Host Security Service (New)
Host Security Service (New)
All results for "
" in this service
All results for "
" in this service
What's New
Product Bulletin
[June 30, 2023] Huawei Cloud Host Security Service (New Version) Upgrade Notice
[September 1, 2022] Changes in the Free Trial Specifications of the HSS Basic Edition (Pay-per-use)
Service Overview
What Is HSS?
Advantages
Scenarios
Specifications of Different Editions
Personal Data Protection Mechanism
HSS Permissions Management
Constraints and Limitations
Related Services
Basic Concepts
Change History
Billing
Billing Overview
Billing Modes
Overview
Yearly/Monthly Billing
Pay-per-Use Billing
Billing Items
Billing Examples
Renewing Subscriptions
Overview
Manually Renewing HSS
Auto-renewing HSS
Bills
Arrears
Billing Termination
Cost Management
Billing FAQ
How Do I Unsubscribe from HSS Quotas?
How Do I Renew HSS?
If I Do Not Renew HSS After It Expires, Will My Services Be Affected?
If I Unsubscribe from HSS and Purchase It Again, Do I Need to Install Agents and Configure Server Protection Settings from Scratch?
How Do I Disable Auto-Renewal?
Change History
Getting Started
Enabling HSS Protection
Getting Started with Common Practices
User Guide
Enabling HSS
Purchasing Quota
Installing an Agent
Agent Overview
Installing the Agent on a Linux Server
Installing the Agent on a Windows Server
Installing the Agent on Linux Servers in Batches
Enabling Protection
Enabling the Basic, Professional, Enterprise, or Premium Edition
Enabling Web Tamper Protection
Enabling Container Protection
Enabling Alarm Notifications
Common Security Configuration
Configuring Server Login Protection
Isolating and Killing Malicious Programs
Enabling 2FA
Dashboard
Asset Management
Asset Management
Server Fingerprints
Collecting Server Asset Fingerprints
Viewing Server Asset Fingerprints
Viewing the Operation History of Server Assets
Container Fingerprints
Collecting Container Asset Fingerprints
Viewing Container Asset Fingerprints
Server Management
Viewing Server Protection Status
Enabling Protection
Basic/Professional/Enterprise/Premium Edition
WTP Edition
Disabling Protection
Disabling the Basic/Professional/Enterprise/Premium Edition
Disabling WTP
Exporting the Server List
Switching the HSS Quota Edition
Deploying a Protection Policy
Managing Server Groups
Servers Importance Management
Ignoring a Server
Container Management
Viewing the Container Node Protection Status
Exporting the Container Node List
Enabling Container Security Protection
Disabling Protection for Container Edition
Container Images
Local Images
Managing SWR Private Images
Managing SWR Shared Images
SWR Enterprise Edition Image
Viewing Container Information
Handling Risk Containers
Managing Cluster Agents
Installing an Agent
Uninstalling an Agent from a Cluster
Protection Quota Management
Viewing Protection Quotas
Binding a Protection Quota
Unbinding a Protection Quota
Upgrading Protection Quotas
Exporting the Protection Quota List
Risk Prevention
Vulnerability Management
Vulnerability Management Overview
Vulnerability Scan
Viewing Vulnerability Details
Exporting the vulnerability list
Handling Vulnerabilities
Managing the Vulnerability Whitelist
Viewing Vulnerability Handling History
Baseline Inspection
Baseline Check Overview
Viewing Baseline Check Details
Fixing Unsafe Settings
Managing Baseline Check Policies
Container Image Security
SWR Image Repository Vulnerabilities
Viewing Malicious File Detection Results
Prevention
Application Protection
Enabling Application Protection
Viewing Application Protection
Managing Application Protection
Managing Application Protection Policies
Disabling Application Protection
WTP
WTP Overview
Adding a Protected Directory
Configuring Remote Backup
Adding a Privileged Process
Enabling/Disabling Scheduled Static WTP
Enabling Dynamic WTP
Viewing WTP Events
Ransomware Prevention
Purchasing a Backup Vault
Enabling Ransomware Prevention
Enabling Backup
Viewing and Handling Ransomware Protection
Managing Ransomware Prevention Policies
Managing Server Backup
Restoring Server Data
Disabling Ransomware Prevention
Application Process Control
Application Process Control Overview
Creating a Whitelist Policy
Confirming Learning Outcomes
Enabling Application Process Control
Checking and Handling Suspicious Processes
Extending the Process Whitelist
Start Learning on Servers Again
Disabling Application Process Control
File Integrity Monitoring
Checking File Change Details
Checking Modified Files
Virus Scan
Virus Scan Overview
Scanning for Viruses
Viewing and Handling Viruses
Container Firewalls
Container Firewall Overview
Creating a Policy (for a Cluster Using the Container Tunnel Network Model)
Creating a Policy (for a Cluster Using the VPC Network Model)
Managing Policies (for a Cluster Using the Container Tunnel Network Model)
Managing Policies (for a Cluster Using the VPC Network Model)
Container Cluster Protection
Container Cluster Protection Overview
Enabling Container Cluster Protection
Configuring a Container Cluster Protection Policy
Checking Container Cluster Protection Events
Disabling Container Cluster Protection
Intrusion Detection
Alarms
HSS Alarms
Server Alarms
Viewing Server Alarms
Handling Server Alarms
Exporting Server Alarms
Managing Isolated Files
Container Alarms
Container Alarm Events
Viewing Container Alarms
Handling Container Alarms
Exporting Container Alarms
Whitelist Management
Configuring the Login Whitelist
Managing the Alarm Whitelist
Managing the System User Whitelist
Security Operations
Policy Management
Viewing a Policy Group
Creating a Policy Group
Editing a Policy
Viewing the Handling History
Security Report
Security Report
Creating a Security Report
Subscribing to a Security Report
Checking a Security Report
Managing Security Reports
Free Scan on Unprotected Servers
Installation & Configuration
Agent Management
Viewing Agent Status
Upgrading the Agent
Uninstalling an Agent
Security Configurations
Plug-in Management
Plug-Ins Overview
Viewing Plug-in Details
Installing a Plug-in
Upgrading a Plug-in
Uninstalling a Plug-in
Audit
HSS Operations Supported by CTS
Viewing Audit Logs
Monitoring
HSS Monitoring Metrics
Configuring a Monitoring Alarm Rule
Viewing Monitoring Metrics
Permissions Management
Creating a User and Granting Permissions
HSS Custom Policies
HSS Actions
Change History
Best Practices
Best Practices of Login Security Hardening
Detecting and Fixing Vulnerabilities
Git Credential Disclosure Vulnerability (CVE-2020-5260)
SaltStack Remote Command Execution Vulnerabilities (CVE-2020-11651 and CVE-2020-11652)
OpenSSL High-risk Vulnerability (CVE-2020-1967)
Adobe Font Manager Library Remote Code Execution Vulnerability (CVE-2020-1020/CVE-2020-0938)
Windows Kernel Elevation of Privilege Vulnerability (CVE-2020-1027)
Windows CryptoAPI Spoofing Vulnerability (CVE-2020-0601)
HSS Multi-Cloud Management and Deployment
Application Scenario
Installation and Deployment Process
Installation and Deployment
Huawei Cloud Solutions
Hybrid Cloud Solution
Verification and Usage
Connecting Off-cloud Servers to the Public Cloud Through Direct Connect
Step 1: Creating a Proxy Server
Step 2: Installing an Agent for the Proxy Server
Step 3: Installing and Configuring Nginx
Step 4: Generating an Installation Package/Command
Step 5: Installing Agents on Off-cloud Servers
Best Practices for Defense Against Ransomware
What Is a Ransomware Attack?
Process of Ransomware Attacks
Protecting Against Ransomware (General Actions)
Huawei Cloud Ransomware Prevention Solution (HSS+CBR)
Overview
Identifying and Fixing Ransomware
Enabling Ransomware Prevention and Backup
Restoring Server Data
Installing the Host Security Service Agent Using CBH
Change History
API Reference
Before You Start
Overview
Limitations and Constraints
Basic Concepts
Calling APIs
Authentication
Response
API Description
Asset Management
Collecting Asset Statistics, Including Accounts, Ports, and Processes
Querying the Account List
Querying Open Port Statistics
Querying the Process List
Querying the Software List
Querying Automatic Startup Item Information
Querying the Server List of an Account
Querying the Open Port List of a Single Server
Querying the Server List of the Software
Querying the Service List of Auto-Started Items
Obtaining the Account Change History
Obtaining the Historical Change Records of Software Information
Obtaining the Historical Change Records of Auto-started Items
Ransomware Prevention
Querying the Servers Protected Against Ransomware
Querying a Protection Policy List
Modifying a Protection Policy
Enabling Ransomware Prevention
Disabling Ransomware Prevention
Querying the Backup Policy Bound to HSS Protection Vault
Modifying the Backup Policy Bound to Vault
Baseline Management
Querying the Weak Password Detection Result List
Querying the Password Complexity Policy Detection Report
Querying the Result List of Server Security Configuration Check
Querying the Check Result of a Security Configuration Item
Querying the Checklist of a Security Configuration Item
Querying the List of Affected Servers of a Security Configuration Item
Querying the Report of a Check Item in a Security Configuration Check
Quota Management
Querying Quota Information
Querying Quota Details
Intrusion Detection
Handling Alarm Events
Querying the Detected Intrusion List
Querying the Alarm Whitelist
Server Management
Querying ECSs
Changing the Protection Status
Querying Server Groups
Creating a Server Group
Editing a Server Group
Deleting a Server Group
Policy Management
Querying the Policy Group List
Applying a Policy
Vulnerability Management
Querying the Vulnerability List
Querying the Servers Affected by a Vulnerability
Changing the Status of a Vulnerability
Web Tamper Protection
Querying the Protection List
Enabling or Disabling WTP
Enabling or Disabling Dynamic WTP
Querying the Status of Static WTP for a Server
Querying the Status of Dynamic WTP for a Server
Tag Management
Creating Tags in Batches
Deleting a Resource Tag
Appendixes
Status Code
Error Codes
Change History
FAQs
About HSS
What Is HSS?
What Is Container Security Service?
What Is Web Tamper Protection?
What Are the Relationships Between Images, Containers, and Applications?
How Do I Use HSS?
Can HSS Protect Local IDC Servers?
Is HSS in Conflict with Any Other Security Software?
What Are the Differences Between HSS and WAF?
Can HSS Be Used Across Accounts?
What Is the HSS Agent?
Can I Use HSS If My Services Are Not Deployed on the Huawei Cloud?
Can I Upgrade My HSS Edition?
Can HSS Automatically Detect and Remove Viruses?
Agent FAQs
Is the Agent in Conflict with Any Other Security Software?
How Do I Install the Agent?
How Do I Uninstall the Agent?
What Should I Do If Agent Installation Failed?
How Do I Fix an Abnormal Agent?
What Is the Default Agent Installation Path?
How Many CPU and Memory Resources Are Occupied by the Agent When It Performs Scans?
Do WTP and HSS Use the Same Agent?
How Do I View Servers Where No Agents Have Been Installed?
What Addresses Do ECSs Access After the Agent Is Installed?
How Do I Use Images to Install Agents in Batches?
What Do I Do If I Cannot Access the Download Link of the Windows Agent?
What Do I Do If Agent Upgrade Fails and the Message "File replacement failed" Is Displayed?
Brute-force Attack Defense
How Does HSS Intercept Brute Force Attacks?
How Do I Handle a Brute-force Attack Alarm?
How Do I Defend Against Brute-force Attacks?
What Do I Do If the Account Cracking Prevention Function Does Not Take Effect on Some Accounts for Linux Servers?
How Do I Unblock an IP Address?
What Do I Do If HSS Frequently Reports Brute-force Alarms?
How Do I Handle Alarms on the Brute-Force Attacks Launched from a Cloud IP Address?
What Do I Do If My Remote Server Port Is Not Updated in Brute-force Attack Records?
Weak Passwords and Unsafe Accounts
How Do I Handle a Weak Password Alarm?
How Do I Set a Secure Password?
Why Are the Weak Password Alarms Still Reported After the Weak Password Policy Is Disabled?
Intrusions
How Do I View and Handle Alarms Reported by HSS?
What Do I Do If My Servers Are Subjected to a Mining Attack?
Why a Process Is Still Isolated After It Was Whitelisted?
What Do I Do If a Mining Process Is Detected on a Server?
Why Some Attacks on Servers Are Not Detected?
Can I Unblock an IP Address Blocked by HSS, and How?
Why a Blocked IP Address Is Automatically Unblocked?
How Often Does HSS Detect, Isolate, and Kill Malicious Programs?
What Do I Do If an IP Address Is Blocked by HSS?
How Do I Defend Against Ransomware Attacks?
How Do I Add a Whitelist for High-Risk Command Execution Alarms?
Abnormal Logins
Why Do I Still Receive Remote Login Alarms After Configuring the Login IP Whitelist?
How Do I Check the User IP address of a Remote Login?
What Can I Do If an Alarm Indicating Successful Login Is Reported?
Can I Disable Remote Login Detection?
How Do I Know Whether an Intrusion Succeeded?
Unsafe Settings
How Do I Install a PAM and Set a Proper Password Complexity Policy in a Linux OS?
How Do I Set a Proper Password Complexity Policy in a Windows OS?
How Do I Handle Unsafe Configurations?
How Do I View Configuration Check Reports?
Vulnerability Management
How Do I Fix Vulnerabilities?
What Do I Do If an Alarm Still Exists After I Fixed a Vulnerability?
Why a Server Displayed in Vulnerability Information Does Not Exist?
Do I Need to Restart a Server After Fixing its Vulnerabilities?
Can I Check the Vulnerability and Baseline Fix History on HSS?
What Do I Do If Vulnerability Fix Failed?
Why Can't I Select a Server During Manual Vulnerability Scanning or Batch Vulnerability Fixing?
Web Tamper Protection
Why Do I Need to Add a Protected Directory?
How Do I Modify a Protected Directory?
What Should I Do If WTP Cannot Be Enabled?
How Do I Modify a File After WTP Is Enabled?
What Can I Do If I Enabled Dynamic WTP But Its Status Is Enabled but not in effect?
What Are the Differences Between the Web Tamper Protection Functions of HSS and WAF?
Container Guard Service
How Do I Disable Node Protection?
What Is the Log Processing Mechanism of CGS?
How Do I Enable Node Protection?
How Do I Enable the API Server Audit for an On-Premises Kubernetes Container?
What Do I Do If the Container Cluster Protection Plug-in Fails to Be Uninstalled?
Ransomware Protection
What Are the Differences Between Ransomware Protection Backup and Cloud Backup?
Security Configurations
How Do I Clear the SSH Login IP Address Whitelist Configured in HSS?
What Can I Do If I Cannot Remotely Log In to a Server via SSH?
How Do I Use 2FA?
What Do I Do If I Cannot Enable 2FA?
Why Can't I Receive a Verification Code After 2FA Is Enabled?
Why Does My Login Fail After I Enable 2FA?
How Do I Add a Mobile Phone Number or Email Address for Receiving 2FA Verification Notifications?
If I Choose to Use Verification Code for 2FA, How Do I Get the Code?
Will I Be Billed for Alarm Notifications and SMS?
Why No Topics Are Available for Me to Choose When I Configure Alarm Notifications?
Can I Disable HSS Alarm Notifications?
How Do I Modify Alarm Notification Items?
How Do I Disable the SELinux Firewall?
Quotas
How Do I Extend the Validity Period of HSS Quotas?
How Do I Filter Unprotected Servers?
Why Can't I Find the Servers I Purchased on the Console?
What Do I Do If My Quotas Are Insufficient and I Failed to Enable Protection?
How Do I Allocate My Quota?
If I Change the OS of a Protected Server, Does It Affect My HSS Quota?
Why Doesn't an HSS Edition Take Effect After Purchase?
How Do I Change the Protection Quota Edition Bound to a Server?
Others
How Do I Use the Windows Remote Desktop Connection Tool to Connect to a Server?
How Do I Check HSS Log Files?
How Do I Enable Logging for Login Failures?
How Do I Clear an Alarm on Critical File Changes?
Is HSS Available as Offline Software?
Why Can't I View All Projects in the Enterprise Project Drop-down List?
How Do I Enable HSS Self-Protection?
What Do I Do If Self-Protection Cannot Be Disabled?
Why Is a Deleted ECS Still Displayed in the HSS Server List?
Change History