This section provides answers to the frequently asked questions about management for Server Security Defender.
What Are the Commands to Start, Stop, and Restart the Agent?
In Linux, go to the /titan/agent directory and run the following commands:
Stop the agent: . /titanagent -s
Start the agent: . /titanagent -d
Uninstall the agent: bash install_agent.sh disclean_agent.sh
In Windows, open the Service Manager, find Titan Agent Service for Windows, and then right-click the service to start, stop, or restart the agent on a host, as shown in the following figure:
Is the Intrusion Detection Feature Available in a Non-Bash Environment?
Only the suspicious operation detection feature is related to the Bash environment. Therefore, only this feature in intrusion detection may be affected in a non-Bash environment.
What Is the Difference Between Quarantine and Deletion in Backdoor Detection?
For quarantine, the system backs up the files to the quarantine directory in the agent installation directory and encrypts them (AES encryption algorithm) to prevent them from running again, and then deletes the backdoor in the original path. Therefore, the quarantined files can be restored by sending a restore command through the agent. However, for deletion, the original files are deleted without backup. Therefore, the deleted files cannot be restored and the delete operation has certain risks.
Will Clicking Other Pages Interrupt the Scan Task When the Risk Scan Task Takes a Long Time?
Clicking other pages during scanning will not interrupt the scan task.
Why Is the Audit Feature Not Displayed on the Front-end Page Although It Functions Properly?
Check whether the time on the server where the agent is installed is the same as the standard time.
How Is the Accuracy of Vulnerability Detection Ensured?
The vulnerabilities are detected in two ways: version comparison and proof of concept (POC) verification.
(1) Version comparison: compares the vulnerability version of the application with its package installation version and the process version.
(2) POC verification: analyzes vulnerabilities one by one. Verification scripts are created based on the principles of vulnerabilities to detect each vulnerability.
Can I monitor and protect the hosts in the internal network?
Yes, you can monitor and protect them.You can set the proxy server when you install the agent.