Docs
uhids
Product Introduction
Term Explanation

Glossary

Security Risks

Monitoring security vulnerabilities of the system servers and applications, these vulnerabilities can be exploited by hackers, thus generating security risks.

Malicious Trojans

The trojan installed on the server by hackers after hacking into the server, hackers can control the server through the “Trojan” program, arbitrarily destroying or stealing files of the infected, or even remotely controlling the infected host.

Remote Login

If someone logs in to the server from a location that is not commonly used by the server owner, consider whether the password has been cracked by hackers.

Brute Force Cracking Success

Hackers through exhaustive behavior matched the correct account and password, and successfully logged into the server.

Configuration Defects

Configuration defects refer to unreasonable configurations of servers by administrators, resulting in security risks. It is recommended that administrators modify server configurations to enhance server security.

Agent

Agent, also known as a plugin, is a monitoring program installed on the server.