Updated on 2025-05-22 GMT+08:00

Enabling Protection

To enable protection, allocate a quota to a server or a container. After protection is disabled or the protected server or container is removed, the quota can be allocated to another server or container.

Prerequisites

Constraints

  • Server
    Before you enable protection for a Windows server, enable the Windows firewall to block the source IP addresses of brute-force attacks. If the Windows firewall is not enabled, HSS only generates alarms for detected brute-force attacks, but does not block them.
    • After the Windows firewall is enabled, every time HSS detects a brute-force attack, it adds an inbound rule to the firewall to block the attack source IP address. There are no other impacts on services.
    • Do not disable the Windows firewall when using HSS, or HSS cannot block the source IP addresses of brute-force attacks. Once it is disabled, HSS may fail to block the attack source IP addresses even after you manually enable it again.
  • Container

    HSS can only protect Docker, Containerd, CRI-O, Podman, and iSulad containers.

Enabling Protection

Perform the following operations to enable protection based on the edition you need.

Viewing Scan Details

After server protection is enabled, HSS will immediately perform a comprehensive scan on the server. It may take a long time. After the scan is complete, you can check its details.

  1. Choose Asset Management > Servers & Quota. Locate the server on the Servers tab page.
  2. Check the Risk Level column of the server.

    Table 3 Risk status

    Status

    Description

    Pending risk detection

    The server is neither protected nor scanned.

    Safe

    No risks were found in the comprehensive scan on the server; or the protection has just been enabled, and no risks have been found yet.

    Risky

    The server has security risks.

  3. Hover the cursor over the risk status to view the risk distribution.

    You can click a value to go to the details page.

Follow-up Procedure

HSS provides server and container defense functions for you to enable as needed. For more information, see Manual configurations.

Table 4 Manual configurations

Category

Function

Reference

Security Configurations

  • Common login location/IP address
  • SSH login IP address whitelist
  • Isolate and kill malicious programs

Common Security Configuration

Server Protection

  • Application protection
  • Ransomware prevention
  • Application process control
  • File integrity monitoring (FIM)
  • Virus scan
  • Dynamic port honeypot

Server Protection

Container Protection

  • Container firewall
  • Container cluster protection

Container Protection

Policy Management

Policy management includes asset management, baseline inspection, intrusion detection, and self-protection policies. Intrusion detection is disabled by default. You can enable and modify them as needed.

Policy Management

OSZAR »