The feature of web tamper proofing can monitor website directories in real time and
restore tampered files or directories by using backups. The feature can also protect
important website information from being tampered with and prevent trojans, hidden
links, and uploads of violent and illicit content. This topic describes how to use
the feature of web tamper proofing.
Background information
To make illegal profits or launch business attacks, attackers exploit vulnerabilities
in websites to insert illegal hidden links and tamper with the websites. Tampered
web pages affect normal user access and may cause serious economic loss, damaged brand
reputation, and political risks.
The Security Center agent automatically collects information about the processes that
modify files in the protected directories of protected servers. The agent identifies
suspicious processes and file changes in real time and generates alerts for or intercepts
the suspicious processes that cause file changes.
Billing
Web tamper proofing is a value-added feature of Security Center. You must separately
purchase and enable the feature. For more information about how to enable web tamper
proofing, see Purchase web tamper proofing.
For more information about the billing of web tamper proofing, see Billing.
Limits on versions of operating systems and kernels
Web tamper proofing requires that your servers run specific versions of operating
systems and kernels. If the versions of operating systems and kernels of your servers
are not supported, the process whitelist does not take effect, and you cannot enable
the alerting mode of web tamper proofing.
- If the operating system and kernel versions of the servers that you want to protect
are supported by web tamper proofing, take note of the following items. For more information,
see Limits on versions of operating systems and kernels.
- The maximum number of directories that you can add for protection is 10 for each server.
- The maximum length of the full path to each protected file or directory is 1,000 characters.
- If the operating system or kernel versions of the server that you want to protect
are not supported by web tamper proofing, take note of the following items. For more
information, see Limits on versions of operating systems and kernels.
- The maximum number of directories that you can add for protection is 10 for each server.
- The maximum size of each protected directory is 20 GB.
- The maximum number of folders in each protected directory is 20,000.
- The maximum number of folder levels in each protected directory is 20.
- The maximum size of each protected file is 20 GB.
- The process whitelist does not take effect.
- You cannot set Prevention Mode to Alert Mode.
- The paths to the Network File System (NFS) cannot be protected.
Purchase web tamper proofing
- Log on to the Security Center console.In the left-side navigation pane, choose .
- On the Tamper Protection page, click Upgrade Now. In the Select a product version panel, click Upgrade. On the Upgrade/Downgrade page, set Web Tamper Protection to Yes and set Quota for Web Tamper Proofing to the number of the servers that you want to protect.
Note The value of Protected Servers on the Upgrade/Downgrade page specifies the number of the servers that are added to Security Center. You can
specify a value for Quota for Web Tamper Proofing based on the value of Protected Servers.
- Click Buy Now and complete the payment.
Enable web tamper proofing for a server
If the quota for web tamper proofing is exhausted, you can no longer enable web tamper
proofing for a server. Before you enable web tamper proofing, make sure that the quota
for web tamper proofing is sufficient within your Alibaba Cloud account. To purchase
the sufficient quota for web tamper proofing, click Upgrade Now in the upper-right corner of the Tamper Protection page.
- Log on to the Security Center console.In the left-side navigation pane, choose .
- On the Management tab of the Tamper Protection page, click Add Server.
- In the Add Servers for Protection panel, select the server for which you want to enable web tamper proofing from the
server list and click Next.
- In the Add Directory step, configure the parameters and click Enable Protection.
- Whitelist Mode
In whitelist mode, Security Center intercepts the modifications to the files of the
specified formats in the protected directory or generates an alert for the modifications.
Parameter |
Description |
Protected Directory |
The server directory that you want to protect. After you specify a directory, Security
Center determines whether to intercept the changes on the name, content, or attribute
of the files in the directory based on the process whitelist and prevention mode that
you specify.
Enter a value in the /The name of the directory/ format. Example: /tmp/ .
|
Protected File Formats |
The formats of the files that you want to protect.
You can select formats from the drop-down list. You can also enter formats that are
not displayed in the drop-down list.
|
Prevention Mode |
- Interception Mode: Security Center intercepts suspicious processes and suspicious modifications to
files. This ensures the security of websites and files on your server.
- Alert Mode: Security Center identifies suspicious processes and file changes and generates alerts
for the identified suspicious processes and file changes.
Important If the operating system or kernel version of your server is not supported by web tamper
proofing, Security Center does not generate alerts. In this case, if you set Prevention
Mode to Alert Mode, Security Center intercepts suspicious processes. For more information about the
supported operating systems and kernel versions, see Limits on versions of operating systems and kernels.
|
Local Backup Directory |
The default directory in which the backup files of the protected directories are stored.
By default, Security Center assigns /usr/local/aegis/bak as the backup directory for Linux servers and C:\Program Files (x86)\Alibaba\Aegis\bak as the backup directory for a Windows server. You can change the default backup directories.
|
Example
If you specify /tmp/
for Protected Directory, xml for Protected File Formats, and Interception Mode for Prevention Mode, Security Center intercepts the modifications to the XML files in the tmp directory.
- Blacklist Mode
In blacklist mode, Security Center does not intercept the modifications to the specified
subdirectories, files of the specified formats, or specified files in the protected
directory or generate alerts for the modifications. Security Center intercepts the
modifications to other subdirectories and files in the protected directory and generates
an alert for the modifications.
Parameter |
Description |
Protected Directory |
The server directory that you want to protect. After you specify a directory, Security
Center determines whether to intercept the changes on the name, content, or attribute
of the files in the directory based on the process whitelist and prevention mode that
you specify. Enter a value in the /The name of the directory/ format. Example: /tmp/ .
|
Excluded Sub-Directories |
The path to the subdirectories that do not require protection.
Enter a value in the Subdirectory name/ format. Example: dir1/dir0/ .
|
Excluded File Formats |
The formats of the files that do not require protection. |
Excluded Files |
The files that do not require protection.
Enter a value in the Subdirectory name/File name format. Example: dir2/file3 .
|
Prevention Mode |
- Interception Mode: Security Center intercepts suspicious processes and suspicious modifications to
files. This ensures the security of websites and files on your server.
- Alert Mode: Security Center identifies suspicious processes and file changes and generates alerts
for the identified suspicious processes and file changes.
Important If the operating system or kernel version of your server is not supported by web tamper
proofing, Security Center does not generate alerts. In this case, if you set Prevention
Mode to Alert Mode, Security Center intercepts suspicious processes. For more information about the
supported operating systems and kernel versions, see Limits on versions of operating systems and kernels.
|
Local Backup Directory |
The default directory in which the backup files of the protected directories are stored.
By default, Security Center assigns /usr/local/aegis/bak as the backup directory for Linux servers and C:\Program Files (x86)\Alibaba\Aegis\bak as the backup directory for a Windows server. You can change the default backup directories.
|
Important Excluded Sub-Directories, Excluded File Formats, and Excluded Files are evaluated by using a logical OR.
Example
If you specify /tmp/
for Protected Directory, dir1/dir0/
for Excluded Sub-Directories, txt for Excluded File Formats, dir2/file3
for Excluded Files, and Interception Mode for Prevention Mode, only the files in the dir1
subdirectory below dir0
in the tmp directory, TXT files in the tmp directory, or the file3
file in the dir2
subdirectory in the tmp directory can be modified. The modifications to other subdirectories
and files in the tmp directory are intercepted by Security Center.
- On the Management tab of the Tamper Protection page, find the server that you specify in the Add Servers for Protection panel and
click the
icon in the Protection column to enable web tamper proofing for the server. If this is the first time that you enable this feature for a server, the status in
the
Status column of the server changes to
Initializing, and a progress bar appears. Web tamper proofing is enabled in a few seconds. After
the feature is enabled, the status changes to
Running.
The following table describes the statuses that are available in the Status column.
Status |
Description |
Suggestion |
Initializing |
Web tamper proofing is being initialized. |
The first time you enable web tamper proofing for a server, the status is Initializing. Wait until web tamper proofing is enabled.
|
Running |
Web tamper proofing is enabled and runs as expected. |
None. |
Exception |
An error occurred during the initialization of web tamper proofing. |
Move the pointer over Exception, view the causes, and then click Retry.
|
Not Initiated |
The switch in the Protection column is turned off. |
Turn on the switch in the Protection column.
|
View the details on the Protection tab
- Log on to the Security Center console.In the left-side navigation pane, choose .
- On the Protection tab of the Tamper Protection page, view the details.
- Statistical items
In the statistics overview module, you can view the total numbers of modified files
on the current day and in the last 15 days, the numbers of protected servers and directories,
the number of suspicious processes that are intercepted by web tamper proofing, the
number of processes that are added to the whitelist, and the purchased quota for web
tamper proofing within your Alibaba Cloud account.
- Distribution of protected file formats
Protected file formats include TXT, PNG, MSI, and ZIP. You can also add more formats
for protection based on your business requirements.
Note All formats of files can be added for protection.
- Top five file changes
This section shows the top five files that are most frequently modified in descending
order in the last 15 days. You can view the names of the files and paths to the files.
- Top five suspicious processes that are blocked
This section shows the top five suspicious processes that are most frequently intercepted
in descending order in the last 15 days. You can view the names of the processes and
the number of processes.
- Details of alerts triggered by web tamper proofing
Web tamper proofing helps you intercept all suspicious modifications to the files
on your server. In the alert list, you can view the details about alerts for these
modifications. The details include the severity level, alert name, affected assets,
path to the modified files, process name, and protection status.
Note
- If an alert is reported more than 100 times or the number of times that a process
writes on files exceeds 100, we recommend that you handle the alert at your earliest
opportunity.
- The severity level of alerts is Medium.
- The status of alerts is Defended. The alerts are triggered when web tamper proofing intercepts suspicious processes
that modify files without authorization. If an intercepted process is required in your workloads, you can add the process to
the whitelist to allow the process. For more information, see Add a process to the whitelist.
Add a process to the whitelist
If web tamper proofing detects that a process modifies the files that are protected,
web tamper proofing intercepts the process. If you confirm that the process is normal
and want the process to modify the files, you can add the process to the whitelist.
- Log on to the Security Center console.In the left-side navigation pane, choose .
- On the Protection tab of the Tamper Protection page, add a normal process to the whitelist.
Important Attackers may exploit the processes in the whitelist to compromise your server. We
recommend that you add processes to the whitelist only if the processes are trusted.
- Add a process for which an alert event is generated to the whitelist
- In the alert event list of the Protection tab, find a process that you want to add
to the whitelist and click Handle in the Actions column.
- In the dialog box that appears, select Whitelist for Process Method and click OK.
A process may run on multiple servers or run in multiple directories on the same server.
If you want to add the process to the whitelist, select Process servers with the same process at the same time.
- Add multiple processes for which alert events are generated to the whitelist at a
time
- In the alert event list on the Protection tab, find and select the processes that
you want to add to the whitelist.
- Click Whitelist below the list. In the message that appears, click OK.
You can click the number below
Whitelist to go to the
Process Management panel. In the upper-right corner of the panel, click
Enter the whitelist. In the dialog box that appears, configure
Process Path and
Server Name/IP to add multiple suspicious processes to the whitelist at a time.

- View the processes in the whitelist or remove processes from the whitelist
You can click the number below Whitelist to go to the Process Management panel. In the Process Management panel, you can view the information about the suspicious
processes that are added to the whitelist. The information includes the server on
which the processes run, the paths to the processes, and the numbers of times that
the processes change files.
In the Process Management panel, you can find the suspicious process that you want
to remove and click Cancel whitelist in the Actions column. You can also select multiple suspicious processes and click Cancel whitelist below the list to remove the processes from the whitelist at a time.