Step 3 Select the event to be monitored as needed.
Table 5-25 Security exception description
Parameter Description
Trusted environment detected
program
Monitors the programs that run in trusted environment to
detect whether there are program running without trusted
signature.
Select it to prevent the program with trojan and virus.
Account login exceeds the set
time range
The account tries to login during the period that does not
allow user to log in.
Congure Restricted Login in Setting > System >
Account > Account > Username, including the IP address,
validity period, and time range.
Session ID Brute Force Attack
When sessionid false reaches the congured threshold in the
dened period, an alarm will be triggered.
Select it to monitor attacks in real time, so that attacks can be
prevented timely.
Brute force attack of web path
Generates the web serve directory and send a request
through enumeration. When URL false reaches the
congured threshold in the dened period, an alarm will be
triggered.
Select it to monitor attacks in real time, so that attacks can be
prevented timely.
Session connection exceeds limit
The number of users (web, platform or mobile phone client)
exceeds the max number of users that can connect to the
device simultaneously.
Congure the Max Connection in Setting > Network >
Port.
Step 4 Set alarm linkage actions. For details, see "5.1.1 Alarm Linkage".
Step 5 Click Save.
5.19.6 Setting Disarming
You can disable the linkage actions through the app on your smart phone, and then the system will
not perform any linkage action, but alarm records will still be generated.
Procedure
Step 1 Select Setting > Event > Disarming.
Operation Manual
224