Host Security Service

Host Security Service (HSS) is designed to improve the overall security for hosts. It reduces intrusion risks for hosts with asset management, vulnerability management, intrusion detection, baseline inspection, and web page anti-tampering functions.

Product Advantages
  • Simple Management

    Detection and protection functions are provided on the same page, simplifying the management.

  • Comprehensive Protection

    HSS provides head-to-toe protection for your businesses, including pre-event prevention, during-event defense, and post-event detection.

  • Precise Defense

    Advanced detection technologies and an extensive sample library contribute to the defense precision.

  • Lightweight Agent

    An HSS agent occupies few resources and does not affect your host running.

Application Scenarios
  • Graded Protection

  • Host Security Management

  • Security Risk Assessment

  • Account Security Protection

Graded Protection

Graded Protection

The Cybersecurity Law of China explicitly requires network operators to have intrusion detection capability. With intrusion detection being its major function, HSS helps customers meet regulation requirements.

Advantages

Protection Against Brute Force Attacks

Detects brute force attacks and blocks attacking IP addresses for 24 hours to ensure host security.

Vulnerability Management

Detects system and software vulnerabilities included in the vulnerability library to help you see hidden security issues.

Malicious Program Detection

Checks running programs to identify malicious programs such as webshells, Trojans, and worms.

Related Services

waf

antiddos

dew

Host Security Management

Host Security Management

You can simply manage the security configurations and events of all your hosts on one console page, reducing not only security risks but also ECS management costs.

Advantages

Rich Functions

Provides various detection functions for you to quickly and accurately identify risks.

Centralized Management

Manages security configurations of hosts on one page, pushes configurations to hosts simultaneously, and manages security events in many user-friendly ways.

Related Services

waf

antiddos

ssa

Security Risk Assessment

Security Risk Assessment

Detects system problems (such as weak passwords and malicious programs) and prompts users to harden their systems to eliminate risks.

Advantages

Comprehensive Detection

Comprehensively inspects systems for potential problems and offers tailored solutions.

Accuracy and Reliability

Uses cutting-edge detection technologies and a constantly updated sample library to pinpoint any security issues.

Related Services

vss

waf

ses

Account Security Protection

Account Security Protection

HSS supports two-factor authentication (2FA) and offers round-the-clock account protection before, during, and after attacks, keeping brute force attackers at bay and keeping ECSs secure.

Advantages

Timely Prompts

Detects weak passwords and prompts you to change them in a timely manner to prevent potential security issues for ECSs.

2FA

Supports 2FA to prevent brute force cracking attacks.

Precise Blocking

Monitors account security in real time and blocks attackers with ease.

Timely Warning

Warns about risks and attacks in real time so you can handle them before it's too late.

Related Services

waf

antiddos

dew

Functions

  • Asset Management

    HSS collects and displays host asset information to simplify host security monitoring and management.

  • Vulnerability Management

    HSS detects system and software vulnerabilities to quickly identify potential risks.

  • Intrusion Detection

    HSS detects intrusion behavior and gives warnings in real time to enable fast responses.

Asset Management

  • Accounts

    Lists system accounts to facilitate account security management.

  • Processes

    Collects and displays running processes so you can identify malicious processes.

  • Software

    Itemizes software installed in your system to help spot dangerous software.

  • Ports

    Lists open ports in the system to help you identify risky ports and unknown ports.

  • Web Directories

    Displays directories used by web services to simplify web resource management.

Vulnerability Management

  • Software Vulnerability Detection

    Detects system and software vulnerabilities included in the vulnerability library to help you see hidden security issues.

  • Web-CMS Vulnerability Detection

    Identifies vulnerabilities by inspecting web directories and files to make web services securer.

Intrusion Detection

  • 2FA

    Further authenticate ESC logins with SMS-/email-based verification codes, greatly enhancing ECSs' account security.

  • Remote Login

    Detects remote login behavior and prompts users to react accordingly.

  • Malicious Programs

    Checks running programs to identify malicious programs such as webshells, Trojans, worms, and viruses.

  • Brute Force Attacks

    Blocks attacking IP addresses for 24 hours to ensure host security.

  • Changes Made to Key Files

    Monitors key system files (such as ls, ps, login, and top) and generates alarms when any key file is changed.

  • Webshells

    Hunts for webshells (such as php and jsp) in web directories on your ECSs.

  • Baseline Inspection

    HSS inspects your system configuration to reveal security risks.

  • Web Page Anti-tampering

    HSS protects web pages, documents, and images on your websites against hacker tampering and sabotage.

Baseline Inspection

  • Password Complexity

    Checks the password complexity policy and provides recommendations for improving password security.

  • Configurations

    Inspects Tomcat, Nginx, and SSH login configurations to help you discover any loophole.

  • Common Weak Passwords

    Scans system accounts for any weak password and prompts you to change the password to prevent easy guessing.

Web Page Anti-tampering

  • Real-Time Interception

    Stops hackers' tampering operations immediately upon detection.

  • File Restoration

    Monitors files and directories in real time and restores tampered files with backups instantly.

Usage Guides

Create an Account and Experience HUAWEI CLOUD for Free

Register Now