tencent cloud

Cloud Workload Protection Platform

Release Notes and Announcements
Release Notes
Announcements
Getting Started
Product Introduction
Overview
Advantages
Basic Concepts
Scenarios
Associated Products
Features in Different Editions
Purchase Guide
Purchase Security Protection Licenses
Purchasing Log Analysis Service
Quick Start
Operation Guide
Security Dashboard
Asset Overview
Server List
Asset Fingerprint
Vulnerability Management
Baseline Management
Malicious File Scan
Unusual Login
Password Cracking
Malicious Requests
High-risk Commands
Local Privilege Escalation
Reverse Shell
Java Webshell
Critical File Monitor
Network Attack
A Ransomware Defense
Log Analysis
License Management
Alarm Setting
Cloud Access Management
Hybrid Cloud Installation Guide
FAQs for Beginners
Cloud Workload Protection Description
Feature Description
Agent Process Description
A Security Baseline Detection List
Parsing of JSON Format Alarm Data
Log Field Data Parsing
Agent Installation Guide
Security Score Overview
Practical Tutorial
Auto Fix of Vulnerabilities
Malicious File Processing
Troubleshooting
Intrusions on Linux
Intrusions on Windows
Offline Agent on Linux
Offline Agent on Windows
An Abnormal Log-in Notification
API Documentation
History
Introduction
API Category
Asset Management APIs
Virus Scanning APIs
Abnormal Log-in APIs
Password Cracking APIs
Malicious Request APIs
High-Risk Command APIs
Local Privilege Escalation APIs
Reverse Shell APIs
Vulnerability Management APIs
New Baseline Management APIs
Baseline Management APIs
Advanced Defense APIs
Security Operation APIs
Expert Service APIs
Other APIs
Overview Statistics APIs
Settings Center APIs
Making API Requests
Intrusion Detection APIs
Data Types
Error Codes
FAQs
Agreements
Terms of Service
Service Level Agreement
Data Processing And Security Agreement
Contact Us
Glossary

Scenarios

PDF
Focus Mode
Font Size
Last updated: 2023-12-26 16:18:14
This document describes the common use cases of CWPP.

Scenarios

When your server is compromised, you will face the following security risks:
Business interruption: Databases and files are tampered with or deleted, resulting in inaccessible services and system paralysis.
Data theft: Hackers steal your data and sell it publicly, leading to customer privacy leaks, and thus causing customer churn and damage to your brand image.
File encryption by ransomware: Hackers intrude into your server and implant irreversible ransomware to encrypt your data for ransom.
Service instability: Hackers run mining programs and DDoS Trojans on your server to gain financial benefits, which consumes a large amount of system resources, thus causing the failure of the server to provide services.
CWPP can effectively prevent the above problems and ensure the security of your servers.

Help and Support

Was this page helpful?

Help us improve! Rate your documentation experience in 5 mins.

Feedback