The content of this page has been automatically translated by AI. If you encounter any problems while reading, you can view the corresponding content in Chinese.
How Often Are the Virus and Vulnerability Libraries Updated?
Virus library: updated at 00:00 every day.
Vulnerability library: updated from time to time.
Why May the Detection Results Be Different Between Multiple Scans Of the Vulnerabilities Of Jar Packages?
The detection of Jar package vulnerabilities, for example, Struts2 vulnerability highly dependent on whether the Jar package is loaded. The vulnerability cannot be detected when the package is not loaded. When the service is running, the Webserver loads the Jar package in two modes — dynamic loading and static loading. In the dynamic loading mode, the Struts2 vulnerability can only be detected when the Jar package is running, so the check results are different between periods. It is recommended to scan for high-risk Jar package vulnerabilities multiple times to improve the accuracy of the check results.
to copy the trojan file path, locate the trojan, and manually delete the file.
Trust: You can perform a trust operation, and Host Security will no longer detect this file on the machine.
Isolation: Currently, intercepting Trojans is not supported. Only real-time or post-event detection and alarms are available. However, you can perform an isolation operation on the file to prevent it from being launched again.
What Is the Security Scoring Mechanism On the Overview Page?
For more information on the security scoring mechanism on the overview page, see the Security Overview document.
How To Back Up Data Automatically Using Snapshots?
Snapshot is a data backup method provided by Tencent Cloud. It can create a fully-available duplicate of the specified cloud disk, whose lifecycle is independent of the lifecycle of the original cloud disk. You can create snapshots regularly to quickly recover data in case of accidental data loss.
You can create a snapshot in the console as instructed below:
How Long Does It Take For Security Baselines To Take Effect Once They Are Configured In the Product?
The security baselines take effect immediately after the product is configured.
What Should Be Done If the Result Of a Security Baseline Check Item Is "Failed"?
1. Go to the Security Baseline page, select the failed detection item, click View Details in the action column to enter the details page of the detection item.
2. On the details page, select the required server IP, and click Details to enter the Detection Detail Page.
3. On the Detection Detail Page, hover the mouse over
to view the processing suggestion for the baseline.
Will I Be Notified If the Host Security Detects Attacks Such As Vulnerabilities and Trojans?
Yes. You will get alarms if CWP detects attacks such as Trojans, emergency vulnerabilities, or other attacks, and will be notified via internal messages, SMS, email, or WeCom. You can set your notification channel in the Message Center.