What's New
This topic describes the features of each Host Security Service (HSS) version and the corresponding documentation updates.
July 2025
September 2024
November 2023
No. |
Feature |
Description |
Phase |
Related Document |
---|---|---|---|---|
1 |
Added the virus scanning and removal function. |
The function uses the virus detection engine to scan virus files on the server. The scanned file types include executable files, compressed files, script files, documents, images, and audio and video files. You can perform quick scan and full-disk scan on the server as required. You can also customize scan tasks and handle detected virus files in a timely manner to enhance the virus defense capability of the service system. Editions: professional, enterprise, premium, WTP, and container editions |
Commercial use |
|
2 |
Added the emergency vulnerability scanning function. |
The emergency vulnerability scan function checks whether the software and any dependencies running on the server have vulnerabilities through version comparison and POC verification. Reports risky vulnerabilities to the console and provides vulnerability alarms for you. Editions: professional, enterprise, premium, WTP, and container editions |
Commercial use |
|
3 |
Added the automatic quota binding function. |
After purchasing a yearly/monthly quota, you need to bind the quota to a server to enable protection. To prevent resource waste, you can enable the automatic quota binding function. HSS automatically binds quotas to unprotected servers. Editions: all editions |
Commercial use |
|
4 |
Added the automatic agent upgrade function. |
The agent edition is continuously updated to improve server protection capabilities. Therefore, you need to periodically upgrade the agent to the latest version. If you cannot manually upgrade the agent in a timely manner, you are advised to enable the automatic agent upgrade function. HSS will automatically upgrade the agent to the latest version. Editions: all editions |
Commercial use |
|
5 |
Optimized container image security scanning. |
Editions: container edition |
Commercial use |
|
6 |
Optimize the vulnerability report. |
Vulnerability reports can be exported in PDF or HTML format. Editions: professional, enterprise, premium, WTP, and container editions |
Commercial use |
|
7 |
Optimize the alarm notification. |
Notify users of successful automatic isolation and killing of malicious programs, automatic blocking of ransomware, and automatic blocking of WTP. Editions: professional, enterprise, premium, WTP, and container editions |
Commercial use |
|
8 |
Optimize the agent installation and configuration. |
Use the same agent installation command for the same OS. Editions: all editions |
Commercial use |
|
9 |
Container cluster protection |
HSS can check for non-compliance baseline issues, vulnerabilities, and malicious files when a container image is started and report alarms on or block container startup that has not been unauthorized or may incur high risks. You can configure container cluster protection policies to block images with vulnerabilities, malicious files, non-compliant baselines, or other threats, hardening cluster security. Editions: container edition |
Commercial use |
|
10 |
Application process control |
HSS can control different types of application processes on servers. Suspicious and trusted processes are allowed to run, and alarms are generated for malicious processes. Editions: premium, WTP, and container editions |
Commercial use |
|
11 |
Cluster agent management |
To enable protection for all containers in a CCE cluster or an on-premises Kubernetes cluster, you can use the cluster agent management function to install the agent in the cluster. After this function is enabled, you do not need to manually install the agent on new nodes or pods added to the cluster. Editions: container edition |
Commercial use |
|
12 |
Backup before vulnerability fixing |
Vulnerability fixing may fail and interrupt services. To avoid this problem, HSS enables you to back up servers before fixing vulnerabilities. If an exception occurs, you can restore servers to ensure service continuity. Editions: professional, enterprise, premium, WTP, and container editions |
Commercial use |
|
13 |
Optimized Dashboard page |
The quota management, protection overview, and news modules are added to the HSS Dashboard page. You can easily check the quota usage, enabling status of key functions, and the latest vulnerability information. The security score criteria are optimized to help you quickly locate security risks and improve the security score. Editions: all editions |
Commercial use |
|
14 |
Optimized intrusion detection alarms |
Editions: professional, enterprise, premium, WTP, and container editions |
Commercial use |
|
15 |
Optimized ransomware prevention |
Ransomware prevention will be enabled with the HSS premium or higher edition. Editions: premium, WTP, and container editions |
Commercial use |
July 2023
No. |
Feature |
Description |
Phase |
Related Document |
---|---|---|---|---|
1 |
Server vulnerability management |
The vulnerability management page is redesigned. The new functions are as follows:
|
Commercial use |
|
2 |
Intrusion detection |
|
Commercial use |
|
3 |
Container asset fingerprint |
Information about accounts, auto-started items, clusters, services, workloads, and container instances can be collected to help you identify insecure container assets. |
Commercial use |
|
4 |
Container image security |
|
Commercial use |
|
5 |
Container intrusion detection |
|
Commercial use |
|
6 |
Container security response |
You can isolate, suspend, kill, and restore containers with medium or higher security risks to prevent them from affecting secure containers. |
Commercial use |
|
7 |
Container firewall |
The HSS container firewall controls and intercepts network traffic inside and outside a container cluster to prevent malicious access and attacks. |
Commercial use |
June 2023
No. |
Feature |
Description |
Phase |
Related Document |
---|---|---|---|---|
1 |
HSS professional edition |
HSS provides the professional edition, where you can isolate and kill Trojans, and can scan for and fix vulnerabilities in a few clicks. |
Commercial use |
March 2023
No. |
Feature |
Description |
Phase |
Related Document |
---|---|---|---|---|
1 |
Honeypot file protection for Windows |
Honeypot files can be deployed in protected directories and important directories (except for the excluded directories specified by users) to trap possible ransomware. If an unknown ransomware attempts to encrypt a honeypot file, HSS immediately generates an alarm. |
Commercial use |
|
2 |
The Windows policy group supports antivirus and host intrusion prevention system (HIPS) detection policies. |
You can set antivirus detection policies for Windows servers to report, isolate, and kill viruses. You can also set HIPS detection policies to detect registries, files, and processes; and to report alarms for suspicious operations such as abnormal changes. |
Commercial use |
|
3 |
Trojans, viruses, and worms can trigger HID alarms. |
HSS can detect, generate alarms on, and remove Trojans, viruses, and worms that intrude servers. |
Commercial use |
|
4 |
The Docker plug-in is added to enhance container security. |
To improve container security capabilities, the Docker plug-in must be installed for Docker containers (Linux). |
Commercial use |
January 2023
No. |
Feature |
Description |
Phase |
Related Document |
---|---|---|---|---|
1 |
Batch agent installation |
The agent can be installed on multiple servers in batches. |
Commercial use |
|
2 |
Privileged processes can be configured in the WTP edition. |
If WTP is enabled, the content in the protected directories is read-only. To allow certain processes to modify files in the directories, add them to the privileged process list. Only the modification made by privileged processes can take effect. Modifications made by other processes will be automatically rolled back. |
Commercial use |
Feedback
Was this page helpful?
Provide feedbackThank you very much for your feedback. We will continue working to improve the documentation.