The client protection feature blocks malicious operations that attempt to uninstall the Security Center agent. This feature ensures that Security Center provides stable protection services. This topic describes how to enable the client protection feature for your server.

Background information

After client protection is enabled, Security Center provides default security protection for the process files in the directory of the Security Center agent. Security Center also blocks the operations that attempt to uninstall the Security Center agent but are not performed in the Security Center console. This prevents attackers from gaining access to your server and uninstalling the Security Center agent. This also prevents the accidental termination of the Security Center agent by other processes. If the Security Center agent is uninstalled or terminated, Security Center fails to protect your server. We recommend that you enable the client protection feature for all servers.

The versions of operating systems and kernels supported by the feature are limited. If the version of the operating system or kernel used by a server is not supported by the feature, you cannot enable the feature for the server. For more information about the versions of operating systems and kernels supported by the feature, see Supported versions of operating systems and kernels.

Note After you enable the client protection feature for your server, you can uninstall the Security Center agent by using one of the following methods:
  • Disable the client protection feature for the server and uninstall the Security Center agent from the server.
  • Uninstall the Security Center agent in the Security Center console. For more information, see Uninstall the Security Center agent.

Limits

All editions of Security Center support this feature. For more information about the features that each edition supports, see Features.

Enable the client protection feature for a server

  1. Log on to the Security Center console.
  2. In the left-side navigation pane, click Settings.
  3. In the Client Protection section of the General tab, turn on Defense Mode. Client protection
    After you perform the preceding operations, the client protection feature is enabled for the servers that are within the scope specified by Protection Scope and have the Security Center agent installed.
  4. Click Manage for Protection Scope.
  5. In the Client Protection panel, select the servers for which you want to enable the client protection feature. Use the client protection feature
    You can select or deselect servers based on your requirements. The client protection feature is enabled for selected servers and is disabled for deselected servers.
  6. Click Determine.
    Note If you enable the client protection feature for a server, the feature immediately takes effect. If you disable the client protection feature for a server, the feature is still in effect for 5 minutes and then becomes invalid.

Supported versions of operating systems and kernels

Operating system Operating system version Kernel version
64-bit Windows
  • Windows Server 2008 R2
  • Windows Server 2012 R2
  • Windows Server 2016
  • Windows Server 2019
All versions
64-bit CentOS
  • CentOS 6.3
  • CentOS 6.4
  • CentOS 6.5
  • CentOS 6.6
  • CentOS 6.7
  • CentOS 6.8
  • CentOS 6.9
  • CentOS 6.10
  • CentOS 7.0
  • CentOS 7.1
  • CentOS 7.2
  • CentOS 7.3
  • CentOS 7.4
  • CentOS 7.5
  • CentOS 7.6
  • CentOS 7.7
  • CentOS 7.8
  • CentOS 7.9
  • CentOS 8.0
  • CentOS 8.1
  • CentOS 8.2
  • CentOS 8.3
  • CentOS 8.4
  • 4.18.0-240.22.1.el8_3.x86_64
  • 4.18.0-240.15.1.el8_3.x86_64
  • 4.18.0-193.28.1.el8_2.x86_64
  • 4.18.0-193.14.2.el8_2.x86_64
  • 4.18.0-147.8.1.el8_1.x86_64
  • 4.18.0-147.5.1.el8_1.x86_64
  • 3.10.0-1160.36.2.el7.x86_64
  • 3.10.0-1160.31.1.el7.x86_64
  • 3.10.0-1160.25.1.el7.x86_64
  • 3.10.0-1160.24.1.el7.x86_64
  • 3.10.0-1160.21.1.el7.x86_64
  • 3.10.0-1160.15.2.el7.x86_64
  • 3.10.0-1160.11.1.el7.x86_64
  • 3.10.0-1160.6.1.el7.x86_64
  • 3.10.0-1160.2.2.el7.x86_64
  • 3.10.0-1127.19.1.el7.x86_64
  • 3.10.0-1127.18.2.el7.x86_64
  • 3.10.0-1127.13.1.el7.x86_64
  • 3.10.0-1127.10.1.el7.x86_64
  • 3.10.0-1127.8.2.el7.x86_64
  • 3.10.0-1127.el7.x86_64
  • 3.10.0-1062.18.1.el7.x86_64
  • 3.10.0-1062.12.1.el7.x86_64
  • 3.10.0-1062.9.1.el7.x86_64
  • 3.10.0-1062.4.3.el7.x86_64
  • 3.10.0-1062.4.2.el7.x86_64
  • 3.10.0-1062.4.1.el7.x86_64
  • 3.10.0-1062.1.2.el7.x86_64
  • 3.10.0-1062.1.1.el7.x86_64
  • 3.10.0-1062.el7.x86_64
  • 3.10.0-957.27.2.el7.x86_64
  • 3.10.0-957.21.3.el7.x86_64
  • 3.10.0-957.12.2.el7.x86_64
  • 3.10.0-957.10.1.el7.x86_64
  • 3.10.0-957.5.1.el7.x86_64
  • 3.10.0-957.1.3.el7.x86_64
  • 3.10.0-957.el7.x86_64
  • 3.10.0-862.14.4.el7.x86_64
  • 3.10.0-862.9.1.el7.x86_64
  • 3.10.0-693.21.1.el7.x86_64
  • 3.10.0-693.11.1.el7.x86_64
  • 3.10.0-693.5.2.el7.x86_64
  • 3.10.0-693.2.2.el7.x86_64
  • 3.10.0-693.el7.x86_64
  • 3.10.0-514.26.2.el7.x86_64
  • 3.10.0-514.21.1.el7.x86_64
  • 3.10.0-514.10.2.el7.x86_64
  • 3.10.0-514.6.2.el7.x86_64
  • 2.6.32-754.35.1.el6.x86_64
  • 2.6.32-754.33.1.el6.x86_64
  • 2.6.32-754.31.1.el6.x86_64
  • 2.6.32-754.30.2.el6.x86_64
  • 2.6.32-754.29.2.el6.x86_64
  • 2.6.32-754.28.1.el6.x86_64
  • 2.6.32-754.27.1.el6.x86_64
  • 2.6.32-754.23.1.el6.x86_64
  • 2.6.32-754.17.1.el6.x86_64
  • 2.6.32-696.16.1.el6.x86_64
  • 2.6.32-696.10.1.el6.x86_64
  • 2.6.32-696.6.3.el6.x86_64
  • 2.6.32-696.3.2.el6.x86_64
  • 2.6.32-642.13.1.el6.x86_64
  • 2.6.32-642.6.2.el6.x86_64
  • 2.6.32-573.22.1.el6.x86_64
  • 2.6.32-431.23.3.el6.x86_64
  • 2.6.32-431.el6.x86_64
64-bit Ubuntu
  • Ubuntu 14.04
  • Ubuntu 16.04
  • Ubuntu 18.04
  • Ubuntu 20.04
  • 5.4.0-77-generic
  • 5.4.0-74-generic
  • 5.4.0-73-generic
  • 5.4.0-54-generic
  • 4.15.0-147-generic
  • 4.15.0-144-generic
  • 4.15.0-143-generic
  • 4.15.0-128-generic
  • 4.15.0-124-generic
  • 4.15.0-91-generic
  • 4.15.0-52-generic
  • 4.15.0-45-generic
  • 4.15.0-42-generic
  • 4.4.0-210-generic
  • 4.4.0-154-generic
  • 4.4.0-151-generic
  • 4.4.0-146-generic
  • 4.4.0-142-generic
  • 4.4.0-117-generic
  • 4.4.0-105-generic
  • 4.4.0-96-generic
  • 4.4.0-93-generic
  • 4.4.0-63-generic
  • 4.4.0-62-generic
64-bit Alibaba Cloud Linux AliyunLinux 2.1903
  • 4.19.91-23.al7.x86_64
  • 4.19.91-22.2.al7.x86_64
  • 4.19.91-21.al7.x86_64
  • 4.19.91-19.1.al7.x86_64
  • 4.19.81-17.2.al7.x86_64