Updated on 2025-08-26 GMT+08:00

HSS Operations Supported by CTS

Cloud Trace Service (CTS) records all operations on HSS, including the requests initiated from the management console or open APIs and the responses to the requests. You can query the records for auditing and tracing.

The following table describes the HSS operations recorded by CTS.

Table 1 CTS-recorded operations on operation tools

Operation

Resource Type

Trace Name

(Operation tool) Clear the search history of the tool

hss

deleteToolConditionHistory

(Operation tool) Obtain the search history of the tool

hss

listToolConditionHistory

(Operation tool) Use the tool to search

hss

executeTool

(Operation tool) Obtain the tool list

hss

listTool

(Operation tool) Obtain the execution result.

hss

listResult

Table 2 Overview operations that can be recorded by CTS

Operation

Resource Type

Trace Name

Query the number of agents

hss

showAgentStatistics

Obtain the service group distribution statistics and identify common, important, and core assets

hss

showAssetGroupsStatistics

Obtain OS distribution statistics

hss

showAssetOsStatistics

Obtain asset (server, container, and image) statistics

hss

showAssetStatistics

Show news

hss

showHotInformation

Query the protection period, virus database update time, vulnerability database update time, and accumulated number of records of each module

hss

showProtectStatistics

Obtain server security statistics

hss

showQuotaStatistics

Obtain server quota statistics

hss

showQuotaHostStatistics

Obtain the ATT&CK matrix

hss

showAttckMitre

Obtain proactive defense statistics

hss

showDefenseStatistics

Obtain risk statistics, including security risks, security alarms, and proactive defense

hss

showRiskStatistics

Manage risks

hss

showRiskManageStatistics

Query the protection status of the current cloud workloads

hss

showProtectionStatusStatistics

Query the server risks, container risks, and security risk trends

hss

showSecurityRisk

Query the security risk list

hss

listSecurityRisk

Query the security score

hss

showSecurityScore

Query the numbers of assets with enabled ransomware protection, application protection, web tamper protection, or 2FA; the number of assets supporting 2FA; and the number of isolated files

hss

showStatistics

Table 3 Asset fingerprint operations that can be recorded by CTS

Operation

Resource Type

Trace Name

Obtain the change history of software information

hss

listAppChangeHistories

Query the software list

hss

listAppStatistics

Query the server list of software

hss

listApps

Query the status of a global asset scan task

hss

listGlobalAssetScanTask

Create a global asset scan task

hss

createGlobalAssetScanTask

Obtain the change history of auto-started items

hss

listAutoLaunchChangeHistories

Query auto-started item information

hss

listAutoLaunchStatistics

Query the service list of an auto-started item

hss

listAutoLaunchs

Display details about a port

hss

showCommonPort

Export container asset fingerprints

hss

downloadAssetFile

Asset management - asset fingerprints - server list of the kernel module

hss

listKernelModuleHostInfo

Asset management - asset fingerprints - server list of the web framework module

hss

listWebFrameworkHostInfo

Asset management - asset fingerprints - server list of the website module

hss

listWebSiteHostInfo

Obtain the status of the interface used for immediately collecting asset fingerprints on a server

hss

showHostAssetManualCollectStatus

Obtain the asset fingerprints of a server

hss

runHostAssetManualCollect

Query the middleware list

hss

listJarPackageStatistics

Query the server list of a specified middleware

hss

listJarPackageHostInfo

Query open port statistics

hss

listPortStatistics

Query the open port list of a server

hss

listPorts

Asset fingerprints - port - server list

hss

listPortHost

Asset fingerprints - port - server list

hss

listPortHostOld

Query the process list

hss

listProcessStatistics

Asset fingerprints - process - server list

hss

listProcessesHost

Asset fingerprints - process - server list

hss

listProcessesHostOld

Collect asset statistics, including accounts, ports, and processes

hss

showAssetStatistic

Asset management - asset fingerprints - kernel module tree on the left

hss

listKernelModuleStatistics

Asset management - asset fingerprints - web framework tree on the left

hss

listWebFrameworkStatistics

Asset management - asset fingerprints - website tree on the left

hss

listWebSiteStatistics

Obtain the account change history

hss

listUserChangeHistories

Query the account list

hss

listUserStatistics

Query the server list of an account

hss

listUsers

Asset management - asset fingerprints - web application and service name tree on the left

hss

listWebAppAndServiceStatistics

Asset management - asset fingerprints - web application and service assets on the right

hss

listWebAppAndServices

Asset management - server management - fingerprint type - JAR package

hss

listJarPackageInfo

Asset management - server management - fingerprint type - kernel module

hss

listKernelModuleInfo

Asset management - server management - fingerprint type - web application

hss

listWebAppInfo

Asset management - server management - fingerprint type - web framework

hss

listWebFrameworkInfo

Asset management - server management - fingerprint type - website

hss

listWebSiteInfo

Query the number of cluster assets

hss

showClusterAssetStatistics

Table 4 Asset overview operations that can be recorded by CTS

Operation

Resource Type

Trace Name

Asset management - overview - top accounts

hss

showAccountTop

Asset management - overview - top auto-started items

hss

showAutoLaunchTop

Asset management - overview - top critical settings

hss

showCoreConfFileTop

Asset management - overview - top environment variables

hss

showEnvironmentTop

Asset management - overview - top JAR packages

hss

showJarPackageTop

Asset management - overview - top kernel modules

hss

showKernelModuleTop

Asset management - overview - top ports

hss

showPortTop

Asset management - overview - top processes

hss

showPorcessTop

Asset management - overview - top software

hss

showSoftwareTop

Asset management - overview - top web applications

hss

showWebAppTop

Asset management - overview - top 5 web applications and top 5 web services

hss

showWebAppAndServiceTop

Asset management - overview - top web frameworks

hss

showWebFrameworkTop

Asset management - overview - top web services

hss

showWebServiceTop

Asset management - overview - top websites

hss

showWebSiteTop

Asset management - overview - asset status - server agent status

hss

showAgentStatisticsStatus

Asset management - overview - asset status - container node protection status

hss

showContainerProtectionStatus

Asset management - overview - asset status - agent status

hss

showHostProtectionStatus

Asset management - overview - asset status - OS statistics

hss

showOsStatisticsInfo

Asset management - overview - asset status - protection quota statistics

hss

showQuotaStatisticsInfo

Asset management - overview - asset status - asset distribution

hss

showAssetType

Table 5 Server management operations that can be recorded by CTS

Operation

Resource Type

Trace Name

Query the list of server groups by asset importance on the asset importance management page

hss

listHostGroupAssetValue

Configure asset importance

hss

associateHostAssetValue

Check whether the firewall is enabled on a server

hss

listFirewallStatus

Modify the firewall authorization status

hss

switchFirewallStatus

Add a server to group

hss

associateHostsGroup

Delete a server group

hss

deleteHostsGroup

Query the server group list

hss

listHostGroups

Create a server group

hss

addHostsGroup

Edit a server group

hss

changeHostsGroup

Collect server statistics

hss

host-statistics

Query the cloud server list

hss

listHostStatus

Query the ECS risk status

hss

listHostsRisk

Query the server groups in on-premises data centers

hss

showOutsideHostGroup

Create an on-premise data center server group

hss

addOutsideHostGroup

Edit an on-premises data center server group

hss

changeOutsideHostGroup

Query whether data center server groups can be created

hss

showOutsideGroupStatus

Query the server policy list

hss

listPolicies

Change the protection status

hss

switchHostsProtectStatus

Uninstall an agent

hss

uninstallAgents

Upgrade an agent

hss

upgradeAgents

Create a VPC endpoint

hss

createVpcEndpoint

Query the creation status of each server endpoint

hss

showEndpointStatus

Deliver a manual scan

hss

setManualDetect

Query the manual scan status

hss

showScanStatus

Ignore or unignore a server

hss

changeHostIgnoreStatus

Table 6 Monthly summary operations that can be recorded by CTS

Operation

Resource Type

Trace Name

Query the status of the monthly operations report dialog box

hss

showMonthlyOperaReportNotifyInfo

Change the status of the monthly operations report dialog box

hss

changeMonthlyOperationReportTipStatus

Query the monthly operations report list

hss

listMonthlyOperationReports

Query the details of a monthly operations report

hss

showMonthlyOperationReportDetail

Query the information in the news and promotions area of a monthly operations report

hss

showWelfareAreaInfo

Table 7 Application process control operations that can be recorded by CTS

Operation

Resource Type

Trace Name

Count the servers with unmatched agent versions

hss

showAppWhitelistAgentStatics

Query suspicious processes in the process whitelist

hss

listAppWhitelistEvent

Query the servers associated with a process whitelist policy

hss

listAppWhitelistPolicyHost

Apply a whitelist policy

hss

switchAppWhitelistPolicyHost

Query the servers available for the process whitelist

hss

listAppWhitelistHostStatus

Delete a whitelist policy

hss

deleteAppWhitelistPolicy

Query the process whitelist policy list

hss

listAppWhitelistPolicy

Create a whitelist policy

hss

createAppWhitelistPolicy

Modify a whitelist policy

hss

changeAppWhitelistPolicy

Query process whitelist policy details

hss

showAppWhitelistPolicy

Delete a server from the whitelist policy

hss

deleteAppWhitelistPolicyHost

Add a server to the whitelist policy

hss

addAppWhitelistPolicyHost

Manage the whitelist policy learning status

hss

switchAppWhitelistPolicyLearnStatus

Query the processes identified by the process whitelist policy

hss

listAppWhitelistPolicyProcess

Add a process to the process whitelist policy

hss

addAppWhitelistPolicyProcess

Mark a process whitelist policy to identify a process

hss

changeAppWhitelistPolicyProcessStatus

Query the extended process list of the process whitelist policy

hss

listAppWhitelistPolicyProcessExtend

Export the process list a process whitelist policy

hss

exportAppWhitelistPolicyProcess

Table 8 Application protection operations that can be recorded by CTS

Operation

Resource Type

Trace Name

Query the application protection event list

hss

listRaspEvents

Query the protection policy list

hss

listPolicies

Delete a protection policy

hss

deletePolicy

Add a protection policy

hss

addPolicy

Modify a protection policy

hss

updatePolicy

Query protection policy details

hss

showRaspPolicyDetail

Query the detection rule list

hss

listCheckFeatureRule

Query the protected server list

hss

listProtectionServers

Query the Java application details of a protected server

hss

showRaspServerDetail

Collect protection statistics

hss

showRaspProtectStatistics

Enable/Disable application protection and update protected ports

hss

switchRasp

Query the status of application protection

hss

showAppRaspSwitchStatus

Table 9 Project management operations that can be recorded by CTS

Operation

Resource Type

Trace Name

Query project configuration

hss

listProjectConfigs

Modify project configuration

hss

modifyProjectConfigs

Table 10 File integrity management operations that can be recorded by CTS

Operation

Resource Type

Trace Name

Obtain the list of modified files

hss

listFileEvents

Obtain the list of modified cloud servers

hss

listFileHosts

Obtain the file statistics of a server

hss

showFileStatistic

Obtain the information about modified files on a server

hss

listFileHostEventDetails

Table 11 Web tamper protection (WTP) operations that can be recorded by CTS

Operation

Resource Type

Trace Name

Query the available server list for WTP

hss

listWebTamperHost

Export the WTP server list

hss

exportWebTamperHost

Query the protection list

hss

listWtpProtectHost

Enable WTP

hss

batchStartWebTamperProtection

Query the dynamic WTP status of a server

hss

listHostRaspProtectHistoryInfo

Enable or disable dynamic WTP

hss

setRaspSwitch

Query the static WTP status of a server

hss

listHostProtectHistoryInfo

Enable or disable WTP

hss

setWtpProtectionStatusInfo

Check a WTP policy

hss

showWebTamperHostPolicy

Edit a WTP policy

hss

updateWebTamperHostPolicy

Query remote backup servers

hss

listBackupHostsInfo

Add or modify a remote backup server

hss

updateBackupHostInfo

Collect protection statistics

hss

showWtpProtectStatistics

Query remote backup server information

hss

showRemoteBackupHostInfo

Enable or disable directory protection

hss

setProtectDirSwitchInfo

Query the Tomcat of dynamic WTP

hss

showWebTamperRaspPath

Modify the Tomcat of dynamic WTP

hss

updateWebTamperRaspPath

Enable or disable remote backup

hss

setRemoteBackupInfo

Table 12 Container asset operations that can be recorded by CTS

Operation

Resource Type

Trace Name

Query the Kubernetes cluster list

hss

listKubernetesClusterDetails

View container details

hss

showK8sContainerDetail

Query the cronjobs basic information list

hss

listK8sCronJobs

Query the daemonsets basic information list

hss

listK8sDaemonSets

Query the deployment basic information list

hss

listK8sDeployments

Query the container Kubernetes endpoint details

hss

showKubernetesEndpointInfo

Query the container Kubernetes endpoint list

hss

listKubernetesEndpointDetails

Query the jobs basic information list

hss

listK8sJobs

Query the pod basic information list

hss

listK8sPods

Synchronize cluster information

hss

createClustersInfo

Query Kubernetes service details

hss

showKubernetesServiceInfo

Query the Kubernetes service list

hss

listKubernetesServiceDetails

Query the statefulset basic information list

hss

listK8sStatefulSets

Manage the container lifecycle

hss

changeContainerStatus

Query pod details

hss

showK8sPodDetail

Table 13 Container image security operations that can be recorded by CTS

Operation

Resource Type

Trace Name

Obtain image software information

hss

listGlobalImageApps

Container assets - image statistics

hss

showImageAssetStatistics

Query the full configuration check statistics of users

hss

listGlobalCfgCheck

Query the list of user images affected by the baseline items that failed to pass the check

hss

listCfgCheckAffectedImage

Query the image configuration check report

hss

showImageCheckRuleDetail

Export image repository baseline check results in batches (full export supported)

hss

batchExportBaselineTask

Query the custom weak passwords of an image

hss

showExtendedWeakPassword

Modify the custom weak passwords of an image

hss

changeExtendedWeakPassword

Query the password complexity policy scan reports

hss

listImagePwdComplexity

Query the list of image security configuration check results

hss

listImageRiskConfigs

Query the check result of a specified security configuration item of an image

hss

showImageRiskConfigDetail

Query the check item list of a specified security configuration item of an image

hss

listImageRiskConfigRules

Query the baseline check statistics

hss

showImageBaselineStatistic

Query the list of weak password detection results of an image

hss

listImageWeakPwdUsers

Scan images in the image repository in batches

hss

batchScanSwrImage

Query the CI/CD configuration list

hss

listCicdConfigurations

Add a CI/CD configuration

hss

addCicdConfiguration

Delete a CI/CD configuration

hss

deleteCicdConfigurations

Generate the CI/CD access configuration command

hss

createCicdConfigurationCommand

Query the CI/CD configuration

hss

showCicdConfiguration

Modify the CI/CD configuration

hss

modifyCicdConfiguration

Query the CI/CD image list

hss

listCicdImages

Query CI/CD image statistics

hss

showCicdImageStatistics

Obtain image file information

hss

listGlobalImageFiles

Create a scan task

hss

createManualImageScanTask

Obtain information about the images associated with a task

hss

listAssociateImages

Terminate an image scan task in the repository

hss

stopImageScanTask

Create an image synchronization task

hss

createImageSynchronizeTask

Obtain information about the image repository associated with an image synchronization task

hss

listAssociateRegistries

Query the local image list

hss

listImageLocal

Export local image vulnerabilities in batches (full export supported)

hss

batchExportLocalVulTask

Query the software information about a local image

hss

listLocalImageAppInfo

Scan local images

hss

batchScanLocalImage

Query the container information about a local image

hss

listLocalImageContainers

Query the server information about a local image

hss

listLocalImageHosts

Query the malicious file list of a user

hss

listGlobalMalware

Modify the number of free image scans

hss

changeImageScanFreeQuota

Query pay-per-use image scan statistics

hss

showImagePayPerScanStatistics

Obtain the image repository list

hss

listRegistry

Add an image repository

hss

addRegistry

Delete image repository access information in batches

hss

batchDeleteRegistry

Obtain the image uploading command of the scan component

hss

showImageUploadCommand

Query the image list of a repository

hss

listRegistryImages

Query image statistics of a repository

hss

listRegistryImagesStatistics

Query the statistics of an image repository

hss

listRegistryStatistics

Delete image repository access information

hss

deleteRegistry

Edit image repository access information

hss

updateRegistry

Obtain the scan policy

hss

listImageScanPolicy

Modify a periodic scan policy

hss

modifyImageScanPolicy

Create a task for exporting image security reports (full or batch export supported)

hss

exportImageSecurityReportTask

Export image security report statistics. If the image type to be exported is CI/CD, the image_type parameter needs to be set to cicd.

hss

showImageSecurityReportStatistic

Query sensitive information about an image

hss

listImageSensitiveInfo

Query the whitelist of file paths containing sensitive image information

hss

showFilePathWhiteDetail

Modify the whitelist of file paths containing sensitive image information

hss

changeFilePathWhiteDetail

Sensitive information processing

hss

changeSensitiveInfo

Obtain the image scan overview

hss

listImageScanOverview

Query the image list in the SWR image repository

hss

listSwrImageRepository

Export vulnerabilities in SWR image repositories in batches (full export supported)

hss

batchExportSWRVulTask

Update and scan SWR images

hss

runSwrImageScan

Synchronize the image list from the SWR

hss

runImageSynchronize

Obtain the scan task list

hss

listImageScanTask

Query user vulnerability information

hss

listGlobalVulnerabilities

Handle image vulnerabilities

hss

handleImageVulnerability

Query the list of vulnerabilities affected by an image vulnerability handling operation

hss

listImageHandleAffectVulnerabilities

View the handling history of an image vulnerability

hss

listGeneralImageVulOperations

Query the images affected by a vulnerability

hss

listVulnerabilityImages

View the software information of the image affected by a vulnerability

hss

listVulAffectImageApps

View the associated container information of the image affected by a vulnerability

hss

listVulAffectImageContainers

Query the CVE information corresponding to a vulnerability

hss

listVulnerabilityCve

Delete an image from the whitelist

hss

deleteImageWhiteLists

Query the image whitelist

hss

listImageWhiteLists

Add an image whitelist item

hss

addImageWhiteLists

Query image whitelist details

hss

showImageWhiteListDetail

Modify the image whitelist configuration

hss

changeImageWhiteList

Query the image software list

hss

listImageApps

Query basic image information

hss

listImageBasicImage

Query the image file list

hss

listImageFiles

Query image file statistics

hss

showImageFilesStat

Query the malicious file list of an image

hss

listImageMalware

Query the non-compliant software information of an image

hss

listImageNonCompliantApp

Query sensitive information about an image

hss

listImageSensitive

Query image vulnerability information

hss

listImageVulnerabilities

Information about the images affected by a vulnerability

hss

listVulRepoImage

View the vulnerabilities of all image types

hss

listGeneralImageVuls

Query vulnerability information about enterprise images

hss

listInstanceImageVul

Table 14 Container cluster protection operations that can be recorded by CTS

Operation

Resource Type

Trace Name

Query cluster protection information

hss

listClusterProtectionInfo

Obtain the list of default cluster protection policies

hss

listClusterProtectionDefaultPolicy

Obtain alarm events in all clusters

hss

listClusterEvents

Chang the alarm status

hss

modClusterEvents

Check the cluster protection overview

hss

listClusterProtectOverview

Delete a cluster protection policy

hss

deleteClusterProtectionPolicy

Obtain the list of cluster protection policies

hss

listClusterProtectionPolicy

Create a cluster protection policy

hss

createClusterProtectionPolicy

Modify a cluster protection policy

hss

changeClusterProtectionPolicy

Obtain the list of cluster protection policies

hss

listClusterProtectionPolicyDetail

Obtain all the protection items of a cluster

hss

listClusterProtectionItem

Manage the cluster protection mode

hss

switchClusterProtectionMode

Table 15 Container management operations that can be recorded by CTS

Operation

Resource Type

Trace Name

Query the container log list

hss

listContainerLogs

Query the container node protection overview

hss

showContainerNodeStatistics

Query the container node list

hss

listContainerNodes

Change the protection status

hss

switchContainerProtectStatus

Download an exported file

hss

listDownloadExportedFile

Table 16 Container firewall operations that can be recorded by CTS

Operation

Resource Type

Trace Name

Query clusters protected by container security

hss

listContainerNetworkClusters

Synchronize the latest data of container clusters

hss

syncClusterList

Obtain the cluster network policy overview

hss

showNetworkStatistics

Query all the security groups in an enterprise project

hss

listSecurityGroups

Obtain the namespaces in a cluster

hss

listNamespaces

Query the network information of a container cluster

hss

showContainerNetworkInfo

Query the node list of the VPC of a container cluster

hss

listContainerNetworkNodeList

Synchronize the latest network node data in a cluster

hss

syncContainerNetworkNode

Delete a configuration policy of the container cluster network

hss

deleteContainerNetworkPolicy

Query the container cluster network policy list

hss

listContainerNetworkPolicy

Add a configuration policy to the container cluster network

hss

createContainerNetworkPolicy

Update a configuration policy of the container cluster network

hss

updateContainerNetworkPolicy

Synchronize the latest container network policies from a cluster

hss

syncContainerNetworkPolicyList

Query the security group policies configured for a cluster in cloud native network mode 2.0

hss

listSecurityGroupPolicies

Delete a security group policy

hss

deleteSecurityGroupPolicy

Synchronize the latest security group policies in a cluster

hss

syncSecurityGroupPolicies

Create a security group policy

hss

createSecurityGroupPolicy

Update a security group policy

hss

updateSecurityGroupPolicy

Query the workloads in a namespace in a cluster

hss

listWorkLoads

Table 17 Task management operations that can be recorded by CTS

Operation

Resource Type

Trace Name

Batch upload files

hss

batchUploadFiles

Create a task

hss

createTask

Query task statistics

hss

showTaskStatistics

Query the task list

hss

listTasks

Query the resource list associated with the current task

hss

listTaskResources

Obtain certain prompt information

hss

listCommonTips

Table 18 Quota management operations that can be recorded by CTS

Operation

Resource Type

Trace Name

Query quota information

hss

showResourceQuotas

Unbind quota

hss

cancelHostsQuota

Query quota details

hss

listQuotasDetail

Query quota IDs in batches

hss

listResourceIds

Query the latest version used by a customer

hss

showVersion

Query the latest version used by a customer

hss

showVersionNewService

Query product information

hss

showProductdataOfferingInfos

Create a quota subscription order for HSS

hss

createQuotasOrder

Change the billing mode from pay-per-use to yearly/monthly for a resource

hss

ChangeToPeriod

After the order for changing the resource billing mode from pay-per-use to yearly/monthly is complete for a resource, the cloud operation service calls an API to unlock the resource.

hss

UnlockResources

Query the resource locking status

hss

ListLockedStatus

Table 19 Vulnerability management operations that can be recorded by CTS

Operation

Resource Type

Trace Name

Query basic information about Web-CMS vulnerabilities

hss

showCmsVulDetail

Query emergency vulnerability details

hss

emergencyVulDetail

Export emergency vulnerabilities

hss

exportEmergencyVulnerabilities

Query emergency vulnerabilities

hss

exportEmergencyVulnerabilities

Manage emergency vulnerabilities

hss

emergencyOperate

Query the emergency event overview

hss

emergencySummary

Export information about vulnerabilities and affected servers

hss

exportVuls

Export information about vulnerabilities and affected servers

hss

exportVulsList

Query basic information about Linux vulnerabilities

hss

showLinuxVulDetail

Query the scan status of server vulnerabilities

hss

vulCheckStatus

Query vulnerability type distribution

hss

listVulTypeSummary

Query basic information about Windows vulnerabilities

hss

showWindosVulDetail

Query vulnerability fix failure information

hss

listVulRepairFailedDetail

Query the backup statistics of the servers where vulnerabilities were handled

hss

showVulBackupStatistics

Query the list of backups that can be rolled back

hss

listVulHostBackups

Query the list of server vaults corresponding to vulnerability handling

hss

listVulHostVaults

Perform rollback using a backup

hss

restoreVulHostBackup

Query the information about the container applications affected by a vulnerability

hss

listVulContainerApps

Query the information about the containers affected by a vulnerability

hss

listVulContainers

Query the vulnerability handling history

hss

listVulHandleHistory

Create a task for exporting vulnerability handling records

hss

exportVulHandleHistory

View handled vulnerabilities

hss

listHandleVuls

Create a task for exporting historical vulnerabilities

hss

exportHandledVulnerabilities

Servers- Vulnerability list

hss

listVulHostVuls

Vulnerability management - server view - server list

hss

listVulHostHosts

Query vulnerability information about a server

hss

listHostVuls

Query the servers affected by a vulnerability

hss

listVulHosts

View the list of images affected by a vulnerability

hss

listVulAffectImages

Query vulnerability statistics

hss

showVulIndividualStatistics

Query the vulnerability fixing command list

hss

listVulRepairCmds

Vulnerability management - server view - server list - export report

hss

showVulReportData

Vulnerability management - server view - server list - export report

hss

exportVulReport

Query a vulnerability scan policy

hss

showVulScanPolicy

Modify a vulnerability scan policy

hss

changeVulScanPolicy

Create a vulnerability scan task

hss

createVulnerabilityScanTask

Query the list of servers corresponding to a vulnerability scan task

hss

listVulScanTaskHost

Query the vulnerability scan tasks

hss

listVulScanTask

Query vulnerability scan task statistics

hss

showVulScanTaskStatistics

Rescan servers in the previous vulnerability scan task

hss

rescanVulScanTask

Query vulnerability management statistics

hss

showVulStatics

Query the numbers of affected servers and vulnerabilities

hss

showVulAffectedStatics

Change the status of a vulnerability

hss

changeVulStatus

Obtain the number of unread vulnerability tasks

hss

showVulTaskStatistics

Record the last time when a user viewed the vulnerability task management page

hss

recordUserViewVulTask

Query the emergency vulnerability list

hss

listUrgentVulnerabilities

Query the vulnerability list

hss

listVulnerabilities

Add a vulnerability whitelist item

hss

addVulWhiteList

Query vulnerability options when adding a whitelist item

hss

listVulWhiteListVulOptions

Query vulnerability whitelist details

hss

showVulWhiteListDetail

Modify the vulnerability whitelist

hss

changeVulWhiteList

Query the vulnerability whitelist

hss

listVulWhiteList

Query details about affected servers - software list

hss

listVulHostApps

Query details about affected servers - process list

hss

listVulHostProcess

Query the number of Windows vulnerabilities on servers

hss

windowsVulNum

Table 20 Ransomware prevention operations that can be recorded by CTS

Operation

Resource Type

Trace Name

Query the backup policy bound to an HSS vault

hss

showBackupPolicyInfo

Modify the backup policy associated with a vault

hss

updateBackupPolicyInfo

Query a backup policy

hss

showSingleBackupPolicyInfo

Apply a backup policy to a vault

hss

associateBackupPolicy

Query the backup and restoration task list

hss

listOperationLogsByVaultName

Query the backup policy list

hss

listBackupPolicy

Query a specific backup

hss

showBackupInfoByBackupId

Query the backup list

hss

listBackedupByHostId

Delete a backup

hss

deleteDuplicationInfo

Restore data from a backup

hss

restoreDuplicationInfo

Query the backup vault list

hss

listBackupVaults

Enable ransomware prevention for multiple vaults

hss

batchStartProtection

Disable ransomware prevention

hss

stopProtection

Enable ransomware prevention

hss

startProtection

Delete a policy

hss

deleteProtectionPolicy

Query the ransomware prevention policy list

hss

listProtectionPolicy

Add a protection policy

hss

addProtectionPolicy

Modify a ransomware protection policy

hss

updateProtectionPolicy

Switch a ransomware protection policy

hss

associateProtectionPolicy

Query the list of servers protected against ransomware

hss

listProtectionServer

Query the list of servers protected against ransomware

hss

listRansomwareProtectionNodes

View the snapshot creation status of a server disk

hss

listCreateStatus

Disable ransomware snapshot

hss

disableSnapshot

Enable ransomware snapshot

hss

enableSnapshot

View the periodic snapshot generation policy

hss

listSnapshotPolicy

Update a scheduled snapshot policy

hss

updateSnapshotPolicy

Collect backup statistics

hss

showBackupsStatistics

Collect protection statistics

hss

showProtectionStatistics

Table 21 Detection and response operations that can be recorded by CTS

Operation

Resource Type

Trace Name

Obtain emergency event statistics

hss

emergencyShowEmergencyStatistics

Obtain the list of unexpected malicious program events

hss

showMalwareInfo

Obtain the list of unexpected malicious program events

hss

listMalware

Export emergency malicious programs

hss

exportEmergency

Obtain the list of isolated malicious program files in unexpected events

hss

listFileIsolateList

Handle incidents

hss

handleMalwareEvent

Manage the isolation switch

hss

isolateOperateEmergency

Restore an isolated file

hss

recoverIsolateFile

Query the statistics of ATT&CK phases

hss

listEventAttCk

Query the list of attack identifier distribution statistics

hss

showEventAttackTag

Query the handling types supported by an event

hss

listEventOperates

Handle alarms in batches

hss

batchChangeEvent

Query the list of blocked IP addresses

hss

listBlockedIp

Unblock an IP address

hss

changeBlockedIp

Query the container response event list

hss

listContainerHandlingEvents

Download the alarm source file

hss

downloadEventSourceFile

Download an exported file

hss

downloadExportedFile

Query the event type statistics list

hss

listEventType

Query intrusion events

hss

listSecurityEvents

Export vulnerabilities

hss

exportEventRequest

Query the export task information

hss

queryExportTask

Query the forensics information about a specific event

hss

listEventForensic

Query the alarm handling history

hss

listEventHandleHistory

Delete an isolated file

hss

deleteIsolatedFile

Query the list of isolated files

hss

listIsolatedFile

Restore an isolated file

hss

changeIsolatedFile

Handle an alarm event

hss

changeEvent

Query the list of duplicate alarms of an alarm event

hss

listSameEvents

Query the threat level statistics list

hss

showEventSeverity

Query the handled similar alarms associated with an alarm event

hss

listSimilarHandledEvents

Query the alarm event statistics

hss

showEventStatistics

Query the top 5 event type statistics list

hss

listTopEventType

Query the top 5 event type statistics list

hss

listEventTopRisk

Remove an alarm from whitelist

hss

removeAlarmWhiteList

Query the alarm whitelist

hss

listAlarmWhiteList

Export the alarm whitelist

hss

exportAlarmWhiteList

Import an alarm whitelist

hss

importAlarmWhiteList

Remove login information from login whitelist

hss

removeLoginWhiteList

Query the login whitelist

hss

listLoginWhiteList

Configure the login whitelist

hss

addLoginWhiteList

Remove an item from the system user whitelist

hss

removeSystemUserWhiteList

Query the system user whitelist

hss

listSystemUserWhiteList

Add an item to the system user whitelist

hss

addSystemUserWhiteList

Modify the system user whitelist

hss

updateSystemUserWhiteList

Query the export task information

hss

queryLatestExportTaskByType

Create an export task

hss

exportTaskInfo

Query the export task information

hss

listQueryExportTask

Table 22 Cluster environment security operations that can be recorded by CTS

Operation

Resource Type

Trace Name

Query the cluster resources affected by a risk

hss

listClusterRiskAffectResources

Query the cluster risk list

hss

listClusterRisks

Query cluster scan statistics

hss

showClusterScanStatistics

Synchronize cluster protection events

hss

cluster-protect

Query the list of cluster component protection policy templates

hss

listClusterProtectPolicyTemplates

Query a cluster component protection policy template

hss

cluster-protect

Query the list of commands running in the container

hss

listContainerCmdLogs

Create a container export task

hss

exportContainerList

Obtain the risky IaC file path list

hss

listIacFileRiskPaths

Obtain the IaC file risk list

hss

listIacFileRisks

Obtain the IaC file list

hss

listIacFiles

Table 23 Baseline check operations that can be recorded by CTS

Operation

Resource Type

Trace Name

Ignore, unignore, repair, or verify the configuration items that fail to pass the check

hss

changeCheckRuleAction

Query the report of configuration check items

hss

showCheckRuleDetail

Query the cause of a check item fix failure

hss

showCheckRuleFixFailDetail

Query the impact scope of a baseline check

hss

listHandleAffectBaseline

Query the servers affected by a configuration check item

hss

listCheckRuleHost

Manual check: Perform configuration and weak password checks on the servers specified in the policy

hss

runBaselineDetect

Export baseline check reports from the backend as Excel files

hss

exportBaselineSecurityCheckReport

Query the baseline check statistics

hss

showBaselineOverview

Query password complexity policy scan reports

hss

listPasswordComplexity

Ignore or unignore the servers that failed the password complexity check

hss

changePasswordComplexityStatus

Export configuration check reports based on query results

hss

exportSecurityCheckReport

Query the checklist of a specified security configuration item

hss

listRiskConfigCheckRules

Query the check result of a specified security configuration item

hss

showRiskConfigDetail

Query the list of affected servers of a specified security configuration item

hss

listRiskConfigHosts

Query the result list of a user's server security configuration checks

hss

listRiskConfigs

Query the progress of a baseline check task

hss

showBaselineScanStatus

Query the default baseline of a configuration check policy

hss

showDefaultSecurityCheckPolicy

Query detailed baseline check items

hss

showDefaultSecurityCheckPolicyDetails

Query the baseline directory information of a baseline check policy

hss

showBaselineDirectory

Create a configuration check policy

hss

copyBaselinePolicyGroup

Create a configuration check policy

hss

addSecurityCheckPolicyGroup

Delete a specified configuration check policy

hss

deleteSecurityCheckPolicyGroup

Modify information about a specified configuration check policy

hss

updateSecurityCheckPolicyGroup

Query the configuration check policy group list

hss

listSecurityCheckPolicyGroup

Query baseline check statistics, including weak passwords, password complexity, and configuration

hss

showBaselineStatistic

Query the list of weak password detection results

hss

listWeakPasswordUsers

Delete a baseline whitelist

hss

deleteBaselineWhiteList

Query the baseline whitelist

hss

showBaselineWhiteList

Add a baseline whitelist item

hss

addBaselineWhiteList

Modify the baseline whitelist

hss

changeBaselineWhiteList

Query the baseline whitelist

hss

listBaselineWhiteLists

Table 24 Dynamic port honeypot operations that can be recorded by CTS

Operation

Resource Type

Trace Name

Enable protection for new servers by default

hss

showDecoyPortAutoBind

Enable protection for new servers by default

hss

switchDecoyPortAutoBind

View the list of protected servers

hss

showDecoyPortHostList

Disable the dynamic port honeypot policy for a server

hss

deleteDecoyPortHostPolicy

Switch the dynamic port honeypot policy for a server

hss

switchDecoyPortHostPolicy

View dynamic port honeypot protection statistics

hss

showDecoyPortStatistics

Add a dynamic port honeypot policy

hss

createDecoyPortPolicy

Enable a dynamic port honeypot policy

hss

switchDecoyPortPolicy

View a dynamic port honeypot policy

hss

listDecoyPortPolicy

Delete a dynamic port honeypot policy

hss

deleteDecoyPortPolicy

View details about a dynamic port honeypot policy

hss

showDecoyPortPolicyDetails

Edit a dynamic port honeypot policy

hss

modifyDecoyPortPolicy

View the list of servers that support dynamic port honeypots

hss

listDecoyPortAvailableHost

Obtain the list of services where probes can be installed

hss

listProbesOptionalServers

Table 25 Policy management operations that can be recorded by CTS

Operation

Resource Type

Trace Name

Apply a policy group

hss

associatePolicyGroup

Query whether automatic handling is enabled for the alarms corresponding to a policy

hss

showEventAutoHandlingStatus

Enable or disable automatic alarm handling for a policy

hss

changeEventAutoHandlingStatus

Remove a policy group

hss

deletePolicyGroup

Modify a policy group

hss

changePolicyGroup

Copy a server policy group

hss

addPolicyGroup

Query the policy list of a policy group

hss

listPolicyGroupDetail

Query the policy group list

hss

listPolicyGroup

Query the global switch of a policy

hss

showPolicySwitchStatus

Modify the global switch of a policy, that is, enable or disable the policy for all the servers associated with the policy

hss

changePolicySwitchStatus

Query details about a specified policy

hss

showPolicyDetail

Modify a policy

hss

changePolicyDetail

Table 26 Virus scan operations that can be recorded by CTS

Operation

Resource Type

Trace Name

Query the list of historical virus scan records

hss

listAntivirusHandleHistory

Query the list of servers available for virus scan

hss

listAntiVirusHost

Query the custom scan policy list

hss

listAntiVirusPolicy

Creat a custom scan policy

hss

createAntiVirusPolicy

Edit a custom scan policy

hss

changeAntivirusPolicy

Delete a custom scan policy

hss

deleteAntivirusPolicy

Query the virus scan result list

hss

listAntiVirusResult

Export the virus scan result list

hss

exportAntiVirusResult

Handle virus scan results

hss

operateAntiVirusResult

Query virus scan statistics

hss

showAntivirusStatistic

View virus scan tasks

hss

listAntiVirusTask

Create a virus scan task

hss

createAntiVirusTask

Cancel a scan task

hss

switchAntivirusTask

Table 27 Tag management operations that can be recorded by CTS

Operation

Resource Type

Trace Name

Filter the number of purchased resources by tag

hss

countResourceInstances

Filter purchased resources by tag

hss

filterResourceInstanceList

Query all used tags in the current project of a user

hss

listProjectTags

Query resource tags

hss

getResourceInstanceTag

Add a tag to a resource

hss

addResourceInstanceTag

Create tags in batches

hss

batchCreateTags

Delete tags in batches

hss

batchDeleteTags

Delete a resource tag

hss

deleteResourceInstanceTag

Table 28 Installation and configuration operations that can be recorded by CTS

Operation

Resource Type

Trace Name

Query container image operation logs

hss

listContainerImageLogs

Query the container image list

hss

listContainerImages

Query the container basic information list

hss

listContainers

Query the Kubernetes cluster audit log list

hss

listClusterAuditLogs

Query the Kubernetes cluster event list

hss

listClusterEventLogs

Obtain cluster configuration

hss

getCCEClusterConfig

Obtain the daemonset list of a cluster

hss

listAgentDaemonsetInfo

Uninstall daemonsets in batches

hss

batchDeleteAgentDaemonset

Upgrade cluster daemonsets in batches

hss

batchUpgradeAgentDaemonset

Obtain cluster node tags

hss

listCCENodesLabel

Create a CCE integrated protection configuration

hss

addCceIntegrationProtection

Obtain container cluster risk information in batches

hss

getCCEClusterDetectRiskList

Delete a cluster daemonset

hss

deleteAgentDaemonset

Obtain cluster daemonset information

hss

showAgentDaemonsetDetailInfo

Create a cluster daemonset

hss

createAgentDaemonset

Update a cluster daemonset

hss

updateAgentDaemonset

Obtain cluster node tags

hss

listAgentDaemonsetClusterNodesLabel

Query a multi-cloud cluster

hss

listMultiCloudClusters

Create a multi-cloud cluster

hss

createMultiCloudClusters

Synchronize the access status of a multi-cloud cluster

hss

syncMultiCloudClusterStatus

Delete a multi-cloud cluster

hss

removeMultiCloudClusters

Update a multi-cloud cluster

hss

updateMultiCloudClusters

Obtain the agent installation script of a multi-cloud cluster

hss

showMultiCloudClusterProxyScript

Obtain the account permissions of a multi-cloud cluster

hss

showMultiCloudClusterAuth

Parse the configuration file of a multi-cloud cluster

hss

parseMultiCloudClusterConfig

Obtain the image upload command of a multi-cloud cluster

hss

showMultiCloudClusterImageCommand

Obtain the deployment template

hss

showAgentDaemonsetDeployTemplate

Delete a user-built cluster daemonset

hss

deleteSelfBuiltClusterDaemonset

Query the on-premises cluster daemonset

hss

getSelfBuiltClusterDaemonset

Save a user-built cluster daemonset

hss

saveSelfBuiltClusterDaemonset

Query the on-premises Kubernetes cluster list

hss

listSelfBuiltKubernetesClusters

Obtain the agent installation script

hss

getAgentInstallScript

Query the agent version information list

hss

listAgentVersion

Install the agent

hss

installAgent

Query alarm configuration

hss

getAlarmConfig

Configure alarms

hss

updateAlarmConfig

Install agents in batches

hss

batchInstallAgent

Query the status of the automatic agent upgrade switch

hss

getAgentAutoUpgradeStatus

Obtain the Docker plug-in installation script

hss

getPluginInstallScript

Verify the connectivity of a configuration

hss

checkConfigInfoConnectivity

Query common login IP addresses

hss

listLoginCommonIp

Add, edit, or delete common login IP addresses

hss

modifyLoginCommonIp

Query common login locations

hss

listLoginCommonLocation

Add, edit, or delete common login locations

hss

modifyLoginCommonLocation

Query the SSH login IP address whitelist

hss

listLoginWhiteIp

Add, delete, edit, enable, or disable login IP addresses

hss

modifyLoginWhiteIp

Obtain the prompt information configuration

hss

showMalwareReminders

Configure prompt information

hss

setMalwareReminders

Obtain page notification information

hss

showPageNotices

Query plug-ins

hss

getPluginList

Configure prompt information

hss

setRemindersConfig

Download a script file

hss

getScriptFile

Obtain the configuration switch status

hss

showSwitchesStatus

Modify the configuration switch status

hss

changeSwitchesStatus

Query the system configuration content list

hss

listSystemConfigs

Download a template

hss

getTemplate

Upload a template file

hss

uploadTemplate

Configure 2FA login

hss

setTwoFactorLoginConfig

Query the 2FA server list

hss

listTwoFactorLoginHost

Obtain the upgrade status of the server

hss

listHostsUpgrade

Upgrade from agent 1.0 to agent 2.0

hss

upgradeAgent

Table 29 Security report operations that can be recorded by CTS

Operation

Resource Type

Trace Name

Obtain the uploaded security report logo

hss

showSecurityReportLogo

Upload a security report logo

hss

uploadReportLogo

Query the statistical period list of historical reports

hss

listHistoryPeriod

Query the list on the report overview page

hss

listSecurityReport

Chang the security report switch

hss

switchReportStatus

Query the content of a report subscription

hss

showReportSubscription

Delete a report

hss

deleteSecurityReport

Query the content of a security report

hss

showSecurityReport

Create or copy a report

hss

addSecurityReport

Modify a report

hss

changeSecurityReport

Send a report

hss

sendSecurityReport

Query report sending records

hss

listSendingRecord

Query the scheduled configuration of a security check

hss

showSecurityCheckConfig

Modify the scheduled configuration of a security check

hss

updateSecurityCheckConfig

Query the security check report list of a cluster

hss

listSecurityCheckClusterReports

Query the security check report information of a cluster

hss

showSecurityCheckClusterReport

Query the historical security check reports of a specified server

hss

listSecurityCheckHostReportHistory

Query the security check report of a specified server

hss

showSecurityCheckHostReport

Query the security check results of multiple servers

hss

listSecurityCheckHostResult

Manually start a health check

hss

startManualSecurityCheck

Query the status and progress of a manual health check

hss

showManualSecurityCheckStatus

Cancel a manually started health check

hss

stopManualSecurityCheck

Query the security check overview

hss

showSecurityCheckOverview

Query the security check statistics

hss

showSecurityCheckStatistic