Help Center > > FAQs> About HSS> What Is Host Security Service?

What Is Host Security Service?

Updated at:Sep 27, 2020 GMT+08:00

Host Security Service (HSS) helps you identify and manage the assets on your servers, eliminate risks, and defend against intrusions and web page tampering. There are also advanced protection and security operations functions available to help you easily detect and handle threats.

Working Principles

Install the HSS agent on your servers, and you will be able to check the server security status and risks in a region on the HSS console.

Figure 1 illustrates how HSS works.

Figure 1 Working principles

The following table describes HSS components.

Table 1 Components

Component

Description

Management console

A visualized management platform, where you can apply configurations in a centralized manner and view the defense status and scan results of servers in a region.

HSS cloud protection center

  • Uses technologies such as AI, machine learning, and deep algorithms to analyze security risks in servers.
  • Integrates multiple antivirus engines to detect and kill malicious programs in servers.
  • Receives configurations and scan tasks sent from the console and forwards them to agents on the servers.
  • Receives server information reported by agents, analyzes security risks and exceptions on servers, and displays the analysis results on the console.

Agent

  • Communicates with the HSS cloud protection center via HTTPS and WSS. Ports 442 and 443 are used by default.
  • Scans all servers every early morning; monitors the security status of servers; and reports the collected server information (including non-compliant configurations, insecure configurations, intrusion traces, software list, port list, and process list) to the cloud protection center.
  • Blocks server attacks based on the security policies you configured.
NOTE:
  • If the agent is not installed or is abnormal, HSS is unavailable.
  • An agent can be installed on HUAWEI CLOUD Elastic Cloud Servers (ECSs), Bare Metal Servers (BMSs), offline servers, and third-party cloud servers.
  • Select the agent and installation command suitable for your OS.
  • Web Tamper Protection (WTP) and HSS can use the same agent on a server.

Did you find this page helpful?

Submit successfully!

Thank you for your feedback. Your feedback helps make our documentation better.

Failed to submit the feedback. Please try again later.

Which of the following issues have you encountered?







Please complete at least one feedback item.

Content most length 200 character

Content is empty.

OK Cancel