All Documentation
Host Security Service (New)
Host Security Service (New)
What's New
Function Overview
Product Bulletin
[September 1, 2022] Changes in the Free Trial Specifications of the HSS Basic Edition (Pay-per-use)
Service Overview
What Is HSS?
Advantages
Editions and Features
Scenarios
Constraints
Pricing Details
Personal Data Protection Mechanism
Security
Shared Responsibilities
Certificates
Asset Identification and Management
Identity Authentication and Access Control
Data Protection Technologies
Audit and Logging
Service Resilience
Risk Monitoring
Fault Rectification
Update Management
HSS Permissions Management
Related Services
Concepts
Change History
Getting Started
User Guide
Enabling HSS
Purchasing an HSS Quota
Purchasing a CGS Quota
Installing an Agent
Installing an Agent on the Linux OS
Installing an Agent on the Windows OS
Enabling HSS
Enabling the Basic/Enterprise/Premium Edition
Enabling the WTP Edition
Enabling Container Node Protection
(Optional) Switching the HSS Edition
Enabling Alarm Notifications
Security Configuration
Server Security Dashboard
Risk Statistics
Free Scan on Unprotected Servers
Asset Management
Asset Management
Server Management
Managing the Server List
Enabling Protection
Basic/Professional/Premium Edition
WTP Edition
CGS Edition
Disabling Protection
Basic/Professional/Premium Edition
WTP Edition
CGS Edition
Applying a Policy
Managing Server Groups
Configuring Asset Importance
Batch Installing Agents
Container Management
Viewing the Clusters and Protection Quotas
Container Images
Private Images
Asset Fingerprint Management
Checking Asset Details
Checking Operation History
Protection Quota Management
Viewing Quotas
Binding a Protection Quota
Unbinding a Quota from a Server
Upgrading Your Edition
Risk Prevention
Vulnerability Management
Vulnerability Management Overview
Viewing Details of a Vulnerability
Fixing Vulnerabilities and Verifying the Result
Manually Performing a Vulnerability Scan
Baseline Inspection
Baseline Inspection Overview
Viewing Baseline Check Details
Suggestions on Fixing Unsafe Settings
Managing Baseline Check Policies
Container Image Security
Container Image Vulnerabilities
Viewing Malicious File Detection Results
Image Baseline Check
Prevention
Application Protection
Viewing Application Protection
Enabling Application Protection
Managing Application Protection
Disabling Application Protection
WTP
Adding a Protected Directory
Managing Remote Backup Servers
Setting Scheduled WTP Protection
Enabling Dynamic WTP
Viewing WTP Reports
Viewing WTP Events
Ransomware Prevention
Preventing Ransomware
Enabling Ransomware Prevention
Managing Policies
Disabling Protection
File Integrity Monitoring
Viewing File Integrity Management
Checking Change Details
Checking Modified Files
Intrusion Detection
Alarms
HSS Alarms
Server Alarms
Viewing Intrusion Alarms
Managing Isolated Files
Handling Server Alarms
Container Alarms
Container Alarm Events
Viewing Container Alarms
Handling Container Alarms
Whitelists
Configuring the Login Whitelist
Managing the Alarm Whitelist
Security Operations
Policy Management
Viewing a Policy Group
Creating a Policy Group
Modifying a Policy
Security Report
Checking a Security Report
Subscribing to a Security Report
Creating a Security Report
Managing a Security Report
Installation & Configuration
Agent Management
Checking Agents
Installing an Agent
Uninstalling an Agent
Audit
HSS Operations Supported by CTS
Viewing Audit Logs
Permissions Management
Creating a User and Granting Permissions
HSS Custom Policies
HSS Actions
Change History
Best Practices
Best Practices of Login Security Hardening
Detecting and Fixing Vulnerabilities
Git Credential Disclosure Vulnerability (CVE-2020-5260)
SaltStack Remote Command Execution Vulnerabilities (CVE-2020-11651 and CVE-2020-11652)
OpenSSL High-risk Vulnerability (CVE-2020-1967)
Adobe Font Manager Library Remote Code Execution Vulnerability (CVE-2020-1020/CVE-2020-0938)
Windows Kernel Elevation of Privilege Vulnerability (CVE-2020-1027)
Windows CryptoAPI Spoofing Vulnerability (CVE-2020-0601)
HSS Multi-Cloud Management and Deployment
Application Scenario
Installation and Deployment Process
Installation and Deployment
Huawei Cloud Solutions
Hybrid Cloud Solution
Verification and Usage
Connecting Off-cloud Servers to the Public Cloud Through Direct Connect
Step 1: Creating a Proxy Server
Step 2: Installing an Agent for the Proxy Server
Step 3: Installing and Configuring Nginx
Step 4: Generating an Installation Package/Command
Step 5: Installing Agents on Off-cloud Servers
Best Practices for Defense Against Ransomware
What Is Ransomware
Process of Ransomware Attacks
Protecting Against Ransomware
Huawei Cloud Ransomware Prevention Solution
Change History
API Reference
Before You Start
Overview
Endpoints
Limitations and Constraints
Basic Concepts
Calling APIs
Making an API Request
Authentication
Response
API Description
Asset Management
Collecting Asset Statistics, Including Accounts, Ports, and Processes
Asset Fingerprint - Account Information
Asset Fingerprint - Open Port Information
Asset Fingerprint - Process Information
Asset Fingerprint - Software Information
Asset Fingerprint - Auto-Started Item Information
Obtaining the Account List of an Asset
Asset Fingerprint of a Server - Open Port Information
Asset Fingerprint of a Server - Software
Asset Fingerprint of a Server - Auto-Started Items
Obtaining the Account Change History
Asset Fingerprint - Software Information - Change History
Asset Fingerprint - Auto-started Item - Change History
Ransomware Prevention
Querying the Servers Protected Against Ransomware
Querying a Policy List
Modifying a Policy
Enabling Ransomware Prevention
Disabling Ransomware Prevention
Querying Backup Policy Information
Modifying a Backup Policy
Baseline Management
Querying the Weak Password Detection Result List
Querying the Password Complexity Policy Detection Report
Querying the Result List of Server Security Configuration Check
Querying the Check Result of a Security Configuration Item
Querying the Checklist of a Security Configuration Item
Querying the List of Affected Servers of a Security Configuration Item
Querying the Report of a Check Item in a Security Configuration Check
Quota Management
Querying Quota Information
Querying Quota Details
Intrusion Detection
Querying the Detected Intrusion List
Handling Alarm Events
Querying the Alarm Whitelist
Server Management
Querying ECSs
Changing the Protection Status
Querying Server Groups
Creating a Server Group
Editing a Server Group
Deleting a Server Group
Policy Management
Querying the Policy Group List
Applying a Policy
Vulnerability Management
Querying the Vulnerability List
Querying the Servers Affected by a Vulnerability
Changing the Status of a Vulnerability
Web Tamper Protection
Querying the Protection List
Enabling or Disabling WTP
Enabling or Disabling Dynamic WTP
Querying the Status of Static WTP for a Server
Querying the Status of Dynamic WTP for a Server
Tag Management
Creating Tags in Batches
Deleting a Resource Tag
Historical APIs
Server Management
Querying ECS Status
Appendixes
Status Code
Error Codes
Change History
FAQs
About HSS
What Is Host Security Service?
What Is Container Security Service?
What Is Web Tamper Protection?
What Are the Relationships Between Images, Containers, and Applications?
Where Is HSS Available?
How Do I Use HSS?
What Are the Differences Between HSS, VSS, and WAF?
What Is the HSS Agent?
Can I Upgrade My HSS to a Higher Edition?
Agent FAQs
Is the Agent in Conflict with Any Other Security Software?
How Do I Install the Agent?
How Do I Uninstall the Agent?
What Should I Do If Agent Installation Failed?
How Do I Fix an Abnormal Agent?
What Is the Default Agent Installation Path?
How Many CPU and Memory Resources Are Occupied by the Agent When It Performs Scans?
Do WTP and HSS Use the Same Agent?
How Do I View Servers Where No Agents Have Been Installed?
What Can I Do If the Agent Status Is Still "Not installed" After Installation?
How Do I Upgrade the Agent?
What Do I Do If the Agent Upgrade Fails or the Agent Status Is "Not installed" After Successful Installation?
What If I Do Not Upgrade from the HSS (Old) to the HSS (New) Version?
Huawei Cloud ECS Would Access Which IP Addresses after Installing an Agent?
Brute-force Attack Defense
How Does HSS Intercept Brute Force Attacks?
How Do I Handle a Brute-force Attack Alarm?
How Do I Defend Against Brute-force Attacks?
How Do I Do If the Account Cracking Prevention Function Does Not Take Effect on Some Linux Accounts?
How Do I Unblock an IP Address?
Weak Passwords and Unsafe Accounts
How Do I Handle a Weak Password Alarm?
How Do I Set a Secure Password?
Why Are the Weak Password Alarms Still Reported After the Weak Password Policy Is Disabled?
Intrusions
How Do I View and Handle Alarms Reported by HSS?
What Do I Do If My Servers Are Subjected to a Mining Attack?
Why a Process Is Still Isolated After It Was Whitelisted?
What Do I Do If a Mining Process Is Detected on a Server?
What Should I Do If I Find My Servers Attacking Others?
Why Some Attacks on Servers Are Not Detected?
Can I Unblock an IP Address Blocked by HSS, and How?
Why a Blocked IP Address Is Automatically Unblocked?
Abnormal Logins
Why Do I Still Receive Remote Login Alarms After Configuring the Login IP Whitelist?
How Do I Check the User IP address of a Remote Login?
What Can I Do If an Alarm Indicating Successful Login Is Reported?
Can I Disable Remote Login Detection?
How Do I Know Whether an Intrusion Succeeded?
Unsafe Settings
How Do I Install a PAM and Set a Proper Password Complexity Policy in a Linux OS?
How Do I Set a Proper Password Complexity Policy in a Windows OS?
How Do I Handle Unsafe Configurations?
How Do I View Configuration Check Reports?
Vulnerability Management
How Do I Fix Vulnerabilities?
What Do I Do If an Alarm Still Exists After I Fixed a Vulnerability?
Why a Server Displayed in Vulnerability Information Does Not Exist?
Do I Need to Restart a Server After Fixing its Vulnerabilities?
Web Tamper Protection
Why Do I Need to Add a Protected Directory?
How Do I Modify a Protected Directory?
What Should I Do If WTP Cannot Be Enabled?
How Do I Modify a File After WTP Is Enabled?
What Can I Do If I Enabled Dynamic WTP But Its Status Is Enabled but not in effect?
What Are the Differences Between the Web Tamper Protection Functions of HSS and WAF?
Container Guard Service
How Do I Enable Node Protection?
What Is the Log Processing Mechanism of CGS?
What Is the Log Path of CGS?
Does the Shield of CGS Affect Services?
Ransomware Protection
What Are the Differences Between Ransomware Protection Backup and Cloud Backup?
Region and AZ
What Are Regions and AZs?
Quota and Bills
How Do I Increase My HSS Quota?
How Do I Filter Unprotected Servers?
How Do I Allocate My Quota?
If I Change the OS of a Protected Server, Does It Affect My HSS Quota?
Why Doesn't an HSS Edition Take Effect After Purchase?
Others
How Do I Use the Windows Remote Desktop Connection Tool to Connect to a Server?
How Do I Check HSS Log Files?
How Do I Enable Logging for Login Failures?
How Do I Clear an Alarm on Critical File Changes?
Is HSS Available as Offline Software?
Change History
General Reference
Glossary
Service Level Agreement
Endpoints
Permissions