Get Involved
Query: List disabled security rules
Description
Uncover the details of inactive security rules to understand the system's potential vulnerabilities and areas for improvement.
Query
Tables used in this query:
Uncover the details of inactive security rules to understand the system's potential vulnerabilities and areas for improvement.
Tables used in this query: