Simple Management

Detection and protection functions are provided on the same page, simplifying the management.

Comprehensive Protection

HSS provides head-to-toe protection for your businesses, including pre-event prevention, during-event defense, and post-event detection.

Precise Defense

Advanced detection technologies and an extensive sample library contribute to the defense precision.

Lightweight Agent

An HSS agent occupies few resources and does not affect your host running.

Application Scenarios

  • Graded Protection

  • Host Security Management

  • Security Risk Assessment

  • Account Security Protection

Graded Protection

Graded Protection

The Cybersecurity Law of China explicitly requires network operators to have intrusion detection capability. With intrusion detection being its major function, HSS helps customers meet regulation requirements.

Advantages

  • Protection Against Brute Force Attacks

    Detects brute force attacks and blocks attacking IP addresses for 24 hours to ensure host security.

  • Vulnerability Management

    Detects system and software vulnerabilities included in the vulnerability library to help you see hidden security issues.

  • Malicious Program Detection

    Checks running programs to identify malicious programs such as webshells, Trojans, and worms.

Related Services

WAF

Anti-DDoS

DEW

Host Security Management

Host Security Management

You can simply manage the security configurations and events of all your hosts on one console page, reducing not only security risks but also ECS management costs.

Advantages

  • Rich Functions

    Provides various detection functions for you to quickly and accurately identify risks.

  • Centralized Management

    Manages security configurations of hosts on one page, pushes configurations to hosts simultaneously, and manages security events in many user-friendly ways.

Related Services

WAF

Anti-DDoS

SSA

Security Risk Assessment

Security Risk Assessment

Detects system problems (such as weak passwords and malicious programs) and prompts users to harden their systems to eliminate risks.

Advantages

  • Comprehensive Detection

    Comprehensively inspects systems for potential problems and offers tailored solutions.

  • Accuracy and Reliability

    Uses cutting-edge detection technologies and a constantly updated sample library to pinpoint any security issues.

Related Services

VSS

WAF

SAS

Account Security Protection

Account Security Protection

HSS supports two-factor authentication (2FA) and offers round-the-clock account protection before, during, and after attacks, keeping brute force attackers at bay and keeping ECSs secure.

Advantages

  • Timely Prompts

    Detects weak passwords and prompts you to change them in a timely manner to prevent potential security issues for ECSs.

  • 2FA

    Supports 2FA to prevent brute force cracking attacks.

  • Precise Blocking

    Monitors account security in real time and blocks attackers with ease.

  • Timely Warning

    Warns about risks and attacks in real time so you can handle them before it's too late.

Related Services

WAF

Anti-DDoS

DEW

Functions

Asset Management

HSS collects and displays host asset information to simplify host security monitoring and management.

  • Accounts

    Lists system accounts to facilitate account security management.

  • Ports

    Lists open ports in the system to help you identify risky ports and unknown ports.

  • Processes

    Collects and displays running processes so you can identify malicious processes.

  • Web Directories

    Displays directories used by web services to simplify web resource management.

  • Software

    Itemizes software installed in your system to help spot dangerous software.

Vulnerability Management

HSS detects system and software vulnerabilities to quickly identify potential risks.

  • Software Vulnerability Detection

    Detects system and software vulnerabilities included in the vulnerability library to help you see hidden security issues.

  • Web-CMS Vulnerability Detection

    Identifies vulnerabilities by inspecting web directories and files to make web services securer.

Intrusion Detection

HSS detects intrusion behavior and gives warnings in real time to enable fast responses.

  • 2FA

    Further authenticate ESC logins with SMS-/email-based verification codes, greatly enhancing ECSs' account security.

  • Brute Force Attacks

    Blocks attacking IP addresses for 24 hours to ensure host security.

  • Remote Login

    Detects remote login behavior and prompts users to react accordingly.

  • Changes Made to Key Files

    Monitors key system files (such as ls, ps, login, and top) and generates alarms when any key file is changed.

  • Malicious Programs

    Checks running programs to identify malicious programs such as webshells, Trojans, worms, and viruses.

  • Webshells

    Hunts for webshells (such as php and jsp) in web directories on your ECSs.

Baseline Inspection

HSS inspects your system configuration to reveal security risks.

  • Password Complexity

    Checks the password complexity policy and provides recommendations for improving password security.

  • Common Weak Passwords

    Scans system accounts for any weak password and prompts you to change the password to prevent easy guessing.

  • Configurations

    Inspects Tomcat, Nginx, and SSH login configurations to help you discover any loophole.

Web Page Anti-tampering

HSS protects web pages, documents, and images on your websites against hacker tampering and sabotage.

  • Real-Time Interception

    Stops hackers' tampering operations immediately upon detection.

  • File Restoration

    Monitors files and directories in real time and restores tampered files with backups instantly.

Create an Account and Experience HUAWEI CLOUD for Free

Register Now