检测到您已登录华为云国际站账号,为了您更好的体验,建议您访问国际站服务网站 https://www.huaweicloud.com/intl/zh-cn
不再显示此消息
For dangerous ports, you are advised to further check their program files, and delete or isolate their source files if necessary. If a detected high-risk port is actually a normal port used for services, you can ignore it.
Yes Integer limit offset Yes Integer Offset, which specifies the start position of the record to be returned. host_name No String Server name host_ip No String Server IP address file_path No String Protected file file_operation No String Types of file operations, including: add delete
Manually delete the cluster or contact the administrator to delete the cluster. ScalingUp: Nodes are being added to the cluster. ScalingDown: The cluster is being downsized to fewer nodes. Creating: The cluster is being created. Deleting: The cluster is being deleted.
To delete or modify a rule, click Delete or Modify in the Operation column of the rule. To update cache of a protected web page, click Update Cache in the row containing the corresponding web tamper protection rule.
Manually delete the cluster or contact the administrator to delete the cluster. ScalingUp: Nodes are being added to the cluster. ScalingDown: The cluster is being downsized to fewer nodes. Creating: The cluster is being created. Deleting: The cluster is being deleted.
Actions Permission Action Related Action IAM Project (Project) Enterprise Project (Enterprise Project) Query asset information hss:assets:list - √ × Delete a cluster protection policy hss:clusterProtect:delete - √ × Configure a runtime application self-protection policy hss:rasp:set
Range add delete modify host_id String Definition Server ID. Range The value can contain 1 to 64 characters. app_name String Definition Software name. Range The value contains 1 to 256 characters. host_name String Definition Server name.
Constraints N/A Range ADD DELETE MODIFY Default Value N/A limit No Integer Definition Number of records displayed on each page.
Delete unnecessary whitelist IP addresses. The number of login blacklist items has reached 50. Delete unnecessary whitelist IP addresses.
For example, attackers can delete important data, implant malware, and maliciously modify programs, causing the system to break down or fail to run.
Disable remote backup and delete the remote backup server In the Operation column of a server, choose More > Manage Remote Backup Servers. In the Operation column of a remote backup server, click Delete. In the dialog box that is displayed, click OK. Parent Topic: WTP
Range add delete modify type Integer Definition Auto-started item type. Range 0: auto-started service 1: scheduled task 2: preloaded dynamic library 3: run registry key 4: startup folder host_id String Definition Server ID.
Select one or multiple policies and click Delete above the policy list. In the displayed dialog box, click OK. Parent Topic: Container Firewalls
Select one or multiple policies and click Delete above the policy list. In the displayed dialog box, click OK. Parent Topic: Container Firewalls
URI DELETE /v5/{project_id}/rasp/policy Table 1 Path Parameters Parameter Mandatory Type Description project_id Yes String The project ID. Table 2 Query Parameters Parameter Mandatory Type Description enterprise_project_id No String Enterprise project ID.
For dangerous ports, you are advised to further check their program files, and delete or isolate their source files if necessary. If a detected dangerous port is actually a normal port used for services, you can ignore it.
File deletion using JSP Attackers may exploit JSP security vulnerabilities to delete files from a server. SuspiciousBehavior Detect file deletion using JSP.
You can click Add to add a path and click Delete to delete it. Confirm the information and click OK.
URI DELETE /v5/{project_id}/honeypot-port/host-policy/{policy_id} Table 1 Path Parameters Parameter Mandatory Type Description project_id Yes String Definition Project ID, which is used to specify the project that an asset belongs to.
You can add or delete them as required. File or Directory Path: path of the file or directory to be monitored. Up to 50 paths can be added. Ensure the specified paths are valid. Alias: alias of a file or directory path. You can enter a name that is easy to distinguish.