Host Security Service (HSS) helps identifying and managing the assets on servers, eliminate risks, and defend against intrusions and web page tampering. There are also advanced protection and security operations functions available to help you easily detect and handle threats.
The new functions will initially be available via the GUI. The associated APIs are expected to be added in Q1 2025.
This major update includes the following changes:
HSS Major Update
- UI update and new features
- Dashboard UI Upgrade
- Application Process Control
- Virus Scan
- Container Firewall
- Dynamic Port Honeypot
- Container Cluster Protection
- Improvements
- IPv6 support
- Container Cluster Agents
- Agent auto-ugrade
- Backup before vulnerability fix
A detailed description of the new features and improvements can be found in the table below.
Feature | Description |
Application process control | HSS can control different types of application processes on servers. Suspicious and trusted processes are allowed to run, and alarms are generated for malicious processes. |
Optimized ransomware prevention | Ransomware prevention will be enabled with the HSS premium or higher edition. |
Container cluster protection | HSS can check for non-compliance baseline issues, vulnerabilities, and malicious files when a container image is started and report alarms on or block container startup that has not been unauthorized or may incur high risks. You can configure container cluster protection policies to block images with vulnerabilities, malicious files, non-compliant baselines, or other threats, hardening cluster security. |
Optimized intrusion detection alarms | The intrusion detection capability is enhanced. HIPS can detect intrusions in the Linux system. The following types of server and container alarms are added: |
Optimized Dashboard page | The quota management, protection overview, and news modules are added to the HSS Dashboard page. You can easily check the quota usage, enabling status of key functions, and the latest vulnerability information. The security score criteria are optimized to help you quickly locate security risks and improve the security score. |
Backup before vulnerability fixing | Vulnerability fixing may fail and interrupt services. To avoid this problem, HSS enables you to back up servers before fixing vulnerabilities. If an exception occurs, you can restore servers to ensure service continuity. |
Cluster agent management | To enable protection for all containers in a CCE cluster or an on-premises Kubernetes cluster, you can use the cluster agent management function to install the agent in the cluster. After this function is enabled, you do not need to manually install the agent on new nodes or pods added to the cluster. |
Added the automatic agent upgrade function | The agent edition is continuously updated to improve server protection capabilities. Therefore, you need to periodically upgrade the agent to the latest version. If you cannot manually upgrade the agent in a timely manner, you are advised to enable the automatic agent upgrade function. HSS will automatically upgrade the agent to the latest version. |
Added the virus scanning and removal function | The function uses the virus detection engine to scan virus files on the server. The scanned file types include executable files, compressed files, script files, documents, images, and audio and video files. You can perform quick scan and full-disk scan on the server as required. You can also customize scan tasks and handle detected virus files in a timely manner to enhance the virus defense capability of the service system. |
Added the dynamic port honeypot function | The dynamic port honeypot function is a deception trap. It uses a real port as a bait port to induce attackers to access the network. In the horizontal penetration scenario, the function can effectively detect attackers' scanning, identify faulty servers, and protect real resources of the user. |
Container firewall | The HSS container firewall controls and intercepts network traffic inside and outside a container cluster to prevent malicious access and attacks. |
Server vulnerability management | The vulnerability management page is redesigned. The new functions are as follows: |
IPv6 server security protection is supported | IPv6 server security protection is supported. multiple security management and defense capabilities are provided, such as asset management, vulnerability management, baseline check, and intrusion detection, meeting security protection requirements in multiple scenarios of customers. |