Docs
udas
Operation Guide
Security Management Platform
2、Protection Object

2. Protecting Objects

Configure the database that needs to be protected. We support auditing for more than a dozen types of databases, including post-relational databases like cache, big data audits like HBASE and MongoDB, and audits of domestically produced databases like Dameng, RenDaJinKu, etc. Audit the behavior of operating the database, configure the corresponding policies to specially mark out dangerous behaviors, and help users quickly discover dangerous operation behaviours and take timely measures.

1) Configuration of Protection Objects

Click “Add” button on the interface to pop up the dialog box for adding protection objects

2) Auto Discovery

When users have many assets that need to be configured as protection objects, manual configuration is obviously not a good method. Therefore, through the auto discovery function, we can accomplish the batch addition of assets, thus improving operational efficiency. Click on the auto discovery button in the protection object to pop up the configuration interface. The address range, task execution time and database type can be filled in according to the actual situation. The types of discovery include “all” and “port scanning”. After filling in, scanning can be started.

After scanning is complete, you can click to complete the batch addition of assets, or click to achieve single addition. In addition, the results of the scan can be queried, by entering the corresponding address, database type, task execution time period, and handling status for the query.