Experience Enhancements

Cloud Firewall - Threat Intelligence-based Access Control Policies Are Optimized

Feb 20 2024

Cloud Firewall
Allows users to configure access control policies based on threat intelligence address books to improve protection effects.
Content

1. Protocols can be specified when users create access control policies that reference threat intelligence address books. 2. Threat intelligence address books support various threat intelligence, including malicious domain names in DNSlog attacks, other malicious domain names, common online document websites, common social websites, and common disk websites. The threat intelligence address books are automatically updated.

7th Gen ECS Is Now Available

Increase instance computing power by up to 40% and Fully equipped with TPM chips.
Powered by Third-generation Intel® Xeon® Scalable processors (Ice Lake).

  • Sales Support

    1 on 1 presale consultation

  • After-Sales Support

    24/7 Technical Support 6 Free Tickets per Quarter Faster Response

  • Alibaba Cloud offers highly flexible support services tailored to meet your exact needs.