Skip to Content

Login Security - Remote Login

The remote login security detection can detect the source IP of each login attempt, record the source address, country, province, and city, and audit legitimate and illegitimate login attempts by combining with a whitelist.

Detection Principle

After installing the Agent, the first login location will be set as the usual login location by default, and it will start monitoring login security logs. The new logs will be uploaded to the cloud for storage. If a login from a location different from the first login is detected, it will be marked as a remote login, triggering an event alert.

Detection Cycle

  • Real-time detection: An alert will be triggered immediately once a remote login (from an IP address not on the whitelist) is detected.
  • Real-time logging: New login logs are uploaded to the cloud storage in real-time. The logs are retained for 6 months and will be deleted after expiration.

Detection Items

Detection ItemDescription
Remote LoginRefers to login attempts from an uncommon location