Edition | Personal Information | Use |
Anti-DDoS Advanced | Forwarding Configuration Data: Forwarding configuration information (access service domain name, return source target source, access protocol/port, return source target source).
Alarm Data: Alarm configuration data.
Strategy Configuration Data: DDoS security policy configuration (IP blocklist/allowlist, port filtering, protocol blocking, watermarking protection, connection class attack protection, AI protection, zone blocking, IP port speed limiting, feature filtering), CC security policy configuration (zone blocking, IP blocklist/allowlist, precision protection, CC frequency control restriction, intelligent CC protection). | We only process this data for the purposes of providing the Feature to you, in accordance with your specific configuration. |
| Attack Analysis Data: attack name, attacked asset, attack source IP address, attack type, attack time, attack duration, attack peak, instance ID, defense type, attack status and sample analysis package download. Business Analysis Data: business traffic bandwidth, business packet rate, peak inbound traffic, peak outbound traffic, active connections, new connections, peak active connections, peak inactive connections and IP address used for business access. | We only process this data for the purposes of providing the Feature to you to enable you to analyze and understand security events. |
Anti-DDoS Pro | Binding Data: Binding relation data in respect of the configuration | We only process this data for the purposes of providing the Feature to you to assist you in determining the effective scope of your security policies. |
| Alarm Data: Alarm configuration data. Strategy Configuration Data: DDoS security policy configuration (IP blocklist/allowlist, port filtering, protocol blocking, watermarking protection, connection class attack protection, AI protection, zone blocking, IP port speed limiting, feature filtering), CC security policy configuration (zone blocking, IP blocklist/allowlist, precision protection, CC frequency control restriction, intelligent CC protection). | We only process this data for the purposes of providing the Feature to you, in accordance with your specific configuration. |
| Attack Analysis Data: attack name, attacked asset, attack source IP address, attack type, attack time, attack duration, attack peak, instance ID, defense type, attack status and sample analysis package download. Business Analysis Data: business traffic bandwidth, business packet rate, peak inbound traffic, peak outbound traffic, active connections, new connections, peak active connections, peak inactive connections and IP address used for business access. | We only process this data for the purposes of providing the Feature to you to enable you to analyze and understand security events. |
Edition | Personal Information | Retention Policy |
Anti-DDoS Advanced | Forwarding Configuration Data | Stored for a minimum of 180 days and retained for as long as you use the Feature. When your use of the Feature is terminated, we will delete this data after 7 days. |
| Alarm Data Strategy Configuration Data Business Analysis Data | We store this for as long as you use the Feature. When your use of the Feature is terminated, we will delete this data after 7 days. |
| Attack Analysis Data | Stored for a maximum of 1 year. |
Anti-DDoS Pro | Binding Data Alarm Data Strategy Configuration Data Business Analysis Data | Stored for a minimum of 180 days and retained for as long as you use the Feature. When your use of the Feature is terminated, we will delete this data after 7 days. We store this for as long as you use the Feature. When your use of the Feature is terminated, we will delete this data after 7 days. |
| Attack Analysis Data | Stored for a maximum of 1 year. |
本页内容是否解决了您的问题?