Security Statement
Before using CBH, read this security statement carefully and perform accordingly to avoid network security issues.
Managing Accounts
The default account admin is the default administrator of a CBH system. The password of admin user is the password you set during purchase of the CBH instance.
Change the password as prompted upon your first login to the CBH system. Otherwise, the CBH system page cannot be reached.
Managing Passwords
To ensure security, you are advised to set passwords according to the following rules:
- Change the password and configure phone number as prompted after you log in to the CBH system. Otherwise, the requested CBH system cannot be reached.
- The complexity of a password must meet the following security policies:
- Contain 8 to 32 characters.
- Contain at least three of the following character types: uppercase letters (A to Z), lowercase letters (a to z), digits (0 to 9), and special characters.
- Cannot contain the username or the username spelled backwards.
- It is recommended that you periodically change your password for account security.
Feature Statement
- The products, services and features you buy are provided in accordance with the contract made between us. All or part of the products, services and features described in this document may not be within the purchase scope or the usage scope.
- The information in this document is subject to change without notice. Every effort has been made in the preparation of this document to ensure accuracy of the contents, but all statements, information, and recommendations in this document do not constitute a warranty of any kind, express or implied.
- CBH supports the HTTPS protocol but not the HTTP protocol.
- Make sure CBH is used in compliance with laws and regulations.
Third-Party Software
CBH uses the following third-party software:
- Third-party browsers
- Nmap
Reason: Nmap is an industry-leading asset scanning tool. CBH uses this tool to discover hosts in batches, so that you can batch manage hosts.
Application scenario: CBH uses the Nmap tool to scan and discover assets in a specified network segment, and add the assets to CBH for O&M.
Risks: Users can discover assets and scan vulnerabilities in a specified network segment through this tool. Only the administrator can use the related functions. The Principle of least privilege is followed during installation and use. The overall risk is low.
Recommended methods for downloading third-party software:
Download the required third-party software in the following ways:
- Log in to the CBH system as a system administrator. On the page that is displayed, click the download icon in the upper right corner. On the displayed Download Center page, download the required software.
- Log in to the CBH system as an O&M user. On the page that is displayed, click the download icon in the upper right corner. On the displayed Download Center page, download the required software.
Feedback
Was this page helpful?
Provide feedbackThank you very much for your feedback. We will continue working to improve the documentation.See the reply and handling status in My Cloud VOC.
For any further questions, feel free to contact us through the chatbot.
Chatbot