检测到您已登录华为云国际站账号,为了您更好的体验,建议您访问国际站服务网站 https://www.huaweicloud.com/intl/zh-cn
不再显示此消息
account creation Suspicious IAM Account Create Suspicious IAM account creation IAM permission escalation IAM Permissions Escalation IAM permission escalation ECS login through brute-force attack ECS BruteForce Login ECS login through brute-force attack IAM login through brute-force
For details about the relationship between IAM identities and operators and the operator username format, see Relationship Between IAM Identities and Operators.
You can call the IAM API to obtain a user token. The value of X-Subject-Token in the response header is the user token. X-Language No String Language.
Table 5 Channel Parameter Type Description channel_id String UUID create_by String IAM user ID. create_by_user String IAM username. title String Related title. description String Description. config_status String Definition Configuration status of the collection channel.
You can obtain it by calling the IAM API for obtaining a user token. The user token is the value of X-Subject-Token in the response header.
Preparing for the Upgrade IAM is used for data collection authorization. You need to create an IAM user with the minimum permission to access SecMaster APIs and disable verification rules such as MFA for the user. Log in to the SecMaster console.
You can call the IAM API to obtain a user token. The value of X-Subject-Token in the response header is the user token. X-Language No String Language.
You have obtained a non-administrator IAM account to log in to SecMaster as a tenant.
You can obtain it by calling the IAM API for obtaining a user token. The user token is the value of X-Subject-Token in the response header.
You can obtain it by calling the IAM API for obtaining a user token. The user token is the value of X-Subject-Token in the response header.
Prerequisites You have obtained the IAM administrator account information. Buying an ECS View the ECS information. Log in to the console as the IAM administrator.
Procedure (Optional) Step 1: Buy an ECS (Optional) Step 2: Buy a Data Disk (Optional) Step 3: Attach a Data Disk Step 4: Create a Non-administrator IAM User Step 5: Configure Network Connection Step 6: Install the Component Controller (isap-agent) Step 7: Install the Log Collection
You can obtain it by calling the IAM API for obtaining a user token. The user token is the value of X-Subject-Token in the response header.
Identity security Identity Defense Alarms Are Associated With Historical Handling Information Associates new IAM alerts with IAM alerts handled earlier and adds historical handling details to the comment area for the new alerts.
You can obtain it by calling the IAM API for obtaining a user token. The user token is the value of X-Subject-Token in the response header.
You can obtain it by calling the IAM API for obtaining a user token. The user token is the value of X-Subject-Token in the response header.
You can obtain it by calling the IAM API for obtaining a user token. The user token is the value of X-Subject-Token in the response header.
Database Connections Vulnerability handling HSS Isolation and Killing of Malware Automatic Renaming of Alert Names CIS_PostgreSQL Enabling the Backup Function and Configuring a Backup Policy CIS_PostgreSQL Disabling Default Ports CIS_DDS Enabling Database Audit Log CIS_Ensuring IAM
You can obtain it by calling the IAM API for obtaining a user token. The user token is the value of X-Subject-Token in the response header.
You can obtain it by calling the IAM API for obtaining a user token. The user token is the value of X-Subject-Token in the response header.