Updated on 2024-11-15 GMT+08:00

Managing Login Whitelist

You can configure the IP addresses of destination servers, login IP addresses, login usernames, and user behaviors in the Login Whitelist.

You can add Login Whitelist in either of the following ways:

  • Add it to the Login Whitelist when handling false alarms of the Brute-force attack and Abnormal login types. For details, see Viewing Server Alarms.
  • On the Login Whitelist page, add Login Whitelist.
  • If the destination server IP address, login IP address, and username of a login are all whitelisted, this login will be allowed without checking.
  • To unblock IP addresses, add the IP address to the whitelist of the login security detection policy. For details, see Login Security Check.

Adding Login Whitelist

  1. Log in to the management console.
  2. In the upper left corner of the page, select a region, click , and choose Security & Compliance > HSS.
  3. Choose Detection & Response > Whitelists. Click Login Whitelist and click Add.

    If your servers are managed by enterprise projects, you can select an enterprise project to view or operate the asset and scan information.

    Figure 1 Adding Login Whitelist

  4. On the displayed page, enter the server IP address, login IP address, and login username.

    Table 1 Login security whitelist parameters

    Parameter

    Description

    Example Value

    Server IP Address

    • IPv4 addresses are supported
    • Single IP addresses, IP address segments, and masks are supported. Use commas (,) to separate them.
    • 192.168.1.1
    • 192.168.2.1-192.168.6.1
    • 192.168.7.0/24

    Login IP Address

    Login Username

    Current login username

    hss_test

    Remarks

    Custom whitelist description

    Test

    Handle historical alarms

    After this option is selected, login alarms that have been generated will be synchronized.

    Selected

  5. Click OK.

Removing an Item from the Login Whitelist

To remove a server IP address from the Login Whitelist, select it and click Delete above the list, or click Delete in its Operation column.

Exercise caution when performing the deletion operation because it cannot be rolled back.