This topic describes how to use features provided by Security Center.


The Security Center agent is a plug-in installed on your server. Security Center only protects your server when the agent is online.

To use Security Center, make sure that the agent installed on your server is online.

Security Center agent

Install the Security Center agent

Install the agent on servers in private networks

View the statistics of security overview


View and manage the status of assets


View the security status of a server

View container status

View website status

View the security status of cloud services

View the details of an asset

Enable or disable server protection

Security checks

Manage asset groups

Manage asset tags

Disassociate an external server

Protect servers against viruses


Scan for viruses

Handle virus alerts

Comparison between virus blocking and the anti-virus feature

Add anti-ransomware policies

Enable the anti-ransomware feature

Create a protection policy

Manage a protection policy

Create a restoration task

Configure web tamper proofing

Web tamper proofing overview

Enable tamper protection

Enable tamper protection

Purchase licenses

View the protection status

Add blocked processes to the whitelist

Detect and handle vulnerabilities


Vulnerability priorities

Quick scans

Linux software vulnerabilities

Windows system vulnerabilities

Web-CMS vulnerabilities

Application vulnerabilities

Urgent vulnerabilities


Fix software vulnerabilities

Troubleshoot vulnerability fix failures

Configure and view baseline checks


Set baseline check policies

Run a baseline check

View and manage baseline risks

Add a check item to the whitelist

Detect and check cloud services


Perform configuration assessment on cloud services

View and manage configuration risks

View reports of classified protection compliance checks

Classified protection compliance checks

View and handle alert events


View and handle alert events

View exceptions related to an alert

Trace attack sources

Quarantine files

Configure IP blocking policy

Export the alert list

Configure security alerts

Cloud threat detection

View information about attack analysis

Attack awareness

Detect the leaks of AccessKey pairs and passwords

AccessKey leak detection

Analyze logs


Activate log analysis

Log types and parameters

Use custom log query and analysis

View the distribution of log dates

View raw logs

View statistics graphs

Quick analysis

Query logs

View log report dashboards

View log report

Export log data

Advanced settings

Descriptions of log fields

Manage asset fingerprints


Collect asset fingerprints data

View asset fingerprints data

View threat intelligence from ThreatBook

Threat intelligence from ThreatBook overview



View security reports

Security reports

Use the playbook

Playbook overview

Create a task

View task details

Container signature

Container signature

Multi-account control

Multi-account control


Security configuration

Configure alert notifications

Install or uninstall the Security Center agent


FAQ about services

FAQ about pricing

Overview FAQ

FAQ about assets

FAQ about proactive defense

FAQ about security control

FAQ about threat detection