Security Technologies and Applications
Security Technologies and Applications
-
Best Practices
- Best Practices for Using Huawei Accounts
- Best Practices in Enabling High-Risk Ports
- Disposal of Spam Mails Sent to External Systems
- UDP-based Amplification Attack Check
- Host Security Checks
- General Reference
On this page
Show all
Help Center/
Security Technologies and Applications/
Best Practices/
Host Security Checks/
Host Security Check (Windows)/
Troubleshooting Methods
Copied.
Troubleshooting Methods
You can check Windows hosts by using the methods described below. Method 1: Using Tools to Detect Security Issues is recommended.
- Method 1: Method 1: Using Tools to Detect Security Issues (recommended)
- You are advised to use the following software.
Table 1 Software Tool
Link
ProcessExplorer
https://learn.microsoft.com/en-us/sysinternals/downloads/process-explorer
Tcpview
https://docs.microsoft.com/en-us/sysinternals/downloads/tcpview
Autoruns
https://docs.microsoft.com/en-us/sysinternals/downloads/autoruns
busybox-x86_64
https://busybox.net/downloads/binaries/1.16.1/busybox-x86_64
- Method 2: Method 2: Using DOS System Commands to Check Processes
Parent topic: Host Security Check (Windows)
Feedback
Was this page helpful?
Provide feedbackThank you very much for your feedback. We will continue working to improve the documentation.See the reply and handling status in My Cloud VOC.
The system is busy. Please try again later.
For any further questions, feel free to contact us through the chatbot.
Chatbot