当前位置:网站首页>Security | how does Tencent virtual machine realize tamper proof of web pages?
Security | how does Tencent virtual machine realize tamper proof of web pages?
2022-06-24 01:27:00 【TCS-F】
Appeal overview : Host security - tamper-proof !
The web page is tamper proof and can be monitored in real time, backed up and restored Websites you need to protect , Make sure it's important Web pages are not tampered with by intrusion 、 Illegal implantation of black chains 、 Hang a horse 、 Malicious advertising and pornography Etc
- Sign in Host security console , In the left navigation , choice Advanced defense > Webpage tamper proof , Enter the web page tamper proof page .
- When you have purchased a license , When the protection directory is not configured , Relevant configurations for opening protection are required .
- On the web page tamper proof page , single click Add protection !
- On the add protection page , Add the protection directory and select the server where the directory is located .
- Add protection : Fill in relevant fields of protection directory
- Protection directory address : namely Protection directory full path , Absolute path , Such as
/www/demo - Protection directory name : Protection directory naming name , You can't have the same name
- Protection file type : Select file format ( Include :.php,.php5,.phtml,.jsp,.jspx,.asp,.aspx,.html,.htm,.shtm,.css,.js, .json,.xml,.ini,.conf,.yaml,.toml,.jpg,.png,.gif,.ico), Support multiple choices .
- Protection directory address : namely Protection directory full path , Absolute path , Such as
- Select the server where the directory is located : Support press Server tag 、 Prefecture 、 Region and IP Screening machine . Select the server on the left side of the page , On the page The server name... Will be displayed on the right side of the face 、 Authorization status 、 Protection switch and automatic recovery switch , You are free to choose the machine and open it freely / Close the switch .
- Add protection : Fill in relevant fields of protection directory
When the configuration is complete , The web page tamper proof interface can View protection monitoring 、 Protection overview and distribution of protection document types 、 Number of file tampers TOP5(15 Japan )、 Latest protection trends 、 Protection server list and event list .
The viewable contents include :
- Protection monitoring : The viewable status includes security protection 、 Detect abnormality and fail to open protection .
- Protection overview : You can see Number of protection hosts 、 Number of protection directories 、 The total number of protected files and the number of tampered files / Times of protection (15 Japan ).
- Protection file type distribution : You can view the distribution of multiple protection file types .
- Number of file tampers TOP5(15 Japan ): You can view the near 15 Intraday , Number of file tampers TOP5.
- Latest protection trends : You can view the latest protection trends , Including servers /IP、 Event Directory 、 Event type and discovery time .
- Protect the server : At the bottom of the page tamper proof interface , single click Protect the server , You can view all the servers being protected , The viewable contents include : Protection directory name / Address 、 Number of associated servers 、 Protected server 、 Unprotected server 、 Relevant operations can be carried out during the last open protection time ( Protection setting and deleting protection ).
- On the protection server tab , Click the action bar on the right side of the target server Protection settings , Enter the protection settings page .
- At the top of the protection settings page , Modifiable Directory name and protection file type .
- In the list of associated protection servers at the bottom of the protection settings page , You can perform related operations on the associated server .
- Support single or multiple selection to open protection switch and automatic recovery switch In the list of associated protection servers at the bottom of the protection settings page , Check Target protection server , The protection switch and automatic recovery switch can be opened individually or in batches .
- Add servers
- Above the list of associated protection servers , single click Add servers , take The add protection server pop-up window pops up .
- In the add protection server pop-up window , According to the Server tag 、 Prefecture 、 Region and IP Screening machine . Select the server on the left side of the page , On the right side of the page will be displayed Server name 、 Authorization status 、 Protection switch and automatic recovery switch , You can freely select the machine and set it to start according to your needs / Turn off all switches .
- After confirmation , single click determine , take Protection and file backup .
- Check out the events On the right side of the target associated protection server , single click Check out the events , You can go to the event list page , View details of relevant events .
- Move out of list stay Target associated protection server On the right side , single click Move out of list , The server can be removed from the list of associated protection servers .
- Add servers
- Support single or multiple selection to open protection switch and automatic recovery switch In the list of associated protection servers at the bottom of the protection settings page , Check Target protection server , The protection switch and automatic recovery switch can be opened individually or in batches .
- List of events : At the bottom of the page tamper proof interface , single click List of events , You can see All tamper proof events , The server /IP、 Time directory 、 Event type 、 Event status ( Recovered and not recovered )、 Time of discovery 、 Recovery time and related operations ( Delete record ).
Tencent cloud professional host security : Click to go to
Recommended reading :
- Based on Tencent cloud CVM Self built high availability Redis practice https://cloud.tencent.com/act/cps/redirect?redirect=11&
- Based on Tencent cloud CVM build Hadoop Cluster and do data migration https://cloud.tencent.com/act/cps/redirect?redirect=12&
- Tencent cloud CVM Tag practice sharing https://cloud.tencent.com/act/cps/redirect?redirect=14&
- Host migration practice sharing https://cloud.tencent.com/act/cps/redirect?redirect=15&
- Load balancing enables cross regional binding 2.0:https://cloud.tencent.com/act/cps/redirect?redirect=35072
- Load how to deploy certificates SSL:https://cloud.tencent.com/act/cps/redirect?redirect=35071
- Local IDC Computer room database disaster recovery solution https://cloud.tencent.com/act/cps/redirect?redirect=16&
- Solutions for inter account cloud resource intranet interworking based on cloud networking https://cloud.tencent.com/act/cps/redirect?redirect=34664&
- Lightweight application server best practices :https://cloud.tencent.com/act/pro/lighthouse_new
边栏推荐
- Radware load balancer common maintenance query commands
- [redis advanced ziplist] if someone asks you what is a compressed list? Please dump this article directly to him.
- What is pension finance? What are the pension financial products?
- How to improve program performance
- 5-step method to quickly find data analysis ideas
- A review of Tencent digital ecology conference · wechat low code special session
- November 20, 2021: the start and end times of a movie can be listed in a small array
- Esp8266 OTA remote and wireless upgrade
- How to build a high-quality website
- Basic DDoS commands
猜你喜欢
![Graduation project - thesis writing notes [design topic type, thesis writing details, design materials]](/img/66/c0c400609b56dd012d87c620ca66e4.png)
Graduation project - thesis writing notes [design topic type, thesis writing details, design materials]

LSF opens job idle information to view the CPU time/elapse time usage of the job

ICML'22 | ProGCL: 重新思考图对比学习中的难样本挖掘

Theoretical analysis of countermeasure training: adaptive step size fast countermeasure training
![[machine learning] linear regression prediction](/img/74/9b5067bb9057049c998898ff2457f1.png)
[machine learning] linear regression prediction

ShardingSphere-proxy-5.0.0容量范围分片的实现(五)

Zhongshanshan: engineers after being blasted will take off | ONEFLOW u

Open source model library of flying propeller industry: accelerating the development and application of enterprise AI tasks

JS input / output statements, variables

LMS Virtual. Derivation method of lab acoustic simulation results
随机推荐
Graduation project - thesis writing notes [design topic type, thesis writing details, design materials]
4 most common automated test challenges and Countermeasures
ICML'22 | ProGCL: 重新思考图对比学习中的难样本挖掘
Theoretical analysis of countermeasure training: adaptive step size fast countermeasure training
7 tips for preventing DDoS Attacks
How to write the domain name of trademark registration? What is the process of trademark and domain name registration?
Salesforce batch apex batch processing (I)
How does the fixed assets management software reduce costs and increase efficiency for enterprises?
Talk about 11 tips for interface performance optimization
Virtual currency mining detection and defense
Disaster recovery series (VI) -- data storage disaster recovery construction
2021-11-19:[0,4,7]:0 means that the stone here has no color. If it turns red
How to view kubernetes API traffic by grabbing packets
Basic templates for various configurations of the SSM framework
【Flutter】如何使用Flutter包和插件
[log service CLS] experience of troubleshooting abnormal scenarios with tke event log
[machine learning] linear regression prediction
How to realize IP invariance in the private network of basic network ECs and cloud database resource switching
Handwritten digit recognition using SVM, Bayesian classification, binary tree and CNN
13 `bs_ duixiang. Tag tag ` get a tag object