This document describes how to use the Anti-Unusual Login feature.
Overview
When log-in behaviors from a server do not meet the allowlist criteria (common source IP, common username, common log-in location, and common log-in time), an unusual log-in alarm will be generated. If the source IP of the unusual log-in is an overseas IP (including Hong Kong (China), Macao (China), and Taiwan (China)) or a malicious IP from threat intelligence, it will be marked as High-risk. Otherwise, it will be marked as Suspicious.
Important Notes
Hosts with CWPP agent installed (client online) will have unusual log-in behaviors monitored in real-time.
The CWPP console only retains the unusual login events for the last 6 months, and the event data generated 6 months ago is not displayed.
Operation Guide
2. Click Intrusion Detection > Unusual Login on the left sidebar. The fields and operations related to the feature are described as follows.
Event List
In the Event List, you can view and handle unusual login risks detected by CWPP.
Field description:
Server IP/Name: The target server of the unusual login attempt.
Source IP: Source IP of the unusual login attempt, which generally is an egress IP of a company's network or a proxy IP.
Source Location: The location where the login source IP is located.
Login Username: The username used by the user who successfully logged in to the server.
Login Time: The time when the user successfully logged in to the server (The time shown on the server).
Threat Level: Suspicious/High.
Status
Unusual Login: A login attempt from an unusual location, with an unusual user name, at an unusual time, or from an unusual IP.
Allowlisted: The login source has been added to the allowlist (login source IP, login username, login time, and usual login location).
Handled: The event has been handled manually and marked as Handled.
Ignored: This alarm event has been ignored.
Operation
Actions
Mark as processed: If the event has been handled manually, mark the event as "Handled".
Add to Allowlist: Once an event is added to the allowlist, no alarm will be sent if the same event occurs again.
Ignore: Only ignore this alarm event. If the same event occurs again, an alarm will be sent again.
Delete Record: Once deleted, the event record will no longer be displayed on the console and cannot be recovered.
Allowlist Management
In Allowlist Management, you can add/delete items to/from the allowlist of unusual logins, or check and edit the allowlist.
Field description:
Server IP/Name: The server on which the allowlist takes effect.
Source IP: The source IP added to the allowlist.
Usual Login Location: The login location added to the allowlist.
Login Username: The username added to the allowlist.
Login Time: The login time added to the allowlist.
Creation time: The time when the allowlist was created.
Update time: The time when the allowlist was last updated.
Operation
Edit: Re-edit the login source IP, login username, login time, usual login location, covered servers, etc.
Delete: Delete items from the allowlist.
FAQs
How to Process Unusual Log-in Alarms?
Determine whether the log-in behavior is self-initiated.
If it is your own log-in behavior and you do not want to see the alarm again, click Processing , and select Add to allowlist to configure common log-in source IP, log-in username, log-in location, log-in time, and effective range.
Field Description:
Empty Log-in Source IP: Indicates that log-in attempts from any source IP to the server will not trigger an alarm.
Empty Log-in Username: Indicates that log-in attempts with any username to the server will not trigger an alarm.
Empty Log-in Location: Indicates that log-in attempts from any location will not trigger an alarm.
Empty Log-in Time: Indicates that log-in attempts at any time will not trigger an alarm.
Note:
Log-in source IP, log-in username, log-in location, and log-in time cannot be empty at the same time.
If the log-in behavior is not from you, immediately change the server log-in password (it is recommended to be more than 10 characters, including uppercase and lowercase letters and special characters for a strong password.).
The server has been logged in abnormally, and the intruder might have already intruded your server and left malicious files. It is recommended to immediately perform malicious file scan, vulnerability detection, baseline detection to enhance your server's security. How to Set an Allowlist to Meet Most Users' Needs?
Scenario 1: The source IP is a fixed IP segment. Users using any username can log in to the server from this segment without triggering abnormal log-in alarms.
You can enter the IP segment in the log-in source IP and select the effective server range.
Scenario 2: The source IP is dynamic. Users from any location within Hong Kong (China) can log in to the server at any time using any username without triggering abnormal log-in alarms.
Select Hong Kong (China) Special Administrative Region in the list of common log-in locations and select the effective server range.
Note:
Combinations of log-in conditions are supported.
How to Disable Abnormal Log-in Alarms?
Go to alert settings to turn off the abnormal log-in alarm switch. If you keep the alarm switch on, it is recommended to select the high-risk option to only alarm on high-risk abnormal log-in behaviors.
Was this page helpful?