Asset management |
Server management |
Manages all server assets, including their protection statuses, quotas, and policies. You can install agents on all the Linux servers in batches. |
√ |
√ |
√ |
√ |
√ |
- |
Container management |
Manage container nodes and images (private image repositories and local images). |
× |
× |
× |
× |
√ |
- |
Asset fingerprint |
Account management |
Check and manage server accounts all in one place. |
× |
√ |
√ |
√ |
√ |
Real-time check |
Open port check |
Check open ports all in one place and identify high-risk and unknown ports. |
× |
√ |
√ |
√ |
√ |
Real-time check |
Process management |
Check running applications all in one place and identify malicious applications. |
× |
√ |
√ |
√ |
√ |
Real-time check |
Software management |
Check and manage server software all in one place and identify insecure versions. |
× |
√ |
√ |
√ |
√ |
Automatic check in the early morning every day |
Auto-startup |
Check auto-started entries and collect statistics on entry changes in a timely manner. |
× |
√ |
√ |
√ |
√ |
Real-time check |
Website |
Check statistics about web directories and sites that can be accessed from the Internet. You can view the directories and permissions, access paths, external ports, and key processes of websites. |
× |
√ |
√ |
√ |
√ |
Once a week (05:00 a.m. every Monday) |
Web framework |
Check statistics about frameworks used for web content presentation, including their versions, paths, and associated processes. |
× |
√ |
√ |
√ |
√ |
Once a week (05:00 a.m. every Monday) |
Middleware |
Check information about servers, versions, paths, and processes associated with middleware. |
× |
√ |
√ |
√ |
√ |
Once a week (05:00 a.m. every Monday) |
Kernel module |
Check information about all the program module files running in kernels, including associated servers, version numbers, module descriptions, driver file paths, file permissions, and file hashes. |
× |
√ |
√ |
√ |
√ |
Once a week (05:00 a.m. every Monday) |
Vulnerability management |
Software vulnerability detection |
Check vulnerabilities in Linux and Windows OSs.
Check and handle vulnerabilities in your system and the software (such as SSH, OpenSSL, Apache, and MySQL) you obtained from official sources and have not compiled. |
× |
√ |
√ |
√ |
√ |
- Automatic check in the early morning every day
- Manual scan
|
Web-CMS vulnerability detection |
HSS scans for Web-CMS vulnerabilities in web directories and files. |
× |
√ |
√ |
√ |
√ |
- Automatic check in the early morning every day
- Manual scan
|
Application vulnerabilities |
Detect vulnerabilities in assets, such as web services, web frameworks, websites, middleware, and kernel modules. |
× |
√ |
√ |
√ |
√ |
- Automatic check in the early morning every day
- Manual scan
|
Unsafe settings check |
Password policy check |
Check password complexity policies and modify them based on suggestions provided by HSS to improve password security. |
√ |
√ |
√ |
√ |
√ |
- Automatic check in the early morning every day
- Manual scan
|
Weak password check |
Change weak passwords to stronger ones based on HSS scan results and suggestions. |
√ |
√ |
√ |
√ |
√ |
- Automatic check in the early morning every day
- Manual scan
|
Unsafe configurations |
Check the unsafe Tomcat, Nginx, and SSH login configurations found by HSS. |
× |
√ |
√ |
√ |
√ |
- Automatic check in the early morning every day
- Manual scan
|
Container image security |
Container image vulnerability management |
Detect and manage vulnerabilities in local images and private image repositories based on a vulnerability database, and handle critical vulnerabilities in a timely manner. |
× |
× |
× |
× |
√ |
- Automatic check in the early morning every day
- Manual scan
|
Malicious image file detection |
Scan images for malicious files (such as Trojans, worms, viruses, and adware) and identify risks. |
× |
× |
× |
× |
√ |
Real-time check |
Image baseline check |
Check for insecure configurations based on 18 types of container baselines. |
× |
× |
× |
× |
√ |
Real-time check |
Application protection |
SQL injection |
Detect and defend against SQL injection attacks, and check web applications for related vulnerabilities. |
× |
× |
√ |
√ |
√ |
Real-time check |
OS command injection |
Detect and defend against remote OS command injection attacks and check web applications for related vulnerabilities. |
× |
× |
√ |
√ |
√ |
Real-time check |
XSS |
Detect and defend against stored cross-site scripting (XSS) injection attacks. |
× |
× |
√ |
√ |
√ |
Real-time check |
Log4jRCE vulnerability |
Detect and defend against remote code execution. |
× |
× |
√ |
√ |
√ |
Real-time check |
Web shell upload |
Detect and defend against attacks that upload dangerous files, change file names, or change file name extension types; and check web applications for related vulnerabilities. |
× |
× |
√ |
√ |
√ |
Real-time check |
XML External Entity Injection |
Detect and defend against XML External Entity Injection (XXE) attacks, and check web applications for related vulnerabilities. |
× |
× |
√ |
√ |
√ |
Real-time check |
Deserialization input |
Detect deserialization attacks that exploit unsafe classes. |
× |
× |
√ |
√ |
√ |
Real-time check |
File directory traversal |
Check whether sensitive directories or files are accessed. |
× |
× |
√ |
√ |
√ |
Real-time check |
Struts2 OGNL |
Detect OGNL code execution. |
× |
× |
√ |
√ |
√ |
Real-time check |
Command execution using JSP |
Detect command execution using JSP. |
× |
× |
√ |
√ |
√ |
Real-time checks |
File deletion using JSP |
Detects file deletion using JSP. |
× |
× |
√ |
√ |
√ |
Real-time check |
Database connection exception |
Detect authentication and communication exceptions thrown by database connections. |
× |
× |
√ |
√ |
√ |
Real-time check |
0-day vulnerability |
Check whether the stack hash of a command is in the whitelist of the web application. |
× |
× |
√ |
√ |
√ |
Real-time check |
SecurityManager permission exception |
Detect exceptions thrown by SecurityManager. |
× |
× |
√ |
√ |
√ |
Real-time check |
Web page tampering prevention |
Static WTP |
Protect the static web page files on your website servers from malicious modification. |
× |
× |
× |
√ |
× |
Real-time check |
Dynamic WTP |
Protect the dynamic web page files in your website databases from malicious modification. |
× |
× |
× |
√ |
× |
Real-time check |
Ransomware prevention |
Ransomware prevention |
Analyze operations on servers, identify trusted applications, and report alarms on or block untrusted applications, depending on your settings. |
× |
× |
√ |
√ |
√ |
Real-time checks |
Monitor file integrity |
File Integrity |
Check the files in the Linux OS, applications, and other components to detect tampering. |
× |
× |
√ |
√ |
√ |
Real-time check |
Intrusion detection |
Malicious program |
Check and handle detected malicious programs all in one place, including web shells, Trojan horses, mining software, worms, and viruses. |
× |
√ |
√ |
√ |
√ |
Real-time check |
Ransomware |
Check ransomware embedded in media such as web pages, software, emails, and storage media.
Ransomware is used to encrypt and control your data assets, such as documents, emails, databases, source code, images, and compressed files, to leverage victim extortion. |
× |
× |
√ |
√ |
√ |
Real-time check |
Webshell |
Check whether the files (often PHP and JSP files) detected by HSS in your web directories are web shells.
- Web shell information includes the Trojan file path, status, first discovery time, and last discovery time. You can choose to ignore warning on trusted files.
- You can use the manual detection function to scan for web shells on servers.
|
× |
√ |
√ |
√ |
√ |
Real-time check |
Reverse shell |
Monitor user process behaviors in real time to detect reverse shells caused by invalid connections.
Reverse shells can be detected for protocols including TCP, UDP, and ICMP. |
× |
× |
√ |
√ |
√ |
Real-time check |
Vulnerability exploit |
Detect server intrusions by exploiting vulnerabilities in real time and report alarms. |
× |
√ |
√ |
√ |
√ |
Real-time check |
File privilege escalation |
Check the file privilege escalations in your system. |
× |
× |
√ |
√ |
√ |
Real-time check |
Process privilege escalation |
The following process privilege escalation operations can be detected:
- Root privilege escalation by exploiting SUID program vulnerabilities
- Root privilege escalation by exploiting kernel vulnerabilities
|
× |
× |
√ |
√ |
√ |
Real-time check |
Change in critical file |
Receive alarms when critical system files are modified. |
× |
√ |
√ |
√ |
√ |
Real-time check |
File/Directory changes |
System files and directories are monitored. When a file or directory is modified, an alarm is generated, indicating that the file or directory may be tampered with. |
× |
√ |
√ |
√ |
√ |
Real-time check |
Abnormal process behavior |
Check the processes on servers, including their IDs, command lines, process paths, and behavior.
Send alarms on unauthorized process operations and intrusions.
The following abnormal process behavior can be detected:
- Abnormal CPU usage
- Processes accessing malicious IP addresses
- Abnormal increase in concurrent process connections
|
× |
√ |
√ |
√ |
√ |
Real-time check |
High-risk command execution |
Receive real-time alarms on high-risk commands. |
× |
× |
√ |
√ |
√ |
Real-time check |
Abnormal shell |
Detect actions on abnormal shells, including moving, copying, and deleting shell files, and modifying the access permissions and hard links of the files. |
× |
× |
√ |
√ |
√ |
Real-time check |
Suspicious crontab task |
Check and list auto-started services, scheduled tasks, pre-loaded dynamic libraries, run registry keys, and startup folders.
You can get notified immediately when abnormal automatic auto-start items are detected and quickly locate Trojans. |
× |
× |
√ |
√ |
√ |
Real-time check |
Brute-force attack defense |
Check for brute-force attack attempts and successful brute-force attacks.
- Your accounts are protected from brute-force attacks. HSS will block the attacking hosts when detecting such attacks.
- Trigger an alarm if a user logs in to the host by a brute-force attack.
|
√ |
√ |
√ |
√ |
√ |
Real-time check |
Abnormal login |
Check and handle remote logins.
If a user's login location is not any common login location you set, an alarm will be triggered. |
√ |
√ |
√ |
√ |
√ |
Real-time check |
Invalid account |
Scan accounts on servers and list suspicious accounts in a timely manner. |
× |
√ |
√ |
√ |
√ |
Real-time check |
Container intrusion detection |
Vulnerability escape |
An escape alarm is reported if a container process behavior that matches the behavior of known vulnerabilities is detected. |
× |
× |
× |
× |
√ |
Real-time checks |
File escape |
An alarm is reported if a container process is found accessing a key file directory (for example, /etc/shadow or /etc/crontab). Directories that meet the container directory mapping rules can also trigger such alarms. |
× |
× |
× |
× |
√ |
Real-time check |
Abnormal container process |
- Malicious container program
Monitor container process behavior and process file fingerprints. An alarm is reported if it detects a process whose behavior characteristics match those of a predefined malicious program.
- Abnormal process
An alarm is reported if a process not in the whitelist is running in the container.
|
× |
× |
× |
× |
√ |
Real-time check |
Abnormal container startup |
The service monitors container startups and reports an alarm if it detects that a container with too many permissions is started.
Container check items include:
- Privileged container startup (privileged:true)
- Too many container capabilities (capability:[xxx])
- Seccomp not enabled (seccomp=unconfined)
- Container privilege escalation (no-new-privileges:false)
- High-risk directory mapping (mounts:[...])
|
× |
× |
× |
× |
√ |
Real-time check |
High-risk system call |
You can run tasks in kernels by Linux system calls. CGS monitors container processes. This alarm is generated when CGS detects that a process uses high-risk system calls. |
× |
× |
× |
× |
√ |
Real-time check |
Sensitive file access |
The service monitors the container image files associated with file protection policies, and reports an alarm if the files are modified. |
× |
× |
× |
× |
√ |
Real-time check |
Whitelist management |
Alarm whitelist |
You can add an alarm to the whitelist when handling it.
The following types of events can be added to the alarm whitelist:
- Reverse shell
- Web shells
- Abnormal process behaviors
- Process privilege escalation
- File privilege escalation
- High-risk commands
- Malicious programs
|
× |
× |
√ |
√ |
√ |
Real-time check |
Policy management |
Querying and editing rule configurations |
You can define and issue different detection policies for different servers or server groups, implementing refined security operations.
- View the policy list.
- Create a policy group based on default and existing policy groups.
- Define a policy.
- Edit or delete a policy.
- Modify or disable policies in a group.
- Apply policies to servers in batches on the Servers & Quota page.
|
× |
√ (Only the default enterprise policy group is supported.) |
√ |
√ |
√ |
Real-time check |
Security report |
Server security report |
Check weekly or monthly server security trend, key security events, and risks. |
× |
√ |
√ |
√ |
√ |
- |
Security configuration |
Common login location |
For each server, you can configure the locations where users usually log in from. The service will generate alarms on logins originated from locations other than the configured common login locations. A server can be added to multiple login locations. |
√ |
√ |
√ |
√ |
√ |
Real-time check |
Common login IP address |
For each server, you can configure the IP addresses where users usually log in from. The service will generate alarms on logins originated from IP addresses other than the configured common IP addresses. |
√ |
√ |
√ |
√ |
√ |
Real-time check |
Configuring an SSH login IP address whitelist |
The SSH login whitelist controls SSH access to servers to prevent account cracking.
After you configure the whitelist, SSH logins will be allowed only from whitelisted IP addresses.
NOTA:
The SSH IP address whitelist does not take effect for servers running Kunpeng EulerOS (EulerOS with Arm).
|
√ |
√ |
√ |
√ |
√ |
Real-time check |
Malicious program isolation and removal |
HSS automatically isolates and kills identified malicious programs, such as web shells, Trojans, and worms, removing security risks. |
× |
√ |
√ |
√ |
√ |
Real-time check |
2FA |
Prevent brute-force attacks by using password and SMS/email authentication. |
× |
√ |
√ |
√ |
√ |
- |
Alarm configuration |
After alarm notification is enabled, you can receive alarm notifications to learn about security risks facing your servers, containers, and web pages. |
√ |
√ |
√ |
√ |
√ |
- |