Updated on 2022-08-30 GMT+08:00

Subscribing to HSS Reports

You can subscribe to weekly and monthly reports and check your server security trends, security events, and risks. HSS stores security reports for six months. You are advised to regularly download them to meet certification requirements.

  • This function is available in Hong Kong, Bangkok, and Singapore regions; and unavailable in Johannesburg, Mexico City 1, Sao Paulo 1, and Santiago regions.
  • If you have enabled the enterprise project function, you can select your enterprise project from the Enterprise project drop-down list and subscribe to the security report of the project. You can also select All projects and subscribe to the security report of servers in all the projects in this region.
  • The next day after your subscription, a report of the last subscription period will be generated at 08:00. You can view and download the report.

Downloading an HSS Report

  1. Log in to the management console.
  2. In the upper left corner of the page, select a region, click , and choose Security & Compliance > Host Security Service.
  3. On the HSS console, choose Security Report. In the Operation column, click Preview to view a report.

    Figure 1 Weekly reports
    Figure 2 Monthly reports

  4. Click Download on the right of the preview page to download the report.

    Figure 3 Downloading a report

HSS Report Template

A weekly or monthly HSS report shows your server security status and helps you handle risks in a timely manner.

A report contains risk overview, risk trend, risk distribution, top 5 high-risk servers, top 5 brute-force attack sources, vulnerability statistics, asset change history, dangerous open ports, weak passwords, unsafe accounts, remote logins, malicious programs, web shells, account cracking attempts, and key file changes.

Take the weekly report template as an example. It contains the following content:

  • Risk overview
    You can check the risk statistics of this week compared with that of last week.
    Figure 4 Risk overview
  • Risk trend
    You can check the intrusion and vulnerability trend in the past week.
    Figure 5 Risk trend
  • Top 5 high-risk servers and top 5 brute-force attack sources
    You can check top 5 high-risk servers and top 5 brute-force attack sources in the past week.
    Figure 6 Top 5 high-risk servers and top 5 brute-force attack sources
  • Vulnerabilities

    You can check vulnerabilities statistics in the past week.

    A maximum of 20 risks are listed in the report. For more information, log in to the HSS console.

    Figure 7 Vulnerability statistics
  • Account changes

    You can check asset changes in the past week.

    A maximum of 20 risks are listed in the report. For more information, log in to the HSS console.

    Figure 8 Asset changes
  • Unsafe open ports

    You can check unsafe open ports detected in the past week.

    A maximum of 20 risks are listed in the report. For more information, log in to the HSS console.

    Figure 9 Unsafe open ports
  • Weak passwords

    You can check weak passwords detected in the past week.

    A maximum of 20 risks are listed in the report. For more information, log in to the HSS console.

    Figure 10 Weak passwords
  • Unsafe accounts

    You can check unsafe accounts detected in the past week.

    A maximum of 20 risks are listed in the report. For more information, log in to the HSS console.

    Figure 11 Unsafe accounts
  • Remote logins

    You can check the remote logins detected in the past week.

    A maximum of 20 risks are listed in the report. For more information, log in to the HSS console.

    Figure 12 Remote logins
  • Malicious programs

    You can check the malicious programs detected in the past week.

    A maximum of 20 risks are listed in the report. For more information, log in to the HSS console.

    Figure 13 Malicious programs
  • Web shells

    You can check the web shells detected in the past week.

    A maximum of 20 risks are listed in the report. For more information, log in to the HSS console.

    Figure 14 Web shells
  • Account hacking attempts

    You can check the account hacking attempts detected in the past week.

    A maximum of 20 risks are listed in the report. For more information, log in to the HSS console.

    Figure 15 Account hacking attempts
  • Important file changes

    You can check the important file changes detected in the past week.

    A maximum of 20 risks are listed in the report. For more information, log in to the HSS console.

    Figure 16 Important file changes