Access Overview
Figure 1 shows the process of accessing and enabling HSS.
No. |
Step |
Description |
---|---|---|
1 |
HSS provides the basic, professional, enterprise, premium, web tamper protection, and container edition. Each edition supports different functions and features. You need to purchase the corresponding edition based on your protection requirements for servers or containers. For details about the differences between the editions of the HSS, see Features. |
|
2 |
The HSS agent is a piece of software installed on cloud servers to exchange data between the servers and HSS, implementing security detection and protection. You can use only after installing the agent. |
|
3 |
You need to enable protection for your ECSs. |
|
4 |
By default, security risks detected by HSS are displayed on the management console. You need to log in to the console and view the risks. If you want to know the security risks of servers or containers in a timely manner, you can enable the alarm notification function. After the function is enabled, HSS will send security risks to you by SMS or email. |
|
5 |
To improve ECS security, you can configure the following ECS security protection items based on your service requirements:
|
Feedback
Was this page helpful?
Provide feedbackThank you very much for your feedback. We will continue working to improve the documentation.