Updated on 2023-05-12 GMT+08:00

Border Protection and Response

Context

The Border Protection and Response Service is a security service provided by Huawei Qiankun. For this service, the operations platform provides operations and maintenance personnel with a variety of functions such as workflows, security center, blacklists and whitelists, security reports, Internet-exposed risk detection, and global configuration.

Procedure

  1. Log in to the operations platform using an operations account. Choose Service Operations > Security Services > Border Protection and Response.
  2. View each function.
    Table 1 Functions available for the Border Protection and Response Service

    Function

    Description

    Workflow

    Device Security Zone Monitoring

    Checks whether the device security zones are reversely connected.

    AI Discrepancy Handling

    Allows users to view the list of threat events automatically handled by AI.

    Aggregate Events

    Allows you to view the list of aggregate events.

    Security Center

    Event Management

    Allows you to manage aggregate events and threat events.

    Model Management

    Allows you to manage automatic analysis models.

    Tracing Platform

    Allows you to manage trusted signatures, alarm templates, event names, signature statistics, precise threat blocking, and custom signatures.

    Blacklist and Whitelist

    Allows you to manage device IP address blacklists and whitelists as well as domain name blacklists.

    Security Report

    Allows you to manage common and custom reports.

    Internet-Exposed Risk Detection

    Exposure Risk Monitoring

    Allows you to view high-risk IP addresses and ports.

    Service Risk Level Configuration

    Allows you to view and change the risk level corresponding to a protocol, and delete the risk level configuration of an existing protocol.

    Global Configuration

    IP Address Security Zone Management

    Allows you to manage global whitelists and device security zones.

    Device Security Zone Monitoring

    Allows you to check whether device security zones are reversely connected.