All Products
Search
Document Center

Cloud Firewall:Best practices for system security defense

Last Updated:Mar 31, 2026

Out-of-the-box server configurations are rarely secure. Unnecessary open ports, weak passwords, and missing patches each create an entry point that attackers can exploit — often automatically, at scale. Cloud Firewall's intrusion prevention system (IPS), Basic Protection, and Virtual Patching work together to close these gaps before they become incidents.

Common attack vectors

Modern attacks exploit two categories of weakness:

Improper system configurations

WeaknessRisk
Unnecessary open portsExpands the attack surface
Weak passwordsVulnerable to brute-force attacks
Missing security policiesLeaves the system with no baseline defense

Unpatched vulnerabilities

WeaknessRisk
Command execution vulnerabilityAllows arbitrary remote code execution
DoS vulnerabilityDisrupts normal service requests
Data breach vulnerabilityExposes sensitive or confidential data

Real-world cases

The following CVEs show how unpatched vulnerabilities lead to serious compromise.

Case 1: RCE in Samba (CVE-2017-7494)

Samba implements the Server Message Block (SMB) protocol on Linux and UNIX, enabling file and printer sharing. This vulnerability lets a client upload a library file to a writable shared directory and force the server to load and execute it.

Affected versions: Samba 4.4.14, 4.5.10, and 4.6.4 on Linux and UNIX.

ImpactDescription
Command executionRemote code execution compromises the server and causes data breaches
Service disruptionSambaCry, a worm that exploits this CVE, mines cryptocurrency on compromised servers, consuming compute resources and degrading service availability

Case 2: RCE in Windows SMB server (CVE-2017-0143)

The SMB server is a protocol component installed by default on Windows. This vulnerability allows an attacker to send specially crafted packets to an SMBv1 server and execute code remotely.

Affected versions: Windows Server 2008 SP2, 2008 R2 SP1, 2012 Gold, 2012 R2, and 2016.

ImpactDescription
Command executionRemote code execution compromises the server and causes data breaches
Data lossWannaCry and similar worms exploit this CVE to encrypt files, causing data loss and breaches

How Cloud Firewall protects against these threats

The Alibaba Cloud security team continuously tracks system vulnerabilities and translates that research into prevention rules. Cloud Firewall provides layered protection across three threat categories:

ThreatProtection mechanism
Brute-force attacksThreat intelligence detects network-wide attack patterns and blocks scans and intrusion attempts proactively
OS vulnerabilities (including Samba RCE, SMB RCE)Virtual Patching shields systems from high-risk OS vulnerabilities
Other intrusions (reverse shells, system file tampering)Basic Protection detects and blocks these attacks in real time

Prerequisites

Before you begin, ensure that you have:

  • An Alibaba Cloud account with access to Cloud Firewall console

  • Cloud Firewall activated and protecting your assets

Enable intrusion prevention

Step 1: Set the threat engine to Block mode

  1. Log on to the Cloud Firewall console.

  2. In the left-side navigation pane, choose Prevention Configuration > IPS Configuration.

  3. Click the Internet Border tab.

  4. For Threat Engine Mode, select a Block mode level.

Step 2: Turn on Basic Protection

On the Basic Protection tab, turn on Basic Protection.

image

Step 3: Turn on Virtual Patching

On the Virtual Patching tab, turn on Virtual Patching.

image

With all three controls enabled, Cloud Firewall defends against brute-force attacks, known OS vulnerabilities, and active intrusion attempts across your internet-facing assets.