Updated on 2023-01-20 GMT+08:00

Viewing Malicious File Detection Results

Malicious files in the private images can be automatically detected, helping you discover and eliminate the security threats in your assets.

Check Frequency

A comprehensive check is automatically performed in the early morning every day.


You have purchased the container edition.


  • Only Linux servers are supported.
  • Servers that are not protected by HSS enterprise, premium, WTP, or container editions cannot perform container-related operations.


  1. Log in to the management console.
  2. In the upper left corner of the page, select a region, click , and choose Security & Compliance > Host Security Service.

    Figure 1 Accessing HSS

  3. In the displayed dialog box, click Try the new edition to switch to the HSS (New) console.

    • Currently, HSS is available in the following regions: CN South-Guangzhou, CN-Hong Kong, AP-Bangkok, and AP-Singapore.
    • On the HSS (New) console, you can click Back to Old Console in the upper left corner to switch to the HSS (Old) console.
    • If cloud scan is not enabled or you access the HSS (New) console for the first time, the Enable Cloud Scan? dialog box is displayed. You are advised to select Enable cloud scan.
      • The cloud scan function is free of charge.
      • After the cloud scan function is enabled, all HSS servers will be scanned. Some HSS quota editions can support only limited scanning capabilities. Therefore, you are advised to purchase the enterprise edition or higher to enjoy all capabilities of the cloud scan function.
      Figure 2 Enabling cloud scan

  4. In the navigation tree on the left, choose Prediction > Container Images.
  5. Click the Malicious Files tab to view details about the malicious files in private images. Delete the malicious files or create images again as needed based on the scan result.

    • Malicious files include Trojans, worms, viruses, and Adware.
    • In the Image Tag column, click an image version to view its vulnerability report.
      Figure 3 Malicious file detection results