Value-added | services, | agent | maintenance | standard | service, | agent | maintenance | professional | service | ||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
As a high-quality value-added telecom service operator in China, Jiaolong Cloud is committed to providing customers with stronger product support and better services. We carefully prepare the following value-added services for you", | 5,000 | yuan/year, | 10,000 | yuan/year | pay | ||||||||||||
,,2000 | yuan/time,3000 | yuan/time | |||||||||||||||
System | security | management, | system | security | operation | planning,√,√ | |||||||||||
,System | operation | authority | management,√,√ | ||||||||||||||
,System | user | rights | management,√,√ | ||||||||||||||
,System | port | management,√,√ | |||||||||||||||
,Virus, | Trojan | killing | and | prevention,√,√ | |||||||||||||
,system | patch | update,√,√ | |||||||||||||||
web | security | management, | web | service | installation,√,√ | ||||||||||||
(Only | supports | IIS | service | type, | web | rights | management, | √, | √ | ||||||||
!ERROR! A12 -> Formula Error: Unexpected operator '<' | !ERROR! B12 -> Formula Error: Unexpected operator '<' | web | site | log | setting | and | backup, | √, | √ | ||||||||
,Web | program | error | handling: | ,√,√ | |||||||||||||
, | Web | site | operation | error | analysis, | provide | solutions. | ,√,√ | |||||||||
, | If | you | need | to | solve | it | on | your | behalf, | an | additional | fee | will | be | charged. | ,√,√ | |
,web | program | security | check: | ,√,√ | |||||||||||||
,Scan | for | vulnerabilities | and | injection | points, | and | provide | solutions. | ,√,√ | ||||||||
, | If | you | need | to | solve | it | on | your | behalf, | an | additional | fee | will | be | charged. | ,√,√ | |
,Site | access | control: | ,√,√ | ||||||||||||||
, | According | to | customer | needs, | different | access | sources | can | access | different | directory | settings. | ,√,√ | ||||
,web | program | backup,√,√ | |||||||||||||||
FTP | application | security | management, | installation | of | FTP | service | software,√,√ | |||||||||
,ftp | authority | management,√,√ | |||||||||||||||
,ftp | access | log | setting | and | backup,√,√ | ||||||||||||
,ftp | user | access | control,√,√ | ||||||||||||||
, | ftp | uses | file | format | restrictions, | √, | √ | ||||||||||
,config | file | backup,√,√ | |||||||||||||||
Database | application | management, | installation | of | database | service | software,√,√ | ||||||||||
(Currently | only | supports | MSSQL | and | database | software | running | security | settings, | √, | √ | ||||||
MYSQL, | !ERROR! B30 -> Formula Error: Unexpected operator '<' | !ERROR! C30 -> Formula Error: Unexpected operator '<' | separate | database | and | user | permission | settings, | √, | √ | |||||||
,Export | of | data | files | (as | needed),√,√ | ||||||||||||
,Separation | or | attachment | of | database | files,√,√ | ||||||||||||
,single | database | backup | plan,√,√ | ||||||||||||||
,Database | restore | operation | (including | restored | access | settings),√,√ | |||||||||||
,Database | access | security,√,√ | |||||||||||||||
Operation | monitoring | and | analysis | service, | hardware | operation | status | monitoring: | 7×24 | hours | server | hardware | operation | monitoring,×,√ | |||
, | IIS | access | log | analysis: | 7 | × | 24 | hours | of | recording. | Includes | data | analysis. | ,×,√ | |||
Clean | up | server | junk | files, | some | junk | files | generated | by | system | operation, | cache | files, | temporary | files,,√,√ | ||
, | duplicate | copy | files, | expired | backup | files, | etc. | ,√,√ | |||||||||
Server | system | reinstallation, | including | rebuilding | of | system, | web, | ftp, | database, | monitoring | and | all | project | details | after | reinstallation. | ,√,√ |
Fault, | attack, | hacker | emergency | handling, | hardware | emergency | troubleshooting. | ,√,√ | |||||||||
, | Web | site, | ftp | service, | database | service | emergency | troubleshooting, | √, | √ | |||||||
,Attack | Analysis | and | Assisted | Protection,√,√ | |||||||||||||
,web | log | attack | analysis,√,√ | ||||||||||||||
,Analysis | of | site | Trojan | horse | attack,√,√ | ||||||||||||
,arp | attack | protection,√,√ | |||||||||||||||
,Assist | protection | against | ddos | ??attacks | (If | you | need | a | hardware | firewall, | you | will | be | charged | additionally),√,√ | ||
,CC | attack | assistance | protection | (if | hardware | firewall | is | required, | additional | charges | will | be | charged),√,√ | ||||
,According | to | the | situation | at | that | time, | provide | professional | advice,√,√ | ||||||||