Enabling Web Tamper Protection
Scenarios
The HSS web tamper protection (WTP) edition can protect dynamic and static web pages from being tampered with, enhancing the security and integrity of website content. It also includes the server protection capabilities of the premium edition, such as asset management, vulnerability detection, baseline check, intrusion detection, and ransomware protection, to detect attacks on servers.
This section describes how to enable WTP.
Prerequisites
- HSS can be billed in yearly/monthly or pay-per-use mode. To use yearly/monthly billing, ensure you have purchased sufficient protection quotas. For details, see Purchasing HSS. If you use the pay-per-use billing mode, you do not need to purchase quotas in advance.
- Ensure that the agent has been installed on the server and is online. For details, see Installing the Agent on Huawei Cloud Servers and Installing the Agent on Third-party Servers.
Constraints
- After the Windows firewall is enabled, HSS automatically adds firewall rules hostguard_AllowAnyIn and hostguard_AllowAnyOut to allow all inbound and outbound traffic. This ensures that the firewall does not affect your services. If HSS detects a brute-force attack, it adds an inbound rule to the firewall to block the attack source IP address. This does not affect your servers.
- Do not disable the Windows firewall when using HSS, or HSS cannot block the source IP addresses of brute-force attacks. Once it is disabled, HSS may fail to block the attack source IP addresses even after you manually enable it again.
Enabling Web Tamper Protection
WTP can be enabled for one or multiple servers at a time. When you enable WTP for multiple servers at a time, the same protected directory settings will be applied to all of them, and cannot be customized for each server. If these servers have different directories to be protected, you can customize the protected directories or other settings for them separately after WTP is enabled. For details, see Modifying WTP Configuration.
- Log in to the HSS console.
- Click
in the upper left corner and select a region or project.
- In the navigation pane, choose Server Protection > Web Tamper Protection.
Figure 1 Web tamper protection
- On the Servers tab, click Add Server. The Add Server page is displayed.
- On the Add Server page, select servers and click Next. For more information, see Table 1.
Figure 2 Selecting servers
Table 1 Parameters for selecting protected servers Parameter
Description
Example Value
OS
Select the OS type of the server to be protected by WTP.
- Linux
- Windows
Linux
Select Servers
Select servers.
You can filter the servers by software type or other attributes.
-
Select Quota
The HSS WTP edition supports two billing modes, yearly/monthly and pay-per-use billing, to meet requirements in different scenarios.
- Yearly/Monthly billing is a prepaid mode in which you pay for the service before using it. Your bill is generated based on the required duration you specify in the order. The longer you use the service, the more discounts you got.
- Pay-per-use is a postpaid billing mode. You pay as you go and just pay for what you use. The HSS usage is calculated by the second but billed every hour. With the pay-per-use billing mode, you can easily adapt to resource requirement changes, reducing the risk of over-provisioning resources or lacking capacity. In this mode, there are no upfront commitments required.
When selecting the yearly/monthly billing mode, you can select a quota or retain the default value Select a quota randomly.
Yearly/Monthly
Agreement
Before enabling WTP, ensure that you have read the Host Security Service Disclaimer.
Select I have read and agree to the Host Security Service Disclaimer.
Selected
- On the Add Server page, configure policies. For more information, see Table 2.
Figure 3 Configuring policies
- After the policy is configured, click OK.
- On the Servers tab, check the static and dynamic WTP status of the server.
The Protected status indicates protection has been enabled. After dynamic WTP is enabled, restart Tomcat to apply the settings.
- (Optional) Configure alarm notification, protection policies, server login protection, and malicious program isolation and removal.
- Configuring alarm notifications
After HSS is enabled, alarms are displayed on the console by default. To learn the security risks of servers, containers, or web pages in a timely manner, you can enable alarm notification, and HSS will notify you of risks by SMS or email. For details, see Alarm Configuration.
- Configuring protection policies
Each HSS edition provides a group of protection policies preset with default settings. You can enable or disable policies and adjust protection rules as needed. For details, see Policy Management.
- Configuring login protection
To enhance server login security, perform the operations in Enabling 2FA, Configuring Common Login Locations, Configuring Common Login IP Addresses, and Configuring an SSH Login IP Address Whitelist.
- Enabling malicious program isolation and removal
If this function is enabled, HSS will automatically isolate identified malicious programs, such as backdoors, Trojans, and worms, to help you handle security risks. For details, see Isolating and Killing Malicious Programs.
- Configuring alarm notifications
Advanced Defense Functions
HSS provides a series of advanced defense functions. You can enable or use them as required to enhance the security protection level of your servers. For details, see Table 4.
Function |
Description |
---|---|
To protect your applications with RASP, you simply need to add probes to them, without having to modify application files. |
|
The function can detect and defend against ransomware. It can automatically back up data either at a scheduled time, or immediately if ransomware is detected. This can help you defend against ransomware and reduce loss. Ransomware prevention is automatically enabled with the container edition. HSS will deploy honeypot files on servers and automatically isolate suspicious encryption processes. You can modify the ransomware protection policy. You are also advised to enable backup so that you can restore data. |
|
Application process control helps to enhance the security of applications and processes running on servers. It can automatically identify and analyze application processes, and classify them into trusted, suspicious, and malicious processes. It allows trusted processes to run, and generates alarms for suspicious and malicious processes. This helps to build a secure environment for application processes, and protects servers from untrusted or malicious application processes. |
|
This function combines cloud-based and local antivirus mechanisms to scan executable files, compressed files, scripts, documents, images, and audiovisual files for viruses. You can perform quick scan, full-disk scan, and custom scans on servers as needed to detect and remove virus files in a timely manner, enhancing the virus defense of the system. |
|
The dynamic port honeypot function is a proactive defense measure. It uses a real port as a honeypot port to induce attackers to access the network. In the horizontal penetration scenario, the function can effectively detect attackers' scanning, identify faulty servers, and protect real resources of the user. |
Feedback
Was this page helpful?
Provide feedbackThank you very much for your feedback. We will continue working to improve the documentation.See the reply and handling status in My Cloud VOC.
For any further questions, feel free to contact us through the chatbot.
Chatbot