Updated on 2025-10-10 GMT+08:00

Viewing Server Asset Fingerprints

HSS can collect server asset fingerprints, including information about ports, processes, web applications, web services, web frameworks, and auto-started items. You can centrally check server asset information and detect risky assets in a timely manner based on the server fingerprints. Asset management only detects risks. You need to manually handle suspicious assets.

This section describes how to view the collected server asset fingerprints on the console. For more information, see Collecting Server Asset Fingerprints.

Constraints

The server fingerprint function is available in HSS enterprise, premium, WTP, and container editions.

Viewing Asset Information of All Servers

  1. Log in to the management console.
  2. Click in the upper left corner and select a region or project.
  3. In the upper left corner of the page, click and choose Security > Host Security Service.
  4. Choose Asset Management > Server Fingerprints.
  5. (Optional) If you have enabled the enterprise project function, select an enterprise project from the Enterprise Project drop-down list in the upper part of the page to view its data.
  6. View the server fingerprints.
  7. Click a fingerprint type in the list to view the asset information.
  8. (Optional) Remove risky assets.

    If you find unsafe assets after counting, remove them in a timely manner.

    You are advised to handle unsafe ports as follows:

    • If HSS detects open high-risk ports or unused ports, check whether they are really used by your services. If they are not, disable them. For dangerous ports, you are advised to further check their program files, and delete or isolate their source files if necessary.
    • If a detected high-risk port is actually a normal port used for services, you can ignore it. Ignored alarms will neither be recorded as unsafe items and nor trigger alarms.

Viewing the Asset Information of a Single Server

  1. Log in to the management console.
  2. Click in the upper left corner and select a region or project.
  3. In the upper left corner of the page, click and choose Security > Host Security Service.
  4. In the navigation pane, choose Asset Management > Servers & Quota. Click the Servers tab.
  5. (Optional) If you have enabled the enterprise project function, select an enterprise project from the Enterprise Project drop-down list in the upper part of the page to view its data.
  6. Click the name of the target server. On the server details page that is displayed, choose Asset Fingerprints > Servers.
  7. Click a fingerprint type in the list to view the asset information.
  8. (Optional) Remove risky assets.

    If you find unsafe assets after counting, remove them in a timely manner.

    You are advised to handle unsafe ports as follows:

    • If HSS detects open high-risk ports or unused ports, check whether they are really used by your services. If they are not, disable them. For dangerous ports, you are advised to further check their program files, and delete or isolate their source files if necessary.
    • If a detected high-risk port is actually a normal port used for services, you can ignore it. Ignored alarms will neither be recorded as unsafe items and nor trigger alarms.