How Do I Handle Unsafe Configurations?
HSS automatically performs a configuration detection for servers. You can repair unsafe configuration items or ignore the configuration items you trust based on the detection result.
- Modifying unsafe configuration items
View details about a detection rule, verify the detection result based on the audit description, and handle the exception based on the modification recommendation.
You are advised to repair the configurations with a high threat level immediately. The configurations with a medium or low threat level can be fixed later based on service requirements.
- Ignoring trusted configuration items
- Click the name of an ECS to view its details. Choose .
- Locate the target risk item, click in front of its name to expand the check items and click Ignore in the Operation column. You can also select multiple detection rules and click Ignore in the upper part of the page to ignore them in batches.
To unignore an ignored detection rule, click Unignore in the Operation column. You can also select multiple ignored detection rules and click Unignore in the upper part of the page to unignore them in batches.
- Verification
After modifying configuration items, you are advised to choose and click Scan to perform manual scan immediately to verify the result.
Feedback
Was this page helpful?
Provide feedbackThank you very much for your feedback. We will continue working to improve the documentation.See the reply and handling status in My Cloud VOC.
For any further questions, feel free to contact us through the chatbot.
Chatbot