Network Security Internet Technology Development Database Servers Mobile Phone Android Software Apple Software Computer Software News IT Information

In addition to Weibo, there is also WeChat

Please pay attention

WeChat public account

Shulou

How does the CVM view the attack log

2025-01-16 Update From: SLTechnology News&Howtos shulou NAV: SLTechnology News&Howtos > Servers >

Share

Shulou(Shulou.com)06/02 Report--

Today, I will talk to you about how to view the attack log on the CVM. Many people may not know much about it. In order to make you understand better, the editor summarized the following for you. I hope you can gain something according to this article.

General CVM can check whether there are security risks through logs, and high defense CVM can provide detailed log records of attack traffic.

Take the operation of Windows system of CVM as an example

1. Open the event Viewer: click start-run-enter and execute the eventvwr.msc command to open the Windows event Viewer

2. Filter records: in the main screen of the window, click the + sign to expand event Viewer-Windows Log-Security-search task category: other login / logout events. After confirmation, the system will list records that meet the filtering criteria.

3, event analysis: double-click the event to be analyzed, click the General tab, the additional information will list the client name and client address, event recording time and other information, we can use this information to analyze whether the server has security risks.

If it is a high defense cloud server, such as a high defense server, it provides attack traffic log records and multi-dimensional defense charts to help users keep abreast of business attacks and deploy emergency defense.

High-defense CVM meets full-service scenario access and supports website and non-website protection. The high defense data center is accessed through T-level bandwidth, and each CVM enjoys free protection against 30g ddos attacks and effective defense against CC attacks. Provide visual management background, detailed protection reports, defense situation at a glance.

After reading the above, do you have any further understanding of how the CVM views the attack log? If you want to know more knowledge or related content, please follow the industry information channel, thank you for your support.

Welcome to subscribe "Shulou Technology Information " to get latest news, interesting things and hot topics in the IT industry, and controls the hottest and latest Internet news, technology news and IT industry trends.

Views: 0

*The comments in the above article only represent the author's personal views and do not represent the views and positions of this website. If you have more insights, please feel free to contribute and share.

Share To

Servers

Wechat

© 2024 shulou.com SLNews company. All rights reserved.

12
Report