The Assets page in the Security Center console shows the details of all assets, including basic information, vulnerability information, alert management, baseline checks, and asset fingerprints. This topic describes how to view the details of a server or cloud service.

Background information

The Assets page in the Security Center console shows basic information about all assets.

The following table describes the features that Security Center provides for servers and cloud services.

  • ×: not supported
  • √: supported
Feature Description Server Cloud service
Basic Information Risk State: shows the number of risks detected for an asset. The following types of risks can be detected:
  • Vulnerabilities
  • Alerts
  • Baseline Risks
  • Configuration Assessment
√ (Only the risks of the Alerts and Configuration Assessment types can be detected.)
Detail: shows the configurations and protection status of an asset. You can configure a tag and a group for the asset. √ (Asset grouping is not supported.)
Asset Investigation: shows the statistical information about asset fingerprints, including ports, software, processes, accounts, and middleware.
Vulnerability check: shows the types of vulnerabilities that can be detected. You can specify the types of vulnerabilities that you want to detect for an asset. X
Anti-brute Force Cracking: shows the defense rule that is applied against brute-force attacks. You can modify the rule.
Login security setting: shows the configured logon locations, IP addresses, time periods, and accounts. You can manage relevant alerts for an asset. X
Vulnerabilities Shows the results of vulnerability detection on an asset. X
Alerts Shows the alerts that are generated for an asset.
Baseline Risks Shows the results of the baseline check on an asset. X
Asset Fingerprints Shows the details of asset fingerprints for an asset. X
Configuration Assessment Shows the results of configuration assessment on an asset.

Procedure

  1. Log on to the Security Center console.
  2. In the left-side navigation pane, click Assets.
  3. On the Assets page, click the Server(s), Container, Website, or Cloud Product tab.
  4. Find the required asset and click its name.
  5. View the details of the asset.

    On the asset details page, click the Basic Information, Vulnerabilities, Alerts, Baseline Risks, Asset Fingerprints, or Configuration Assessment tab to view asset information.

    This section describes the operations that you can perform on each tab:
    • Basic Information: On this tab, you can click the required tab to view and manage asset details.
      • Risk State: On this tab, you can view the numbers of vulnerabilities, alerts, and risk items detected in baseline checks. You can click the number in each section to view details.
      • Detail: On this tab, you can view the configurations and protection status of the asset. You can also manage the asset tag and group.
        • Change the group

          Click Group. In the Group dialog box, select a new group and click OK.

        • Add a tag

          Click the Add tag icon icon. In the Add tag dialog box, select a tag and click OK.

          You can click the Remove icon icon on the right of a tag to delete the tag.

      • Asset Investigation: On this tab, you can view statistical information about asset fingerprints. You can click the number below an item to go to the Asset Fingerprints tab on which you can view the details.

      • Vulnerability check: On this tab, you can view the types of vulnerabilities for which you enable or disable the vulnerability detection feature. You can enable or disable this feature as needed. Supported types include Linux Software, Windows System, Web CMS, and Emergency.
      • Anti-brute Force Cracking: On this tab, you can view the defense rule that is applied against brute-force attacks. You can modify and save the defense rule as needed. For more information about how to create defense rules, see Configure security alerts.
      • Login security setting: On this tab, you can set the Login Location parameter and turn on or turn off Uncommon IP Alert, Uncommon Time Alert, and Uncommon Account Alert. You can configure the logon locations, IP addresses, time periods, and accounts for the asset.
    • Vulnerabilities: On this tab, you can view the results of vulnerability detection on the asset. For more information about how to fix vulnerabilities, see Vulnerability fix.
    • Alerts: On this tab, you can view the alerts that are generated for the asset. For more information about how to handle alerts, see View and handle alerts.
    • Baseline Risks: On this tab, you can view the results of the baseline check on the asset. For more information about how to handle baseline risks, see Run a baseline check.
    • Asset Fingerprints: On this tab, you can view and collect statistical information about asset fingerprints, including ports, software, processes, accounts, scheduled tasks, and middleware.

      You can manually run a task to collect the latest fingerprints of the asset.

      1. Click the Port, Software, Process, Account, Scheduled Tasks, or Middleware tab. Then, click Collect data now in the upper-right corner of the list.
      2. In the Collect data message, click OK.

        It requires one to five minutes to complete the data collection task. After the task is completed, you can view the latest fingerprint data of the selected type of asset. For more information, see Asset fingerprints.

    • Configuration Assessment: On this tab, you can view the results of configuration assessment on the asset. For more information, see View and manage configuration risks.