This topic describes how to manage individual servers or cloud products.

Background information

The basic information about individual assets is displayed on the Assets page. Based on the type of the assets, servers or cloud products, assets can be managed in different ways.

Step 1: Find the target asset

  1. Login Cloud security center console.
  2. In the left-side navigation pane, click Assets.
  3. Click the Server, Website, or Cloud Product tab, find the target asset, and then click the name of the asset to go to the asset details page.

Step 2: Manage the target asset

On the asset details page, click the Basic Information, Vulnerabilities, Alerts, Baseline Risks, or Asset Fingerprints tab to view relevant details.

  • Basic Information: This tab consists of sections where you can view asset details and manage an asset.
    • Risk state: This section displays information about vulnerabilities, alerts, and baseline risks of an asset. You can click the number under Vulnerabilities, Alerts, or Baseline Risks to view the details.
      Note For cloud products, only security alerts are displayed in this section.
    • Detail: This section displays information about the asset configuration and security protection settings, and allows you to manage asset tags and groups.
      • Change asset groups
        Note Asset groups are only supported by servers. Cloud products do not support asset groups.

        Click Group. In the Group dialog box that appears, select a new group and click OK.

      • Manage tags

        Click the Add a tag icon. In the Add tag dialog box that appears, select a tag and click OK.

        To remove the tag of an asset, click the Remove a tag icon on the right side of the tag.

    • Asset investigation: This section displays the fingerprints of an asset. You can click the number under an item to go to the Asset Fingerprints tab to view the details.

    • Vulnerability check: This section allows you to turn on or off vulnerability check for a specific type of vulnerabilities.
      Note Vulnerability check is only supported by servers. Cloud products do not support vulnerability check.
    • Anti-brute Force Cracking: This section displays the defense rules of an asset. You can modify and save a defense rule. For more information about how to create defense rules, see Configure security alerts.
    • Login security settings: This section allows you to add approved logon locations, configure advanced logon settings (includes approved IP addresses, time periods, and accounts), turn on or turn off the unapproved IP, time, and account alert function. You can also add approved IP addresses, time periods, and accounts that are allowed to log on to a specific asset.
      Note Login security settings are only supported by servers. Cloud products do not support logon security settings.
  • Vulnerabilities: This tab displays the vulnerabilities detected on an asset. For more information about how to fix vulnerabilities, see Vulnerability fix prioritization.
    Note This tab only displays detected server vulnerabilities. Cloud products do not provide this tab.
  • Alerts: This tab displays the security alerts of an asset. For more information about how to manage security alerts, see View and handle security events.
  • Baseline Risks: This tab displays the baseline check results of an asset. For more information about how to manage baseline risks, see Baseline check.
    Note Baseline check is only supported by servers. Cloud products do not support baseline check.
  • Asset Fingerprints: This tab displays asset fingerprints, including ports, processes, software, and accounts. For more information, see Asset fingerprints.
    Note Asset fingerprints are only supported by servers. Cloud products do not provide this information.