Configuring Critical Asset Object
To configure the critical asset object, take the following steps:
- Select Object > Critical Assets.
- Click New.
- Web Vulnerability Scan: A web vulnerability scanner is a program which communicates with a web application through the web front-end in order to identify potential security vulnerabilities in the web application and architectural weaknesses.
- Http-based DoS Attack: Denial of service (DoS) usually refers to an attack that attempts to make a computer resource unavailable to its intended users by flooding a network or server with requests and data. As the name suggests, Http-Based DoS Attack is based on http protocol.
- Web Spider : A Web spider is an internet bot that systematically browses the World Wide Web, typically for the purpose of Web indexing. Web search engines and some other sites use a web spider to update their web content or indexes others' sites' web content. Web spider can copy all of the pages they visit for later processing by a search engine that indexes the downloaded pages so that users can search them much more quickly.
In Critical Assets page, configure the settings.
|Name||Specify the name of the critical asset object.|
|Zone||Specify the security zone where this object is located. Enable Abnormal Behavior Detection and Advanced Threat Detection function on the selected zone.|
|IP||Specify the IP address of the critical asset.|
|Web Server Advanced Protection||Click the Enable button if the critical asset is a Web server. Selecting this check box can detect the following types of attacks and behavior:
|Description||Enter the description for this object.|