{{ secondMenu.name }}
PIC: Sangfor engineer and customer's business personnel
• Verify whether services provided by the business system can be accessed by performing some common operations to see whether anomalies occur.
• Verify business system data by performing data addition, deletion, modification, and query to see whether anomalies occur.
• Verify the privileges of the business system by performing unauthorized operations to see whether anomalies occur.
• Analyze the causes of all the anomalies detected above and handle them promptly.