Figure 5-99 Security exception
Step 3
Select the event to be monitored as needed.
Table 5-25 Security exception description
Parameter
Description
Trusted environment detected
program
Monitors the programs that run in the trusted
environment to detect whether there are programs
running without trusted signature.
Select to prevent the programs with trojan and virus.
Account login exceeds the
set time range
This function detects if an account tries to log in during
a period that does not allow the user to log in.
Configure
Restricted Login
in
Setting
>
System
>
Account
>
Account
>
Username
, including the IP address,
validity period, and time range.
Session ID Brute Force Attack
Select to enable protection against brute force attacks
(multiple login attempts)
Brute force attack of web path
Generates a web server directory and sends a request
through enumeration. When a false URL reaches the
configured threshold in the defined period, an alarm
will be triggered.
Select to prevent attacks via web.
178