03-Monitor

HomeSupportSecurityH3C SecPath F5000 FirewallConfigure & DeployConfiguration GuidesH3C Firewall Products Comware 7 Web Configuration Guide(E1196 E8371)-6W70003-Monitor
Table of Contents
Related Documents
50-Asset security
Title Size Download
50-Asset security 23.65 KB

Asset security

 

This help contains the following topics:

·     Introduction

·     Restrictions and guidelines

·     Configure asset security

·     Appendix

Introduction

The device analyses health status of downstream hosts and supports displaying the number of compromised hosts and security event distribution in graphs and tables. You can view a summary on the security status of downstream hosts, and a detailed security analysis report for a single host. Thus, you can take prevention actions based asset security information.

Restrictions and guidelines

·     The detailed security analysis report for a single host displays only the statistics over the past half year.

·     The device generates detailed security analysis reports only for the hosts at the Controlled risk level or higher.

Configure asset security

1.     Click the Monitor tab.

2.     In the navigation pane, select Asset Security.

The page displays security summary of hosts on the Hosts at risk tab. For information about risk levels, see "Appendix."

3.     To view the detailed security analysis report for a single host, click the host name in the table.

Appendix

Table 1 Risk level description

Risk level

Description

Vulnerable

Vulnerabilities were detected on the host. The host has not been attacked. For example, the system might have detected that vulnerable ports 138 and 139 are open on the host through vulnerability scanning.

Attacked

Malicious attacks were detected on the host. For example, the host might suffer DDoS attacks, SQL injection attacks, or bots.

Controlled

Abnormal outreach behaviors were detected on the host. For example, the host might have communicated with a C&C server or communicated with the IP, URL, or domain name associated with a known malware or worm.

Spread

Attacks from the host to other hosts were detected. For example, the host might have initiated port scanning and brute-force attacks to other hosts.

Damaged

File leakage was detected on the host, or threats to other hosts or databases were detected on the host. For example, mining and ransomware viruses might exist on the host.

 

  • Cloud & AI
  • InterConnect
  • Intelligent Computing
  • Security
  • SMB Products
  • Intelligent Terminal Products
  • Product Support Services
  • Technical Service Solutions
All Services
  • Resource Center
  • Policy
  • Online Help
All Support
  • Become a Partner
  • Partner Resources
  • Partner Business Management
All Partners
  • Profile
  • News & Events
  • Online Exhibition Center
  • Contact Us
All About Us
新华三官网