[[["わかりやすい","easyToUnderstand","thumb-up"],["問題の解決に役立った","solvedMyProblem","thumb-up"],["その他","otherUp","thumb-up"]],[["わかりにくい","hardToUnderstand","thumb-down"],["情報またはサンプルコードが不正確","incorrectInformationOrSampleCode","thumb-down"],["必要な情報 / サンプルがない","missingTheInformationSamplesINeed","thumb-down"],["翻訳に関する問題","translationIssue","thumb-down"],["その他","otherDown","thumb-down"]],["最終更新日 2025-07-16 UTC。"],[[["Data exfiltration protection in GDC projects can be enabled during project creation to restrict outbound traffic to only destinations within the same organization."],["Disabling data exfiltration protection allows outbound traffic to all destinations, including external projects from other organizations, and requires the creation of `ProjectNetworkPolicy` egress policies to restrict outbound traffic."],["To enable data exfiltration protection, ensure the corresponding checkbox is selected on the network page when creating a project within the GDC console."],["To disable data exfiltration protection, clear the \"Enable data exfiltration protection\" checkbox in the GDC console's project settings, which will then change its value to \"Disabled\"."],["Managing data exfiltration protection requires the Project Editor role, allowing control over project management and deletion."]]],[]]