检测到您已登录华为云国际站账号,为了您更好的体验,建议您访问国际站服务网站 https://www.huaweicloud.com/intl/zh-cn
不再显示此消息
Deleting a Dynamic Port Honeypot Policy Function This API is used to delete a dynamic port honeypot policy. Calling Method For details, see Calling APIs.
Deleting a Resource Tag Function This API is used to delete a tag from a resource. Calling Method For details, see Calling APIs.
Enter DELETE in the text box and click OK. Return to the alarm whitelist. Verify that the deleted login whitelist item is not displayed. Delete all alarm whitelist items Click Delete above the alarm whitelist.
Delete multiple login whitelist items Select whitelist items and click Delete above the list. On the Delete Login Alarm Whitelist page, confirm the information to be deleted, enter DELETE, and click OK. Return to the login alarm whitelist.
Use one of the following methods to disable the HSS alarm notification: Delete the SMN topic. After you delete the topic, your alarm notification settings will not take effect. Delete the subscription from the SMN topic.
If you want to delete the policy configuration plug-in later, repeat the preceding steps to disable protection and select Delete policy plug-in of the cluster. Figure 1 Disabling container cluster protection Click OK.
Figure 1 Viewing protection settings Click Delete in the Operation column of a server. In the Delete dialog box, confirm the information about the server where application protection is to be disabled, enter DELETE, and click OK. Parent Topic: Application Protection
Deleting Isolated Files If you want to permanently delete an isolated file, you can perform the deletion operation by referring to the following steps. Click Delete in the Operation column of the list. The dialog box is displayed.
Delete a port vpc:ports:delete Create a security group rule vpc:securityGroupRules:create Delete a security group rule vpc:securityGroupRules:delete Query the port list or the details about a port vpc:ports:get Query the network list or the details about a network vpc:networks:get
Alternatively, delete the comment tag (#) before PasswordAuthentication yes. Change PermitRootLogin no to PermitRootLogin yes. Alternatively, delete the comment tag (#) before PermitRootLogin yes.
To delete multiple whitelist items at a time, select them and click Delete above the list. To delete all the whitelist items, directly click Delete. In the displayed dialog box, confirm the information to be deleted, enter DELETE, and click OK.
Disable protection and delete the application process characteristics learned by HSS. In the row of a policy, click Delete in the Operation column. Click OK. Check the policy list. Disable protection but retain the application process characteristics learned by HSS.
Run the following command to delete the workload install-agent-ds: kubectl delete ds install-agent-ds -n default Log in to the management console. In the upper left corner of the page, select a region, click , and choose Security & Compliance > Host Security Service.
In the row containing the target policy, click Delete in the Operation column. The Delete Policy dialog box is displayed. Ensure that all information is correct and click OK. Parent Topic: Dynamic Port Honeypot
Add or delete an associated security group. Click OK. Delete a policy. Locate a target policy and click Delete in the Operation column. The Delete Policy dialog box is displayed. Ensure that all information is correct and click OK. Parent Topic: Container Firewalls
Run the following command to check whether the /etc/init.d/hostguard file exists: ll /etc/init.d/hostguard If the file exists, run the rm -f /etc/init.d/hostguard command to delete the file.
Run the following command to check whether the /etc/init.d/hostguard file exists: ll /etc/init.d/hostguard If the file exists, run the rm -f /etc/init.d/hostguard command to delete the file.
Periodically check and delete unnecessary accounts. Periodically delete or lock unnecessary accounts. Open Control Panel. Click Administrative Tools. Open Computer Management. Choose System Tools > Local Users and Groups.
An attacker could then install programs; view, change, or delete data; or create new accounts with full user rights.
apiGroups":[""]},{"resources":["daemonsets","deployments","deployments/rollback","replicasets"],"verbs":["create","delete","deletecollection","get","list","patch","update","watch"],"apiGroups":["apps"]},{"resources":["cronjobs","jobs"],"verbs":["create","delete","deletecollection"