百度智能云

All Product Document

          Host Security

          Features

          Prevent Brute Force on Cloud Server Password

          Brute force on passwords are very harmful to the cloud server. If the password is successfully cracked, the administrator permissions will be stolen, which will harm the users' information and rights and interests.

          • Display the protection records of brute force on the password of BCC cloud server and deny the attack source IP.
          • When it is found that the password of the cloud server is successfully cracked, an alarm will be triggered, and the user will be notified by email&SMS.

          Remote Login Reminder

          Analyze and establish a model based on the remote login to the cloud server to avoid the harm caused by illegal login.

          • Display the remote login records detected: Source region/IP, login time.
          • Find out abnormal login actions through scanning the access logs. If remote login to the cloud server is found, the user will be notified by email&SMS.

          Website Backdoor Detection

          Use the backdoor detection and removal engine self-developed by the security team of Baidu AI Cloud. Support a variety of commonly used Web service backdoor detection. Clear the website backdoor files immediately to protect the security of the cloud server.

          • Display detailed information of backdoor files detected, including file path, cloud server ID, cloud server IP address and last modification time, etc.
          • Baidu AI Cloud security agent can automatically identify Web directories, and users can also manually add Web directories that need to be identified.

          Security Baseline

          Check the risks of the system configuration, web service configuration, database configuration and account password configuration on the user's cloud server, and provide repair suggestions for the risks detected to avoid security events caused by improper configuration.

          • There are more than 10 types of baseline check categories, including account security policy, system local permissions policy, IIS service configuration, Apache Tomcat service configuration, Nginx service configuration, MySQL service configuration, Redis service configuration, MongoDB service configuration and weak password configuration.
          • Support users to customize to configure check rules for the security baseline.
          • Support users to manually issue security baseline detection tasks immediately.
          • Support users to customize to configure scheduled baseline detection tasks.
          Previous
          Introduction
          Next
          Advantages