Compute
Elastic Cloud Server
Huawei Cloud Flexus
Bare Metal Server
Auto Scaling
Image Management Service
Dedicated Host
FunctionGraph
Cloud Phone Host
Huawei Cloud EulerOS
Networking
Virtual Private Cloud
Elastic IP
Elastic Load Balance
NAT Gateway
Direct Connect
Virtual Private Network
VPC Endpoint
Cloud Connect
Enterprise Router
Enterprise Switch
Global Accelerator
Management & Governance
Cloud Eye
Identity and Access Management
Cloud Trace Service
Resource Formation Service
Tag Management Service
Log Tank Service
Config
OneAccess
Resource Access Manager
Simple Message Notification
Application Performance Management
Application Operations Management
Organizations
Optimization Advisor
IAM Identity Center
Cloud Operations Center
Resource Governance Center
Migration
Server Migration Service
Object Storage Migration Service
Cloud Data Migration
Migration Center
Cloud Ecosystem
KooGallery
Partner Center
User Support
My Account
Billing Center
Cost Center
Resource Center
Enterprise Management
Service Tickets
HUAWEI CLOUD (International) FAQs
ICP Filing
Support Plans
My Credentials
Customer Operation Capabilities
Partner Support Plans
Professional Services
Analytics
MapReduce Service
Data Lake Insight
CloudTable Service
Cloud Search Service
Data Lake Visualization
Data Ingestion Service
GaussDB(DWS)
DataArts Studio
Data Lake Factory
DataArts Lake Formation
IoT
IoT Device Access
Others
Product Pricing Details
System Permissions
Console Quick Start
Common FAQs
Instructions for Associating with a HUAWEI CLOUD Partner
Message Center
Security & Compliance
Security Technologies and Applications
Web Application Firewall
Host Security Service
Cloud Firewall
SecMaster
Anti-DDoS Service
Data Encryption Workshop
Database Security Service
Cloud Bastion Host
Data Security Center
Cloud Certificate Manager
Edge Security
Situation Awareness
Managed Threat Detection
Blockchain
Blockchain Service
Web3 Node Engine Service
Media Services
Media Processing Center
Video On Demand
Live
SparkRTC
MetaStudio
Storage
Object Storage Service
Elastic Volume Service
Cloud Backup and Recovery
Storage Disaster Recovery Service
Scalable File Service Turbo
Scalable File Service
Volume Backup Service
Cloud Server Backup Service
Data Express Service
Dedicated Distributed Storage Service
Containers
Cloud Container Engine
SoftWare Repository for Container
Application Service Mesh
Ubiquitous Cloud Native Service
Cloud Container Instance
Databases
Relational Database Service
Document Database Service
Data Admin Service
Data Replication Service
GeminiDB
GaussDB
Distributed Database Middleware
Database and Application Migration UGO
TaurusDB
Middleware
Distributed Cache Service
API Gateway
Distributed Message Service for Kafka
Distributed Message Service for RabbitMQ
Distributed Message Service for RocketMQ
Cloud Service Engine
Multi-Site High Availability Service
EventGrid
Dedicated Cloud
Dedicated Computing Cluster
Business Applications
Workspace
ROMA Connect
Message & SMS
Domain Name Service
Edge Data Center Management
Meeting
AI
Face Recognition Service
Graph Engine Service
Content Moderation
Image Recognition
Optical Character Recognition
ModelArts
ImageSearch
Conversational Bot Service
Speech Interaction Service
Huawei HiLens
Video Intelligent Analysis Service
Developer Tools
SDK Developer Guide
API Request Signing Guide
Terraform
Koo Command Line Interface
Content Delivery & Edge Computing
Content Delivery Network
Intelligent EdgeFabric
CloudPond
Intelligent EdgeCloud
Solutions
SAP Cloud
High Performance Computing
Developer Services
ServiceStage
CodeArts
CodeArts PerfTest
CodeArts Req
CodeArts Pipeline
CodeArts Build
CodeArts Deploy
CodeArts Artifact
CodeArts TestPlan
CodeArts Check
CodeArts Repo
Cloud Application Engine
MacroVerse aPaaS
KooMessage
KooPhone
KooDrive

Vulnerability Management Overview

Updated on 2024-07-12 GMT+08:00

HSS detects Linux, Windows, Web-CMS, and application vulnerabilities and provides a vulnerability overview, including host vulnerability detection details, vulnerability statistics, vulnerability type distribution, top 5 vulnerabilities, and top 5 risky servers, helping you learn host vulnerabilities in real time.

Automatic and manual vulnerability scans are supported. Automatic scan can be performed in the early morning every day at the preset time. You can also perform manual scan to view the vulnerabilities of target servers or of the current server.

How Vulnerability Scan Works

Table 1 describes how different types of vulnerabilities are detected.

Table 1 How vulnerability scan works

Type

Mechanism

Linux vulnerability

Based on the vulnerability database, checks and handles vulnerabilities in the software (such as kernel, OpenSSL, vim, glibc) you obtained from official Linux sources and have not compiled, reports the results to the management console, and generates alarms.

Windows vulnerability

Synchronizes Microsoft official patches, checks whether the patches on the server have been updated, pushes Microsoft official patches, reports the results to the management console, and generates vulnerability alarms.

Web-CMS vulnerability

Checks web directories and files for Web-CMS vulnerabilities, reports the results to the management console, and generates vulnerability alarms.

Application vulnerability

Detects the vulnerabilities in the software and dependency packages running on the server, reports risky vulnerabilities to the console, and displays vulnerability alarms.

Constraints

  • The basic edition supports automatic scan and viewing of Linux and Windows vulnerabilities, but does not support server view switching or vulnerability handling.
  • The Server Status is Running, Agent Status is Online, and Protection Status is Protected. Otherwise, vulnerability scan cannot be performed.
  • Table 2 describes the OSs that support vulnerability scan and fix.
    Table 2 OSs that support vulnerability scan and fix

    OS Type

    Supported OS

    Windows

    • Windows Server 2019 Datacenter 64-bit English (40 GB)
    • Windows Server 2019 Datacenter 64-bit Chinese (40 GB)
    • Windows Server 2016 Standard 64-bit English (40 GB)
    • Windows Server 2016 Standard 64-bit Chinese (40 GB)
    • Windows Server 2016 Datacenter 64-bit English (40 GB)
    • Windows Server 2016 Datacenter 64-bit Chinese (40 GB)
    • Windows Server 2012 R2 Standard 64-bit English (40 GB)
    • Windows Server 2012 R2 Standard 64-bit Chinese (40 GB)
    • Windows Server 2012 R2 Datacenter 64-bit English (40 GB)
    • Windows Server 2012 R2 Datacenter 64-bit Chinese (40 GB)

    Linux

    • EulerOS: 2.2, 2.3, 2.5, 2.8, 2.9 (64-bit)
    • CentOS 7.4, 7.5, 7.6, 7.7, 7.8 and 7.9 (64-bit)
    • Ubuntu 16.04, 18.04, 20.04 (64-bit)
    • Debian 9, 10, and 11 (64-bit)
    • Kylin V10 (64-bit)

Types of Vulnerabilities That Can Be Scanned and Fixed

For details about the types of vulnerabilities that can be scanned and fixed in different HSS editions, see Types of vulnerabilities that can be scanned and fixed in each HSS edition.

The meanings of the symbols in the table are as follows:

  • √: supported
  • ×: not supported
Table 3 Types of vulnerabilities that can be scanned and fixed in each HSS edition

Vulnerability Type

Function

Professional Edition

Enterprise Edition

Premium Edition

Web Tamper Protection Edition

Container Edition

Linux vulnerability

Automatic vulnerability scan (once a week by default)

Vulnerability policy configuration

Vulnerability whitelist

Manual vulnerability scan

One-click vulnerability fix

(A maximum of 50 vulnerabilities can be fixed at a time.)

(A maximum of 50 vulnerabilities can be fixed at a time.)

Windows vulnerability

Automatic vulnerability scan (once a week by default)

×

Vulnerability policy configuration

×

Vulnerability whitelist

×

Manual vulnerability scan

×

One-click vulnerability fix

(A maximum of 50 vulnerabilities can be fixed at a time.)

(A maximum of 50 vulnerabilities can be fixed at a time.)

×

Web-CMS vulnerability

Automatic vulnerability scan (once a week by default)

Vulnerability policy configuration

Vulnerability whitelist

Manual vulnerability scan

One-click vulnerability fix

×

×

×

×

×

Application vulnerability

Automatic vulnerability scan (once a week by default)

×

Vulnerability policy configuration

×

Vulnerability whitelist

×

Manual vulnerability scan

×

One-click vulnerability fix

×

×

×

×

×

NOTE:
  • HSS can scan for Web-CMS and application vulnerabilities but cannot fix them. You can log in to your server to manually fix the vulnerability by referring to the suggestions displayed on the vulnerability details page.

Procedure

  1. Log in to the management console.
  2. Click in the upper left corner of the page, select a region, and choose Security > Host Security Service.
  3. In the left navigation pane, choose Prediction > Vulnerabilities.

We use cookies to improve our site and your experience. By continuing to browse our site you accept our cookie policy. Find out more

Feedback

Feedback

Feedback

0/500

Selected Content

Submit selected content with the feedback