This topic answers the frequently asked questions (FAQ) before you purchase Security Center.

If I do not have an Alibaba Cloud Elastic Compute Service (ECS) instance, can I use Security Center to protect the servers in on-premises data centers?

Yes.

Security Center can protect ECS instances, servers in on-premises data centers, and external servers. Security Center can protect servers that have installed the Security Center agent. For more information, see Install the Security Center agent and Use Security Center to protect servers in on-premises data centers.

Can Security Center protect external servers?

Yes.

Security Center can protect servers from other service providers, such as AWS, Tencent Cloud, QingCloud, and UCloud. Security Center can protect servers that have installed the Security Center agent. For more information, see Install the Security Center agent on non-Alibaba Cloud servers.

How can I use Security Center to protect my servers in on-premises data centers and external servers?

Before you can use Security Center to protect the servers in on-premises data centers and external servers, you must install the Security Center agent on these servers. For related information, see the following table:

Server type How to use Security Center to protect the servers
ECS instances If you have selected Security reinforcement when you purchase ECS instances, the Security Center agent is automatically installed and the Basic edition of Security Center is automatically activated. The Basic edition is free and you do not need to manually install the Security Center agent.
Note The Basic edition of Security Center only detects unusual logons and urgent vulnerabilities. The Basic edition is recommended for individuals.
If you have not selected Security reinforcement when you purchase ECS instances or Security Center prompts that the Security Center Agent is offline. To enable Security Center to protect the servers, follow these steps:
  1. Activate the Advanced or Enterprise edition of Security Center. For more information, see Purchase Security Center.
    Note The Basic edition of Security Center only detects unusual logons and urgent vulnerabilities. The Basic edition is recommended for individuals.
  2. Log on to the Security Center console.
  3. Install the Security Center agent on the server in the Security Center console. For more information, see Manual installation.
External servers from third-party providers Complete the following steps to enable Security Center to protect the servers.
  1. Activate the Advanced or Enterprise edition of Security Center. For more information, see Purchase Security Center.
    Note The Basic edition of Security Center only detects unusual logons and urgent vulnerabilities. The Basic edition is recommended for individuals.
  2. Log on to the Security Center console.
  3. Install the Security Center agent on the server in the Security Center console. For more information, see Manual installation.
Servers in on-premises data centers

I have 100 ECS instances, can I activate Security Center for 10 ECS instances?

No.

When you purchase the Advanced or Enterprise edition of Security Center, you must activate Security Center for all the instances under the current account.

When you purchase the Advanced or Enterprise edition of Security Center, you must specify the number of Protected Assets. The number of protected assets represents the total number of instances under the current account. The default value is the total number of ECS instances and external servers that have installed the Security Center agent.

Does Security Center provide the anti-virus service?

Yes.

The Advanced or Enterprise edition of Security Center can detect and automatically remove common network viruses. For more information, see The anti-virus feature.

Which edition of Security Center do I select if I want to meet the evaluation requirement for classified protection of cybersecurity?

You must purchase the Enterprise edition of Security Center and activate the log analysis service (value-added). For more information about how to activate log analysis, see Activate log analysis.

Note The Enterprise edition of Security Center supports the baseline check feature. You can use this feature together with log analysis, which retains log data for 180 days, to meet the evaluation requirement for classified protection of cybersecurity.