检测到您已登录华为云国际站账号,为了您更好的体验,建议您访问国际站服务网站 https://www.huaweicloud.com/intl/zh-cn
不再显示此消息
安全配置 如何清除HSS中配置的SSH登录IP白名单? 不能通过SSH远程登录主机,怎么办? 如何使用双因子认证? 开启双因子认证失败,怎么办? 开启双因子认证后收不到验证码? 开启双因子认证后登录主机失败? 如何添加双因子认证的手机号或邮箱? 双因子认证的验证码是固定的吗? 告警通知短信是否收费?
"b3e83d25-d92f-4963-a293-e056e81ec44d", "file_name" : "hss-vul-vul-zh-xxxxxxxx.zip" } SDK代码示例 SDK代码示例如下。 Java Python Go 更多 1 2 3 4 5 6 7 8 9 10
添加组织成员账号 如果您需要通过HSS统一查看组织成员账号的主机及风险数量,请先参考本章节添加账号。 前提条件 已创建组织,相关操作详情请参见创建组织。 已设置HSS为可信服务,操作详情请参考启用、禁用可信服务。 当前操作的账号为组织管理账号或委托管理员账号。添加委托管理员请参见添加委托管理员。
修复紧急度,包含如下3种。 immediate_repair :高危。 delay_repair :中危。 not_needed_repair :低危。 description String 漏洞描述 position String 漏洞所在镜像层 app_name String 漏洞的软件名称 app_path
great security risks. It is recommended that the AK and SK be stored in ciphertext in configuration files or environment variables and decrypted
设置监控告警规则 通过设置HSS告警规则,用户可自定义监控目标与通知策略,设置告警规则名称、监控对象、监控指标、告警阈值、监控周期和是否发送通知等参数,帮助您及时了解HSS防护状况,从而起到预警作用。 设置监控告警规则 登录管理控制台。 单击管理控制台左上角的,选择区域或项目。 单击页面左上方的,选择“管理与监管
great security risks. It is recommended that the AK and SK be stored in ciphertext in configuration files or environment variables and decrypted
严格控制系统管理员账户的使用范围,为应用和中间件配置各自的权限和并严格控制使用范围。 使用安全组定义访问规则,根据业务需求对外开放端口,对于特殊业务端口,建议设置固定的来源IP(如:远程登录)或使用VPN、堡垒机建立自己的运维通道,详细操作请参见安全组规则。 Windows加固建议 使用HSS全面体检并深度防御主
great security risks. It is recommended that the AK and SK be stored in ciphertext in configuration files or environment variables and decrypted
great security risks. It is recommended that the AK and SK be stored in ciphertext in configuration files or environment variables and decrypted
great security risks. It is recommended that the AK and SK be stored in ciphertext in configuration files or environment variables and decrypted
great security risks. It is recommended that the AK and SK be stored in ciphertext in configuration files or environment variables and decrypted
great security risks. It is recommended that the AK and SK be stored in ciphertext in configuration files or environment variables and decrypted
great security risks. It is recommended that the AK and SK be stored in ciphertext in configuration files or environment variables and decrypted
great security risks. It is recommended that the AK and SK be stored in ciphertext in configuration files or environment variables and decrypted
great security risks. It is recommended that the AK and SK be stored in ciphertext in configuration files or environment variables and decrypted
great security risks. It is recommended that the AK and SK be stored in ciphertext in configuration files or environment variables and decrypted
great security risks. It is recommended that the AK and SK be stored in ciphertext in configuration files or environment variables and decrypted
great security risks. It is recommended that the AK and SK be stored in ciphertext in configuration files or environment variables and decrypted
great security risks. It is recommended that the AK and SK be stored in ciphertext in configuration files or environment variables and decrypted