FAQs
Last Updated:2020-10-21
What to do if the hacker invades successfully and gives alarm?
- The "Website Backdoor Isolation" feature of the host security client can be used to remove the malicious backdoor that has been uploaded to the server. Go to Hosteye Security Agent for configuration.
- It is highly recommended to enable BLB WAF & CDN WAF to intercept web attack in real time. Go to Web Application Firewall (WAF) for configuration.
-
Block the IP of malicious attack source.
Note: The attacking IP can be an agent node, and the blockage may cause unable access to all the normal flow of the agent, so please be careful about the blockage.
For the operation to block the source station, please refer to Web Application Firewall Service (WAF) - Customized Rule Configuration.
For the operation to block the CDN node, please refer to Content Delivery Network (CDN) - IP Blacklist.