Updated on 2025-09-29 GMT+08:00

Enabling Server Protection

Scenarios

This section describes how to enable the basic, professional, or premium edition for a server.

For details about the related versions, see Features.

Prerequisites

Constraints

Before you enable protection for a Windows server, enable the Windows firewall to block the source IP addresses of brute-force attacks. If the Windows firewall is not enabled, HSS only generates alarms for detected brute-force attacks, but does not block them.
  • After the Windows firewall is enabled, HSS automatically adds firewall rules hostguard_AllowAnyIn and hostguard_AllowAnyOut to allow all inbound and outbound traffic. This ensures that the firewall does not affect your services. If HSS detects a brute-force attack, it adds an inbound rule to the firewall to block the attack source IP address. This does not affect your servers.
  • Do not disable the Windows firewall when using HSS, or HSS cannot block the source IP addresses of brute-force attacks. Once it is disabled, HSS may fail to block the attack source IP addresses even after you manually enable it again.

Enabling the Basic/Professional/Enterprise/Premium Edition

  1. Log in to the HSS console.
  2. Click in the upper left corner and select a region or project.
  3. In the navigation pane on the left, choose Asset Management > Servers & Quota.

    The server list displays the protection status of only the following servers:

    • Huawei Cloud servers purchased in the selected region
    • Non-Huawei Cloud servers that have been added to the selected region

  4. Locate a server whose agent status is Online.
  5. Click Enable in the Operation column of a server.
  6. Confirm the server information and select a billing mode.

    You can buy HSS in the yearly/monthly or pay-per-use mode.
    • Yearly/Monthly
      • Billing Mode: Select Yearly/Monthly.
      • Edition: Select an edition.
      • Select Quota: Select a quota allocation mode.
        • Select a quota randomly: Let the system allocate the quota with the longest remaining validity to the server.
        • Select a quota ID and allocate it to a server.
    • Pay-per-use
      • Billing Mode: Select Pay-per-use.
      • Edition: Select an edition.
      • Tags: Select a tag if you want to use it to identify multiple types of cloud resources.

    If the version of the agent installed on the Linux server is 3.2.10 or later or the version of the agent installed on the Windows server is 4.0.22 or later, ransomware prevention is automatically enabled with the premium edition. Deploy honeypot files on servers and automatically isolate suspicious encryption processes (there is a low probability that processes are incorrectly isolated). You are also advised to enable backup so that you can restore data in the case of a ransomware attack to minimize losses. For details, see Enabling Ransomware Backup.

  7. Read the Host Security Service Disclaimer and select I have read and agree to the Host Security Service Disclaimer.
  8. Click OK. If the Protection Status of the target server is Enabled, the basic, professional, enterprise or premium edition has been enabled.

    • Alternatively, on the Quotas tab of the Servers & Quota page, click Bind Server in the Operation column to bind a quota to a server. HSS will automatically enable protection for the server.
    • A quota can be bound to a server to protect it, on condition that the agent on the server is online.
    • After HSS is enabled, it will scan your servers for security issues. Check items vary according to the edition you enabled.

      For details about the differences between the editions, see Features.

  9. (Optional) Configure alarm notification, protection policies, server login protection, and malicious program isolation and removal.

    • Configuring alarm notifications

      After HSS is enabled, alarms are displayed on the console by default. To learn the security risks of servers, containers, or web pages in a timely manner, you can enable alarm notification, and HSS will notify you of risks by SMS or email. For details, see Alarm Configuration.

    • Configuring protection policies

      Each HSS edition provides a group of protection policies preset with default settings. You can enable or disable policies and adjust protection rules as needed. For details, see Policy Management.

    • Configuring login protection

      To enhance server login security, perform the operations in Enabling 2FA, Configuring Common Login Locations, Configuring Common Login IP Addresses, and Configuring an SSH Login IP Address Whitelist.

    • Enabling malicious program isolation and removal

      If this function is enabled, HSS will automatically isolate identified malicious programs, such as backdoors, Trojans, and worms, to help you handle security risks. For details, see Isolating and Killing Malicious Programs.

Viewing Scan Details

After server protection is enabled, HSS will immediately perform a comprehensive scan on the server. It may take a long time. After the scan is complete, you can check its details.

  1. Choose Asset Management > Servers & Quota. Locate the server on the Servers tab page.
  2. Check the Risk Level column of the server.

    Table 1 Risk status

    Status

    Description

    Pending risk detection

    The server is neither protected nor scanned.

    Safe

    No risks were found in the comprehensive scan on the server; or the protection has just been enabled, and no risks have been found yet.

    Risky

    The server has security risks.

  3. Hover the cursor over the risk status to view the risk distribution.

    You can click a value to go to the details page.

Advanced Protection

HSS provides a series of advanced defense functions. You can enable or use them as required to enhance the security protection level of your servers. For details, see Table 4.

Table 2 Advanced protection

Function

Description

Version Restriction

Application Protection

To protect your applications with RASP, you simply need to add probes to them, without having to modify application files.

Premium edition

Ransomware Prevention

The function can detect and defend against ransomware. It can automatically back up data either at a scheduled time, or immediately if ransomware is detected. This can help you defend against ransomware and reduce loss.

Ransomware prevention is automatically enabled with the container edition. HSS will deploy honeypot files on servers and automatically isolate suspicious encryption processes. You can modify the ransomware protection policy. You are also advised to enable backup so that you can restore data.

Premium edition

Application Process Control

Application process control helps to enhance the security of applications and processes running on servers. It can automatically identify and analyze application processes, and classify them into trusted, suspicious, and malicious processes. It allows trusted processes to run, and generates alarms for suspicious and malicious processes. This helps to build a secure environment for application processes, and protects servers from untrusted or malicious application processes.

Premium edition

Virus Scanning and Removal

This function combines cloud-based and local antivirus mechanisms to scan executable files, compressed files, scripts, documents, images, and audiovisual files for viruses. You can perform quick scan, full-disk scan, and custom scans on servers as needed to detect and remove virus files in a timely manner, enhancing the virus defense of the system.

Professional and premium editions

Dynamic Port Honeypot

The dynamic port honeypot function is a proactive defense measure. It uses a real port as a honeypot port to induce attackers to access the network. In the horizontal penetration scenario, the function can effectively detect attackers' scanning, identify faulty servers, and protect real resources of the user.

Premium edition