检测到您已登录华为云国际站账号,为了您更好的体验,建议您访问国际站服务网站 https://www.huaweicloud.com/intl/zh-cn
不再显示此消息
Delete: total number of file deletions. Viewing the File Change Records of a Single Server In the server list, you can view the number of files and registry changes on a servers and the time when they were last changed.
In the row of a policy, click Delete in the Operation column. In the displayed dialog box, click OK. Parent Topic: Application Process Control
In the row containing the desired vulnerability whitelist rule, click Delete in the Operation column. In the dialog box displayed, confirm the information and click OK. Parent Topic: Vulnerability Management
DELETE: requests the server to delete specified resources, for example, an object. HEAD: same as GET except that the server must return only the response header. PATCH: requests the server to update partial content of a specified resource.
SMN Topics To change a subscription endpoint (an email address or mobile phone number), delete it and add a new one. The following procedure changes test@example.com to another address in the HSS-warning topic. Prerequisite You have obtained the SMN Administrator permission.
You are not advised to delete the old kernel.
Delete the PkgConfMgr.exe file.
For dangerous ports, you are advised to further check their program files, and delete or isolate their source files if necessary. If a detected high-risk port is actually a normal port used for services, you can ignore it.
Stopping Billing If your no longer need to use HSS, you can unsubscribe from or delete it to stop the billing. For details, see Billing Termination. Managing Costs You can manage costs from cost composition, allocation, analysis, and optimization.
If an HSS quota is no longer used, you can delete it to avoid generating further expenditures. To help make sure your account never falls into arrears, you can configure the Balance Alert on the Overview page of the Billing Center.
Disabling WTP Disabling WTP stops protection and releases the protection quota (by unbinding the yearly/monthly quota or stopping the pay-per-use quota billing), but does not delete the configured WTP settings, such as protected directories and privileged processes.
Related Operations Deleting a backup You can delete the backup data of a server if it is no longer required. A deleted backup cannot be restored. Exercise caution when performing this operation. In the Backups column of a server, click the number. The backup list is displayed.
Perform the following operations to delete the file that records the number of restart times. Linux: Run the rm -f /usr/local/hostguard/run/restart.conf command. Windows: Find C:\Program Files\HostGuard\run\restart.conf and delete it.
Range add: Add a file. delete: Delete a file. modify: Modify the file content. attribute: Modify a file attribute. unknown host_ip String Definition Server IP address Range Length: 0 to 64 characters process_id Integer Definition Process ID.
Create a custom policy with the action to delete key pairs, set its Effect to Deny, and assign both this and the HSS Administrator policies to the group the user belongs to. Then the user can perform all operations on HSS except uninstalling it.
Figure 3 Checking a security report Click Delete in the lower right corner of the target report. Parent Topic: Security Report
Locate the row where a server group resides and click Delete in the Operation column. After the server group is deleted, the Server Group column of the servers that were in the group will be blank. Parent Topic: Server Management
You can add, modify, and delete local image vulnerabilities in the whitelist. Adding a Local Image Vulnerability to the Whitelist Log in to the HSS console. Click in the upper left corner and select a region or project.
You can delete the mobile numbers and email addresses that do not need to receive verification messages. Figure 2 SMS/Email verification Verification code Use the verification code you receive in real time for verification. Click OK.
You can restore or delete isolated files as required. For details, see Isolated Files. Click OK. After the alarm is handled, the status of the virus file alarm event changes to Handled. You can view the handling records on the historical handling records page.