百度智能云

All Product Document

          Security Risk Detection

          Security Risk Detection

          View Safety Inspection Records

          Application scenarios

          Users can view the number of web vulnerabilities and the number of open ports for all cloud resource instances.

          Operation steps

          1. In the left navigation, select "Security Risk Detection" to enter the inspection list.
          2. You can view the number of web vulnerabilities and the number of open ports of the cloud service instance. Click the corresponding data to enter the corresponding details page.

          image.png

          Web Vulnerability Detection

          Background information

          Web vulnerability detection can detect the vulnerability of user websites in real time. If vulnerabilities are found, you can verify whether the repair is complete by rechecking. By setting the notification method, users can be notified of website vulnerability information in a timely manner.

          Note:

          The security detection service initiates detection from the public network. Cloud servers without public IP addresses cannot be detected.

          Record Web Vulnerability Detection

          Application scenarios

          Users can view the WEB vulnerability scan records of a single BCC instance.

          Operation steps

          1.In the left navigation, select "Security Risk Detection" to enter the service list page.

          2.Select the instance you want to view and click "View Details" to enter the "Web Vulnerability" tab.

          3.View the scan record of the corresponding instance.

          Handle Web Vulnerability Detection Results

          Application scenarios

          Users can follow up on a web vulnerability scan record.

          For a pending or ignored Web vulnerability, the supported operations include re-detection.

          Operation steps

          1.For the operation, please see Record Web Vulnerability Detection.

          2.In the "Action" column, click to re-detect the vulnerability.

          Set the Web Vulnerability Detection Result Notification Method

          For details, please see Set Alarm.

          System Threat Detection

          Background information

          System threat detection, including "Specific Software Threats" and "Weak Password Threats", prompts for ports with service vulnerabilities and the names of services running on the ports, and finally provides a repair plan.

          Record System Threat Detection

          Application scenarios

          Users can view system threat scan records of a single BCC cloud server.

          Operation steps

          1.In the left navigation, select "Security Risk Detection" to enter the service list page.

          2.Select the instance you want to view and click "View Details" to enter the "System Threat" tab.

          3.View the scan record of the corresponding instance.

          Set System Threat Scan Notification Method

          Application scenarios

          Users can uniformly set alarm methods and policies for different security services.

          Users can set alarm methods and SMS alarm time for different security services: Email or SMS.

          Operation steps

          1.Select "Alarm Setting" on the left navigation to enter the "Cloud Security-Alarm Settings" interface.

          image.png

          3.According to the actual situation, select the notification method, SMS or email, and set the reminder time.

          4.Click "OK" to complete the alarm setting.

          Previous
          Log-in SRD
          Next
          Identity and Access Management