Host Security Service
Host Security Service
All results for "
" in this service
All results for "
" in this service
What's New
Function Overview
Product Bulletin
[September 1, 2022] Changes in the Free Trial Specifications of the HSS Basic Edition (Pay-per-use)
Technology Poster
Host Security Service (New) Is Coming
Your Server Is Under Brute-force Attacks Every Day
Service Overview
HSS Infographics
What Is HSS?
Advantages
Scenarios
Features
Provided Free of Charge
Personal Data Protection Mechanism
Security
Shared Responsibilities
Certificates
Asset Identification and Management
Identity Authentication and Access Control
Data Protection Technologies
Audit and Logging
Service Resilience
Risk Monitoring
HSS Permissions Management
Constraints
Related Services
Basic Concepts
Billing
Billing Overview
Billing Modes
Overview
Yearly/Monthly Billing
Pay-per-Use Billing
Billing Items
Billing Examples
Changing the Billing Mode
Overview
Pay-per-Use to Yearly/Monthly
Yearly/Monthly to Pay-per-Use
Renewing Subscriptions
Overview
Manually Renewing HSS
Auto-renewing HSS
Bills
Arrears
Billing Termination
Cost Management
Billing FAQ
How Do I Unsubscribe from HSS Quotas?
How Do I Renew HSS?
If I Unsubscribe from HSS and Purchase It Again, Do I Need to Install Agents and Configure Server Protection Settings from Scratch?
How Do I Disable Auto-Renewal?
Getting Started
Free Trial of HSS Basic Edition for 30 Days
Purchasing and Enabling HSS
Purchasing and Enabling WTP
Purchasing and Enabling Container Security
Quickly Viewing ECS Security Situation
Getting Started with Common Practices
User Guide
Using IAM to Grant Access to HSS
Creating a User and Granting Permissions
HSS Custom Policies
HSS Actions
Accessing HSS
Access Overview
Purchasing an HSS Quota
Installing the Agent on Servers
Agent Overview
Checking the Installation Environment
Installing the Agent on Huawei Cloud Servers
Installing the Agent on Third-party Servers
Enabling Protection
Enabling Alarm Notifications
Common Security Configuration
Configuring Server Login Protection
Isolating and Killing Malicious Programs
Enabling and Disabling Agent Self-Protection
Enabling 2FA
Checking the Dashboard
Asset Management
Asset Overview
Server Fingerprints
Collecting Server Asset Fingerprints
Viewing Server Asset Fingerprints
Viewing the Operation History of Server Assets
Container Assets
Collecting Container Assets
Viewing Container Assets
Server Management
Enabling Server Protection
Viewing Server Protection Status
Viewing the Assets and Risks of a Server
Exporting the Server List
Switching the HSS Quota Edition
Deploying a Protection Policy
Managing Server Groups
Servers Importance Management
Ignoring a Server
Disabling HSS
Container Management
Enabling Container Protection
Viewing the Container Node Protection Status
Exporting the Container Node List
Viewing Container Information
Handling Unsafe Containers
Uninstalling the Agent from a Cluster
Disabling Container Protection
Protection Quota Management
Viewing Protection Quotas
Binding a Protection Quota
Unbinding a Protection Quota
Upgrading a Protection Quota
Exporting the Protection Quota List
Risk Management
Vulnerability Management
Vulnerability Management Overview
Vulnerability Scan
Viewing Vulnerability Details
Exporting the Vulnerability List
Handling Vulnerabilities
Managing the Vulnerability Whitelist
Viewing Vulnerability Handling History
Baseline Check
Baseline Check Overview
Configuring a Baseline Check Policy
Performing a Baseline Check
Viewing and Handling Baseline Check Results
Exporting a Baseline Check Report
Managing the Baseline Whitelist
Container Image Security
Container Image Security Overview
Enabling Pay-per-use Container Image Scan
CI/CD Image Security Scan
CI/CD Image Security Scan Overview
Viewing and Handling CI/CD Image Scan Results
Exporting CI/CD Image Scan Results
Repository Image Security Scan
Repository Image Security Scan Overview
Synchronizing Repository Images
Scanning Repository Images
Viewing and Handling Repository Image Scan Results
Exporting Repository Image Scan Results
Managing the Repository Image Vulnerability Whitelist
Local Image Security Scan
Local Image Security Scan Overview
Scanning Local Images
Viewing and Handling Local Image Scan Results
Exporting Local Image Scan Results
Managing the Local Image Vulnerability Whitelist
Cluster Environment Security
Cluster Environment Security Overview
Checking Cluster Environment Security
Viewing and Handling Security Risks in a Cluster
Server Protection
Application Protection
Application Protection Overview
Enabling Application Protection
Viewing Application Protection
Managing Application Protection Policies
Disabling Application Protection
WTP
WTP Overview
Enabling Web Tamper Protection
Configuring Remote Backup
Modifying WTP Configuration
Manually Enabling or Disabling Directory Protection
Deleting WTP Configuration
Viewing WTP Events
Ransomware Prevention
Ransomware Prevention Overview
Enabling Ransomware Prevention
Enabling Backup
Viewing and Handling Ransomware Prevention Events
Managing Ransomware Protection Policies
Restoring Server Data
Managing Server Backup
Disabling Ransomware Prevention
Application Process Control
Application Process Control Overview
Creating a Whitelist Policy
Confirming Learning Outcomes
Enabling Application Process Control
Checking and Handling Suspicious Processes
Extending the Process Whitelist
Start Learning on Servers Again
Disabling Application Process Control
File Integrity Monitoring
File Integrity Management Overview
Viewing File Change Records
Virus Scan
Virus Scan Overview
Scanning for Viruses
Viewing and Handling Viruses
Managing Custom Antivirus Policies
Managing Isolated Files
Dynamic Port Honeypot
Dynamic Port Honeypot Overview
Creating a Protection Policy for a Dynamic Honeypot Port
Viewing and Handling Honeypot Protection Events
Managing Dynamic Port Honeypot Protection Policies
Managing Associated Servers
Container Protection
Container Firewalls
Container Firewall Overview
Configuring a Network Defense Policy (for a Container Tunnel Network)
Configuring a Network Defense Policy (for a VPC Network)
Configuring a Network Defense Policy (for Cloud Native Network 2.0)
Configuring a Network Defense Policy (for a Native Kubernetes Network)
Container Cluster Protection
Container Cluster Protection Overview
Enabling Container Cluster Protection
Configuring a Container Cluster Protection Policy
Checking Container Cluster Protection Events
Disabling Container Cluster Protection
Detection and Response
HSS Alarms
Server Alarms
Viewing Server Alarms
Handling Server Alarms
Exporting Server Alarms
Managing Isolated Files
Container Alarms
Container Alarm Events
Viewing Container Alarms
Handling Container Alarms
Exporting Container Alarms
Whitelist Management
Managing the Login Whitelist
Managing the Alarm Whitelist
Managing the System User Whitelist
Security Operations
Policy Management
Policy Management Overview
Configuring Policies
Configuring the Policy Group Protection Mode
Creating a Custom Policy Group
Deleting a Custom Policy Group
Handling History
Container Audit
Container Audit Overview
Viewing Container Audit Logs
Security Report
Security Report Overview
Creating a Security Report
Checking a Security Report
Managing Security Reports
Free Health Check
Monthly Operation Summary
Installation and Configuration on Servers
Agent Management
Agent Release Notes
Viewing Agent Status
Upgrading the Agent
Uninstalling the Agent
Installation and Configuration on Containers
Installing an Agent in a Cluster
Overview of Agent Installation in a Cluster
Installing the Agent in a Huawei Cloud CCE Cluster
Installing an Agent in a User-built Cluster on Huawei Cloud
Installing the Agent in a Third-Party Public Network Cluster
Installing the Agent in a Third-Party Private Network Cluster
Installing the Agent on an Independent Container Node
Modifying Cluster Agent Installation Information
Managing Cluster Agents
Viewing the Cluster Node List and Permission List
Managing Agents on Independent Nodes
Connecting to a Third-party Image Repository
CI/CD Image Access Configuration
Accessing CI/CD
Editing the Blacklist or Whitelist
Account Management
Account Management Overview
Adding an Account to an Organization
Viewing Security Risks of Organization Member Accounts
Plug-in Settings
Plug-Ins Overview
Viewing Plug-in Information
Installing a Plug-in
Uninstalling a Plug-in
Authorization
Monitoring and Auditing
Cloud Eye Monitoring
HSS Metrics
Monitored HSS Events
Configuring a Monitoring Alarm Rule
Viewing Monitoring Metrics
CTS Auditing
HSS Operations Supported by CTS
Viewing CTS Traces in the Trace List
Enterprise Project Management
Managing Projects and Enterprise Projects
Managing All Projects Settings
Best Practices
HSS Best Practices You May Need
Suggestions on How to Fix Official Disclosed Vulnerabilities Provided by HSS
Git Credential Disclosure Vulnerability (CVE-2020-5260)
SaltStack Remote Command Execution Vulnerabilities (CVE-2020-11651 and CVE-2020-11652)
OpenSSL High-risk Vulnerability (CVE-2020-1967)
Adobe Font Manager Library Remote Code Execution Vulnerability (CVE-2020-1020/CVE-2020-0938)
Windows Kernel Elevation of Privilege Vulnerability (CVE-2020-1027)
Windows CryptoAPI Spoofing Vulnerability (CVE-2020-0601)
Third-Party Servers Accessing HSS Through a Direct Connect and Proxy Servers
Overview
Resources and Costs
Process Flow
Process
Creating a Direct Connect
Creating a Proxy Server
Installing an Agent on the Proxy Server
Installing and Configuring Nginx on the Proxy Server
Creating an Agent Installation Package or Installation Commands Using a Proxy Server
Installing an Agent for a Third-Party Server
Connecting Third-Party Servers to HSS Through Direct Connect and VPC Endpoint
Overview
Resources and Costs
Process Flow
Process
Creating a Direct Connect
Creating a VPC Endpoint
Obtaining a Project ID
Generating the Agent Installation Package or Installation Command
Installing an Agent for a Third-Party Server
Installing the HSS Agent Using CBH
Using HSS to Improve Server Login Security
Using HSS and CBR to Defend Against Ransomware
Overview
Resources and Costs
Defense Measures
Identifying and Fixing Ransomware
Enabling Ransomware Prevention and Backup
Restoring Backup Data
Combining WAF and HSS to Improve Web Page Tampering Protection
Using HSS to Scan for and Fix Vulnerabilities
Using HSS to Prevent Weak Passwords
Using HSS to Scan for Trojans
Using HSS to Handle Mining Attacks
Using HSS to Monitor the Integrity of Linux Server Files
Using the Whitelist to Reduce False Alarms
HSS Security Best Practices
API Reference
Before You Start
Calling APIs
Making an API Request
Authentication
Response
API Description
Asset Management
Collecting Asset Statistics, Including Accounts, Ports, and Processes
Querying the Account List
Querying Open Port Statistics
Displaying Details About a Port
Querying the Process List
Querying the Software List
Querying Automatic Startup Item Information
Querying the Server List of an Account
Querying the Open Port List of a Single Server
Querying the Server List of the Software
Querying the Service List of Auto-Started Items
Obtaining the Account Change History
Obtaining the Historical Change Records of Software Information
Obtaining the Historical Change Records of Auto-started Items
Asset Fingerprints - Process - Server List
Asset Fingerprints - Port - Server List
Querying the Server List of a Specified Middleware
Querying the Middleware List
Querying the Status of a Global Asset Scan Task
Creating a Global Asset Scan Task
Asset management-asset fingerprint-the server list of the kernel module
Asset management-asset fingerprint-the server list of the web framework
Asset management-asset fingerprint-the server list of the Web site
Querying the Asset Fingerprint Collection Status of a Single Server
Collecting Asset Fingerprints of a Single Server
Asset Management - Asset Fingerprint - Kernel Module Tree on the Left
Asset Management - Asset Fingerprint - Web Framework Navigation Tree on the Left
Asset Management - Asset Fingerprint - Web Site Navigation Tree on the Left
Asset Management - Asset Fingerprint - WebAppAndService Name Navigation Tree on the Left
Asset Management - Asset Fingerprint - WebAppAndService Asset Information on the Right
Asset Management - Overview - Asset Status - Server Agent Status
Asset Management - Overview - Asset Status - Container Node Protection Status
Asset Management - Overview - Asset Status - Agent Status
Asset Management - Overview - Asset Status - OS Statistics
Asset Management - Overview - Asset Status - Protection Quota Statistics
Asset Management - Server Management - Fingerprint Type - Middleware
Asset Management - Server Management - Fingerprint Type - Kernel Module
Asset Management - Server Management - Fingerprint Type - Web Framework
Asset Management - Server Management - Fingerprint Type - Website
Exporting Asset Fingerprints
Ransomware Prevention
Querying the Backup Vault List
Querying the Ransomware Protection Server List 2.0
Adding a Protection Policy
Deleting a Protection Policy
Querying the Backup and Restoration Task List
Querying Information About a Backup Policy
Querying the Backup Policy Bound to HSS Protection Vault
Modifying the Backup Policy Bound to Vault
Disabling Ransomware Prevention
Enabling Ransomware Prevention
Querying the Protection Policy List of Ransomware
Modifying Ransomware Protection Policies
Querying the Servers Protected Against Ransomware
Baseline Checks
Querying the Impact Scope of a Baseline Check
Baseline Policies
Querying the Baseline Directory Information of a Baseline Detection Policy
Copying Configuration Detection Policy Information
Quota Management
Querying Quota Details
Querying Quota Information
Querying Product and Offering Information
Creating an Order Quota by HSS
Querying the Resource Locking Status
Container Management
Querying Basic Container Information List
Querying the Container Node List
Querying the List of Commands Running in a Container
Creating a Container Export Task
Querying the Container Log List
Querying the Protection Overview Data of a Container Node
Changing Protection Status
Querying the Kubernetes Cluster List
Querying Container Details
Querying Kubernetes Endpoint Details
Querying the Kubernetes Endpoint List
Querying the Basic Pod Information List
Synchronizing Cluster Information
Querying Kubernetes Service Details
Querying the Kubernetes Service List
Querying Pod Details
Event Management
Querying the Attack Identifier Distribution Statistics List
Querying the Statistics of ATT&CK Phases
Deleting Isolated Files
Downloading Export Files
Querying the List of Blocked IP Addresses
Unblocking a Blocked IP Address
Querying the List of Isolated Files
Restoring Isolated Files
Querying Export Tasks
Querying Export Task Information Based on Query Conditions
Intrusion Detection
Handling Alarm Events
Querying the Detected Intrusion List
Server Management
Querying Server Groups
Creating a Server Group
Editing a Server Group
Deleting a Server Group
Querying ECSs
Querying the Server Policy List
Changing the Protection Status
Querying the Status of the Automatic Quota Binding Switch
Enabling or Disabling the Automatic Quota Binding Function
Policy Management
Applying a Policy Group
Querying the Policy Group List
Copying a Policy Group
Deleting a Policy Group
Modifying a Policy Group
Vulnerability Management
Querying the Vulnerability List
Obtaining the Number of Unread Vulnerability Tasks
Exporting Information About Vulnerabilities and Their Affected Servers
Querying Information About Containers Affected by a Vulnerability
Querying Container Application Information Affected by a Vulnerability
Querying the Servers Affected by a Vulnerability
Changing the Status of a Vulnerability
Querying Vulnerability Information About a Server
Creating a Vulnerability Scan Task
Querying a Vulnerability Scan Policy
Modifying a Vulnerability Scan Policy
Querying the Vulnerability Scan Tasks
Querying the List of Servers Corresponding to a Vulnerability Scan Task
Querying Details About Affected Servers - Process List
Querying Vulnerability Management Statistics
Viewing Handled Vulnerabilities
Querying Details About Affected Servers - Software List
Recording the Last Time When a User Viewed the Vulnerability Task Management Page
Creating a Task for Exporting Handled Vulnerabilities
Creating a Task for Exporting Vulnerability Handling Records
Querying the Backup Statistics of the Servers Where Vulnerabilities Were Handled
Querying the List of Server Vaults Corresponding to Vulnerability Handling
Querying the List of Backups That Can Be Rolled Back
Performing a Rollback Using a Backup
Web Tamper Protection
Querying the Protection List
Querying the Status of Dynamic WTP for a Server
Enabling or Disabling Dynamic WTP
Querying the Status of Static WTP for a Server
Enabling or Disabling WTP
Querying the List of Servers for Where WTP Can Be Enabled
This API is used to enable web tamper protection for servers in batches.
Viewing Web Tamper Protection Policies
Editing a Web Tamper Protection Policy
Querying the Tomcat Bin Directory Configured for Dynamic Web Tamper Protection
Modifying the Tomcat bin Directory for Dynamic Web Tamper Protection
Exporting the List of Protected WTP Directories
Querying Remote Backup Server Information
Enabling or Disabling Remote Backup
Querying the Remote Backup Server List
Adding or Modifying a Remote Backup Server
Deleting a Remote Backup Server
Suspending or Resuming a Protected Directory
Collecting Protection Data Statistics
Tag Management
Creating Tags in Batches
Deleting a Resource Tag
Querying All Tags Used in the Current Project of a Tenant
Antivirus
This API is used to query the list of servers available for virus scan.
Deleting a Custom Scan Policy
Creating a Custom Scan Policy
Querying a Custom Scan Policy List
Editing a Custom Scan Policy
Exporting the Virus Scan Result List
This API is used to handle virus scan results.
Querying the Virus Scan Result List
Querying Virus Scan Statistics
Creating a Virus Scan Task
Viewing the Virus Scan Task List
Canceling a Scan Task
Querying the Status of the Pay-per-use Billing Switch for Virus Scan
Changing the Status of the Pay-per-use Billing Switch for Virus Scan
This API is used to query the number of free virus scans.
This API is used to query the server list of paid virus scans.
This API is used to create a paid virus scan task.
Application Protection
Querying the Application Protection Event List
Querying the Protection Policy List
Querying Protection Policy Details
Querying the Detection Rule List
Querying Java Applications of a Protected Server
Querying the List of Protected Servers
Protection Data Statistics
Querying the Status of Application Protection
Deleting a Protection Policy
Adding a Protection Policy
Modifying a Protection Policy
Enable/Disable application protection and update the protection port.
Application Process Control
Querying Process Whitelist Policies
Creating a Whitelist Policy
Modifying a Whitelist Policy
Deleting a Whitelist Policy
Querying Details About a Process Whitelist Policy
Managing the Learning Status of a Process Whitelist Policy
Querying the Servers Associated with a Process Whitelist Policy
Applying a Whitelist Policy
Adding a Server to a Whitelist Policy
Deleting a Server from a Whitelist Policy
Querying the Servers Available for the Process Whitelist
Querying the Processes Identified by the Process Whitelist Policy
Adding a Process to the Whitelist Policy
Marking a Process Identified by the Process Whitelist Policy
Querying the Extended Process List of the Process Whitelist Policy
Counting Servers with Unmatched Agent Versions
Querying Suspicious Processes in the Process Whitelist
Whitelist Management
Querying the Alarm Whitelist
Querying the Login Whitelist
Adding a Login Whitelist
Deleting Whitelisted Login Items
Querying the System User Whitelist
Adding an Item to the System User Whitelist
Modifying System User Whitelist
Removing an Item from the System User Whitelist
Deleting an Alarm Whitelist
File Integrity Monitoring
Modifying the File List
Checking New File Information on a Server
Checking the New Server List
Obtaining the File Statistics of a Server
Container Installation and Configuration
Obtaining Information About the Repository Associated with an Image Synchronization Task
Deleting a Cluster Daemonset
Updating a Cluster Daemonset
Obtaining Cluster Daemonset Information
Creating a Cluster Daemonset
Querying the CI/CD Configuration List
Querying CI/CD Configuration
Modifying CI/CD Configuration
Deleting CI/CD Configuration
Creating a Task to Export All or Multiple Image Security Reports
Uninstalling daemonset in batches
Upgrading Cluster Daemonset in Batches
Querying a Multi-cloud Cluster
Creating a Multi-cloud Cluster
Synchronizing the Access Status of a Multi-cloud Cluster
Deleting a Multi-cloud Cluster
Updating a Multi-cloud Cluster
Obtaining the Agent Installation Script of a Multi-Cloud Cluster
Parsing the Configuration File of a Multi-cloud Cluster
Obtaining the Image Upload Command of a Multi-Cloud Cluster
Obtaining the Deployment Template
Obtaining the Account Permissions of a Multi-cloud Cluster
Obtaining the Image Upload Command of the Scan Component
Adding an Image Repository
Obtaining the Image Repository List
Querying the Statistics of an Image Repository
Editing Image Repository Access Information
Deleting Image Repository Access Information
Deleting Image Repository Access Information in Batches
Dynamic Port Honeypot
Switching the Dynamic Port Honeypot Policy of a Server
Disabling the Dynamic Port Honeypot Policy of a Server
Viewing a Dynamic Port Honeypot Policy
Editing Dynamic Port Honeypot Policy
Viewing Dynamic Port Honeypot Policy Details
Deleting a Dynamic Port Honeypot Policy
Adding a Dynamic Port Honeypot Policy
Installation and Configuration
Querying the Multi-Account List
Deleting an Account
Adding Accounts in Batches
Querying an Account Organization
Querying the Plug-in List
Obtaining the Prompt Information Configuration
Configuring Prompt Information
Querying the Status of the Sample Collection Configuration Switch for Malware Cloud Scans
Enabling or Disabling Malware Sample Collection for Cloud Scan
Obtaining the Docker Plug-in Installation Script
Querying the Agent Installation Script
Obtaining Notifications on a Page
Cluster Management
Obtaining Cluster Configurations
Creating a CCE Integrated Protection Configuration
Querying the Number of Cluster Assets
Obtaining Some Prompt Information
Synchronizing Cluster Protection Events
Querying the Cluster Component Protection Policy Templates
Querying a Cluster Component Protection Policy Template
Querying the Audit Log List of the Kubernetes Cluster
Querying the Kubernetes Cluster Event List
Obtaining Container Cluster Risk Information in Batches
Cluster Risks
Querying Cluster Scanning Statistics
Querying the Cluster Risk List
Querying the List of Cluster Resources Affected by Cluster Risks
Exporting Cluster Environment Security Information
Server Installation and Configuration
Querying Common Login IP Addresses
Querying Common Login Locations
This API is used to query the SSH login IP address whitelist.
Configuring Two-Factor Login
Querying the Two-Factor Server List
Querying the Global Switch of a Specified Policy
Modifying the Global Switch of a Policy (to Enable/Disable the Policy for All Associated Servers)
Querying the Status of the Automatic Agent Upgrade Function
Enabling or Disabling the Automatic Agent Upgrade Function
Querying the Automatic Isolation and Killing Status of a Program
Enabling or Disabling Automatic Isolation and Killing of Malicious Programs
Common Modules
Querying Project Configurations
Modifying Project Configurations
Saving User Access Records
IaC Risks
Obtaining the IAC File List
Obtaining the Risk List of the IAC File
Obtaining the Risk Path List of IAC Files
Common Service Modules
Creating a Task
Obtaining Jobs
Querying the Resource List Associated with the Current Task
Querying Task Statistics
Container Images
Querying the Mirror Configuration Check Report
Querying the Check Item List of a Specified Security Configuration Item of an Image
Querying the List of Image Security Configuration Detection Results
Scanning Images in the Image Repository in Batches
Querying the Local Image List
Querying the Image List of the SWR Image Repository (Deprecated)
Synchronizing the Image List from SWR
CVE Information Corresponding to the Vulnerability
Querying Image Vulnerability Information
Viewing the List of Images Affected by the Vulnerability
Handling Image Vulnerabilities
Querying Container Image Operation Logs
Querying the Container Image List
Container Assets - Image Statistics
Querying the Image Whitelist
Querying Details About an Image Whitelist
Querying the List of Vulnerabilities Affected by Image Vulnerability Handling Operations
Image Scan Task
Obtaining the Scan Task List
Security Operations
Querying the List of Historical Alarm Records
Viewing Vulnerability Handling History
Querying the List of Historical Virus Scan Records
Querying the Security Check Report Information of a Cluster
Vulnerability Report
Vulnerability Management - Server View - Server List - Export Report
Ransomware Protection
Enabling Ransomware Protection 2.0 in Batches
Cluster Protection
Querying Cluster Protection Information
Obtaining the List of Default Cluster Protection Policies
Obtaining Alarm Events in All Clusters
Modifying the Alarm Status
Cluster Protection Overview
Deleting a Cluster Protection Policy
Obtaining the Cluster Protection Policies
Creating a Cluster Protection Policy
Modifying a Cluster Protection Policy
Viewing Details About a Specified Policies
Obtaining All the Protection Items of a Cluster
Performing Operations on Cluster Protection
Baseline Management
Ignoring, Unignoring, Repairing, or Verifying the Failed Configuration Check Items
Querying the Report of a Check Item in a Security Configuration Check
Querying the Password Complexity Policy Detection Report
Querying the Checklist of a Security Configuration Item
Querying the Check Result of a Security Configuration Item
Querying the List of Affected Servers of a Security Configuration Item
Querying the Result List of Server Security Configuration Check
Querying the Weak Password Detection Result List
Ignoring or Unignoring Servers that Fail the Password Complexity Check
Querying Manual Baseline Scan Results
Querying the Baseline Whitelist Items
Added baseline whitelists.
Deleting a Baseline Whitelist
Modifying the Baseline Whitelist
Querying the Baseline Whitelist
Container Assets
Querying the Basic CronJobs Information List
Querying the Basic DaemonSets Information List
Querying Basic Deployment Information
Querying the Basic Job Information List
Querying the Basic StatefulSet Information List
Container Network Isolation Information
Querying Clusters Protected by Container Security
Querying the Network Information of a Container Cluster
Querying the List of Container Cluster Network Policies
Delete The Container Cluster Network Configuration Policy
Container Cluster Network Update Configuration Policy
Configuration Policy for Adding a Network to a Container Cluster
Synchronizing the Latest Container Network Policies from a Cluster
Synchronizing the latest data of a container cluster
Synchronizing the Latest Data of Network Nodes in a Cluster
Cluster Network Policy Overview
Obtaining Namespaces in a Cluster
Querying the Node List of a Container Cluster VPC Network
Synchronizing the Latest Security Group Policies in a Cluster
Querying the Security Group Policies Configured for Clusters Using Cloud Native Network Mode 2.0
Creating a Security Group Policy
Updating a Security Group Policy
Deleting a Security Group Policy
Querying All Security Groups in an Enterprise Project
Querying the Workloads in a Namespace in a Cluster
Appendixes
Status Code
Error Codes
Obtaining a Project ID
Obtaining an Enterprise Project ID
Obtaining Region ID
SDK Reference
SDK Overview
FAQs
About HSS
What Is Host Security?
What Is Container Security?
What Is Web Tamper Protection?
What Are the Relationships Between Images, Containers, and Applications?
How Do I Use HSS?
Can HSS Protect Local IDC Servers?
Is HSS in Conflict with Any Other Security Software?
What Are the Differences Between HSS and WAF?
Can HSS Be Used Across Accounts?
What Is the HSS Agent?
Can HSS Be Used Across Clouds?
Does HSS Support Version Upgrade?
Can HSS Automatically Detect and Remove Viruses?
Agent
Do I Need to Install the HSS Agent After Purchasing HSS?
Is the Agent in Conflict with Any Other Security Software?
How Do I Uninstall the Agent?
What Should I Do If Agent Installation Failed?
How Do I Fix an Abnormal Agent?
What Is the Default Agent Installation Path?
How Many CPU, Memory, and Disk Resources Are Occupied When the Agent Is Running?
Do Different HSS Editions Share the Same Agent?
How Do I View Servers Where No Agents Have Been Installed?
How Do I Upgrade the Agent?
What Do I Do If the HSS Upgrade Fails?
What Resources Will Be Accessed by the Agent After It Is Installed on a Server?
How Do I Use Images to Install Agents in Batches?
What Do I Do If I Cannot Access the Download Link of the Windows Or Linux Agent?
What Do I Do If Agent Upgrade Fails and the Message "File replacement failed" Is Displayed?
What Can I Do If Agents Failed to Be Installed in Batches and a Message Is Displayed Indicating that the Network Is Disconnected?
How Do I Verify the Connection Between My Server and the HSS Server?
Protection
Protection Interrupted
Protection Degraded
Vulnerability Management
How Do I Fix Vulnerabilities?
What Do I Do If an Alarm Still Exists After I Fixed a Vulnerability?
Why a Server Displayed in Vulnerability Information Does Not Exist?
Do I Need to Restart a Server After Its Vulnerabilities Are Fixed?
Can I Check the Vulnerability and Baseline Fix History on HSS?
What Do I Do If Vulnerability Fix Failed?
Why Can't I Select a Server During Manual Vulnerability Scanning or Batch Vulnerability Fixing?
What Do I Do If a Vulnerability Scan Failed?
Do I Need to Subscribe to Ubuntu Pro to Fix Ubuntu Vulnerabilities?
Detection & Response
How Do I View and Handle HSS Alarm Notifications?
What Do I Do If My Servers Are Subjected to a Mining Attack?
Why a Process Is Still Isolated After It Was Whitelisted?
Why an Attack Is Not Detected by HSS?
Can I Unblock an IP Address Blocked by HSS, and How?
Why a Blocked IP Address Is Automatically Unblocked?
How Often Is Malware Scan and Removal?
How Often Are the HSS Virus Database and Vulnerability Database Updated?
What Do I Do If an IP Address Is Blocked by HSS?
How Do I Defend Against Ransomware Attacks?
Why Can't I Receive Alarms After the HSS Is Upgraded?
How Do I Add High-risk Command Execution Alarms to the Whitelist?
Why Doesn't HSS Generate Alarms for Some Web Shell Files?
Abnormal Logins
Why Do I Still Receive Remote Login Alarms After Configuring the Login IP Whitelist?
How Do I Check the User IP address of a Remote Login?
How Do I Cancel the Alarm Notifications of Successful Server Logins?
Can I Disable Remote Login Detection?
How Do I Know Whether an Intrusion Succeeded?
Brute-force Attack Defense
How Does HSS Intercept Brute Force Attacks?
How Do I Handle a Brute-force Attack Alarm?
How Do I Defend Against Brute-force Attacks?
How Do I Unblock an IP Address?
What Do I Do If HSS Frequently Reports Brute-force Alarms?
What Do I Do If a Huawei Cloud IP Address Trigger a Brute-force Attack Alarm?
What Do I Do If the Port in Brute-force Attack Records Is Not Updated?
Baseline Inspection
Why Are Weak Password Alarms Generated After the Weak Password Detection Policy Is Disabled?
How Do I Install a PAM and Set a Proper Password Complexity Policy in a Linux OS?
How Do I Set a Proper Password Complexity Policy in a Windows OS?
How Do I Handle Unsafe Settings?
How Do I View Configuration Check Reports?
How Do I Handle a Weak Password Alarm?
How Do I Set a Secure Password?
Web Tamper Protection
Why Do I Need to Add a Protected Directory?
How Do I Modify a Protected Directory?
What Should I Do If WTP Cannot Be Enabled?
How Do I Modify a File After WTP Is Enabled?
What Are the Differences Between the Web Tamper Protection Functions of HSS and WAF?
Container Security
How Do I Disable Node Protection?
How Do I Switch from CGS to HSS?
How Do I Enable Node Protection?
How Do I Enable the API Server Audit for an On-Premises Kubernetes Container?
What Do I Do If the Container Cluster Protection Plug-in Fails to Be Uninstalled?
What Do I Do If the Cluster Connection Component (ANP-Agent) Failed to Be Deployed?
What Do I Do If Cluster Permissions Are Abnormal?
Failed to Upload the Image to the Private Image Repository
What Do I Do If I Failed to Enable Protection for a CCE Cluster?
What Do I Do If a Repository Image Scan Failed?
Ransomware Prevention
What Are the Differences Between Ransomware Protection Backup and Cloud Backup?
Ransomware Protection Exception
Region and AZ
What Are Regions and AZs?
In What Regions Is HSS Available to Non-Huawei Cloud Servers?
Security Configurations
How Do I Clear the SSH Login IP Address Whitelist Configured in HSS?
What Can I Do If I Cannot Remotely Log In to a Server via SSH?
How Do I Use 2FA?
What Do I Do If I Cannot Enable 2FA?
Why Can't I Receive a Verification Code After 2FA Is Enabled?
Why Does My Login Fail After I Enable 2FA?
How Do I Add a Mobile Number or Email Address for 2FA?
Do I Use a Fixed Verification Code for 2FA?
Will I Be Billed for Alarm Notifications and SMS?
How Do I Modify Alarm Notification Recipients?
Why No Topics Are Available for Me to Choose When I Configure Alarm Notifications?
Can I Disable HSS Alarm Notifications?
How Do I Modify Alarm Notification Items?
How Do I Disable the SELinux Firewall?
Protection Quota
How Do I Extend the Validity Period of HSS Quotas?
How Do I Filter Unprotected Servers?
Why Can't I Find the Servers I Purchased on the Console?
What Do I Do If My Quotas Are Insufficient and I Failed to Enable Protection?
How Do I Allocate My Quota?
If I Change the OS of a Protected Server, Does It Affect My HSS Quota?
Why Doesn't an HSS Edition Take Effect After Purchase?
How Do I Change the Protection Quota Edition Bound to a Server?
Can I Bind a Server to an HSS Quota If They Are in Different Enterprise Projects?
When an ECS or CCE Cluster Node Is Deleted, Will They Be Unbound from Their Protection Quotas?
Others
How Do I Use the Windows Remote Desktop Connection Tool to Connect to a Windows Server?
How Do I Check HSS Log Files?
How Do I Enable Logging for Login Failures?
Why Can't I View All Projects in the Enterprise Project Drop-down List?
How Do I Enable or Disable the Agent Self-protection Policy?
What Do I Do If Windows Self-Protection Cannot Be Disabled?
Why Is a Deleted Server Still Displayed in the HSS Server List?
Videos
More Documents
User Guide (Ankara Region)
Introduction
What Is HSS?
Advantages
Scenarios
Editions and Features
HSS Permissions Management
Constraints and Limitations
Basic Concepts
Enabling HSS
Installing an Agent
Installing an Agent on Linux
Installing an Agent on Windows
Enabling HSS
Enabling the Enterprise/Premium Edition
Enabling the WTP Edition
Enabling Container Node Protection
(Optional) Switching the HSS Edition
Installation and Configuration
Server Security Dashboard
Risk Statistics
Asset Management
Asset Management
Server Fingerprints
Viewing Server Asset Fingerprints
Viewing the Operation History of Server Assets
Manually Updating Server Asset Information in Real Time
Container Fingerprints
Viewing Container Asset Fingerprints
Manually Updating Container Asset Information in Real Time
Server Management
Viewing Server Protection Status
Enabling Protection
Enterprise/Premium Edition
WTP Edition
Disabling Protection
Enterprise/Premium Edition
WTP Edition
Applying a Policy
Managing Server Groups
Configuring Asset Importance
Container Management
Viewing the Clusters and Protection Quotas
Enabling Container Security Protection
Disabling Container Security Protection
Container Images
Local Images
Viewing Container Information
Handling Risk Containers
Risk Prevention
Vulnerability Management
Vulnerability Management Overview
Vulnerability Scan
Viewing Vulnerability Details
Fixing and Verifying the Fix ofVulnerabilities
Managing the Vulnerability Whitelist
Viewing Vulnerability Handling History
Baseline Inspection
Baseline Check Overview
Viewing Baseline Check Details
Fixing Unsafe Settings
Managing Baseline Check Policies
Container Image Security
Image Vulnerabilities
Viewing Malicious File Detection Results
Image Baseline Check
Prevention
Application Protection
Viewing Application Protection
Enabling Application Protection
Managing Application Protection
Disabling Application Protection
Managing Policies
WTP
Adding a Protected Directory
Managing Remote Backup Servers
Setting Scheduled WTP Protection
Enabling Dynamic WTP
Viewing WTP Reports
Viewing WTP Events
Adding a Privileged Process
Ransomware Prevention
Purchasing a Backup Vault
Enabling Ransomware Prevention
Preventing Ransomware
Disabling Ransomware Prevention
Managing Protection Policies
File Integrity Monitoring
Viewing File Integrity Management
Checking Change Details
Checking Modified Files
Intrusion Detection
Alarms
HSS Alarms
Server Alarms
Viewing Intrusion Alarms
Managing Isolated Files
Handling Server Alarms
Container Alarms
Container Alarm Events
Viewing Container Alarms
Handling Container Alarms
Whitelist Management
Configuring the Login Whitelist
Managing the Alarm Whitelist
Configuring the System User Whitelist
Security Operations
Policy Management
Viewing a Policy Group
Creating a Policy Group
Modifying a Policy
Viewing the Handling History
Security Report
Checking a Security Report
Subscribing to a Security Report
Creating a Security Report
Managing a Security Report
Installation & Configuration
Agent Management
Viewing Agent Management
Installing an Agent
Uninstalling an Agent
Upgrading the Agent
Security Configurations
Plug-in Management
Plug-Ins Overview
Viewing Plug-in Details
Installing a Plug-in
Upgrading a Plug-in
Uninstalling a Plug-in
Permissions Management
Creating a User and Granting Permissions
HSS Custom Policies
FAQs
About HSS
What Is HSS?
What Is Container Security Service?
What Is Web Tamper Protection?
What Are the Relationships Between Images, Containers, and Applications?
How Do I Use HSS?
Can HSS Protect Local IDC Servers?
Is HSS in Conflict with Any Other Security Software?
What Are the Differences Between HSS and WAF?
What Is the HSS Agent?
Agent FAQs
Is the Agent in Conflict with Any Other Security Software?
How Do I Install the Agent?
How Do I Uninstall the Agent?
What Should I Do If Agent Installation Failed?
How Do I Fix an Abnormal Agent?
What Is the Default Agent Installation Path?
How Many CPU and Memory Resources Are Occupied by the Agent When It Performs Scans?
Do WTP and HSS Use the Same Agent?
How Do I View Servers Where No Agents Have Been Installed?
Brute-force Attack Defense
How Does HSS Intercept Brute Force Attacks?
How Do I Handle a Brute-force Attack Alarm?
How Do I Defend Against Brute-force Attacks?
How Do I Do If the Account Cracking Prevention Function Does Not Take Effect on Some Linux Accounts?
How Do I Unblock an IP Address?
What Do I Do If HSS Frequently Reports Brute-force Alarms?
What Do I Do If My Remote Server Port Is Not Updated in Brute-force Attack Records?
Weak Passwords and Unsafe Accounts
How Do I Handle a Weak Password Alarm?
How Do I Set a Secure Password?
Why Are the Weak Password Alarms Still Reported After the Weak Password Policy Is Disabled?
Intrusions
What Do I Do If My Servers Are Subjected to a Mining Attack?
Why a Process Is Still Isolated After It Was Whitelisted?
What Do I Do If a Mining Process Is Detected on a Server?
Why Some Attacks on Servers Are Not Detected?
Can I Unblock an IP Address Blocked by HSS, and How?
Why a Blocked IP Address Is Automatically Unblocked?
How Often Does HSS Detect, Isolate, and Kill Malicious Programs?
What Do I Do If an IP Address Is Blocked by HSS?
How Do I Defend Against Ransomware Attacks?
Abnormal Logins
Why Do I Still Receive Remote Login Alarms After Configuring the Login IP Whitelist?
How Do I Check the User IP address of a Remote Login?
How Do I Know Whether an Intrusion Succeeded?
Unsafe Settings
How Do I Install a PAM and Set a Proper Password Complexity Policy in a Linux OS?
How Do I Set a Proper Password Complexity Policy in a Windows OS?
How Do I Handle Unsafe Configurations?
How Do I View Configuration Check Reports?
Vulnerability Management
How Do I Fix Vulnerabilities?
What Do I Do If an Alarm Still Exists After I Fixed a Vulnerability?
Why a Server Displayed in Vulnerability Information Does Not Exist?
Do I Need to Restart a Server After Fixing its Vulnerabilities?
Can I Check the Vulnerability and Baseline Fix History on HSS?
Web Tamper Protection
Why Do I Need to Add a Protected Directory?
How Do I Modify a Protected Directory?
What Should I Do If WTP Cannot Be Enabled?
How Do I Modify a File After WTP Is Enabled?
What Can I Do If I Enabled Dynamic WTP But Its Status Is Enabled but not in effect?
What Are the Differences Between the Web Tamper Protection Functions of HSS and WAF?
Container Guard Service
How Do I Disable Node Protection?
What Is the Log Processing Mechanism of CGS?
How Do I Enable Node Protection?
How Do I Enable the API Server Audit for an On-Premises Kubernetes Container?
Ransomware Protection
What Are the Differences Between Ransomware Protection Backup and Cloud Backup?
Security Configurations
How Do I Clear the SSH Login IP Address Whitelist Configured in HSS?
What Can I Do If I Cannot Remotely Log In to a Server via SSH?
How Do I Use 2FA?
What Do I Do If I Cannot Enable 2FA?
Why Can't I Receive a Verification Code After 2FA Is Enabled?
Why Does My Login Fail After I Enable 2FA?
How Do I Add a Mobile Phone Number or Email Address for Receiving 2FA Verification Notifications?
If I Choose to Use Verification Code for 2FA, How Do I Get the Code?
How Do I Disable the SELinux Firewall?
Quotas
How Do I Filter Unprotected Servers?
What Do I Do If My Quotas Are Insufficient and I Failed to Enable Protection?
If I Change the OS of a Protected Server, Does It Affect My HSS Quota?
Others
How Do I Use the Windows Remote Desktop Connection Tool to Connect to a Server?
How Do I Check HSS Log Files?
How Do I Enable Logging for Login Failures?
How Do I Clear an Alarm on Critical File Changes?
Is HSS Available as Offline Software?
How Do I Enable HSS Self-Protection?
What Do I Do If HSS Self-Protection Cannot Be Disabled?
Change History
User Guide (ME-Abu Dhabi Region)
Introduction
What Is HSS?
Advantages
Scenarios
Editions and Features
HSS Permissions Management
Constraints and Limitations
Billing
Related Services
Basic Concepts
Enabling HSS
Installing an Agent
Installing an Agent on Linux
Installing the Agent for Windows
Enabling Protection
Enabling the Enterprise/Premium Edition
Enabling Web Tamper Protection
Enabling Container Protection
Common Security Configuration
Server Security Dashboard
Risk Statistics
Asset Management
Asset Management
Server Fingerprints
Viewing Server Asset Fingerprints
Container Fingerprints
Viewing Container Asset Fingerprints
Server Management
Viewing Server Protection Status
Enabling Protection
Enterprise/Premium Edition
WTP Edition
Disabling Protection
Disabling the Enterprise/Premium Edition
Disabling WTP
Switching the HSS Quota Edition
Deploying a Policy
Managing Server Groups
Servers Importance Management
Container Management
Viewing the Container Node Protection List
Enabling Container Security Protection
Disabling Protection for Container Edition
Container Images
Local Images
Managing SWR Private Images
Managing SWR Shared Images
Viewing Container Information
Handling Risk Containers
Asset Fingerprint Management
Asset Management
Viewing Server Asset Information
Checking Operation History
Container Asset Management
Viewing Container Asset Details
Risk Prevention
Vulnerability Management
Vulnerability Management Overview
Vulnerability Scan (Manual)
Viewing Vulnerability Details
Exporting the vulnerability list
Fixing and Verifying the Fix of Vulnerabilities
Managing the Vulnerability Whitelist
Viewing Vulnerability Handling History
Baseline Inspection
Baseline Check Overview
Viewing Baseline Check Details
Fixing Unsafe Settings
Managing Baseline Check Policies
Container Image Security
Image Vulnerabilities
Viewing Malicious File Detection Results
Image Baseline Check
Prevention
Application Protection
Enabling Application Protection
Viewing Application Protection
Managing Application Protection
Managing Application Protection Policies
Disabling Application Protection
WTP
Adding a Protected Directory
Configuring Remote Backup
Adding a Privileged Process
Enabling/Disabling Scheduled Static WTP
Enabling Dynamic WTP
Viewing WTP Reports
Viewing WTP Events
Ransomware Prevention
Enabling Ransomware Prevention
Viewing Ransomware Protection
Managing Protection Policies
Disabling Ransomware Prevention
File Integrity Monitoring
Viewing File Integrity Management
Checking Change Details
Checking Modified Files
Container Firewalls
Container Firewall Overview
Creating a Policy (for a Cluster Using the Container Tunnel Network Model)
Creating a Policy (for a Cluster Using the VPC Network Model)
Managing Policies (for a Cluster Using the Container Tunnel Network Model)
Managing Policies (for a Cluster Using the VPC Network Model)
Intrusion Detection
Alarms
HSS Alarms
Server Alarms
Viewing Server Alarms
Handling Server Alarms
Exporting Server Alarms
Managing Isolated Files
Container Alarms
Container Alarm Events
Viewing Container Alarms
Handling Container Alarms
Exporting Container Alarms
Whitelist Management
Configuring the Login Whitelist
Managing the Alarm Whitelist
Managing the System User Whitelist
Security Operations
Policy Management
Viewing a Policy Group
Creating a Policy Group
Editing a Policy
Viewing the Handling History
Security Report
Checking a Security Report
Subscribing to a Security Report
Creating a Security Report
Managing Security Reports
Installation & Configuration
Agent Management
Viewing Agent Status
Installing an Agent
Upgrading the Agent
Uninstalling an Agent
Security Configurations
Plug-in Management
Plug-Ins Overview
Viewing Plug-in Details
Installing a Plug-in
Upgrading a Plug-in
Uninstalling a Plug-in
Audit
HSS Operations Supported by CTS
Viewing Audit Logs
Permissions Management
Creating a User and Granting Permissions
HSS Custom Policies
HSS Actions
Manually Upgrading HSS
Upgrade Overview
Step 1: Disabling HSS Protection of the Old Version
Step 2: Uninstalling the Agent of the Old Version
Step 3: Installing the Agent of the New Version
Step 4: Enabling HSS Protection of the New Version
Enabling the HSS Enterprise or Premium Edition
Enabling Web Tamper Protection
Enabling Container Protection
FAQs
About HSS
What Is HSS?
What Is Container Security Service?
What Is Web Tamper Protection?
What Are the Relationships Between Images, Containers, and Applications?
What Is the HSS Agent?
Agent FAQs
Is the Agent in Conflict with Any Other Security Software?
How Do I Uninstall the Agent?
What Should I Do If Agent Installation Failed?
How Do I Fix an Abnormal Agent?
What Is the Default Agent Installation Path?
How Many CPU and Memory Resources Are Occupied by the Agent When It Performs Scans?
Do WTP and HSS Use the Same Agent?
How Do I View Servers Where No Agents Have Been Installed?
What Can I Do If the Agent Status Is Still "Not installed" After Installation?
What Do I Do If the HSS Upgrade Fails?
Brute-force Attack Defense
How Does HSS Intercept Brute Force Attacks?
How Do I Handle a Brute-force Attack Alarm?
How Do I Defend Against Brute-force Attacks?
What Do I Do If the Account Cracking Prevention Function Does Not Take Effect on Some Accounts for Linux Servers?
How Do I Unblock an IP Address?
What Do I Do If HSS Frequently Reports Brute-force Alarms?
What Do I Do If My Remote Server Port Is Not Updated in Brute-force Attack Records?
Weak Passwords and Unsafe Accounts
How Do I Handle a Weak Password Alarm?
How Do I Set a Secure Password?
Why Are the Weak Password Alarms Still Reported After the Weak Password Policy Is Disabled?
Intrusions
What Do I Do If My Servers Are Subjected to a Mining Attack?
Why a Process Is Still Isolated After It Was Whitelisted?
What Do I Do If a Mining Process Is Detected on a Server?
Why Some Attacks on Servers Are Not Detected?
Can I Unblock an IP Address Blocked by HSS, and How?
Why a Blocked IP Address Is Automatically Unblocked?
How Often Does HSS Detect, Isolate, and Kill Malicious Programs?
What Do I Do If an IP Address Is Blocked by HSS?
How Do I Defend Against Ransomware Attacks?
Abnormal Logins
Why Do I Still Receive Remote Login Alarms After Configuring the Login IP Whitelist?
How Do I Check the User IP address of a Remote Login?
What Can I Do If an Alarm Indicating Successful Login Is Reported?
Can I Disable Remote Login Detection?
How Do I Know Whether an Intrusion Succeeded?
Unsafe Settings
How Do I Install a PAM and Set a Proper Password Complexity Policy in a Linux OS?
How Do I Set a Proper Password Complexity Policy in a Windows OS?
How Do I Handle Unsafe Configurations?
How Do I View Configuration Check Reports?
Vulnerability Management
How Do I Fix Vulnerabilities?
What Do I Do If an Alarm Still Exists After I Fixed a Vulnerability?
Why a Server Displayed in Vulnerability Information Does Not Exist?
Do I Need to Restart a Server After Fixing its Vulnerabilities?
Web Tamper Protection
Why Do I Need to Add a Protected Directory?
How Do I Modify a Protected Directory?
What Should I Do If WTP Cannot Be Enabled?
How Do I Modify a File After WTP Is Enabled?
What Can I Do If I Enabled Dynamic WTP But Its Status Is Enabled but not in effect?
What Are the Differences Between the Web Tamper Protection Functions of HSS and WAF?
Container Guard Service
How Do I Disable Node Protection?
What Is the Log Processing Mechanism of CGS?
How to Switch from CGS to HSS Console?
How Do I Enable Node Protection?
Security Configurations
What Can I Do If I Cannot Remotely Log In to a Server via SSH?
How Do I Use 2FA?
Why Can't I Receive a Verification Code After 2FA Is Enabled?
Why Does My Login Fail After I Enable 2FA?
How Do I Add a Mobile Phone Number or Email Address for Receiving 2FA Verification Notifications?
How Do I Disable the SELinux Firewall?
Others
How Do I Use the Windows Remote Desktop Connection Tool to Connect to a Server?
How Do I Check HSS Log Files?
How Do I Enable Logging for Login Failures?
How Do I Clear an Alarm on Critical File Changes?
Change History
User Guide (Paris)
Introduction
What Is ?
Advantages
Scenarios
Editions and Features
HSS Permissions Management
Constraints and Limitations
Billing
Related Services
Basic Concepts
Enabling HSS
Installing an Agent
Installing an Agent on Linux
Installing the Agent for Windows
Enabling Protection
Enabling the Enterprise/Premium Edition
Enabling Web Tamper Protection
Enabling Container Protection
Enabling Alarm Notifications
Common Security Configuration
Server Security Dashboard
Risk Statistics
Asset Management
Asset Management
Server Fingerprints
Viewing Server Asset Fingerprints
Container Fingerprints
Viewing Container Asset Fingerprints
Server Management
Viewing Server Protection Status
Enabling Protection
Enterprise/Premium Edition
WTP Edition
Disabling Protection
Disabling the Enterprise/Premium Edition
Disabling WTP
Switching the HSS Quota Edition
Deploying a Policy
Managing Server Groups
Servers Importance Management
Installing Agents in Batches (with the Same Server Account and Password)
Container Management
Viewing the Container Node Protection List
Enabling Container Security Protection
Disabling Protection for Container Edition
Container Images
Managing SWR Private Images
Viewing Container Information
Risk Prevention
Vulnerability Management
Vulnerability Management Overview
Vulnerability Scan (Manual)
Viewing Vulnerability Details
Exporting the vulnerability list
Handling Vulnerabilities
Managing the Vulnerability Whitelist
Viewing Vulnerability Handling History
Baseline Inspection
Baseline Check Overview
Viewing Baseline Check Details
Fixing Unsafe Settings
Managing Baseline Check Policies
Container Image Security
Image Vulnerabilities
Viewing Malicious File Detection Results
Image Baseline Check
Prevention
WTP
Adding a Protected Directory
Configuring Remote Backup
Adding a Privileged Process
Enabling/Disabling Scheduled Static WTP
Enabling Dynamic WTP
Viewing WTP Reports
Viewing WTP Events
Ransomware Prevention
Enabling Ransomware Prevention
Viewing Ransomware Protection
Managing Protection Policies
Disabling Ransomware Prevention
File Integrity Monitoring
Viewing File Integrity Management
Checking Change Details
Checking Modified Files
Container Firewalls
Container Firewall Overview
Creating a Policy (for a Cluster Using the Container Tunnel Network Model)
Creating a Policy (for a Cluster Using the VPC Network Model)
Managing Policies (for a Cluster Using the Container Tunnel Network Model)
Managing Policies (for a Cluster Using the VPC Network Model)
Intrusion Detection
Alarms
HSS Alarms
Server Alarms
Viewing Server Alarms
Handling Server Alarms
Exporting Server Alarms
Managing Isolated Files
Container Alarms
Container Alarm Events
Viewing Container Alarms
Handling Container Alarms
Exporting Container Alarms
Whitelist Management
Configuring the Login Whitelist
Managing the Alarm Whitelist
Managing the System User Whitelist
Security Operations
Policy Management
Viewing a Policy Group
Creating a Policy Group
Editing a Policy
Viewing the Handling History
Security Report
Checking a Security Report
Subscribing to a Security Report
Creating a Security Report
Managing Security Reports
Installation & Configuration
Agent Management
Viewing Agent Status
Installing an Agent
Upgrading the Agent
Uninstalling an Agent
Security Configurations
Plug-in Management
Plug-Ins Overview
Viewing Plug-in Details
Installing a Plug-in
Upgrading a Plug-in
Uninstalling a Plug-in
Audit
HSS Operations Supported by CTS
Viewing Audit Logs
Permissions Management
Creating a User and Granting Permissions
HSS Custom Policies
Manually Upgrading HSS
Upgrade Overview
Step 1: Disabling HSS Protection of the Old Version
Step 2: Uninstalling the Agent of the Old Version
Step 3: Installing the Agent of the New Version
Step 4: Enabling HSS Protection of the New Version
Enabling the HSS Enterprise or Premium Edition
Enabling Web Tamper Protection
Enabling Container Protection
FAQs
About HSS
What Is HSS?
What Is Container Security Service?
What Is Web Tamper Protection?
What Are the Relationships Between Images, Containers, and Applications?
What Are the Differences Between HSS and WAF?
What Is the HSS Agent?
Agent FAQs
Is the Agent in Conflict with Any Other Security Software?
How Do I Uninstall the Agent?
What Should I Do If Agent Installation Failed?
How Do I Fix an Abnormal Agent?
What Is the Default Agent Installation Path?
How Many CPU and Memory Resources Are Occupied by the Agent When It Performs Scans?
Do WTP and HSS Use the Same Agent?
How Do I View Servers Where No Agents Have Been Installed?
What Can I Do If the Agent Status Is Still "Not installed" After Installation?
What Addresses Do ECSs Access After the Agent Is Installed?
Brute-force Attack Defense
How Does HSS Intercept Brute Force Attacks?
How Do I Handle a Brute-force Attack Alarm?
How Do I Defend Against Brute-force Attacks?
What Do I Do If the Account Cracking Prevention Function Does Not Take Effect on Some Accounts for Linux Servers?
How Do I Unblock an IP Address?
What Do I Do If HSS Frequently Reports Brute-force Alarms?
What Do I Do If My Remote Server Port Is Not Updated in Brute-force Attack Records?
Weak Passwords and Unsafe Accounts
How Do I Handle a Weak Password Alarm?
How Do I Set a Secure Password?
Why Are the Weak Password Alarms Still Reported After the Weak Password Policy Is Disabled?
Intrusions
What Do I Do If My Servers Are Subjected to a Mining Attack?
Why a Process Is Still Isolated After It Was Whitelisted?
What Do I Do If a Mining Process Is Detected on a Server?
Why Some Attacks on Servers Are Not Detected?
Can I Unblock an IP Address Blocked by HSS, and How?
Why a Blocked IP Address Is Automatically Unblocked?
How Often Does HSS Detect, Isolate, and Kill Malicious Programs?
What Do I Do If an IP Address Is Blocked by HSS?
How Do I Defend Against Ransomware Attacks?
Abnormal Logins
Why Do I Still Receive Remote Login Alarms After Configuring the Login IP Whitelist?
How Do I Check the User IP address of a Remote Login?
What Can I Do If an Alarm Indicating Successful Login Is Reported?
Can I Disable Remote Login Detection?
How Do I Know Whether an Intrusion Succeeded?
Unsafe Settings
How Do I Install a PAM and Set a Proper Password Complexity Policy in a Linux OS?
How Do I Set a Proper Password Complexity Policy in a Windows OS?
How Do I Handle Unsafe Configurations?
How Do I View Configuration Check Reports?
Vulnerability Management
How Do I Fix Vulnerabilities?
What Do I Do If an Alarm Still Exists After I Fixed a Vulnerability?
Why a Server Displayed in Vulnerability Information Does Not Exist?
Do I Need to Restart a Server After Fixing its Vulnerabilities?
Can I Check the Vulnerability and Baseline Fix History on HSS?
What Do I Do If Vulnerability Fix Failed?
Why Can't I Select a Server During Manual Vulnerability Scanning or Batch Vulnerability Fixing?
Web Tamper Protection
Why Do I Need to Add a Protected Directory?
How Do I Modify a Protected Directory?
What Should I Do If WTP Cannot Be Enabled?
How Do I Modify a File After WTP Is Enabled?
What Can I Do If I Enabled Dynamic WTP But Its Status Is Enabled but not in effect?
What Are the Differences Between the Web Tamper Protection Functions of HSS and WAF?
Container Guard Service
How Do I Disable Node Protection?
What Is the Log Processing Mechanism of CGS?
How to Switch from CGS to HSS Console?
How Do I Enable Node Protection?
How Do I Enable the API Server Audit for an On-Premises Kubernetes Container?
Security Configurations
How Do I Clear the SSH Login IP Address Whitelist Configured in HSS?
What Can I Do If I Cannot Remotely Log In to a Server via SSH?
How Do I Use 2FA?
What Do I Do If I Cannot Enable 2FA?
Why Can't I Receive a Verification Code After 2FA Is Enabled?
Why Does My Login Fail After I Enable 2FA?
How Do I Add a Mobile Phone Number or Email Address for Receiving 2FA Verification Notifications?
If I Choose to Use Verification Code for 2FA, How Do I Get the Code?
How Do I Modify Alarm Notification Recipients?
Why No Topics Are Available for Me to Choose When I Configure Alarm Notifications?
Can I Disable HSS Alarm Notifications?
How Do I Modify Alarm Notification Items?
How Do I Disable the SELinux Firewall?
Others
How Do I Use the Windows Remote Desktop Connection Tool to Connect to a Server?
How Do I Check HSS Log Files?
How Do I Enable Logging for Login Failures?
How Do I Clear an Alarm on Critical File Changes?
Is HSS Available as Offline Software?
Why Is a Deleted ECS Still Displayed in the HSS Server List?
Change History
General Reference
Glossary
Service Level Agreement
White Papers
Endpoints
Permissions