Updated on 2024-03-06 GMT+08:00

Usage Overview

You can purchase an AAD instance and connect your services to the instance. The widely covering defense rules provided by AAD will protect your services from massive DDoS attacks.

Usage Overview shows the usage overview of AAD.
Table 1 Usage Overview

Step

Description

Connecting services to AAD

For details, see Connecting Domain Name Website Services to Advanced Anti-DDoS.

Configuring protection policies

AAD provides abundant and comprehensive protection rules. You can configure protection policies based on your service requirements. For details, see Configuring a Protection Policy.

Enabling alarm notifications

After the alarm notification is enabled, you will receive alarm notifications if your IP address is under a DDoS attack. For details, see Enabling Alarm Notifications.

Managing instances

View instance information, upgrade protection bandwidth and service bandwidth, and modify elastic protection bandwidth. For details, see Managing Instances.

Managing domain names

View domain name information, update certificates, modify resolution lines, change origin server IP addresses, and modify domain name service configurations. For details, see Managing Domain Names.

Monitoring

You can set alarms based on monitoring metrics, black hole, scheduling events, and attack events to learn about the protection status of AAD in a timely manner. For details, see Monitoring.

Auditing

AAD related operations are recorded for later query, audit, and backtrack operations. For details, see Auditing.