This topic describes the features provided by Security Center and provides links to the related topics.

Prerequisites

The Security Center agent installed on your server. Security Center protects your server only when the agent is online.

To use Security Center, make sure that the agent installed on your server is online.

Security Center agent

Install the Security Center agent

Install the agent on servers in private networks

View the statistics of security overview

Overview

Security score

View and manage the status of assets

Overview

View the security status of a server

View the security information of containers

View website status

View the security status of cloud services

View the details of an asset

Enable or disable server protection

Use the security check feature

Manage asset groups

Manage asset tags

Disassociate an external server

Configure the container security feature

Container security

Overview of image security scans

Enable the container image scan feature

Add third-party image repositories to Security Center

Scan container images

View container image scan results

Use the container signature feature

Use threat detection on Kubernetes containers

Configure the asset exposure analysis feature

Use the asset exposure analysis feature

Use the anti-ransomware feature

Anti-ransomware overview

Enable the anti-ransomware feature

Create a protection policy

Manage a protection policy

Create a restoration task

Troubleshoot the abnormal status of the anti-ransomware client

Protect servers against viruses

Overview

Scan for viruses

Handle virus alerts

Comparison between virus blocking and the anti-virus feature

Configure the web tamper proofing feature

Overview of web tamper proofing

Activate the feature

Enable the web tamper proofing feature

Purchase licenses

View the protection status

Add blocked processes to the whitelist

Detect and handle vulnerabilities

Overview

Vulnerability priorities

Quick scan

Linux software vulnerabilities

Windows system vulnerabilities

Web-CMS vulnerabilities

Application vulnerabilities

Urgent vulnerabilities

Configure vulnerability settings

Fix software vulnerabilities

Troubleshoot vulnerability fix failures

Configure and view baseline checks

Overview

Baseline checks

Set baseline check policies

Run a baseline check

View and manage baseline risks

Add a check item to the whitelist

Detect and check cloud services

Overview

Perform configuration assessment on cloud services

View and manage configuration risks

View and handle alerts

Overview

View and handle alert events

View exceptions related to an alert

Use the attack source tracing feature

Use the quarantine feature

Configure IP blocking policy

Archive alerts

Export the alert list

Configure security alerts

Cloud threat detection

View information about attack analysis

Attack awareness

Detect the leaks of AccessKey pairs and passwords

AccessKey pair leak detection

Analyze logs

Limits

Activate log analysis

Log types and parameters

Use custom log query and analysis

View the distribution of log dates

View raw logs

View statistics graphs

Quick analysis

Query logs

View log report dashboards

View log report

Export log data

Advanced settings

Descriptions of log fields

Manage asset fingerprints

Overview of asset fingerprints

Collect asset fingerprints data

View asset fingerprints data

View security reports

Security reports

Use the playbook

Playbook overview

Create a task

View task details

Configure the container signature feature

Use the container signature feature

Control multiple accounts

Multi-account control

Configure features on the Settings page

Overview of features on the Settings page

Use proactive defense

Use the webshell detection feature

Use threat detection on Kubernetes containers

Use the security control feature

Use RAM

Manage protection modes

Use the client protection feature

Configure the notification feature

Install or uninstall the Security Center agent

View reports of classified protection compliance checks

Classified protection compliance checks

Configure the security group check feature

Security group checks

FAQ

Pre-sales FAQ

FAQ about pricing

FAQ about the Overview page of the Security Center

FAQ about assets

FAQ about proactive defense

FAQ about security control

FAQ about threat detection