Updated on 2023-03-01 GMT+08:00

Checking the Whitelist Policy List

Application Recognition Service (ARS) scans all the applications running on your servers for uncertified or unauthorized applications, helping you maintain a secure runtime.

Function Description

Set whitelist policies, and determine whether applications are Trusted, Untrusted, or Unknown. The applications that are not whitelisted are not allowed to run. This function protects your servers from untrusted or malicious applications, reducing unnecessary resource usage.

You can create a whitelist policy and apply it to your servers. HSS will check whether suspicious or malicious processes exist on the servers, and generate alarms or isolate the processes that are not in the whitelist.

  • An alarm is generated when an application not in the whitelist is started.
  • An application not in the whitelist is probably a new normal application, or a malicious program implanted through intrusion.
    • If the alarmed application is normal, frequently used, or a third-party application you installed, you are advised to add it to the whitelist. HSS will no longer report alarms when the application starts.
    • If the application is malicious, you are advised to delete it in a timely manner and check whether your configuration files, such as scheduled task files, have been tampered with.

Checking the Whitelist Policy List

  1. Log in to the management console.
  2. In the upper left corner of the page, select a region, click , and choose Security > Host Security Service.
  3. On the Programs page, click the Whitelist Policies tab, as shown in Figure 1.

    Figure 1 Checking the whitelist policy list
    Table 1 Policy list parameters

    Parameter

    Description

    Policy Name

    Whitelist policy name

    Servers Protected

    Number of servers where the whitelist policy takes effect

    Status

    Policy status. Its value can be:

    • Learning

      Intelligent learning is in progress.

      After a policy is created, the intelligent learning function automatically analyzes operations on the servers you selected. The status of a new policy is Learning.

    • Learning complete. Policy not in effect

      Intelligent learning is complete. You need to manually enable the policy for it to take effect.

      To enable the policy, click in the row where it locates. HSS will automatically check whether the application running on your servers are trustworthy, and mark them as trusted, untrusted, or unknown.

    • Learning complete. Policy in effect

      Intelligent learning is complete. The policy has taken effect on associated servers.

    Applications

    Number of trusted, untrusted, and unknown applications identified by HSS

    Switch

    Enables or disables a policy. If the policy is in the Learning complete. Policy not in effect state, you can click to enable it. The whitelist policy takes effect only after it is enabled.

    Operation

    Operations that can be performed on the policy, including:

    • Applications. You can click this button to select servers that a policy applies to.
    • Edit. You can click this button to modify the period and servers for intelligent learning.
    • Delete: You can click this button to delete a whitelist policy.

      After a whitelist policy is deleted, the applications on the servers associated to it will no longer be protected.

  4. Click the name of a whitelist policy to view the applications on associated servers, as shown in Figure 2.

    The total number of applications, number of trusted applications, number of untrusted applications, and number of unknown applications are displayed. You can mark an application as trusted, untrusted, or unknown, and create an application whitelist for the application.
    Figure 2 Application list

  5. Click the Servers Protected tab to view the servers that the whitelist policy applies to, as shown in Figure 3.

    The server names and IP addresses, whitelist policy, number of suspicious operations, and the way to handle the operations are displayed.

    • Suspicious Operations include startup of processes that are not in the whitelist policy or marked as Untrusted or Unknown.
    • Action in the following figure indicates that HSS will report an alarm when detecting suspicious operations.
      Figure 3 Checking protected servers

      You can remove servers as required. Servers removed will no longer be protected by the whitelist policy.