What If I Do Not Upgrade to the New Version?

The HSS (Old) can still work properly, until it is completely replaced by the HSS (New) version.

Why You Need to Upgrade to HSS (New)

  • In the future, the HSS (New) version will replace the HSS (Old) version, which will be brought offline after the replacement.

  • The HSS (New) version provides new features and enhances existing features, as described in the following table.

Table 1 Main changes in the HSS (New) version

Feature

Description

Type

Free scan on unprotected servers

HSS periodically scans your unprotected servers and provides reports for you to check online.

New

Asset fingerprint management

HSS deeply scans assets on servers and classifies the assets into different types, such as accounts, ports, processes, web directories, and software information; and display statistics about these types.

New

Asset importance

You can configure asset importance for your servers and perform operations on them in batches, including but not limited to deploying policies, enabling or disabling protection, assigning groups, and installing agents.

New

Application vulnerabilities

HSS scans for vulnerabilities in web services, web frameworks, websites, middleware, and kernel modules.

New

Baseline report export

You can filter and export the check results of baseline configurations and common weak passwords.

New

Application protection

To protect running applications, you simply need to add probes to these applications, without having to modify application files. Detectable risks include but are not limited to SQL injections, command injections, deserialization input, file traversal, and JSP execution of OS commands.

New

Agent installation

You can install agents in batches in a few clicks.

New

Protection quota management

You can directly upgrade an earlier version to a later version.

New

Baseline check

You can select baseline check items to assess whether your system meets compliance requirements.

New

Alarm management

Ransomware and reverse shells can be isolated and killed.

Alarms can be generated for the exploits of common vulnerabilities and Redis, Hadoop, and MySQL vulnerabilities.

New

Security report

You can customize the report period, content, and sending time.

Upgrade

Ransomware detection

HSS monitors new files and running processes in real time, dynamically generates honeypot files to lure and remove ransomware, and periodically backs up servers based on user-defined policies.

Upgrade

Container protection

The original Container Guard Service (CGS) has been integrated into the HSS (New) version to manage server workloads in a unified manner.

Integration