Updated on 2024-06-06 GMT+08:00

Checking and Handling Suspicious Processes

If HSS detects suspicious processes on servers, the processes will be displayed in the suspicious process list but will not trigger alarms. HSS cannot determine whether these processes are trustworthy based on the application process characteristics. To avoid affecting services, you need to check whether the processes can be trusted, add trustworthy ones to the process whitelist, and isolate and kill the malicious ones.

Procedure

  1. Log in to the management console.
  2. In the upper left corner of the page, select a region, click , and choose Security & Compliance > HSS.
  1. In the navigation tree, choose Prevention > Application Process Control.
  1. Click the Suspicious Processes tab.

    Figure 1 Viewing suspicious processes

  2. Determine whether a suspicious process is malicious based on its information, such as the hash value and file path.
  3. In the row of a process, click Handle in the Operation column.

    You can also select multiple suspicious processes and click Batch Handle above the list.

  4. In the dialog box that is displayed, select an action.

    Select Add to process whitelist or Isolate and kill.

  5. Click OK.