What's New

This topic describes the features of each Host Security Service (HSS) version and the corresponding documentation updates.
October 2025
|
No. |
Feature |
Description |
Phase |
Document |
|---|---|---|---|---|
|
1 |
Added application protection for containers. |
Application protection is supported for containerized applications. To improve application security, you can enable protection for Tomcat, WebLogic, Netty, and Jetty applications automatically or manually.
|
Commercial use |
|
|
2 |
Added brute-force attack detection for containers. |
Brute-force attack detection monitors SSH, MySQL, and vsftp login behaviors while containers are running to detect possible brute-force attacks in time. You can configure the brute-force attack detection thresholds, including slow and fast brute-force attack detection rules, to better suit your workloads. Editions: container edition |
Commercial use |
|
|
3 |
Added abnormal container behavior detection. |
Abnormal container behavior detection can detect non-image programs (such as Trojans implanted by hackers) started during container running to defend against unknown attacks. The container infrastructure is immutable. Any programs started outside images are regarded abnormal. Processes are monitored and alarms are reported in real time. After the abnormal container behavior detection policy is enabled, HSS learns the behaviors of started containers by image. After the learning is complete, a baseline library is established, and HSS checks the processes started in containers based on the library. If the process started in the container is not in the baseline library, an alarm is generated. The alarms are classified based on whether the software that starts the process is in an image.
Editions: container edition |
Commercial use |
|
|
4 |
Enhanced container image security. |
Editions: container edition (only for local images) |
Commercial use |
|
|
5 |
Enhanced vulnerability scan. |
Vulnerability scan supports the following OSs:
Editions: all editions |
Commercial use |
|
|
6 |
Optimized baseline checks. |
Editions: enterprise, premium, WTP, and container editions |
Commercial use |
|
|
7 |
AI ransomware protection supports Linux. |
AI ransomware protection can protect Linux. Editions: premium, WTP, and container editions |
Commercial use |
|
|
8 |
Added cluster environment security scans. |
A cluster environment security scan checks the resources on the Kubernetes cluster management plane and data plane; identifies infrastructure as code (IaC) risks, vulnerabilities, unsafe settings, configuration compliance, sensitive information, and permissions management issues; and provides solutions, helping you build a comprehensive cluster security system.
Editions: container edition |
Commercial use |
|
|
9 |
Added kernel module loading checks. |
Kernel module loading can be detected and alarms can be reported in real time, improving OS kernel security. In kernel module loading, a precompiled kernel module (.ko file) is loaded to a running Linux kernel by using commands such as insmod and modprobe to extend kernel functions. If kernel modules are loaded without strict security reviews, hackers may use the kernel modules to inject malicious code and escalate permissions. This may interfere with kernel operations and even lead to system breakdown. Editions: enterprise, premium, WTP, and container editions |
Commercial use |
|
|
10 |
Optimized automatic quota unbinding. |
If an Elastic Cloud Server (ECS) instance or a Cloud Container Engine (CCE) node is deleted, it will be automatically unbound from its HSS protection quota.
Editions: all editions |
Commercial use |
When an ECS or CCE Cluster Node Is Deleted, Will They Be Unbound from Their Protection Quotas? |
|
11 |
Optimized baseline checks. |
|
Commercial use |
|
|
12 |
Optimized image synchronization rules. |
HSS can periodically synchronize basic image information from the container image repository to the HSS console. Editions: container edition |
Commercial use |
|
|
13 |
Optimized the asset fingerprint list. |
The First Scanned column was added in the account information list and the installed software list to help you trace assets. You can learn when an asset was added. Editions: enterprise, premium, WTP, and container editions |
Commercial use |
|
|
14 |
Optimized the logic for enabling the container edition. |
Editions: container edition |
Commercial use |
|
|
15 |
Optimized container image security views. |
Added the Affected Images column on the Malicious Files, Unsafe Configuration, Sensitive Information, and Software Compliance lists in the Risk View on the Container Images page, helping you quickly locate and handle image risks. Editions: container edition |
Commercial use |
July 2025
September 2024
November 2023
|
No. |
Feature |
Description |
Phase |
Related Document |
|---|---|---|---|---|
|
1 |
Added the virus scanning and removal function. |
The function uses the virus detection engine to scan virus files on the server. The scanned file types include executable files, compressed files, script files, documents, images, and audio and video files. You can perform quick scan and full-disk scan on the server as required. You can also customize scan tasks and handle detected virus files in a timely manner to enhance the virus defense capability of the service system. Editions: professional, enterprise, premium, WTP, and container editions |
Commercial use |
|
|
2 |
Added the emergency vulnerability scanning function. |
The emergency vulnerability scan function checks whether the software and any dependencies running on the server have vulnerabilities through version comparison and POC verification. Reports risky vulnerabilities to the console and provides vulnerability alarms for you. Editions: professional, enterprise, premium, WTP, and container editions |
Commercial use |
|
|
3 |
Added the automatic quota binding function. |
After purchasing a yearly/monthly quota, you need to bind the quota to a server to enable protection. To prevent resource waste, you can enable the automatic quota binding function. HSS automatically binds quotas to unprotected servers. Editions: all editions |
Commercial use |
|
|
4 |
Added the automatic agent upgrade function. |
The agent edition is continuously updated to improve server protection capabilities. Therefore, you need to periodically upgrade the agent to the latest version. If you cannot manually upgrade the agent in a timely manner, you are advised to enable the automatic agent upgrade function. HSS will automatically upgrade the agent to the latest version. Editions: all editions |
Commercial use |
|
|
5 |
Optimized container image security scanning. |
Editions: container edition |
Commercial use |
|
|
6 |
Optimize the vulnerability report. |
Vulnerability reports can be exported in PDF or HTML format. Editions: professional, enterprise, premium, WTP, and container editions |
Commercial use |
|
|
7 |
Optimize the alarm notification. |
Notify users of successful automatic isolation and killing of malicious programs, automatic blocking of ransomware, and automatic blocking of WTP. Editions: professional, enterprise, premium, WTP, and container editions |
Commercial use |
|
|
8 |
Optimize the agent installation and configuration. |
Use the same agent installation command for the same OS. Editions: all editions |
Commercial use |
|
|
9 |
Container cluster protection |
HSS can check for non-compliance baseline issues, vulnerabilities, and malicious files when a container image is started and report alarms on or block container startup that has not been unauthorized or may incur high risks. You can configure container cluster protection policies to block images with vulnerabilities, malicious files, non-compliant baselines, or other threats, hardening cluster security. Editions: container edition |
Commercial use |
|
|
10 |
Application process control |
HSS can control different types of application processes on servers. Suspicious and trusted processes are allowed to run, and alarms are generated for malicious processes. Editions: premium, WTP, and container editions |
Commercial use |
|
|
11 |
Cluster agent management |
To enable protection for all containers in a CCE cluster or an on-premises Kubernetes cluster, you can use the cluster agent management function to install the agent in the cluster. After this function is enabled, you do not need to manually install the agent on new nodes or pods added to the cluster. Editions: container edition |
Commercial use |
|
|
12 |
Backup before vulnerability fixing |
Vulnerability fixing may fail and interrupt services. To avoid this problem, HSS enables you to back up servers before fixing vulnerabilities. If an exception occurs, you can restore servers to ensure service continuity. Editions: professional, enterprise, premium, WTP, and container editions |
Commercial use |
|
|
13 |
Optimized Dashboard page |
The quota management, protection overview, and news modules are added to the HSS Dashboard page. You can easily check the quota usage, enabling status of key functions, and the latest vulnerability information. The security score criteria are optimized to help you quickly locate security risks and improve the security score. Editions: all editions |
Commercial use |
|
|
14 |
Optimized intrusion detection alarms |
Editions: professional, enterprise, premium, WTP, and container editions |
Commercial use |
|
|
15 |
Optimized ransomware prevention |
Ransomware prevention will be enabled with the HSS premium or higher edition. Editions: premium, WTP, and container editions |
Commercial use |
July 2023
|
No. |
Feature |
Description |
Phase |
Related Document |
|---|---|---|---|---|
|
1 |
Server vulnerability management |
The vulnerability management page is redesigned. The new functions are as follows:
|
Commercial use |
|
|
2 |
Intrusion detection |
|
Commercial use |
|
|
3 |
Container asset fingerprint |
Information about accounts, auto-started items, clusters, services, workloads, and container instances can be collected to help you identify insecure container assets. |
Commercial use |
|
|
4 |
Container image security |
|
Commercial use |
|
|
5 |
Container intrusion detection |
|
Commercial use |
|
|
6 |
Container security response |
You can isolate, suspend, kill, and restore containers with medium or higher security risks to prevent them from affecting secure containers. |
Commercial use |
|
|
7 |
Container firewall |
The HSS container firewall controls and intercepts network traffic inside and outside a container cluster to prevent malicious access and attacks. |
Commercial use |
June 2023
|
No. |
Feature |
Description |
Phase |
Related Document |
|---|---|---|---|---|
|
1 |
HSS professional edition |
HSS provides the professional edition, where you can isolate and kill Trojans, and can scan for and fix vulnerabilities in a few clicks. |
Commercial use |
March 2023
|
No. |
Feature |
Description |
Phase |
Related Document |
|---|---|---|---|---|
|
1 |
Honeypot file protection for Windows |
Honeypot files can be deployed in protected directories and important directories (except for the excluded directories specified by users) to trap possible ransomware. If an unknown ransomware attempts to encrypt a honeypot file, HSS immediately generates an alarm. |
Commercial use |
|
|
2 |
The Windows policy group supports antivirus and host intrusion prevention system (HIPS) detection policies. |
You can set antivirus detection policies for Windows servers to report, isolate, and kill viruses. You can also set HIPS detection policies to detect registries, files, and processes; and to report alarms for suspicious operations such as abnormal changes. |
Commercial use |
|
|
3 |
Trojans, viruses, and worms can trigger HID alarms. |
HSS can detect, generate alarms on, and remove Trojans, viruses, and worms that intrude servers. |
Commercial use |
|
|
4 |
The Docker plug-in is added to enhance container security. |
To improve container security capabilities, the Docker plug-in must be installed for Docker containers (Linux). |
Commercial use |
January 2023
|
No. |
Feature |
Description |
Phase |
Related Document |
|---|---|---|---|---|
|
1 |
Batch agent installation |
The agent can be installed on multiple servers in batches. |
Commercial use |
|
|
2 |
Privileged processes can be configured in the WTP edition. |
If WTP is enabled, the content in the protected directories is read-only. To allow certain processes to modify files in the directories, add them to the privileged process list. Only the modification made by privileged processes can take effect. Modifications made by other processes will be automatically rolled back. |
Commercial use |
Feedback
Was this page helpful?
Provide feedbackThank you very much for your feedback. We will continue working to improve the documentation.