What If I Do Not Upgrade to the New Version?¶
The HSS (Old) can still work properly, until it is completely replaced by the HSS (New) version.
Why You Need to Upgrade to HSS (New)¶
In the future, the HSS (New) version will replace the HSS (Old) version, which will be brought offline after the replacement.
The HSS (New) version provides new features and enhances existing features, as described in the following table.
Feature | Description | Type |
---|---|---|
Free scan on unprotected servers | HSS periodically scans your unprotected servers and provides reports for you to check online. | New |
Asset fingerprint management | HSS deeply scans assets on servers and classifies the assets into different types, such as accounts, ports, processes, web directories, and software information; and display statistics about these types. | New |
Asset importance | You can configure asset importance for your servers and perform operations on them in batches, including but not limited to deploying policies, enabling or disabling protection, assigning groups, and installing agents. | New |
Application vulnerabilities | HSS scans for vulnerabilities in web services, web frameworks, websites, middleware, and kernel modules. | New |
Baseline report export | You can filter and export the check results of baseline configurations and common weak passwords. | New |
Application protection | To protect running applications, you simply need to add probes to these applications, without having to modify application files. Detectable risks include but are not limited to SQL injections, command injections, deserialization input, file traversal, and JSP execution of OS commands. | New |
Agent installation | You can install agents in batches in a few clicks. | New |
Protection quota management | You can directly upgrade an earlier version to a later version. | New |
Baseline check | You can select baseline check items to assess whether your system meets compliance requirements. | New |
Alarm management | Ransomware and reverse shells can be isolated and killed. Alarms can be generated for the exploits of common vulnerabilities and Redis, Hadoop, and MySQL vulnerabilities. | New |
Security report | You can customize the report period, content, and sending time. | Upgrade |
Ransomware detection | HSS monitors new files and running processes in real time, dynamically generates honeypot files to lure and remove ransomware, and periodically backs up servers based on user-defined policies. | Upgrade |
Container protection | The original Container Guard Service (CGS) has been integrated into the HSS (New) version to manage server workloads in a unified manner. | Integration |