All Products
Search
Document Center

Security Center:Use the web tamper proofing feature

Last Updated:Apr 07, 2024

The web tamper proofing feature can monitor website directories and files on your server in real time. The feature can also restore tampered files or directories by using backups if a website is tampered with. This prevents the website from being inserted with illegal information and ensures that the website runs as expected. This topic describes how to use the web tamper proofing feature.

Prerequisites

The Security Center agent is installed on the server for which you want to enable the web tamper proofing feature. For more information, see Install the Security Center agent.

Background information

To make illegal profits or launch business attacks, attackers exploit vulnerabilities in websites to tamper with the websites. For example, attackers insert hidden links to the websites. Tampering with web pages affects normal user access and may cause serious economic loss, damage to brand reputation, and political risks.

The Security Center agent automatically collects information about the processes related to the files in the protected directories of protected servers. The agent identifies suspicious processes and abnormal file changes in real time and generates alerts for or intercepts the processes that cause abnormal file changes.

Billing rules

Web tamper proofing is a value-added feature of Security Center. You can use the feature after you purchase it. For more information about the billing of web tamper proofing, see Billing.

Usage notes

  • A quota of 1 on web tamper proofing can be consumed to protect one server.

  • You can enable web tamper proofing for a server only once. You can add up to 10 directories on each server for protection.

  • If the operating system and kernel version of your server are supported by the whitelist feature, take note of the following items. For more information, see Supported versions of operating systems and kernels.

    • Use the whitelist feature: If Security Center blocks or generates an alert for a process that causes abnormal file changes but the process is required by your workloads, you can add the process to the process whitelist. Then, Security Center no longer blocks or generates alerts for the process.

    • When you add directories for protection, take note of the following items:

      • The maximum length of the full path to each specified file or directory is 1,000 characters.

      • If you add a process path of a Network File System (NFS) server for protection, Security Center cannot protect the files in the path from NFS client-based attacks that attempt to modify the files.

  • If the operating system and kernel version of your server are not supported by the whitelist feature, take note of the following items. For more information, see Supported versions of operating systems and kernels.

    • The whitelist feature is not supported. The web tamper proofing feature still blocks a process even if you add the process to the process whitelist.

    • When you add directories for protection, take note of the following items:

      • The maximum size of each specified directory is 20 GB.

      • The maximum number of folders in each specified directory is 20,000.

      • The maximum number of folder levels in each specified directory is 20.

      • The maximum size of each specified file is 20 GB.

      • You cannot set Prevention Mode to Alert Mode.

      • The paths to the NFS cannot be protected.

      • Alerts may not be generated. Details of alerts do not include information about process paths.

Table 1. Supported versions of operating systems and kernels

Operating system

Operating system version

Kernel version

Windows (32-bit or 64-bit)

Windows Server 2008, Windows Server 2012, Windows Server 2016, and Windows Server 2019

All versions

CentOS (64-bit)

Unlimited

2.6.32 series

  • 2.6.32-220.el6.x86_64

  • 2.6.32-220.13.1.el6.x86_64

  • 2.6.32-279.el6.x86_64

  • 2.6.32-358.6.2.el6.x86_64

  • 2.6.32-358.el6.x86_64

  • 2.6.32-358.18.1.el6.x86_64

  • 2.6.32-431.17.1.el6.x86_64

  • 2.6.32-431.23.3.el6.x86_64

  • 2.6.32-431.el6.x86_64

  • 2.6.32-431.29.2.el6.x86_64

  • 2.6.32-431.20.3.el6.x86_64

  • 2.6.32-504.30.3.el6.x86_64

  • 2.6.32-504.23.4.el6.x86_64

  • 2.6.32-504.16.2.el6.x86_64

  • 2.6.32-504.12.2.el6.x86_64

  • 2.6.32-504.8.1.el6.x86_64

  • 2.6.32-504.3.3.el6.x86_64

  • 2.6.32-504.1.3.el6.x86_64

  • 2.6.32-504.el6.x86_64

  • 2.6.32-573.12.1.el6.x86_64

  • 2.6.32-573.18.1.el6.x86_64

  • 2.6.32-573.22.1.el6.x86_64

  • 2.6.32-573.26.1.el6.x86_64

  • 2.6.32-573.8.1.el6.x86_64

  • 2.6.32-573.7.1.el6.x86_64

  • 2.6.32-573.3.1.el6.x86_64

  • 2.6.32-573.el6.x86_64

  • 2.6.32-642.1.1.el6.x86_64

  • 2.6.32-642.11.1.el6.centos.plus.x86_64

  • 2.6.32-642.13.1.el6.centos.plus.x86_64

  • 2.6.32-642.11.1.el6.x86_64

  • 2.6.32-642.13.1.el6.x86_64

  • 2.6.32-642.15.1.el6.x86_64

  • 2.6.32-642.3.1.el6.x86_64

  • 2.6.32-642.4.2.el6.x86_64

  • 2.6.32-642.6.2.el6.centos.plus.x86_64

  • 2.6.32-642.6.2.el6.x86_64

  • 2.6.32-642.6.1.el6.x86_64

  • 2.6.32-642.el6.x86_64

  • 2.6.32-696.1.1.el6.x86_64

  • 2.6.32-696.10.1.el6.x86_64

  • 2.6.32-696.10.2.el6.x86_64

  • 2.6.32-696.13.2.el6.x86_64

  • 2.6.32-696.16.1.el6.x86_64

  • 2.6.32-696.18.7.el6.x86_64

  • 2.6.32-696.20.1.el6.x86_64

  • 2.6.32-696.23.1.el6.x86_64

  • 2.6.32-696.28.1.el6.x86_64

  • 2.6.32-696.3.1.el6.x86_64

  • 2.6.32-696.3.2.el6.x86_64

  • 2.6.32-696.30.1.el6.x86_64

  • 2.6.32-696.6.3.el6.x86_64

  • 2.6.32-696.el6.x86_64

  • 2.6.32-754.11.1.el6.x86_64

  • 2.6.32-754.12.1.el6.x86_64

  • 2.6.32-754.14.2.el6.x86_64

  • 2.6.32-754.15.3.el6.x86_64

  • 2.6.32-754.17.1.el6.x86_64

  • 2.6.32-754.18.2.el6.x86_64

  • 2.6.32-754.2.1.el6.x86_64

  • 2.6.32-754.22.1.el6.x86_64

  • 2.6.32-754.23.1.el6.x86_64

  • 2.6.32-754.24.3.el6.x86_64

  • 2.6.32-754.25.1.el6.x86_64

  • 2.6.32-754.27.1.el6.x86_64

  • 2.6.32-754.28.1.el6.x86_64

  • 2.6.32-754.29.1.el6.x86_64

  • 2.6.32-754.29.2.el6.x86_64

  • 2.6.32-754.3.5.el6.x86_64

  • 2.6.32-754.30.2.el6.x86_64

  • 2.6.32-754.31.1.el6.x86_64

  • 2.6.32-754.33.1.el6.x86_64

  • 2.6.32-754.35.1.el6.x86_64

  • 2.6.32-754.6.3.el6.x86_64

  • 2.6.32-754.9.1.el6.x86_64

  • 2.6.32-754.el6.x86_64

  • 2.6.32-754.10.1.el6.x86_64

3.10.x series

  • 3.10.0-123.9.3.el7.x86_64

  • 3.10.0-229.el7.x86_64

  • 3.10.0-327.10.1.el7.x86_64

  • 3.10.0-327.13.1.el7.x86_64

  • 3.10.0-327.18.2.el7.x86_64

  • 3.10.0-327.22.2.el7.x86_64

  • 3.10.0-327.36.3.el7.x86_64

  • 3.10.0-327.36.2.el7.x86_64

  • 3.10.0-327.36.1.el7.x86_64

  • 3.10.0-327.28.3.el7.x86_64

  • 3.10.0-327.28.2.el7.x86_64

  • 3.10.0-327.el7.x86_64

  • 3.10.0-514.10.2.el7.x86_64

  • 3.10.0-514.16.1.el7.x86_64

  • 3.10.0-514.21.2.el7.x86_64

  • 3.10.0-514.21.1.el7.x86_64

  • 3.10.0-514.26.2.el7.x86_64

  • 3.10.0-514.26.1.el7.x86_64

  • 3.10.0-514.6.2.el7.x86_64

  • 3.10.0-514.6.1.el7.x86_64

  • 3.10.0-514.el7.x86_64

  • 3.10.0-514.2.2.el7.x86_64

  • 3.10.0-693.11.1.el7.x86_64

  • 3.10.0-693.11.6.el7.x86_64

  • 3.10.0-693.17.1.el7.x86_64

  • 3.10.0-693.2.2.el7.x86_64

  • 3.10.0-693.21.1.el7.x86_64

  • 3.10.0-693.5.2.el7.x86_64

  • 3.10.0-693.el7.x86_64

  • 3.10.0-862.11.6.el7.x86_64

  • 3.10.0-862.14.4.el7.x86_64

  • 3.10.0-862.2.3.el7.x86_64

  • 3.10.0-862.3.2.el7.x86_64

  • 3.10.0-862.3.3.el7.x86_64

  • 3.10.0-862.6.3.el7.x86_64

  • 3.10.0-862.9.1.el7.x86_64

  • 3.10.0-862.el7.x86_64

  • 3.10.0-957.1.3.el7.x86_64

  • 3.10.0-957.10.1.el7.x86_64

  • 3.10.0-957.12.1.el7.x86_64

  • 3.10.0-957.12.2.el7.x86_64

  • 3.10.0-957.21.2.el7.x86_64

  • 3.10.0-957.21.3.el7.x86_64

  • 3.10.0-957.27.2.el7.x86_64

  • 3.10.0-957.5.1.el7.x86_64

  • 3.10.0-957.el7.x86_64

  • 3.10.0-1062.1.1.el7.x86_64

  • 3.10.0-1062.1.2.el7.x86_64

  • 3.10.0-1062.12.1.el7.x86_64

  • 3.10.0-1062.18.1.el7.x86_64

  • 3.10.0-1062.4.1.el7.x86_64

  • 3.10.0-1062.4.2.el7.x86_64

  • 3.10.0-1062.4.3.el7.x86_64

  • 3.10.0-1062.7.1.el7.x86_64

  • 3.10.0-1062.9.1.el7.x86_64

  • 3.10.0-1062.el7.x86_64

  • 3.10.0-1127.10.1.el7.x86_64

  • 3.10.0-1127.13.1.el7.x86_64

  • 3.10.0-1127.18.2.el7.x86_64

  • 3.10.0-1127.19.1.el7.x86_64

  • 3.10.0-1127.8.2.el7.x86_64

  • 3.10.0-1127.el7.x86_64

  • 3.10.0-1160.11.1.el7.x86_64

  • 3.10.0-1160.15.2.el7.x86_64

  • 3.10.0-1160.2.2.el7.x86_64

  • 3.10.0-1160.21.1.el7.x86_64

  • 3.10.0-1160.24.1.el7.x86_64

  • 3.10.0-1160.25.1.el7.x86_64

  • 3.10.0-1160.31.1.el7.x86_64

  • 3.10.0-1160.36.2.el7.x86_64

  • 3.10.0-1160.41.1.el7.x86_64

  • 3.10.0-1160.42.2.el7.x86_64

  • 3.10.0-1160.45.1.el7.x86_64

  • 3.10.0-1160.49.1.el7.x86_64

  • 3.10.0-1160.53.1.el7.x86_64

  • 3.10.0-1160.59.1.el7.x86_64

  • 3.10.0-1160.6.1.el7.x86_64

  • 3.10.0-1160.62.1.el7.x86_64

  • 3.10.0-1160.66.1.el7.x86_64

  • 3.10.0-1160.el7.x86_64

  • 3.10.0-1160.71.1.el7.x86_64

  • 3.10.0-1160.76.1.el7.x86_64

  • 3.10.0-1160.80.1.el7.x86_64

  • 3.10.0-1160.83.1.el7.x86_64

  • 3.10.0-1160.108.1.el7.x86_64

  • 3.10.0-1160.105.1.el7.x86_64

  • 3.10.0-1160.102.1.el7.x86_64

  • 3.10.0-1160.99.1.el7.x86_64

  • 3.10.0-1160.95.1.el7.x86_64

  • 3.10.0-1160.92.1.el7.x86_64

  • 3.10.0-1160.90.1.el7.x86_64

  • 3.10.0-1160.88.1.el7.x86_64

  • 3.10.0-1160.81.1.el7.x86_64

  • 3.10.0-1160.2.1.el7.x86_64

  • 3.10.107-1.el6.elrepo.x86_64

4.4.x series

  • 4.4.248-1.el7.elrepo.x86_64

  • 4.4.240-1.el7.elrepo.x86_64

  • 4.4.231-1.el7.elrepo.x86_64

  • 4.4.228-2.el7.elrepo.x86_64

  • 4.4.225-1.el7.elrepo.x86_64

  • 4.4.223-1.el7.elrepo.x86_64

  • 4.4.219-1.el7.elrepo.x86_64

  • 4.4.217-1.el7.elrepo.x86_64

  • 4.4.216-1.el7.elrepo.x86_64

  • 4.4.202-1.el7.elrepo.x86_64

  • 4.4.196-1.el7.elrepo.x86_64

  • 4.4.175-1.el7.elrepo.x86_64

  • 4.4.169-1.el7.elrepo.x86_64

  • 4.4.71-1.el7.elrepo.x86_64

4.9.x - 4.14.x series

  • 4.14.35-2047.505.4.3.el7uek.x86_64

  • 4.14.1-1.el7.elrepo.x86_64

  • 4.13.3-1.el7.elrepo.x86_64

  • 4.13.2-1.el7.elrepo.x86_64

  • 4.11.8-1.el7.elrepo.x86_64

  • 4.9.220-37.el7.x86_64

  • 4.9.215-36.el7.x86_64

4.18.x series

  • 4.18.10-1.el7.elrepo.x86_64

  • 4.18.8-1.el7.elrepo.x86_64

  • 4.18.0-529.el8.x86_64

  • 4.18.0-521.el8.x86_64

  • 4.18.0-513.el8.x86_64

  • 4.18.0-512.el8.x86_64

  • 4.18.0-500.el8.x86_64

  • 4.18.0-497.el8.x86_64

  • 4.18.0-496.el8.x86_64

  • 4.18.0-490.el8.x86_64

  • 4.18.0-485.el8.x86_64

  • 4.18.0-448.el8.x86_64

  • 4.18.0-408.el8.x86_64

  • 4.18.0-394.el8.x86_64

  • 4.18.0-383.el8.x86_64

  • 4.18.0-373.el8.x86_64

  • 4.18.0-372.19.1.el8_6.x86_64

  • 4.18.0-80.11.2.el8_0.x86_64

  • 4.18.0-147.3.1.el8_1.x86_64

  • 4.18.0-147.5.1.el8_1.x86_64

  • 4.18.0-147.8.1.el8_1.x86_64

  • 4.18.0-193.el8.x86_64

  • 4.18.0-193.1.2.el8_2.x86_64

  • 4.18.0-193.6.3.el8_2.x86_64

  • 4.18.0-193.14.2.el8_2.x86_64

  • 4.18.0-193.19.1.el8_2.x86_64

  • 4.18.0-193.28.1.el8_2.x86_64

  • 4.18.0-240.1.1.el8_3.x86_64

  • 4.18.0-240.10.1.el8_3.x86_64

  • 4.18.0-240.15.1.el8_3.x86_64

  • 4.18.0-240.22.1.el8_3.x86_64

  • 4.18.0-305.3.1.el8.x86_64

  • 4.18.0-305.7.1.el8_4.x86_64

  • 4.18.0-305.10.2.el8_4.x86_64

  • 4.18.0-305.12.1.el8_4.x86_64

  • 4.18.0-305.17.1.el8_4.x86_64

  • 4.18.0-305.19.1.el8_4.x86_64

  • 4.18.0-305.25.1.el8_4.x86_64

  • 4.18.0-348.el8.x86_64

  • 4.18.0-348.2.1.el8_5.x86_64

  • 4.18.0-348.7.1.el8_5.x86_64

  • 4.18.0-348.12.2.el8_5.x86_64

  • 4.18.0-348.20.1.el8_5.x86_64

  • 4.18.0-358.el8.x86_64

  • 4.18.0-365.el8.x86_64

  • 4.18.0-372.9.1.el8.x86_64

  • 4.18.0-372.26.1.el8_6.x86_64

  • 4.18.0-372.16.1.el8_6.0.1.x86_64

  • 4.18.0-372.32.1.el8_6.x86_64

  • 4.18.0-425.3.1.el8.x86_64

  • 4.18.0-425.10.1.el8_7.x86_64

  • 4.18.0-425.13.1.el8_7.x86_64

  • 4.18.0-425.19.2.el8_7.x86_64

  • 4.18.0-477.10.1.el8_8.x86_64

  • 4.18.0-477.13.1.el8_8.x86_64

  • 4.18.0-477.15.1.el8_8.x86_64

  • 4.18.0-477.21.1.el8_8.x86_64

  • 4.18.0-477.27.1.el8_8.x86_64

  • 4.18.0-477.27.2.el8_8.x86_64

  • 4.18.0-513.9.1.el8_9.x86_64

  • 4.18.0-513.11.1.el8_9.x86_64

4.19.x - 4.20.x series

  • 4.20.13-1.el7.elrepo.x86_64

  • 4.19.118-2.el7.centos.x86_64

  • 4.19.113-300.el7.x86_64

  • 4.19.104-300.el7.x86_64

  • 4.19.110-300.el7.x86_64

  • 4.19.94-300.el7.x86_64

  • 4.19.12-1.el7.elrepo.x86_64

  • 4.19.1-1.el7.elrepo.x86_64

5.3.x - 5.8.x series

  • 5.8.8-1.el7.elrepo.x86_64

  • 5.6.5-1.el7.elrepo.x86_64

  • 5.5.7-1.el7.elrepo.x86_64

  • 5.5.5-1.el7.elrepo.x86_64

  • 5.5.1-1.el7.elrepo.x86_64

  • 5.4.268-1.el8.elrepo.x86_64

  • 5.4.268-1.el7.elrepo.x86_64

  • 5.4.265-1.el7.elrepo.x86_64

  • 5.4.264-1.el7.elrepo.x86_64

  • 5.4.262-1.el8.elrepo.x86_64

  • 5.4.260-1.el8.elrepo.x86_64

  • 5.4.259-1.el7.elrepo.x86_64

  • 5.4.258-1.el7.elrepo.x86_64

  • 5.4.257-1.el8.elrepo.x86_64

  • 5.4.257-1.el7.elrepo.x86_64

  • 5.4.256-1.el7.elrepo.x86_64

  • 5.4.255-1.el7.elrepo.x86_64

  • 5.4.254-1.el7.elrepo.x86_64

  • 5.4.253-1.el8.elrepo.x86_64

  • 5.4.249-1.el7.elrepo.x86_64

  • 5.4.247-1.el7.elrepo.x86_64

  • 5.4.246-1.el7.elrepo.x86_64

  • 5.4.245-1.el7.elrepo.x86_64

  • 5.4.243-1.el7.elrepo.x86_64

  • 5.4.242-1.el7.elrepo.x86_64

  • 5.4.240-1.el7.elrepo.x86_64

  • 5.4.231-1.el7.elrepo.x86_64

  • 5.4.230-1.el7.elrepo.x86_64

  • 5.4.228-1.el7.elrepo.x86_64

  • 5.4.225-200.el7.x86_64

  • 5.4.225-1.el7.elrepo.x86_64

  • 5.4.223-1.el7.elrepo.x86_64

  • 5.4.221-1.el7.elrepo.x86_64

  • 5.4.210-1.el7.elrepo.x86_64

  • 5.4.209-1.el7.elrepo.x86_64

  • 5.4.208-1.el7.elrepo.x86_64

  • 5.4.207-1.el7.elrepo.x86_64

  • 5.4.204-1.el7.elrepo.x86_64

  • 5.4.201-1.el7.elrepo.x86_64

  • 5.4.195-1.el7.elrepo.x86_64

  • 5.4.194-1.el7.elrepo.x86_64

  • 5.4.188-1.el7.elrepo.x86_64

  • 5.4.181-1.el7.elrepo.x86_64

  • 5.4.179-1.el7.elrepo.x86_64

  • 5.4.173-1.el7.elrepo.x86_64

  • 5.4.172-1.el7.elrepo.x86_64

  • 5.4.170-1.el7.elrepo.x86_64

  • 5.4.168-1.el7.elrepo.x86_64

  • 5.4.165-1.el7.elrepo.x86_64

  • 5.4.157-1.el7.elrepo.x86_64

  • 5.4.155-200.el7.x86_64

  • 5.4.155-1.el7.elrepo.x86_64

  • 5.4.150-1.el7.elrepo.x86_64

  • 5.4.148-1.el7.elrepo.x86_64

  • 5.4.144-1.el7.elrepo.x86_64

  • 5.4.143-1.el7.elrepo.x86_64

  • 5.4.132-1.el7.elrepo.x86_64

  • 5.4.131-1.el7.elrepo.x86_64

  • 5.4.129-1.el7.elrepo.x86_64

  • 5.4.119-19.0009.28

  • 5.4.119-19-0009.11

  • 5.4.119-19-0009.1

  • 5.4.109-1.el7.elrepo.x86_64

  • 5.4.91-1.el7.elrepo.x86_64

  • 5.4.86-1.el7.elrepo.x86_64

  • 5.4.42-200.el7.x86_64

  • 5.4.8-1.el7.elrepo.x86_64

  • 5.3.8-1.el7.elrepo.x86_64

  • 5.3.7-1.el7.elrepo.x86_64

  • 5.3.6-1.el7.elrepo.x86_64

  • 5.3.0-1.el7.elrepo.x86_64

5.10.x - 5.13.x series

  • 5.13.2-1.el7.elrepo.x86_64

  • 5.12.12-1.el7.elrepo.x86_64

  • 5.12.3-1.el7.elrepo.x86_64

  • 5.11.8-1.el7.elrepo.x86_64

  • 5.11.6-1.el7.elrepo.x86_64

  • 5.11.1-1.el7.elrepo.x86_64

  • 5.10.9-1.el7.elrepo.x86_64

5.14.0 series

  • 5.14.0-412.el9.x86_64

  • 5.14.0-407.el9.x86_64

  • 5.14.0-391.el9.x86_64

  • 5.14.0-386.el9.x86_64

  • 5.14.0-383.el9.x86_64

  • 5.14.0-366.el9.x86_64

  • 5.14.0-361.el9.x86_64

  • 5.14.0-350.el9.x86_64

  • 5.14.0-333.el9.x86_64

  • 5.14.0-325.el9.x86_64

  • 5.14.0-312.el9.x86_64

  • 5.14.0-307.el9.x86_64

  • 5.14.0-299.el9.x86_64

  • 5.14.0-289.el9.x86_64

  • 5.14.0-285.el9.x86_64

  • 5.14.0-267.el9.x86_64

  • 5.14.0-252.el9.x86_64

  • 5.14.0-229.el9.x86_64

  • 5.14.0-226.el9.x86_64

  • 5.14.0-210.el9.x86_64

  • 5.14.0-205.el9.x86_64

  • 5.14.0-197.el9.x86_64

  • 5.14.0-191.el9.x86_64

  • 5.14.0-177.el9.x86_64

  • 5.14.0-160.el9.x86_64

  • 5.14.0-148.el9.x86_64

  • 5.14.0-134.el9.x86_64

  • 5.14.0-119.el9.x86_64

  • 5.14.0-362.18.1.el9_3.x86_64

  • 5.14.0-362.13.1.el9_3.x86_64

  • 5.14.0-362.8.1.el9_3.x86_64

  • 5.14.0-284.30.1.el9_2.x86_64

  • 5.14.0-284.25.1.el9_2.x86_64

  • 5.14.0-284.18.1.el9_2.x86_64

  • 5.14.0-284.11.1.el9_2.x86_64

  • 5.14.0-162.12.1.el9_1.x86_64

  • 5.14.0-162.18.1.el9_1.x86_64

  • 5.14.0-162.23.1.el9_1.x86_64

  • 5.14.0-162.6.1.el9_1.0.1.x86_64

  • 5.14.0-162.6.1.el9_1.x86_64

  • 5.14.0-70.17.1.el9_0.x86_64

  • 5.14.0-70.30.1.el9_0.x86_64

5.15.x - 5.19.x series

  • 5.19.12-1.el7.elrepo.x86_64

  • 5.19.1-1.el7.elrepo.x86_64

  • 5.19.0-1.el7.elrepo.x86_64

  • 5.18.7-1.el7.elrepo.x86_64

  • 5.18.6-1.el7.elrepo.x86_64

  • 5.18.4-1.el7.elrepo.x86_64

  • 5.18.0-1.el7.elrepo.x86_64

  • 5.17.6-1.el7.elrepo.x86_64

  • 5.17.1-1.el7.elrepo.x86_64

  • 5.17.0-1.el7.elrepo.x86_64

  • 5.16.12-1.el7.elrepo.x86_64

  • 5.15.102-1.el7.x86_64

  • 5.15.11-1.el7.elrepo.x86_64

  • 5.15.6-1.el7.elrepo.x86_64

  • 5.15.5-1.el7.elrepo.x86_64

  • 5.15.2-1.el7.elrepo.x86_64

6.x.x series

  • 6.6.4-1.el8.elrepo.x86_64

  • 6.6.1-1.el7.elrepo.x86_64

  • 6.4.12-1.el7.elrepo.x86_64

  • 6.4.11-1.el7.elrepo.x86_64

  • 6.4.10-1.el7.elrepo.x86_64

  • 6.4.8-1.el7.elrepo.x86_64

  • 6.4.7-1.el7.elrepo.x86_64

  • 6.4.3-1.el7.elrepo.x86_64

  • 6.4.2-1.el7.elrepo.x86_64

  • 6.4.1-1.el7.elrepo.x86_64

  • 6.4.0-1.el7.elrepo.x86_64

  • 6.3.9-1.el7.elrepo.x86_64

  • 6.3.8-1.el7.elrepo.x86_64

  • 6.3.7-1.el7.elrepo.x86_64

  • 6.3.6-1.el7.elrepo.x86_64

  • 6.3.5-1.el7.elrepo.x86_64

  • 6.3.4-1.el7.elrepo.x86_64

  • 6.3.3-1.el7.elrepo.x86_64

  • 6.3.2-1.el7.elrepo.x86_64

  • 6.3.1-1.el7.elrepo.x86_64

  • 6.3.0-1.el7.elrepo.x86_64

  • 6.2.12-1.el8.elrepo.x86_64

  • 6.2.12-1.el7.elrepo.x86_64

  • 6.2.11-1.el7.elrepo.x86_64

  • 6.2.10-1.el7.elrepo.x86_64

  • 6.2.9-1.el7.elrepo.x86_64

  • 6.2.8-1.el7.elrepo.x86_64

  • 6.2.7-1.el7.elrepo.x86_64

  • 6.2.6-1.el7.elrepo.x86_64

  • 6.2.2-1.el7.elrepo.x86_64

  • 6.2.1-1.el7.elrepo.x86_64

  • 6.1.0-1.el7.elrepo.x86_64

  • 6.0.10-1.el7.elrepo.x86_64

  • 6.0.6-1.el9.elrepo.x86_64

  • 6.0.1-1.el7.elrepo.x86_64

Ubuntu (64-bit)

Unlimited

3.x.x series

  • 3.2.0-67-generic

  • 3.2.0-126-generic

  • 3.13.0-30-generic

  • 3.13.0-32-generic

  • 3.13.0-65-generic

  • 3.13.0-86-generic

  • 3.13.0-92-generic

  • 3.13.0-135-generic

  • 3.13.0-144-generic

  • 3.13.0-145-generic

  • 3.13.0-153-generi

  • 3.13.0-164-generic

  • 3.13.0-169-generic

  • 3.13.0-170-generic

  • 3.19.0-25-generic

  • 3.19.0-80-generic

4.4.0 series

  • 4.4.0-53-generic

  • 4.4.0-57-generic

  • 4.4.0-62-generic

  • 4.4.0-63-generic

  • 4.4.0-79-generic

  • 4.4.0-81-generic

  • 4.4.0-85-generic

  • 4.4.0-87-generic

  • 4.4.0-93-generic

  • 4.4.0-96-generic

  • 4.4.0-97-generic

  • 4.4.0-98-generic

  • 4.4.0-101-generic

  • 4.4.0-104-generic

  • 4.4.0-105-generic

  • 4.4.0-109-generic

  • 4.4.0-112-generic

  • 4.4.0-116-generic

  • 4.4.0-117-generic

  • 4.4.0-119-generic

  • 4.4.0-122-generic

  • 4.4.0-124-generic

  • 4.4.0-127-generic

  • 4.4.0-128-generic

  • 4.4.0-130-generic

  • 4.4.0-131-generic

  • 4.4.0-135-generic

  • 4.4.0-137-generic

  • 4.4.0-138-generic

  • 4.4.0-139-generic

  • 4.4.0-140-generic

  • 4.4.0-141-generi

  • 4.4.0-142-generic

  • 4.4.0-143-generic

  • 4.4.0-145-generic

  • 4.4.0-146-generic

  • 4.4.0-148-generic

  • 4.4.0-150-generic

  • 4.4.0-151-generic

  • 4.4.0-154-generic

  • 4.4.0-157-generic

  • 4.4.0-159-generic

  • 4.4.0-161-generic

  • 4.4.0-164-generic

  • 4.4.0-165-generic

  • 4.4.0-166-generic

  • 4.4.0-169-generic

  • 4.4.0-170-generic

  • 4.4.0-171-generic

  • 4.4.0-173-generic

  • 4.4.0-174-generic

  • 4.4.0-176-generic

  • 4.4.0-177-generic

  • 4.4.0-178-generic

  • 4.4.0-179-generic

  • 4.4.0-184-generic

  • 4.4.0-185-generic

  • 4.4.0-186-generic

  • 4.4.0-187-generic

  • 4.4.0-189-generic

  • 4.4.0-190-generic

  • 4.4.0-193-generic

  • 4.4.0-194-generic

  • 4.4.0-197-generic

  • 4.4.0-198-generic

  • 4.4.0-200-generic

  • 4.4.0-201-generic

  • 4.4.0-203-generic

  • 4.4.0-206-generic

  • 4.4.0-208-generic

  • 4.4.0-210-generic

4.15.0 series

  • 4.15.0-13-generic

  • 4.15.0-15-generic

  • 4.15.0-23-generic

  • 4.15.0-29-generic

  • 4.15.0-42-generic

  • 4.15.0-43-generic

  • 4.15.0-45-generic

  • 4.15.0-46-generic

  • 4.15.0-47-generic

  • 4.15.0-48-generic

  • 4.15.0-51-generic

  • 4.15.0-52-generic

  • 4.15.0-54-generic

  • 4.15.0-55-generic

  • 4.15.0-58-generic

  • 4.15.0-62-generic

  • 4.15.0-64-generic

  • 4.15.0-65-generic

  • 4.15.0-66-generic

  • 4.15.0-70-generic

  • 4.15.0-72-generic

  • 4.15.0-74-generic

  • 4.15.0-76-generic

  • 4.15.0-88-generic

  • 4.15.0-91-generic

  • 4.15.0-96-generic

  • 4.15.0-99-generic

  • 4.15.0-101-generic

  • 4.15.0-106-generic

  • 4.15.0-108-generic

  • 4.15.0-109-generic

  • 4.15.0-111-generic

  • 4.15.0-112-generic

  • 4.15.0-117-generic

  • 4.15.0-118-generic

  • 4.15.0-121-generic

  • 4.15.0-122-generic

  • 4.15.0-124-generic

  • 4.15.0-128-generic

  • 4.15.0-129-generic

  • 4.15.0-130-generic

  • 4.15.0-132-generic

  • 4.15.0-134-generic

  • 4.15.0-135-generic

  • 4.15.0-136-generic

  • 4.15.0-137-generic

  • 4.15.0-139-generic

  • 4.15.0-140-generic

  • 4.15.0-141-generic

  • 4.15.0-142-generic

  • 4.15.0-144-generic

  • 4.15.0-145-generic

  • 4.15.0-147-generic

  • 4.15.0-143-generic

  • 4.15.0-151-generic

  • 4.15.0-153-generic

  • 4.15.0-154-generic

  • 4.15.0-156-generic

  • 4.15.0-158-generic

  • 4.15.0-159-generic

  • 4.15.0-161-generic

  • 4.15.0-162-generic

  • 4.15.0-163-generic

  • 4.15.0-166-generic

  • 4.15.0-167-generic

  • 4.15.0-169-generic

  • 4.15.0-170-generic

  • 4.15.0-171-generic

  • 4.15.0-173-generic

  • 4.15.0-175-generic

  • 4.15.0-176-generic

  • 4.15.0-177-generic

  • 4.15.0-180-generic

  • 4.15.0-181-generic

  • 4.15.0-184-generic

  • 4.15.0-187-generic

  • 4.15.0-188-generic

  • 4.15.0-189-generic

  • 4.15.0-190-generic

  • 4.15.0-191-generic

  • 4.15.0-192-generic

  • 4.15.0-193-generic

  • 4.15.0-194-generic

  • 4.15.0-196-generic

  • 4.15.0-197-generic

  • 4.15.0-200-generic

  • 4.15.0-201-generic

  • 4.15.0-202-generic

  • 4.15.0-204-generic

  • 4.15.0-206-generic

  • 4.15.0-208-generic

  • 4.15.0-209-generic

  • 4.15.0-210-generic

  • 4.15.0-211-generic

  • 4.15.0-212-generic

  • 4.15.0-213-generic

  • 4.15.0-1047-gcp

  • 4.15.0-1098-gcp

4.18.0 series

  • 4.18.0-15-generic

  • 4.18.0-21-generic

5.3.0 series

  • 5.3.0-40-generic

5.4.0 series

  • 5.4.0-31-generic

  • 5.4.0-40-generic

  • 5.4.0-42-generic

  • 5.4.0-45-generic

  • 5.4.0-47-generic

  • 5.4.0-48-generic

  • 5.4.0-52-generic

  • 5.4.0-53-generic

  • 5.4.0-54-generic

  • 5.4.0-58-generic

  • 5.4.0-59-generic

  • 5.4.0-60-generic

  • 5.4.0-62-generic

  • 5.4.0-65-generic

  • 5.4.0-66-generic

  • 5.4.0-67-generic

  • 5.4.0-70-generic

  • 5.4.0-72-generic

  • 5.4.0-73-generic

  • 5.4.0-74-generic

  • 5.4.0-75-generic

  • 5.4.0-77-generic

  • 5.4.0-80-generic

  • 5.4.0-81-generic

  • 5.4.0-83-generic

  • 5.4.0-84-generic

  • 5.4.0-86-generic

  • 5.4.0-88-generic

  • 5.4.0-89-generic

  • 5.4.0-90-generic

  • 5.4.0-91-generic

  • 5.4.0-92-generic

  • 5.4.0-94-generic

  • 5.4.0-96-generic

  • 5.4.0-97-generic

  • 5.4.0-99-generic

  • 5.4.0-100-generic

  • 5.4.0-102-generic

  • 5.4.0-104-generic

  • 5.4.0-105-generic

  • 5.4.0-106-generic

  • 5.4.0-107-generic

  • 5.4.0-108-generic

  • 5.4.0-109-generic

  • 5.4.0-110-generic

  • 5.4.0-113-generic

  • 5.4.0-117-generic

  • 5.4.0-120-generic

  • 5.4.0-121-generic

  • 5.4.0-122-generic

  • 5.4.0-123-generic

  • 5.4.0-124-generic

  • 5.4.0-125-generic

  • 5.4.0-126-generic

  • 5.4.0-128-generic

  • 5.4.0-131-generic

  • 5.4.0-132-generic

  • 5.4.0-135-generic

  • 5.4.0-136-generic

  • 5.4.0-137-generic

  • 5.4.0-139-generic

  • 5.4.0-144-generic

  • 5.4.0-146-generic

  • 5.4.0-147-generic

  • 5.4.0-148-generic

  • 5.4.0-149-generic

  • 5.4.0-150-generic

  • 5.4.0-151-generic

  • 5.4.0-152-generic

  • 5.4.0-153-generic

  • 5.4.0-154-generic

  • 5.4.0-155-generic

  • 5.4.0-156-generic

  • 5.4.0-159-generic

  • 5.4.0-162-generic

  • 5.4.0-163-generic

  • 5.4.0-164-generic

  • 5.4.0-165-generic

  • 5.4.0-166-generic

  • 5.4.0-167-generic

  • 5.4.0-169-generic

  • 5.4.0-170-generic

  • 5.4.0-171-generic

  • 5.4.0-172-generic

  • 5.4.0-173-generic

5.15.0 series

  • 5.15.0-94-generic

  • 5.15.0-92-generic

  • 5.15.0-91-generic

  • 5.15.0-89-generic

  • 5.15.0-88-generic

  • 5.15.0-87-generic

  • 5.15.0-86-generic

  • 5.15.0-84-generic

  • 5.15.0-83-generic

  • 5.15.0-82-generic

  • 5.15.0-79-generic

  • 5.15.0-78-generic

  • 5.15.0-76-generic

  • 5.15.0-75-generic

  • 5.15.0-73-generic

  • 5.15.0-72-generic

  • 5.15.0-71-generic

  • 5.15.0-70-generic

  • 5.15.0-69-generic

  • 5.15.0-67-generic

  • 5.15.0-60-generic

  • 5.15.0-58-generic

  • 5.15.0-56-generic

  • 5.15.0-53-generic

  • 5.15.0-52-generic

  • 5.15.0-46-generic

  • 5.15.0-43-generic

  • 5.15.0-41-generic

  • 5.15.0-40-generic

6.2.0 series

  • 6.2.0-1018-gcp

Debian

Unlimited

4.9.0 series

  • 4.9.0-19-amd64

  • 4.9.0-18-amd64

  • 4.9.0-17-amd64

  • 4.9.0-16-amd64

  • 4.9.0-15-amd64

  • 4.9.0-14-amd64

  • 4.9.0-13-amd64

  • 4.9.0-12-amd64

  • 4.9.0-11-amd64

  • 4.9.0-9-amd64

  • 4.9.0-8-amd64

  • 4.9.0-4-amd64

4.19.0 series

  • 4.19.0-25-amd64

  • 4.19.0-24-amd64

  • 4.19.0-23-amd64

  • 4.19.0-22-amd64

  • 4.19.0-21-amd64

  • 4.19.0-20-amd64

  • 4.19.0-18-amd64

  • 4.19.0-17-amd64

  • 4.19.0-16-amd64

  • 4.19.0-13-amd64

  • 4.19.0-12-amd64

  • 4.19.0-10-amd64

  • 4.19.0-9-amd64

  • 4.19.0-8-amd64

  • 4.19.0-6-amd64

5.10.0 series

  • 5.10.0-27-amd64

  • 5.10.0-26-amd64

  • 5.10.0-25-amd64

  • 5.10.0-24-amd64

  • 5.10.0-23-amd64

  • 5.10.0-22-amd64

  • 5.10.0-21-amd64

  • 5.10.0-20-amd64

  • 5.10.0-19-amd64

  • 5.10.0-18-amd64

  • 5.10.0-17-amd64

  • 5.10.0-16-amd64

  • 5.10.0-15-amd64

  • 5.10.0-14-amd64

  • 5.10.0-11-amd64

  • 5.10.0-10-amd64

  • 5.10.0-9-amd64

  • 5.10.0-8-amd64

6.1.0 series

  • 6.1.0-18-amd64

  • 6.1.0-17-amd64

  • 6.1.0-16-amd64

  • 6.1.0-13-amd64

  • 6.1.0-12-amd64

  • 6.1.0-11-amd64

  • 6.1.0-10-amd64

Anolis OS (64-bit)

Unlimited

3.10.0 series

  • 3.10.0-1062.an7.x86_64

  • 3.10.0-1160.an7.x86_64

  • 3.10.0-1160.59.1.0.1.an7.x86_64

  • 3.10.0-1160.62.1.0.1.an7.x86_64

  • 3.10.0-1160.66.1.0.1.an7.x86_64

  • 3.10.0-1160.71.1.0.1.an7.x86_64

  • 3.10.0-1160.76.1.0.1.an7.x86_64

  • 3.10.0-1160.80.1.0.1.an7.x86_64

  • 3.10.0-1160.81.1.0.1.an7.x86_64

  • 3.10.0-1160.83.1.0.1.an7.x86_64

  • 3.10.0-1160.88.1.0.1.an7.x86_64

4.18.0 series

  • 4.18.0-305.an8.x86_64

  • 4.18.0-348.2.1.an8_4.x86_64

  • 4.18.0-348.12.2.an8.x86_64

  • 4.18.0-348.20.1.an8_5.x86_64

  • 4.18.0-348.23.1.an8_5.x86_64

  • 4.18.0-372.9.1.an8.x86_64

  • 4.18.0-372.16.1.an8_6.x86_64

  • 4.18.0-372.19.1.an8_6.x86_64

  • 4.18.0-372.26.1.an8_6.x86_64

  • 4.18.0-372.32.1.an8_6.x86_64

  • 4.18.0-425.13.1.0.1.an8.x86_64

  • 4.18.0-425.19.2.0.1.an8.x86_64

  • 4.18.0-477.13.1.0.1.an8.x86_64

  • 4.18.0-477.21.1.0.1.an8.x86_64

  • 4.18.0-477.27.1.0.1.an8.x86_64

  • 4.18.0-477.36.1.0.1.an8.x86_64

4.19.91 series

  • 4.19.91-24.8.an8.x86_64

  • 4.19.91-25.2.an7.x86_64

  • 4.19.91-25.7.an7.x86_64

  • 4.19.91-26.an7.x86_64

  • 4.19.91-26.4.an7.x86_64

  • 4.19.91-26.5.an7.x86_64

  • 4.19.91-26.6.an7.x86_64

  • 4.19.91-25.7.an8.x86_64

  • 4.19.91-25.8.an8.x86_64

  • 4.19.91-26.an8.x86_64

  • 4.19.91-26.1.an8.x86_64

  • 4.19.91-26.4.an8.x86_64

  • 4.19.91-26.5.an8.x86_64

  • 4.19.91-26.6.an8.x86_64

  • 4.19.91-27.an7.x86_64

  • 4.19.91-27.1.an7.x86_64

  • 4.19.91-27.4.an8.x86_64

  • 4.19.91-27.7.an7.x86_64

5.4.x series

  • 5.4.262-1.el8.elrepo.x86_64

5.10.134 series

  • 5.10.134-16.1.an8.x86_64

  • 5.10.134-15.2.an8.x86_64

  • 5.10.134-15.an8.x86_64

  • 5.10.134-14.1.an8.x86_64

  • 5.10.134-14.an8.x86_64

  • 5.10.134-13.1.an8.x86_64

  • 5.10.134-13.an8.x86_64

RHEL

Unlimited

2.6.32 series

  • 2.6.32-220.el6.x86_64

  • 2.6.32-279.el6.x86_64

  • 2.6.32-358.el6.x86_64

  • 2.6.32-431.el6.x86_64

  • 2.6.32-573.el6.x86_64

  • 2.6.32-696.el6.x86_64

  • 2.6.32-754.el6.x86_64

  • 2.6.32-754.9.1.el6.x86_64

  • 2.6.32-754.17.1.el6.x86_64

  • 2.6.32-754.35.1.el6.x86_64

3.10.0 series

  • 3.10.0-693.2.2.el7.x86_64

  • 3.10.0-862.el7.x86_64

  • 3.10.0-957.el7.x86_64

  • 3.10.0-1062.el7.x86_64

  • 3.10.0-1127.el7.x86_64

  • 3.10.0-1160.el7.x86_64

  • 3.10.0-1160.2.1.el7.x86_64

  • 3.10.0-1160.11.1.el7.x86_64

  • 3.10.0-1160.21.1.el7.x86_64

  • 3.10.0-1160.42.2.el7.x86_64

  • 3.10.0-1160.45.1.el7.x86_64

  • 3.10.0-1160.59.1.el7.x86_64

  • 3.10.0-1160.71.1.el7.x86_64

  • 3.10.0-1160.76.1.el7.x86_64

  • 3.10.0-1160.80.1.el7.x86_64

  • 3.10.0-1160.81.1.el7.x86_64

  • 3.10.0-1160.83.1.el7.x86_64

  • 3.10.0-1160.88.1.el7.x86_64

  • 3.10.0-1160.90.1.el7.x86_64

  • 3.10.0-1160.92.1.el7.x86_64

  • 3.10.0-1160.95.1.el7.x86_64

  • 3.10.0-1160.99.1.el7.x86_64

  • 3.10.0-1160.102.1.el7.x86_64

  • 3.10.0-1160.108.1.el7.x86_64

4.18.0 series

  • 4.18.0-80.el8.x86_64

  • 4.18.0-305.3.1.el8_4.x86_64

  • 4.18.0-348.2.1.el8_5.x86_64

  • 4.18.0-348.12.2.el8_5.x86_64

  • 4.18.0-372.9.1.el8.x86_64

  • 4.18.0-372.19.1.el8_6.x86_64

  • 4.18.0-425.19.2.el8_7.x86_64

  • 4.18.0-477.10.1.el8_8.x86_64

  • 4.18.0-477.13.1.el8_8.x86_64

  • 4.18.0-477.15.1.el8_8.x86_64

  • 4.18.0-477.21.1.el8_8.x86_64

  • 4.18.0-513.11.1.el8_9.x86_64

5.14.0 series

  • 5.14.0-284.11.1.el9_2.x86_64

Alibaba Cloud Linux (64-bit)

Unlimited

3.10.0 series

  • 3.10.0-1160.al7.1.x86_64

  • 3.10.0-1127.19.1.al7.1.x86_64

  • 3.10.0-1127.al7.1.x86_64

  • 3.10.0-1062.12.1.al7.1.x86_64

  • 3.10.0-1062.4.1.al7.1.x86_64

  • 3.10.0-514.2.3.al7.x86_64

4.4.95 series

  • 4.4.24-2.al7.x86_64

  • 4.4.95-1.al7.x86_64

  • 4.4.95-2.al7.x86_64

  • 4.4.95-3.al7.x86_64

4.19.x series

  • 4.19.24-7.al7.x86_64

  • 4.19.24-7.14.al7.x86_64

  • 4.19.24-9.al7.x86_64

  • 4.19.34-11.al7.x86_64

  • 4.19.36-12.al7.x86_64

  • 4.19.43-13.2.al7.x86_64

  • 4.19.57-15.1.al7.x86_64

  • 4.19.81-17.al7.x86_64

  • 4.19.81-17.1.al7.x86_64

  • 4.19.81-17.2.al7.x86_64

  • 4.19.91-18.al7.x86_64

  • 4.19.91-19.1.al7.x86_64

  • 4.19.91-19.2.al7.x86_64

  • 4.19.91-21.al7.x86_64

  • 4.19.91-21.2.al7.x86_64

  • 4.19.91-22.1.al7.x86_64

  • 4.19.91-22.2.al7.x86_64

  • 4.19.91-22.al7.x86_64

  • 4.19.91-22.fc.1.al7.x86_64

  • 4.19.91-23.al7.x86_64

  • 4.19.91-23.1.al7.x86_64

  • 4.19.91-24.al7.x86_64

  • 4.19.91-24.1.al7.x86_64

  • 4.19.91-25.al7.x86_64

  • 4.19.91-25.1.al7.x86_64

  • 4.19.91-25.3.al7.x86_64

  • 4.19.91-25.6.al7.x86_64

  • 4.19.91-25.7.al7.x86_64

  • 4.19.91-25.8.al7.x86_64

  • 4.19.91-26.al7.x86_64

  • 4.19.91-26.1.al7.x86_64

  • 4.19.91-26.2.al7.x86_64

  • 4.19.91-26.3.al7.x86_64

  • 4.19.91-26.4.al7.x86_64

  • 4.19.91-26.6.al7.x86_64

  • 4.19.91-26.5.al7.x86_64

  • 4.19.91-27.al7.x86_64

  • 4.19.91-27.1.al7.x86_64

  • 4.19.91-27.2.al7.x86_64

  • 4.19.91-27.3.al7.x86_64

  • 4.19.91-27.4.al7.x86_64

  • 4.19.91-27.5.al7.x86_64

  • 4.19.91-27.6.al7.x86_64

  • 4.19.91-27.7.al7.x86_64

5.10.x series

  • 5.10.23-5.al8.x86_64

  • 5.10.23-6.al8.x86_64

  • 5.10.23-6.1.al8.x86_64

  • 5.10.60-9.al8.x86_64

  • 5.10.84-10.2.al8.x86_64

  • 5.10.84-10.3.al8.x86_64

  • 5.10.84-10.4.al8.x86_64

  • 5.10.112-11.al8.x86_64

  • 5.10.112-11.1.al8.x86_64

  • 5.10.112-11.2.al8.x86_64

  • 5.10.134-12.al8.x86_64

  • 5.10.134-12.1.al8.x86_64

  • 5.10.134-12.2.al8.x86_64

  • 5.10.134-13.al8.x86_64

  • 5.10.134-13.1.al8.x86_64

  • 5.10.134-14.al8.x86_64

  • 5.10.134-14.1.al8.x86_64

  • 5.10.134-15.al8.x86_64

  • 5.10.134-15.1.al8.x86_64

  • 5.10.134-15.2.al8.x86_64

  • 5.10.134-16.al8.x86_64

  • 5.10.134-16.1.al8.x86_64

Oracle Linux

Unlimited

4.14.35 series

  • 4.14.35-2047.505.4.3.el7uek.x86_64

5.4.17 series

  • 5.4.17-2136.311.6.1.el8uek.x86_64

  • 5.4.17-2136.302.7.2.2.el8uek.x86_64

  • 5.4.17-2136.310.7.1.el8uek.x86_64

Step 1: Purchase the quota for web tamper proofing

Before you use web tamper proofing, make sure that the quota for web tamper proofing is sufficient within the current Alibaba Cloud account.

  1. Log on to the Security Center console. In the top navigation bar, select the region of the asset that you want to manage. You can select China or Outside China.

  2. In the left-side navigation pane, choose Protection Configuration > Host Protection > Web Tamper Proofing.

  3. Perform the following operations based on your business scenarios.

    No quota for web tamper proofing is purchased

    1. On the Web Tamper Proofing page, click Upgrade Now.

    2. Perform the following operations based on the edition of Security Center:

      • Basic edition:

        In the Select a product version panel, select an edition. On the Security Center page, configure the parameters such as the Edition and Protected Servers parameters. You must set the Web Tamper Proofing parameter to Yes and configure the Quota for Web Tamper Proofing parameter based on the number of servers for which you want to enable web tamper proofing.

        If you want to separately purchase web tamper proofing, set the Edition parameter to Value-added Plan. For more information about how to select an edition of Security Center and purchase other features, see Purchase Security Center.

      • Paid edition:

        In the Select a product version panel, click Upgrade. On the Upgrade page, set the Web Tamper Proofing parameter to Yes and configure the Quota for Web Tamper Proofing parameter based on the number of servers for which you want to enable web tamper proofing.

    3. Click Buy Now and complete the payment.

    The quota for web tamper proofing is purchased

    If the quota for web tamper proofing is 0 or insufficient, you can click Upgrade Now in the upper-right corner of the Tamper Protection page to purchase a sufficient quota for web tamper proofing.

Step 2: Enable web tamper proofing for servers

You can enable the web tamper proofing feature for servers on which the Security Center agent is installed. You can also specify multiple directories on a server for protection.

  1. The first time you use web tamper proofing, click Add Servers for Protection on the Web Tamper Proofing page.

    If this is not the first time that you use web tamper proofing, click the Management tab on the Web Tamper Proofing page and click Add Server.

  2. In the Add Servers for Protection panel, select the server for which you want to enable web tamper proofing from the server list and click Next.

  3. In the Add Directory step, configure the parameters and click Enable Protection.

    By default, the Whitelist Mode is used. In whitelist mode, you must specify the directories and formats of files that you want to protect. You can click Blacklist Mode to switch to the blacklist mode. In blacklist mode, you must specify the directory that you want to protect, and the subdirectories, formats of files, and files that do not require protection in the protected directory.

    • Whitelist Mode

      In whitelist mode, Security Center intercepts or generates an alert for modifications to the files of the specified formats in the protected directory.

      Parameter

      Description

      Protected Directory

      The server directory that you want to protect. After you specify a directory, Security Center determines whether to intercept modifications to the name, content, or attribute of the files in the directory based on the process whitelist and prevention mode that you specify.

      Enter a value in the /The name of the directory/ format. Example: /tmp/.

      Protected File Formats

      The formats of the files that you want to protect.

      You can select formats from the drop-down list. You can also enter formats that are not displayed in the drop-down list.

      Note

      All formats of files can be added for protection.

      Prevention Mode

      • Interception Mode: Security Center intercepts suspicious processes and abnormal file changes. This ensures the security of websites and files on your server.

      • Alert Mode: Security Center identifies suspicious processes and abnormal file changes and generates alerts.

        Important

        If the operating system or kernel version of your server is not supported by web tamper proofing, Security Center does not generate alerts. In this case, if you set Prevention Mode to Alert Mode, Security Center intercepts suspicious processes. For more information, see Supported versions of operating systems and kernels.

      Local Backup Directory

      The directory in which backup files of the protected directories are stored.

      By default, Security Center uses /usr/local/aegis/bak as the backup directory for Linux servers and C:\Program Files (x86)\Alibaba\Aegis\bak as the backup directory for Windows servers. You can change the default backup directories.

      Important

      If the operating system or kernel version of your server is not supported by web tamper proofing, you do not need to configure the Local Backup Directory parameter.Supported versions of operating systems and kernels

      Configuration example

      If you specify /tmp/ for Protected Directory, xml for Protected File Formats, and Interception Mode for Prevention Mode, Security Center intercepts the modifications to the XML files in the tmp directory.

    • Blacklist Mode

      In blacklist mode, Security Center does not intercept or generate alerts for modifications to the specified subdirectories, files of the specified formats, or specified files in the protected directory. Security Center intercepts and generates an alert for modifications to other subdirectories and files in the protected directory.

      For more information about how to configure the Protected Directory, Prevention Mode, and Local Backup Directory parameters, see Whitelist Mode.

      Parameter

      Description

      Excluded Sub-Directories

      The path to the subdirectories that do not require protection.

      Enter a value in the Subdirectory name/ format. Example: dir1/dir0/.

      Excluded File Formats

      The formats of the files that do not require protection.

      Excluded Files

      The files that do not require protection.

      Enter a value in the Subdirectory name/File name format. Example: dir2/file3.

      Important

      The Excluded Sub-Directories, Excluded File Formats, and Excluded Files parameters are evaluated by using a logical OR.

      Configuration example

      If you specify /tmp/ for Protected Directory, dir1/dir0/ for Excluded Sub-Directories, txt for Excluded File Formats, dir2/file3 for Excluded Files, and Interception Mode for Prevention Mode, the files in the dir1 subdirectory below dir0 in the tmp directory, TXT files in the tmp directory, or the file3 file in the dir2 subdirectory in the tmp directory can be modified. The modifications to other subdirectories and files in the tmp directory are intercepted by Security Center.

  4. Optional. On the Management tab of the Web Tamper Proofing page, find the server that you specify in the Add Servers for Protection panel and click Add Directory in the Actions column to add other directories for protection.

    You can click the image icon next to the server name to view the list of protected directories on the server. You can find a protected directory and click Modify in the Actions column to modify the parameter configurations.

  5. On the Management tab of the Web Tamper Proofing page, find the server that you specify in the Add Servers for Protection panel and click the 开关 icon in the Protection column to enable the web tamper proofing feature for the server.

    The first time you enable this feature for a server, the status in the Status column of the server changes to Initializing, and a progress bar appears. Wait until the feature is enabled. After this feature is enabled, the status of the server changes to Running.

    The following table describes the statuses that are available in the Status column.

    Status

    Description

    Suggestion

    Initializing

    Web tamper proofing is being initialized.

    The first time you enable web tamper proofing for a server, the status is Initializing. Wait until web tamper proofing is enabled.

    Running

    Web tamper proofing is enabled and runs as expected.

    None.

    Exception

    An error occurred during the initialization of web tamper proofing.

    Move the pointer over Exception, view the causes, and then click Retry.

    Not Initialized

    The switch in the Protection column is turned off.

    Turn on the switch in the Protection column.

Step 3: View the protection status

On the Protection tab of the Web Tamper Proofing page, view the details of the protection status.

  • The overview statistics on web tamper proofing, and the statistics on the top 5 protected files and top 5 blocked processes in the last 15 days

    image

  • Details of alerts triggered by web tamper proofing

    The alert list displays all alerts that are generated for abnormal file changes on your server regardless of whether the alerts are generated in Interception Mode or Alert Mode. You can view the details of an alert, including the severity level, alert name, affected assets, file path, process name, and protection status. The severity level is Medium.

    • List of Handled alerts

      By default, alerts that are generated in Interception Mode are displayed, and the status of the alerts is Defended. This indicates that the web tamper proofing feature detects abnormal file changes and then intercepts the processes that modify files.

      image

    • List of Unhandled alerts

      Alerts that are generated in Alert Mode are displayed, and the default status of the alerts is Unhandled. This indicates that the web tamper proofing feature generates alerts for suspicious processes and abnormal file changes.

      image

    If an intercepted process that modifies files or the process that modifies files and then triggers an alert is required by your workloads, you can add the process to the whitelist to allow the process. After you add a process for which an alert is generated to the whitelist, the status of the alert changes to Added to Whitelist, and the alert is added to the Handled alert list. For more information, see (Optional) Add a process to the whitelist.

    Important

    If an alert is reported more than 100 times or the number of times that a process writes on files exceeds 100, we recommend that you handle the alert at the earliest opportunity.

(Optional) Add a process to the whitelist

If you confirm that the process that modifies the protected files on your server is normal and want the process to modify the files, you can add the process to the whitelist.

Important
  • You can add a process to the process whitelist only if the operating system and kernel versions of your server are supported by the whitelist feature. For more information, see Supported versions of operating systems and kernels.

  • Attackers may exploit the processes in the whitelist to compromise your server. We recommend that you add only trusted processes to the whitelist.

On the Protection tab of the Web Tamper Proofing page, add a normal process to the whitelist.

Add a process for which an alert is generated to the whitelist

  1. In the Unhandled alert list, find a process that you want to add to the whitelist and click Handle in the Actions column.

  2. In the dialog box that appears, set the Handling Method parameter to Add to Whitelist and click Process Now.

    A process may run on multiple servers or run in multiple directories on the same server. If you want to add the process to the whitelist, select Process servers with the same process at the same time.

You can also find alerts generated for processes that modify files in the Handled alert list and add an alert whose status is Defended to the whitelist. You can view process paths to check whether a process is normal.

Add multiple processes for which alerts are generated to the whitelist at the same time

  1. In the alert event list on the Protection tab, find and select the processes that you want to add to the whitelist.

  2. Click Add to Whitelist below the list. In the message that appears, click OK.

Specify processes in the process whitelist

  1. Click the number below Number of blocked processes or Whitelist to go to the Process Management panel.

    image

  2. Click Enter the Whitelist in the upper-right corner. Then, configure the Process Path and Server Name/IP parameters to add multiple processes to the process whitelist.

View the processes in the whitelist or remove processes from the whitelist

  1. Click the number below Whitelist to go to the Process Management panel. In the Process Management panel, you can view the information about all suspicious processes that are added to the whitelist. The information includes the server on which the processes run, the paths to the processes, and the numbers of times that the processes modify files.

  2. In the Process Management panel, find the suspicious process that you want to remove and click Remove from Whitelist in the Actions column. You can also select multiple suspicious processes and click Remove from Whitelist below the list to remove the processes from the whitelist at a time.

FAQ