ECS knowledge for users from beginner level to expert level
Be a Power User
You can configure intrusion prevention policies, the blacklist, and the whitelist, and increase quota to protect more EIPs. You can also adjust protection policies based on real-time protection logs and event statistics.
Learn more about common issues and solutions.
Can CFW Be Used Across Clouds or Regions
Can CFW Protect Servers Off the Cloud?
What Are the Differences Between CFW and WAF?
Can I Share My CFW with Other Accounts?
Do I Need to Increase My Bandwidth If the Rate of a Flow Exceeds the Threshold?
What Details Can I Get from Log Audit?
How Does CFW Detect and Defend Against Attacks Exploiting the Apache Log4j Remote Code Execution Vulnerability?
Why Are Traffic and Attack Logs Incomplete on the Traffic Analysis Page?
(Apache Log4j)How Does CFW Detect and Defend Against Attacks Exploiting the Apache Log4j Remote Code Execution Vulnerability?
(Spring Framework )How Does CFW Detect and Defend Against Attacks Exploiting the Spring Framework Remote Code Execution Vulnerability?
Technologies, expert opinions, and courses