Personal Information | Use |
Client Protected Resource Information: For protection of Tencent Cloud servers: APPID, UIN, your servers information (name, IP address, type, OS, agent version, agent installment date, time of last login, online status, installed components, and security level) For protection of non-Tencent Cloud servers: resource monitoring, account, port, software application, process, database, web application, web service, web framework, web site, jar package, startup service, scheduled task, environment variables, kernel module | We only process this data for the purposes of providing the Feature to you. Please note that unless authorized by you, we have no access to the personal data, if any, stored in the database or control over the data. Please note that this data is stored and backed up in our TencentDB for MySQL (MySQL) feature. |
Security Incident Information: For the free subscription of the Feature: Intrusion detection information: events such as client server abnormal login, password cracking; information regarding the relevant events (server UUID, event details, threat level, and processing status). For the paid subscription of the Feature, the following are additionally processed: Detection information on servers’ security holes: UUID of affected servers, name and descriptions of detected security holes, current status, date and time of the latest detection; Security baseline information: UUID of servers, name of security baseline, detection type, security threat levels, current status, date and time of the latest detection; Security report of the servers: total number of logged client abnormal login, vulnerability scanning results, password cracking, and malicious file scanning; numbers and types of purchased subscriptions of the Feature by you. | We only process this data for the purposes of providing the Feature to you. We may also anonymize and de-identify certain security incident information to improve the Feature. Please note that this data is stored and backed up in our MySQL feature. |
Client Configuration Data: Detection configuration of vulnerabilities/baselines/files: regular detection settings, ignored vulnerabilities/baselines, trusted files, quarantined files; Whitelist configuration of intrusion prevention functions: whitelist conditions, covered servers; Other configurations: automatic protection upgrade settings, automatic renewal settings, and alarm settings. | We only process this data for the purposes of providing the Feature to you in accordance to your specific configuration. Please note that this data is stored and backed up in our MySQL feature. |
Personal Information | Retention Policy |
Client Protected Resource Information Security Incident Information Client Configuration Data | We retain such data until you manually delete such data. Otherwise, when you terminate your subscription for the Feature or delete your account, we will delete such data within 7 days. |
Was this page helpful?