If I Change the OS of a Protected Server, Does It Affect My HSS Quota?
No. But before changing the server OS, you need to check whether the HSS agent supports the new OS. To obtain better HSS service experience, you are advised to install or upgrade to an OS version supported by the agent.
The agent is probably incompatible with the Linux or Windows versions that have reached end of life. To obtain better HSS service experience, you are advised to install or upgrade to an OS version supported by the agent.
OS |
Agent |
System Vulnerability Scan |
---|---|---|
Windows 10 (64-bit) |
√
NOTE:
Only Huawei Cloud Workspace can use this OS. |
× |
Windows 11 (64-bit) |
√
NOTE:
Only Huawei Cloud Workspace can use this OS. |
× |
Windows Server 2012 R2 Standard 64-bit English (40 GB) |
√ |
√ |
Windows Server 2012 R2 Standard 64-bit Chinese (40 GB) |
√ |
√ |
Windows Server 2012 R2 Datacenter 64-bit English (40 GB) |
√ |
√ |
Windows Server 2012 R2 Datacenter 64-bit Chinese (40 GB) |
√ |
√ |
Windows Server 2016 Standard 64-bit English (40 GB) |
√ |
√ |
Windows Server 2016 Standard 64-bit Chinese (40 GB) |
√ |
√ |
Windows Server 2016 Datacenter 64-bit English (40 GB) |
√ |
√ |
Windows Server 2016 Datacenter 64-bit Chinese (40 GB) |
√ |
√ |
Windows Server 2019 Datacenter 64-bit English (40 GB) |
√ |
√ |
Windows Server 2019 Datacenter 64-bit Chinese (40 GB) |
√ |
√ |
Windows Server 2022 Datacenter 64-bit English (40 GB) |
√ |
× |
Windows Server 2022 Datacenter 64-bit Chinese (40 GB) |
√ |
× |
OS |
Agent |
System Vulnerability Scan |
---|---|---|
CentOS 7.4 (64-bit) |
√ |
√ |
CentOS 7.5 (64-bit) |
√ |
√ |
CentOS 7.6 (64-bit) |
√ |
√ |
CentOS 7.7 (64-bit) |
√ |
√ |
CentOS 7.8 (64-bit) |
√ |
√ |
CentOS 7.9 (64-bit) |
√ |
√ |
CentOS 8.1 (64-bit) |
√ |
× |
CentOS 8.2 (64-bit) |
√ |
× |
CentOS 8 (64-bit) |
√ |
× |
CentOS 9 (64-bit) |
√ |
× |
Debian 9 (64-bit) |
√ |
√ |
Debian 10 (64-bit) |
√ |
√ |
Debian 11.0.0 (64-bit) |
√ |
√ |
Debian 11.1.0 (64-bit) |
√ |
√ |
Debian 12.0.0 (64-bit) |
√ |
× |
EulerOS 2.2 (64-bit) |
√ |
√ |
EulerOS 2.3 (64-bit) |
√ |
√ |
EulerOS 2.5 (64-bit) |
√ |
√ |
EulerOS 2.7 (64-bit) |
√ |
× |
EulerOS 2.9 (64-bit) |
√ |
√ |
Fedora 28 (64-bit) |
√ |
× |
Fedora 31 (64-bit) |
√ |
× |
Fedora 32 (64-bit) |
√ |
× |
Fedora 33 (64-bit) |
√ |
× |
Fedora 34 (64-bit) |
√ |
× |
Ubuntu 16.04 (64-bit) |
√ |
√ |
Ubuntu 18.04 (64-bit) |
√ |
√ |
Ubuntu 20.04 (64-bit) |
√ |
√ |
Ubuntu 22.04 (64-bit) |
√ |
√ |
Ubuntu 24.04 (64-bit) |
√
NOTE:
Currently, brute-force attack detection is not supported. |
× |
Red Hat 7.4 (64-bit) |
√ |
× |
Red Hat 7.6 (64-bit) |
√ |
× |
Red Hat 8.0 (64-bit) |
√ |
× |
Red Hat 8.7 (64-bit) |
√ |
× |
OpenEuler 20.03 LTS (64-bit) |
√ |
× |
OpenEuler 22.03 SP3 (64-bit) |
√ |
× |
OpenEuler 22.03 (64-bit) |
√ |
× |
AlmaLinux 8.4 (64-bit) |
√ |
√ |
AlmaLinux 9.0 (64-bit) |
√ |
× |
Rocky Linux 8.4 (64-bit) |
√ |
× |
Rocky Linux 8.5 (64-bit) |
√ |
× |
Rocky Linux 9.0 (64-bit) |
√ |
× |
HCE 1.1 (64-bit) |
√ |
√ |
HCE 2.0 (64-bit) |
√ |
√ |
SUSE 12 SP5 (64-bit) |
√ |
√ |
SUSE 15 (64-bit) |
√ |
× |
SUSE 15 SP1 (64-bit) |
√ |
√ |
SUSE 15 SP2 (64-bit) |
√ |
√ |
SUSE 15 SP3 (64-bit) |
√ |
× |
SUSE 15.5 (64-bit) |
√ |
× |
SUSE 15 SP6 (64-bit) |
√
NOTE:
Currently, brute-force attack detection is not supported. |
× |
Kylin V10 (64-bit) |
√ |
√ |
Kylin V10 SP3 (64-bit) |
√ |
× |
UnionTech OS 1050u2e |
√
NOTE:
Currently, file escape detection is not supported. |
√ |
OS |
Agent |
System Vulnerability Scan |
---|---|---|
CentOS 7.4 (64-bit) |
√ |
√ |
CentOS 7.5 (64-bit) |
√ |
√ |
CentOS 7.6 (64-bit) |
√ |
√ |
CentOS 7.7 (64-bit) |
√ |
√ |
CentOS 7.8 (64-bit) |
√ |
√ |
CentOS 7.9 (64-bit) |
√ |
√ |
CentOS 8.0 (64-bit) |
√ |
× |
CentOS 8.1 (64-bit) |
√ |
× |
CentOS 8.2 (64-bit) |
√ |
× |
CentOS 9 (64-bit) |
√ |
× |
EulerOS 2.8 (64-bit) |
√ |
√ |
EulerOS 2.9 (64-bit) |
√ |
√ |
Fedora 29 (64-bit) |
√ |
× |
Ubuntu 18.04 (64-bit) |
√ |
× |
Ubuntu 24.04 (64-bit) |
√
NOTE:
Currently, brute-force attack detection is not supported. |
× |
Kylin V7 (64-bit) |
√ |
× |
Kylin V10 (64-bit) |
√ |
√ |
HCE 2.0 (64-bit) |
√ |
√ |
UnionTech OS V20 (64-bit) |
√ |
√
NOTE:
Only UnionTech OS V20 server editions E and D support system vulnerability scan. |
Feedback
Was this page helpful?
Provide feedbackThank you very much for your feedback. We will continue working to improve the documentation.