35 results found for " delete ".
-
How Do I Clear the SSH Login IP Address Whitelist Configured in HSS? - Host Security Service
the whitelist vary according to your HSS quota states. Normal or Expired Normal and expired quotas can be used. To delete the SSH login IP address, disable or delete it on the management console. Log in to the management console. In the upper left corner of the page, select a region
-
If I Unsubscribe from HSS and Purchase It Again, Do I Need to Install Agents and Configure Server Protection Settings from Scratch? - Host Security Service
unsubscribe from HSS, your HSS quota will no longer be available. HSS neither automatically uninstalls the agent from your servers nor modify or delete the server protection configurations on your servers. Old and New HSS Quota Are in the Same Region You do not need to install the agent or
-
Asset Management - Host Security Service
process list. Managing Web Directories You can check and delete risky web directories and terminate suspicious processes in a timely manner. Managing Software Operations made to software are recorded. Action: Create and Delete. The Time column records the time when changes were detected
-
Adding a Privileged Process That Can Modify Protected Files - Host Security Service
processes In the Operation column of a process file path, click Edit to modify the privileged processes or click Delete to delete it if it is unnecessary. After you edit or delete the process file path, the privileged process cannot modify the files in the protected directory. To avoid
-
Can I Disable HSS Alarm Notifications? - Host Security Service
methods to disable the HSS alarm notification: Delete the SMN topic. After you delete the topic, your alarm notification settings will not take effect. Delete the subscription from the SMN topic. After you delete the subscription, you will no longer receive alarm notifications. Cancel or
-
Configuring the Login Whitelist - Host Security Service
login whitelist Click OK. Other Operations Removing login information from login whitelist To delete a piece of login information from the whitelist, select it and click Delete, or click Delete in the row it resides. Exercise caution when performing the deletion operation because it cannot
-
How Do I Modify Alarm Notification Recipients? - Host Security Service
select or deselect the contacts, and click OK. SMN Topic Settings To change a subscription endpoint (an email address or mobile phone number), delete it and add a new one. The following procedure changes test@example.com to another address in the HSS-warning topic. Prerequisite You have
-
Adding a Protected Directory - Host Security Service
directory: You can modify the added protected directory as needed. Delete a protected directory: You can delete the directories that do not need to be protected. After you suspend protection for a protected directory, delete it, or modify its path, files in the directory will no longer
-
Applying a Whitelist Policy - Host Security Service
From: Help > Host Security Service > User Guide > Advanced Protection > Application Recognition ServiceBefore the learning completes, servers associated to the policy are not protected. Deleting a whitelist policy You can click the Delete button to delete a whitelist policy. Parent topic: Application Recognition Service
-
Adobe Font Manager Library Remote Code Execution Vulnerability (CVE-2020-1020/CVE-2020-0938) - Host Security Service
code in an AppContainer sandbox context with limited privileges and capabilities. An attacker could then install programs; view, change, or delete data; or create new accounts with full user rights. There are multiple ways an attacker could exploit the vulnerability, such as convincing
-
What Should I Do If I Find My Servers Attacking Others? - Host Security Service
its exposure to the Internet. Update the system and applications, installing the latest patches in a timely manner. Regularly back up data. Delete or rename the phpmyadmin folder. Parent topic: Intrusions
-
Checking the Whitelist Policy List - Host Security Service
From: Help > Host Security Service > User Guide > Advanced Protection > Application Recognition Serviceservers that a policy applies to. Edit. You can click this button to modify the period and servers for intelligent learning. Delete: You can click this button to delete a whitelist policy. After a whitelist policy is deleted, the applications on the servers associated to it will no longer
-
What Do I Do If My Servers Are Subjected to a Mining Attack? - Host Security Service
Periodically check and delete unnecessary accounts. Periodically delete or lock unnecessary accounts. Open Control Panel. Click Administrative Tools. Open Computer Management. Choose System Tools > Local Users and Groups. Choose Users or User Groups and delete unnecessary users or user
-
How Do I Install the Agent on Servers in Batches? - Host Security Service
check the PID of the HSS, and then run the kill -pid command to stop the hostguard process in the Linux OS. Delete the configuration file. Run the rm -rf command to delete the files in the /usr/local/hostguard/conf/agentinfo directory in the Linux OS. Stop the ECS and use it to create
-
Checking or Creating a Policy Group - Host Security Service
will be blank. Select one or more policy groups to be deleted and click Delete, as shown in Figure 7. Figure 7 Deleting policy groups You can also click Delete in the Operation column of a policy group to delete it. In the displayed dialog box, click OK. Parent topic: Security Operations
-
Making an API Request - Host Security Service
requests the server to update specified resources. POST: requests the server to add resources or perform special operations. DELETE: requests the server to delete specified resources, for example, an object. HEAD: same as GET except that the server must return only the response header
-
Ransomware Prevention - Host Security Service
to encrypt bait files will trigger alarms immediately. Bait files are marked by HSS. While you handle suspicious files, be careful not to delete the bait files by mistake. Bait files will neither affect your services nor trigger malicious behaviors. If the bait files are deleted, HSS
-
How Do I Install the Agent from the Command Line (on Windows)? - Host Security Service
agent installation path. Run the .\hostguard_setup.exe /silent command to install the agent. After the agent is installed, you are advised to delete the agent installation package. Parent topic: Agent
-
Adding a Monitored File - Host Security Service
and whether the modifications are suspicious. FIM checks the integrity of Linux files and manages operations on them, including: Create and delete files Modify files (changes in file size, ACLs, and content hashes) The registry monitoring function will be available soon. You are advised
-
How Do I Handle a Brute-force Attack Alarm? - Host Security Service
program alarms are false, go to Step 5. Figure 3 Malicious program (cloud scan) Check for and delete suspicious accounts. Choose Scans > Assets and click the Account Information tab. Delete suspicious accounts to prevent attackers from creating accounts or escalating account permissions