Simple Management

Detection and protection functions are provided on the same page, simplifying the management.

Comprehensive Protection

HSS provides head-to-toe protection for your businesses, including pre-event prevention, during-event defense, and post-event detection.

Precise Defense

Advanced detection technologies and an extensive sample library contribute to the defense precision.

Lightweight Agent

An HSS agent occupies few resources and does not affect your host running.

Application Scenarios

  • Host Security Management

  • System Hardening

  • Last Line of Defense

Host Security Management

Host Security Management

You can simply manage the security configurations and events of all your hosts on one console page, reducing not only security risks but also ECS management costs.


  • Rich Functions

    Provides various detection functions for you to quickly and accurately identify risks.

  • Centralized Management

    Manages security configurations of hosts on one page, pushes configurations to hosts simultaneously, and manages security events in many user-friendly ways.

System Hardening

System Hardening

Detects system problems (such as weak passwords and malicious programs) and prompts users to harden their systems to prevent intrusions.


  • Comprehensive Detection

    Comprehensively detects systems for any problems and offers tailored solutions.

  • Accuracy and Reliability

    Uses cutting-edge detection technologies and a constantly updated sample library to pinpoint any security issues.

Last Line of Defense

Last Line of Defense

HSS guards your businesses at the last line of defense — the server (ECS) — by identifying attacks from inside a network or attacks that escape the interception at network borders.


  • Fine-Grained Protection

    Offers ECS-specific protection to remove security "blind spots."

  • Automatic Management

    Displays and manages all security information of ECSs in a centralized manner.

  • Lightweight Agent

    An HSS agent occupies few resources and does not affect your host running.


Asset Management

HSS collects and displays host asset information to simplify host security monitoring and management.

  • Accounts

    Lists system accounts to facilitate account security management.

  • Ports

    Lists open ports in the system to help you identify risky ports and unknown ports.

  • Processes

    Collects and displays running processes so you can identify malicious processes.

  • Web Directories

    Displays directories used by web services to simplify web resource management.

  • Software

    Itemizes software installed in your system to help spot dangerous software.

Vulnerability Management

HSS detects system and software vulnerabilities to quickly identify potential risks.

  • Software Vulnerability Detection

    Detects system and software vulnerabilities included in the CVE vulnerability library to help you see hidden security issues.

Intrusion Detection

HSS detects intrusion behavior and gives warnings in real time to enable fast responses.

  • Brute Force Attacks

    Blocks attacking IP addresses for 24 hours to ensure host security.

  • Remote Login

    Detects remote login behavior and prompts users to react accordingly.

  • Changes Made to Key Files

    Monitors key system files (such as ls, ps, login, and top) and generates alarms when any key file is changed.

  • Malicious Programs

    Checks running programs to identify malicious programs such as webshells, Trojans, worms, and viruses.

  • Webshells

    Hunts for webshells (such as php and jsp) in web directories on your ECSs.

Baseline Inspection

HSS inspects your system configuration to reveal security risks.

  • Password Complexity

    Checks the password complexity policy and provides recommendations for improving password security.

  • Common Weak Passwords

    Scans system accounts for any weak password and prompts you to change the password to prevent easy guessing.

  • Configurations

    Inspects Tomcat, Nginx, and SSH login configurations to help you discover any loophole.

Register Now