Avatar of gmanster
gmansterFlag for United States of America

asked on 

White list

How do I whitelist an IP address coming into my server?
Security

Avatar of undefined
Last Comment
Rich Weissler
Avatar of CES
CES

Please provide more detail.  Depending on the application and setup, this could be done at several places
Avatar of gmanster
gmanster
Flag of United States of America image

ASKER

The program being accessed is AMSI run on SQL Server
Avatar of gmanster
gmanster
Flag of United States of America image

ASKER

Any ideas on this?
SOLUTION
Avatar of Rich Weissler
Rich Weissler

Blurred text
THIS SOLUTION IS ONLY AVAILABLE TO MEMBERS.
View this solution by signing up for a free trial.
Members can start a 7-Day free trial and enjoy unlimited access to the platform.
See Pricing Options
Start Free Trial
Avatar of gmanster
gmanster
Flag of United States of America image

ASKER

AMSI is a property management software running on SQL server - We are trying to interface a software called Rent Payment that takes payment on the net.  Rent Payment is getting an error of access when trying to query on our outside IP address to the SQL server.  AMSI says we need to shite list Rent Payments incoming IP address in order for the error to go away however AMSI can't provide me with the information of where in the server to do the white listing.
ASKER CERTIFIED SOLUTION
Avatar of Rich Weissler
Rich Weissler

Blurred text
THIS SOLUTION IS ONLY AVAILABLE TO MEMBERS.
View this solution by signing up for a free trial.
Members can start a 7-Day free trial and enjoy unlimited access to the platform.
Avatar of gmanster
gmanster
Flag of United States of America image

ASKER

Let me check on this - Thanks!!!!
Avatar of Rich Weissler
Rich Weissler

General information on White Listing provided, as well as where to likely collect more information for a specific instance.
Security
Security

Security is the protection of information systems from theft or damage to the hardware, the software, and the information on them, as well as from disruption or misdirection of the services they provide. The main goal of security is protecting assets, and an asset is anything of value and worthy of protection. Information Security is a discipline of protecting information assets from threats through safeguards to achieve the objectives of confidentiality, integrity, and availability or CIA for short. On the other hand, disclosure, alteration, and disruption (DAD) compromise the security objectives.

32K
Questions
--
Followers
--
Top Experts
Get a personalized solution from industry experts
Ask the experts
Read over 600 more reviews

TRUSTED BY

IBM logoIntel logoMicrosoft logoUbisoft logoSAP logo
Qualcomm logoCitrix Systems logoWorkday logoErnst & Young logo
High performer badgeUsers love us badge
LinkedIn logoFacebook logoX logoInstagram logoTikTok logoYouTube logo