backend subnets in the production environment, and then test the changes in the testing environment first before applying them to production. That way, we can capture the network traffic we need without impacting the live system.
Disabling macros, no problem. I'll just go to the Trust Center, find the Macro Settings, and select the "Disable all macros without notification" option. Simple enough.
This question seems straightforward, but I want to make sure I understand the key details before answering. The security group rules have the same protocol, port range, authorization type, and authorization object, but one is a denial policy and the other is an allowed policy. I'll need to think through how the priority of the rules affects which one takes precedence.
upvoted 0 times
...
Log in to Pass4Success
Sign in:
Report Comment
Is the comment made by USERNAME spam or abusive?
Commenting
In order to participate in the comments you need to be logged-in.
You can sign-up or
login
Vonda
4 months agoAlease
4 months agoCasandra
4 months agoLea
4 months agoGalen
4 months agoLili
5 months agoShawn
5 months agoNaomi
5 months agoLindsay
5 months agoRenea
5 months agoJoesph
5 months agoNakisha
5 months agoChauncey
5 months ago