Security Center provides the asset fingerprints feature that periodically collects and records the information about the ports, software, processes, accounts, scheduled tasks, and middleware on your servers. This feature allows you to monitor the running status of your assets and trace the sources of security issues. The Security Center console provides an overview of asset fingerprints and the details of the fingerprints. This topic provides an overview of the asset fingerprints feature, including relevant characteristics and the data that the feature collects.
The asset fingerprints feature is supported by the Enterprise edition only. To use this feature, you must upgrade the Basic, Basic Anti-Virus, or Advanced edition of Security Center to the Enterprise edition. For more information about how to upgrade the Security Center, see Upgrade and downgrade.
- The asset fingerprints feature can collect, record, and analyze the following fingerprint information: listened ports, software assets, running progresses, account assets, paths of scheduled tasks, and middleware (system components that can run independently, such as MySQL databases).
- You can click Settings on the Asset Fingerprints page to set the time interval at which the preceding fingerprint information is collected.
- You can go to the Assets page to manually run a task that collects fingerprint information about a single asset.
|Ports|| Listened ports. This feature periodically collects information about the listened
ports. The information includes:
|Software||Software assets. This feature periodically collects information about the software
installed on your servers. The information includes:
|Processes||Running processes. This feature periodically collects information about the processes
that are running on your servers. The information includes:
|Accounts||Account assets. This feature periodically collects information about the accounts
of your servers. The information includes:
|Scheduled tasks||This feature periodically collects information about the paths of scheduled tasks
that are periodically run on your servers. Information includes:
|Middleware||This feature periodically collects information about the middleware of your servers.
Middleware refers to system components that can run independently, such as MySQL databases
and Docker. Docker is a container component. Information includes:
You can log on to the Security Center console and choose to view the following information: top five open ports, top five software, top five processes, top five with the same account, top five middleware, and the latest accounts.
You can click Details in each section to go to the relevant tab that displays more fingerprint details. For more information, see View asset fingerprints data.