Operation Manual
205
2.
Change Passwords Regularly
We suggest that you change passwords regularly to reduce the risk of being guessed or cracked.
3.
Turn On Account Lock Mechanism
The account lock function is enabled by default at the factory, and it is recommended to keep it
on to protect the security of your account. After the attacker has failed multiple password
attempts, the corresponding account and source IP will be locked.
4.
Reasonable Allocation of Accounts and Permissions
According to business and management needs, reasonably add new users, and reasonably
allocate a minimum set of permissions for them.
5.
Close Non-essential Services and Restrict the Open Form of Essential Services
If not needed, it is recommended to turn off NetBIOS (port 137, 138, 139), SMB (port 445), remote
desktop (port 3389) and other services under Windows, and Telnet (port 23) and SSH (port 22)
under Linux. At the same time, close the database port to the outside or only open to a specific IP
address, such as MySQL (port 3306), to reduce the risks faced by the platform.
6.
Patch the Operating System/Third Party Components
It is recommended to regularly detect security vulnerabilities in the operating system and third-
party components, and apply official patches in time.
7.
Security Audit
●
Check online users: It is recommended to check online users irregularly to identify whether
there are illegal users logging in.
●
View the platform log: By viewing the log, you can get the IP information of the attempt to
log in to the platform and the key operation information of the logged-in user.
8.
The Establishment of a secure Network Environment
In order to better protect the security of the platform and reduce cyber security risks, it is
recommended that:
●
Follow the principle of minimization, restrict the ports that the platform maps externally by
firewalls or routers, and only map ports that are necessary for services.
●
Based on actual network requirements, separate networks: if there is no communication
requirement between the two subnets, it is recommended to use VLAN, gatekeeper, etc. to
divide the network to achieve the effect of network isolation.
More information
Please visit Dahua official website security emergency response center for security announcements
and the latest security recommendations.
Содержание IPC-HDW5842T-ZE
Страница 1: ...Network Camera Web 3 0 Operation Manual ZHEJIANG DAHUA VISION TECHNOLOGY CO LTD V2 1 5...
Страница 118: ...Operation Manual 104 Figure 4 98 Username Step 2 Click Add User Figure 4 99 Add user operation permission...
Страница 189: ...Operation Manual 175 Figure 5 64 People counting...
Страница 231: ...Operation Manual 217 Select Setting Information Online User Figure 6 12 Online user...
Страница 235: ...Operation Manual...
Страница 236: ...Network Camera Web 5 0 Operation Manual ZHEJIANG DAHUA VISION TECHNOLOGY CO LTD V1 0 5...
Страница 325: ...Operation Manual 77 Figure 6 70 User Step 2 Click Add Figure 6 71 Add user system...
Страница 337: ...Operation Manual 89 Figure 6 86 Remote log...
Страница 407: ...Operation Manual 159 Step 3 Click Apply...
Страница 440: ...Operation Manual 192 Figure 12 5 Area people counting number of people Figure 12 6 Area people counting stay time...
Страница 454: ...Operation Manual...
Страница 455: ...Eyeball Network Camera Quick Start Guide V1 0 2 ZHEJIANG DAHUA VISION TECHNOLOGY CO LTD...
Страница 470: ...Quick Start Guide 10 Install waterproof connector Figure 3 8 3 3 6 Adjusting Lens Angle Adjust lens angle Figure 3 9...
Страница 471: ...Quick Start Guide...
Страница 472: ......
Страница 473: ......