Vulnerability Management Overview¶
Vulnerability management can detect Linux, Windows, Web-CMS, and application vulnerabilities and provide suggestions, helping you learn about server vulnerabilities in real time. Linux and Windows vulnerabilities can be fixed in one-click mode. This section describes how the vulnerabilities are detected and the vulnerabilities that can be scanned and fixed in each HSS edition.
Note
The vulnerability list displays vulnerabilities detected in the last seven days. After a vulnerability is detected for a server, if you change the server name and do not perform a vulnerability scan again, the vulnerability list still displays the original server name.
How Vulnerability Scan Works¶
Table 1 describes how different types of vulnerabilities are detected.
Type | Mechanism |
---|---|
Linux vulnerability | Based on the vulnerability database, checks and handles vulnerabilities in the software (such as kernel, OpenSSL, vim, glibc) you obtained from official Linux sources and have not compiled, reports the results to the management console, and generates alarms. |
Windows vulnerability | Synchronizes Microsoft official patches, checks whether the patches on the server have been updated, pushes Microsoft official patches, reports the results to the management console, and generates vulnerability alarms. |
Web-CMS vulnerability | Checks web directories and files for Web-CMS vulnerabilities, reports the results to the management console, and generates vulnerability alarms. |
Application vulnerability | HSS detects the vulnerabilities in the software and dependency packages running on servers and container server machines, reports risky vulnerabilities to the console, and displays vulnerability alarms. |
Types of Vulnerabilities That Can Be Scanned and Fixed¶
For details about the types of vulnerabilities that can be scanned and fixed in different HSS editions, see Types of vulnerabilities that can be scanned and fixed in each HSS edition.
The meanings of the symbols in the table are as follows:
Y: supported
x: not supported
Vulnerability Type | Function | Enterprise Edition | Premium Edition | Web Tamper Protection Edition | Container Edition |
---|---|---|---|---|---|
Linux vulnerability | Automatic vulnerability scan (reporting based on the software asset collection period) | Y | Y | Y | Y |
Scheduled vulnerability scan (By default, vulnerabilities are scanned once a week. You can change the scan period by configuring vulnerability policies.) | Y | Y | Y | Y | |
Vulnerability whitelist | Y | Y | Y | Y | |
Manual vulnerability scan | Y | Y | Y | Y | |
One-click vulnerability fix | Y (A maximum of 50 vulnerabilities can be fixed at a time.) | Y | Y | Y | |
Windows vulnerability | Automatic vulnerability scan (reporting based on the software asset collection period) | Y | Y | Y | x |
Scheduled vulnerability scan (By default, vulnerabilities are scanned once a week. You can change the scan period by configuring vulnerability policies.) | Y | Y | Y | x | |
Vulnerability whitelist | Y | Y | Y | x | |
Manual vulnerability scan | Y | Y | Y | x | |
One-click vulnerability fix | Y (A maximum of 50 vulnerabilities can be fixed at a time.) | Y | Y | x | |
Web-CMS vulnerability | Automatic vulnerability scan (reporting based on the software asset collection period) | Y | Y | Y | Y |
Scheduled vulnerability scan (By default, vulnerabilities are scanned once a week. You can change the scan period by configuring vulnerability policies.) | Y | Y | Y | Y | |
Vulnerability whitelist | Y | Y | Y | Y | |
Manual vulnerability scan | Y | Y | Y | Y | |
One-click vulnerability fix | x | x | x | x | |
Application vulnerability | Automatic vulnerability scan (reporting based on the middleware asset collection period) | Y | Y | Y | Y |
Scheduled vulnerability scan (By default, vulnerabilities are scanned once a week. You can change the scan period by configuring vulnerability policies.) | Y | Y | Y | Y | |
Vulnerability whitelist | Y | Y | Y | Y | |
Manual vulnerability scan | Y | Y | Y | Y | |
One-click vulnerability fix | x | x | x | x |
Note
HSS can scan for Web-CMS and application vulnerabilities but cannot fix them. You can log in to your server to manually fix the vulnerability by referring to the suggestions displayed on the vulnerability details page.