检测到您已登录华为云国际站账号,为了您更好的体验,建议您访问国际站服务网站 https://www.huaweicloud.com/intl/zh-cn
不再显示此消息
For dangerous ports, you are advised to further check their program files, and delete or isolate their source files if necessary. If a detected high-risk port is actually a normal port used for services, you can ignore it.
For example, some software developers in your enterprise need to use HSS resources but must not delete them or perform any high-risk operations.
Its value can be: add delete modify enterprise_project_id No String ID of the enterprise project that a server belongs. An enterprise project can be configured only after the enterprise project function is enabled. Enterprise project ID.
Its value can be: add delete modify enterprise_project_id No String ID of the enterprise project that a server belongs. An enterprise project can be configured only after the enterprise project function is enabled. Enterprise project ID.
The options are as follows: ADD DELETE MODIFY limit No Integer Number of records on each page offset No Integer Offset, which specifies the start position of the record to be returned. enterprise_project_id No String ID of the enterprise project that a server belongs.
Manually delete the cluster or contact the administrator to delete the cluster. ScalingUp: Nodes are being added to the cluster. ScalingDown: The cluster is being downsized to fewer nodes. Creating: The cluster is being created. Deleting: The cluster is being deleted.
To delete or modify a rule, click Delete or Modify in the Operation column of the rule. To update cache of a protected web page, click Update Cache in the row containing the corresponding web tamper protection rule.
Actions Permission Action Related Action IAM Project (Project) Enterprise Project (Enterprise Project) Query asset information hss:assets:list - √ × Delete a cluster protection policy hss:clusterProtect:delete - √ × Configure a runtime application self-protection policy hss:rasp:set
Delete unnecessary whitelist IP addresses. The number of login blacklist items has reached 50. Delete unnecessary whitelist IP addresses.
Disable remote backup and delete the remote backup server In the Operation column of a server, choose More > Manage Remote Backup Servers. In the Operation column of a remote backup server, click Delete. In the dialog box that is displayed, click OK. Parent Topic: WTP
Select one or multiple policies and click Delete above the policy list. In the displayed dialog box, click OK. Parent Topic: Container Firewalls
For example, attackers can delete important data, implant malware, and maliciously modify programs, causing the system to break down or fail to run.
Select one or multiple policies and click Delete above the policy list. In the displayed dialog box, click OK. Parent Topic: Container Firewalls
You can click Add to add a path and click Delete to delete it. Confirm the information and click OK.
For dangerous ports, you are advised to further check their program files, and delete or isolate their source files if necessary. If a detected dangerous port is actually a normal port used for services, you can ignore it.
File deletion using JSP Attackers may exploit JSP security vulnerabilities to delete files from a server. SuspiciousBehavior Detect file deletion using JSP.
URI DELETE /v5/{project_id}/honeypot-port/host-policy/{policy_id} Table 1 Path Parameters Parameter Mandatory Type Description project_id Yes String Parameter description: Project ID, which can be obtained from my credentials Constraints: N/A Options: The value contains 1 to 256 characters
You can add or delete them as required. File or Directory Path: path of the file or directory to be monitored. Up to 50 paths can be added. Ensure the specified paths are valid. Alias: alias of a file or directory path. You can enter a name that is easy to distinguish.
Its value can be: mark_as_handled ignore add_to_alarm_whitelist manual_isolate_and_kill unhandle do_not_ignore remove_from_alarm_whitelist: delete an alarm whitelist do_not_isolate_or_kill: cancel file isolation. memo No String Remarks operate_results No Array of OperateResultRequestInfo
You can select, create, edit, and delete these policies. Scanned Servers Total number of detected servers. Checked Baselines Number of baselines executed during the server detection. Checked Items Total number of checked server configuration items.