Assets |
Collect statistics on asset status and usage of all servers. |
√ |
√ |
√ |
√ |
Linux and Windows |
Real-time check |
Servers & Quota |
Manage all server assets, including their protection status, quotas, and policy allocation. |
√ |
√ |
√ |
√ |
Linux and Windows
Note: Only Linux agents can be installed in batches. |
- |
Containers & Quota |
Manage container nodes and container images. |
× |
× |
× |
√ |
Linux |
- |
Asset Fingerprints |
Account |
Check and manage server accounts all in one place. |
× |
√ |
√ |
√ |
√ |
Linux and Windows
Real-time check |
Open port |
Check open ports all in one place and identify high-risk and unknown ports. |
× |
√ |
√ |
√ |
√ |
Linux and Windows
Real-time check |
Process |
Check running applications all in one place and identify malicious applications. |
× |
√ |
√ |
√ |
√ |
Linux and Windows
Real-time check |
Installed software |
Check and manage server software all in one place and identify insecure versions. |
× |
√ |
√ |
√ |
√ |
Linux and Windows
Automatic check in the early morning every day |
Auto-startup |
Check auto-startup entries and collect statistics on entry changes in a timely manner. |
× |
√ |
√ |
√ |
√ |
Linux and Windows
Real-time check |
Web application |
You can check details about software used for web content push and release, including versions, paths, configuration files, and associated processes of all software. |
× |
√ |
√ |
√ |
√ |
Linux
Once a week (05:00 a.m. every Monday) |
Web service |
You can check details about the software used for web content access, including versions, paths, configuration files, and associated processes of all software. |
× |
√ |
√ |
√ |
√ |
Linux
Once a week (05:00 a.m. every Monday) |
Web framework |
Check statistics about frameworks used for web content presentation, including their versions, paths, and associated processes. |
× |
√ |
√ |
√ |
√ |
Linux
Once a week (05:00 a.m. every Monday) |
Website |
Check statistics about web directories and sites that can be accessed from the Internet. You can view the directories and permissions, access paths, external ports, and key processes of websites. |
× |
√ |
√ |
√ |
√ |
Linux
Once a week (05:00 a.m. every Monday) |
Middleware |
Check information about servers, versions, paths, and processes associated with middleware. |
× |
√ |
√ |
√ |
√ |
Linux
Once a week (05:00 a.m. every Monday) |
Database |
You can check details about software that provides data storage, including versions, paths, configuration files, and associated processes of all software. |
× |
√ |
√ |
√ |
√ |
Linux
Once a week (05:00 a.m. every Monday) |
Kernel module |
Check information about all the program module files running in kernels, including associated servers, version numbers, module descriptions, driver file paths, file permissions, and file hashes. |
× |
√ |
√ |
√ |
√ |
Linux
Once a week (05:00 a.m. every Monday) |
Vulnerability Management |
Linux vulnerability detection |
Based on the vulnerability database, check and handle vulnerabilities in the software (such as kernel, OpenSSL, vim, glibc) you obtained from official Linux sources and have not compiled. |
√ |
√ |
√ |
√ |
Linux |
- Automatic check in the early morning every day
- Manual scan
|
Windows vulnerability detection |
Detect vulnerabilities in Windows OS based on the official patch releases of Microsoft. |
√ |
√ |
√ |
√ |
Windows |
- Automatic check in the early morning every day
- Manual scan
|
Web-CMS vulnerability detection |
Scan for Web-CMS vulnerabilities in web directories and files. |
√ |
√ |
√ |
√ |
Linux and Windows |
- Automatic check in the early morning every day
- Manual scan
|
Application vulnerability detection |
Detect vulnerabilities in JAR packages, ELF files, and other files of open source software, such as Log4j and spring-core. |
√ |
√ |
√ |
√ |
Linux |
- Once a week (05:00 a.m. every Monday)
- Manual scan
|
Unsafe settings check |
Password policy check |
Check password complexity policies and modify them based on suggestions provided by HSS to improve password security. |
√ |
√ |
√ |
√ |
Linux |
- Automatic check in the early morning every day
- Manual scan
|
Weak password check |
Change weak passwords to stronger ones based on HSS scan results and suggestions. |
√ |
√ |
√ |
√ |
Linux |
- Automatic check in the early morning every day
- Manual scan
|
Unsafe configuration |
Check the unsafe Tomcat, Nginx, and SSH login configurations found by HSS. |
√ |
√ |
√ |
√ |
Linux and Windows |
- Automatic check in the early morning every day
- Manual scan
|
Container image security |
Container image vulnerability management |
Detect and manage vulnerabilities in local images and private image repositories based on a vulnerability database, and handle critical vulnerabilities in a timely manner. |
× |
× |
× |
√ |
Linux |
- Automatic check in the early morning every day
- Manual scan
|
Image baseline check |
Check for insecure configurations based on 18 types of container baselines. |
× |
× |
× |
√ |
Linux |
Real-time check |
Web page tampering prevention |
Static WTP |
Protect the static web page files on your website servers from malicious modification. |
× |
× |
√ |
× |
Linux and Windows |
Real-time check |
Dynamic WTP |
Protect the dynamic web page files in your website databases from malicious modification. |
× |
× |
√ |
× |
Linux |
Real-time check |
Ransomware prevention |
Ransomware prevention |
Help you identify and detect known ransomware attacks and restore services using ransomware backups. |
× |
√ |
√ |
√ |
Linux and Windows |
Real-time checks |
File integrity monitoring |
File Integrity |
Check the files in the Linux OS, applications, and other components to detect tampering. |
× |
√ |
√ |
√ |
Linux |
Real-time check |
Container firewall |
Container firewall |
Control and intercept network traffic inside and outside a container cluster to prevent malicious access and attacks. |
× |
× |
× |
√ |
Linux |
Real-time check |
Intrusion detection |
Unclassified malware |
Check and handle detected malicious programs all in one place, including web shells, Trojan, mining software, worms, and viruses. |
√ |
√ |
√ |
√ |
Linux and Windows |
Real-time check |
Rootkit |
Detect server assets and report alarms for suspicious kernel modules, files, and folders. |
√ |
√ |
√ |
√ |
Linux |
Real-time check |
Ransomware |
Check ransomware embedded in media such as web pages, software, emails, and storage media.
Ransomware is used to encrypt and control your data assets, such as documents, emails, databases, source code, images, and compressed files, to leverage victim extortion. |
× |
√ |
√ |
√ |
Linux and Windows |
Real-time check |
Web shell |
Check whether the files (often PHP and JSP files) detected by HSS in your web directories are web shells.
- Web shell information includes the Trojan file path, status, first discovery time, and last discovery time. You can choose to ignore warning on trusted files.
- You can use the manual detection function to scan for web shells on servers.
|
√ |
√ |
√ |
√ |
Linux and Windows |
Real-time check |
Redis vulnerability exploit |
Detect the modifications made by the Redis process on key directories in real time and report alarms. |
√ |
√ |
√ |
√ |
Linux |
Real-time check |
Hadoop vulnerability exploit |
Detect the modifications made by the Hadoop process on key directories in real time and report alarms. |
√ |
√ |
√ |
√ |
Linux |
Real-time check |
MySQL vulnerability exploit |
Detect the modifications made by the MySQL process on key directories in real time and report alarms. |
√ |
√ |
√ |
√ |
Linux |
Real-time check |
Reverse shell |
Monitor user process behaviors in real time to detect reverse shells caused by invalid connections.
Reverse shells can be detected for protocols including TCP, UDP, and ICMP. |
√ |
√ |
√ |
√ |
Linux |
Real-time check |
File privilege escalation |
Check the file privilege escalations in your system. |
√ |
√ |
√ |
√ |
Linux |
Real-time check |
Process privilege escalation |
The following process privilege escalation operations can be detected:
- Root privilege escalation by exploiting SUID program vulnerabilities
- Root privilege escalation by exploiting kernel vulnerabilities
|
√ |
√ |
√ |
√ |
Linux |
Real-time check |
Change in critical file |
Receive alarms when critical system files are modified. |
√ |
√ |
√ |
√ |
Linux and Windows |
Real-time check |
File/Directory change |
System files and directories are monitored. If a file or directory is modified, an alarm is generated, indicating that the file or directory may be tampered with. |
√ |
√ |
√ |
√ |
Linux and Windows |
Real-time check |
Abnormal process behavior |
Check the processes on servers, including their IDs, command lines, process paths, and behavior.
Send alarms on unauthorized process operations and intrusions.
The following abnormal process behavior can be detected:
- Abnormal CPU usage
- Processes accessing malicious IP addresses
- Abnormal increase in concurrent process connections
|
√ |
√ |
√ |
√ |
Linux and Windows |
Real-time check |
High-risk command execution |
Receive real-time alarms on high-risk commands. |
√ |
√ |
√ |
√ |
Linux and Windows |
Real-time check |
Abnormal shell |
Detect actions on abnormal shells, including moving, copying, and deleting shell files, and modifying the access permissions and hard links of the files. |
√ |
√ |
√ |
√ |
Linux |
Real-time check |
Suspicious crontab task |
Check and list auto-started services, scheduled tasks, pre-loaded dynamic libraries, run registry keys, and startup folders.
You can get notified immediately when abnormal automatic auto-start items are detected and quickly locate Trojans. |
√ |
√ |
√ |
√ |
Linux and Windows |
Real-time check |
System protection disabling |
Detect the preparations for ransomware encryption: Disable the Windows defender real-time protection function through the registry. Once the function is disabled, an alarm is reported immediately. |
√ |
√ |
√ |
√ |
Windows |
Real-time check |
Backup deletion |
Detect the preparations for ransomware encryption: Delete backup files or files in the Backup folder. Once backup deletion is detected, an alarm is reported immediately. |
√ |
√ |
√ |
√ |
Windows |
Real-time check |
Suspicious registry operation |
Detect operations such as disabling the system firewall through the registry and using the ransomware Stop to modify the registry and write specific strings in the registry. An alarm is reported immediately when such operations are detected. |
√ |
√ |
√ |
√ |
Windows |
Real-time check |
System log deletion |
An alarm is generated when a command or tool is used to clear system logs. |
√ |
√ |
√ |
× |
Windows |
Real-time check |
Suspicious command execution |
- Check whether a scheduled task or an automated startup task is created or deleted by running commands or tools.
- Detect suspicious remote command execution.
|
√ |
√ |
√ |
√ |
Linux and Windows |
Real-time check |
Brute-force attack defense |
Check for brute-force attack attempts and successful brute-force attacks.
- Your accounts are protected from brute-force attacks. HSS will block the attacking hosts when detecting such attacks.
- Trigger an alarm if a user logs in to the server by a brute-force attack.
|
√ |
√ |
√ |
√ |
Linux and Windows |
Real-time check |
Abnormal login |
Check and handle remote logins.
If a user's login location is not any common login location you set, an alarm will be triggered. |
√ |
√ |
√ |
√ |
Linux and Windows |
Real-time check |
Invalid account |
Scan accounts on servers and list suspicious accounts in a timely manner. |
√ |
√ |
√ |
√ |
Linux and Windows |
Real-time check |
User account added |
Detect the commands used to create hidden accounts. Hidden accounts cannot be found in the user interaction interface or be queried by commands. |
√ |
√ |
√ |
√ |
Windows |
Real-time check |
Password theft |
Detect the abnormal obtaining of hash value of system accounts and passwords on servers and report alarms. |
√ |
√ |
√ |
√ |
Windows |
Real-time check |
Suspicious download request |
An alarm is generated when a suspicious HTTP request that uses system tools to download programs is detected. |
√ |
√ |
√ |
× |
Windows |
Real-time check |
Suspicious HTTP request |
An alarm is generated when a suspicious HTTP request that uses a system tool or process to execute a remote hosting script is detected. |
√ |
√ |
√ |
× |
Windows |
Real-time check |
Port scan |
Detect scanning or sniffing on specified ports and report alarms. |
× |
√ |
√ |
√ |
Linux |
Real-time check |
Container intrusion detection |
Unclassified malware |
Check and handle malicious programs in a container, including web shells, Trojan, mining software, worms, and viruses. |
× |
× |
× |
√ |
Linux |
Real-time check |
Ransomware |
Check and handle alarms on ransomware in containers. |
× |
× |
× |
√ |
Linux |
Real-time check |
Web shell |
Check whether the files (often PHP and JSP files) in the web directories on containers are web shells. |
× |
× |
× |
√ |
Linux |
Real-time check |
Vulnerability escape |
An escape alarm is reported if a container process behavior that matches the behavior of known vulnerabilities is detected. |
× |
× |
× |
√ |
Linux |
Real-time checks |
File escape |
An alarm is reported if a container process is found accessing a key file directory (for example, /etc/shadow or /etc/crontab). Directories that meet the container directory mapping rules can also trigger such alarms. |
× |
× |
× |
√ |
Linux |
Real-time check |
Reverse shell |
Monitor user process behaviors in real time to detect reverse shells caused by invalid connections. Reverse shells can be detected for protocols including TCP, UDP, and ICMP. |
× |
× |
× |
√ |
Linux |
Real-time check |
Process privilege escalation |
The following process privilege escalation operations can be detected:
- Root privilege escalation by exploiting SUID program vulnerabilities
- Root privilege escalation by exploiting kernel vulnerabilities
|
× |
× |
× |
√ |
Linux |
Real-time check |
Abnormal container process |
- Malicious container program
Monitor container process behavior and process file fingerprints. An alarm is reported if it detects a process whose behavior characteristics match those of a predefined malicious program.
- Abnormal process
An alarm is reported if a process not in the whitelist is running in the container.
|
× |
× |
× |
√ |
Linux |
Real-time check |
Abnormal container startup |
The service monitors container startups and reports an alarm if it detects that a container with too many permissions is started.
Container check items include:
- Privileged container startup (privileged:true)
- Too many container capabilities (capability:[xxx])
- Seccomp not enabled (seccomp=unconfined)
- Container privilege escalation (no-new-privileges:false)
- High-risk directory mapping (mounts:[...])
|
× |
× |
× |
√ |
Linux |
Real-time check |
High-risk command execution |
Check executed commands in containers and generate alarms if high-risk commands are detected. |
× |
× |
× |
√ |
Linux |
Real-time check |
High-risk system call |
You can run tasks in kernels by Linux system calls. The container edition reports an alarm if it detects a high-risk call. |
× |
× |
× |
√ |
Linux |
Real-time check |
Sensitive file access |
The service monitors the container image files associated with file protection policies, and reports an alarm if the files are modified. |
× |
× |
× |
√ |
Linux |
Real-time check |
Container image blocking |
If a container contains insecure images specified in the suspicious image behavior policy, before the container is started, an alarm will be generated and the insecure images will be blocked. |
× |
× |
× |
√ |
Linux |
Real-time check |
Brute-force attack |
Detect and report alarms for brute-force attack behaviors, such as brute-force attack attempts and successful brute-force attacks, on containers.
Detect SSH, web, and Enumdb brute-force attacks on containers.
NOTE:
Currently, brute-force attacks can be detected only in the Docker runtime.
|
× |
× |
× |
√ |
Linux |
Real-time check |
Invalid system user account |
Detect suspicious accounts and report alarms. |
× |
× |
× |
√ |
Linux |
Real-time check |
Whitelist management |
Alarm whitelist |
You can add an alarm to the whitelist when handling it. |
√ |
√ |
√ |
√ |
Linux and Windows |
Real-time check |
Login whitelist |
Some alarms can be added to the alarm whitelist. |
√ |
√ |
√ |
√ |
Linux and Windows |
Real-time check |
System user whitelist |
Users (non-root users) that are newly added to the root user group on a server can be added to the system user whitelist. HSS will not report risky account alarms for them. |
√ |
√ |
√ |
√ |
Linux and Windows |
Real-time check |
Policy management |
Querying and editing rule configurations |
You can define and issue different detection policies for different servers or server groups, implementing refined security operations.
- Check the policy group list.
- Create a policy group based on default and existing policy groups.
- Define a policy.
- Edit or delete a policy.
- Modify or disable policies in a group.
- Apply policies to servers in batches on the Servers & Quota page.
|
√ (Only the default enterprise policy group is supported.) |
√ |
√ |
√ |
Linux and Windows |
Real-time check |
Handling history |
Handling history |
Check historical vulnerability and alarm handling records, including the handling time and handlers. |
√ |
√ |
√ |
√ |
Linux and Windows |
- |
Security report |
Server security report |
Check weekly or monthly server security trend, key security events, and risks. |
√ |
√ |
√ |
√ |
Linux and Windows |
- |
Security configuration |
Agent management |
You can view the agent status of all servers and upgrade, uninstall, and install agents. |
√ |
√ |
√ |
√ |
Linux and Windows |
Real-time check |
Common login location |
For each server, you can configure the locations where users usually log in from. The service will generate alarms on logins originated from locations other than the configured common login locations. A server can be added to multiple login locations. |
√ |
√ |
√ |
√ |
Linux and Windows |
Real-time check |
Common login IP address |
For each server, you can configure the IP addresses where users usually log in from. The service will generate alarms on logins originated from IP addresses other than the configured common IP addresses. |
√ |
√ |
√ |
√ |
Linux and Windows |
Real-time check |
Configuring an SSH login IP address whitelist |
The SSH login whitelist controls SSH access to servers to prevent account cracking.
After you configure the whitelist, SSH logins will be allowed only from whitelisted IP addresses. |
√ |
√ |
√ |
√ |
Linux |
Real-time check |
Malicious program isolation and removal |
HSS automatically isolates and kills identified malicious programs, such as web shells, Trojans, and worms, removing security risks. |
√ |
√ |
√ |
√ |
Linux and Windows |
Real-time check |
Plug-in management |
Install, uninstall, upgrade, and manage plug-ins in a unified manner. |
× |
× |
× |
√ |
Linux |
- |