Product Advantages
Simple Management
Comprehensive Protection
Precise Defense
Lightweight Agent

Simple Management

Detection and protection functions are provided on the same page to simplify management.

Comprehensive Protection

HSS provides head-to-toe protection for your businesses, including pre-event prevention, during-event defense, and post-event detection.

Precise Defense

Advanced detection technologies and an extensive sample library contribute to the defense precision.

Lightweight Agent

HSS agents occupy few resources and do not affect the running performance of your hosts.

Recommended Editions

WTP

The new-gen anti-tampering and web protection system keeps public agency, education institutions, large enterprise, and a long list of other portals well protected

WTP

The new-gen anti-tampering and web protection system keeps public agency, education institutions, large enterprise, and a long list of other portals well protected

Features

  • Prevents hackers from tampering with web pages
  • Automatically restores tampered web pages in real time.
  • Includes all features of the enterprise edition

Applications

  • Web tamper protection for enterprise portals
  • Hidden link prevention for enterprise portals
  • Website server protection
¥9800/year/host

Enterprise

Keeps your hosts fully protected, and provides such functions as asset management, vulnerability management, baseline inspection, and intrusion detection

Enterprise

Keeps your hosts fully protected, and provides such functions as asset management, vulnerability management, baseline inspection, and intrusion detection

Features

  • Supports cross-platform and hybrid cloud deployment
  • Reduces 95% of security risks for hosts
  • Provides AI engine-powered intrusion detection
  • Includes all features of the basic edition

Applications

  • Security risk prevention
  • Virus and Trojan horse detection
  • Host vulnerability management
  • Statutory compliance in graded protection requirements
¥900/year/host

Basic

Provides basic host account security protection – the perfect fit for small enterprises, individuals, and developers requiring a secure test environment

Basic

Provides basic host account security protection – the perfect fit for small enterprises, individuals, and developers requiring a secure test environment

Features

  • Account cracking protection
  • Two-factor authentication
  • Weak password scan

Applications

  • Host account security
  • Two-factor authentication for login
¥100/year/host
Application Scenarios
  • Graded Protection

  • Host Security Management

  • Security Risk Assessment

  • Account Security Protection

Graded Protection

Graded Protection

The Cybersecurity Law of China requires network operators to have intrusion detection capabilities. Dedicated to this purpose, HSS helps customers meet regulatory requirements.

Advantages

Protection Against Brute Force Attacks

Detects brute force attacks and blocks source IP addresses for 24 hours to ensure host security.

Vulnerability Management

Using a comprehensive vulnerability library, detects system and software vulnerabilities to help you identify hidden security issues.

Malicious Program Detection

Checks running programs to identify malicious programs such as webshells, Trojans, and worms.

Related Services

WAF

AAD

DEW

Host Security Management

Host Security Management

Centrally manages the security configurations and events of all your hosts on one console, reducing ECS management costs and hardening security.

Advantages

Multi-server Management

Easy operations of HUAWEI CLOUD, hybrid cloud, and on-premises servers in one unified environment.

Diverse Functions

Provides various detection functions, helping you quickly and accurately identify risks.

Centralized Management

Manages security configurations of hosts on one page, pushes configurations to all hosts simultaneously, and improves user-friendliness in security event management.

Related Services

WAF

AAD

SA

Security Risk Assessment

Security Risk Assessment

Detects risks (such as weak passwords and malicious programs) and prompts users to harden their systems accordingly.

Advantages

Comprehensive Detection

Comprehensively inspects systems for potential problems and offers tailored solutions.

Accuracy and Reliability

Uses cutting-edge detection technologies and a constantly updated sample library to pinpoint all security issues.

Related Services

vss

waf

ses

Account Security Protection

Account Security Protection

HSS supports two-factor authentication (2FA) and offers 24/7 account protection before, during, and after attacks, preventing brute force attacks and keeping ECSs secure.

Advantages

Timely Prompts

Detects weak passwords and prompts you to change them, preventing potential security issues for ECSs.

2FA

Supports 2FA to prevent brute force attacks.

Precise Blocking

Monitors account security in real time and blocks attackers effectively.

Timely Warning

Warns about risks and attacks in real time so you can handle them immediately.

Related Services

WAF

AAD

DEW

Functions

  • Asset Management

    HSS collects and displays host asset information to simplify host security monitoring and management.

  • Vulnerability Management

    HSS detects system and software vulnerabilities to quickly identify potential risks.

  • Intrusion Detection

    HSS detects intrusions in real time and issues warnings immediately, allowing quick response to security events.

Asset Management

  • Accounts

    Lists system accounts to facilitate account security management.

  • Processes

    Collects and displays running processes so you can identify malicious processes.

  • Software

    Itemizes software installed in your system to help spot dangerous software.

  • Ports

    Lists open ports in the system to help you identify risky ports and unknown ports.

  • Web Directories

    Displays directories used by web services to simplify web resource management.

Vulnerability Management

  • Software Vulnerability Detection

    Detects system and software vulnerabilities included in the vulnerability library to help you see hidden security issues.

  • Web-CMS Vulnerability Detection

    Identifies vulnerabilities by inspecting web directories and files to make web services securer.

Intrusion Detection

  • 2FA

    Further authenticate ESC logins with SMS-/email-based verification codes, greatly enhancing ECSs' account security.

  • Remote Login

    Detects remote login behavior and prompts users to react accordingly.

  • Malicious Programs

    Checks running programs to identify malicious programs such as webshells, Trojans, worms, and viruses.

  • Brute Force Attacks

    Blocks attacking IP addresses for 24 hours to ensure host security.

  • Changes Made to Key Files

    Monitors key system files (such as ls, ps, login, and top) and generates alarms when any key file is changed.

  • Webshells

    Hunts for webshells (such as php and jsp) in web directories on your ECSs.

  • Baseline Inspection

    HSS inspects your system configuration to reveal security risks.

  • Web Page Anti-tampering

    HSS protects web pages, documents, and images on your websites against tampering and sabotage.

Baseline Inspection

  • Password Complexity

    Checks the password complexity policy and provides recommendations for improving password security.

  • Configurations

    Inspects Tomcat, Nginx, and SSH login configurations to help you discover any loophole.

  • Common Weak Passwords

    Scans system accounts for any weak password and prompts you to change the password to prevent easy guessing.

Web Page Anti-tampering

  • Real-Time Interception

    Stops hackers' tampering operations immediately upon detection.

  • File Restoration

    Monitors files and directories in real time and restores tampered files with backups instantly.

Usage Guides

Create an Account and Experience HUAWEI CLOUD for Free

Register Now