Viewing Server Asset Fingerprints
HSS can collect server asset fingerprints, including information about ports, processes, web applications, web services, web frameworks, and auto-started items. You can centrally check server asset information and detect risky assets in a timely manner based on the server fingerprints. Asset management only detects risks. You need to manually handle suspicious assets.
This section describes how to view the collected server asset fingerprints on the console. For more information, see Collecting Server Asset Fingerprints.
Constraints
The server fingerprint function is available in HSS enterprise, premium, WTP, and container editions.
Viewing Asset Information of All Servers
- Log in to the management console.
- Click
in the upper left corner and select a region or project.
- In the upper left corner of the page, click
and choose .
- Choose .
- (Optional) If you have enabled the enterprise project function, select an enterprise project from the Enterprise Project drop-down list in the upper part of the page to view its data.
- View the server fingerprints.
- Click a fingerprint type in the list to view the asset information.
- (Optional) Remove risky assets.
If you find unsafe assets after counting, remove them in a timely manner.
You are advised to handle unsafe ports as follows:
- If HSS detects open high-risk ports or unused ports, check whether they are really used by your services. If they are not, disable them. For dangerous ports, you are advised to further check their program files, and delete or isolate their source files if necessary.
- If a detected high-risk port is actually a normal port used for services, you can ignore it. Ignored alarms will neither be recorded as unsafe items and nor trigger alarms.
Viewing the Asset Information of a Single Server
- Log in to the management console.
- Click
in the upper left corner and select a region or project.
- In the upper left corner of the page, click
and choose .
- In the navigation pane, choose . Click the Servers tab.
- (Optional) If you have enabled the enterprise project function, select an enterprise project from the Enterprise Project drop-down list in the upper part of the page to view its data.
- Click the name of the target server. On the server details page that is displayed, choose .
- Click a fingerprint type in the list to view the asset information.
- (Optional) Remove risky assets.
If you find unsafe assets after counting, remove them in a timely manner.
You are advised to handle unsafe ports as follows:
- If HSS detects open high-risk ports or unused ports, check whether they are really used by your services. If they are not, disable them. For dangerous ports, you are advised to further check their program files, and delete or isolate their source files if necessary.
- If a detected high-risk port is actually a normal port used for services, you can ignore it. Ignored alarms will neither be recorded as unsafe items and nor trigger alarms.
Feedback
Was this page helpful?
Provide feedbackThank you very much for your feedback. We will continue working to improve the documentation.See the reply and handling status in My Cloud VOC.
For any further questions, feel free to contact us through the chatbot.
Chatbot