Document Center
all-products-head
This Product
This Product
All Products
Security Center
Security Center
All Products
Announcements and Updates
Release notes
[Notice] End of sending security alert notifications to users of Security Center Basic by text message or email
[Notice] Price adjustments to Security Center Ultimate
Show more
Show less
Product Introduction
What is Security Center?
Functions and features
FAQ
Terms
Limits
Services that work with Security Center
Collection scope
Introduction to Security Center Basic
Show more
Show less
Billing
Apply for a 7-day free trial of Security Center
Billing
Renew the subscription to Security Center
Upgrade and downgrade Security Center
FAQ
Show more
Show less
Getting Started
Purchase Security Center
Quick start
Configure common features (simplified)
Complete basic tasks
View security information of ECS instances
Show more
Show less
Access Security Center
Overview of the Security Center agent
Install the Security Center agent
Uninstall the Security Center agent
Troubleshoot why the Security Center agent is offline
Deploy Security Center on hybrid clouds
Show more
Show less
Overview
Overview
Overview FAQ
Show more
Show less
Assets
Asset Overview
Server assets
Container assets
View information about cloud services
View website information
Supported assets
Security Center features supported by different types of servers
FAQ
Show more
Show less
Risk Management
Asset exposure analysis
Vulnerability Management
Baseline check
Configuration assessment
Detection of AccessKey pair leaks
Cloud honeypot
FAQ about risk management
Show more
Show less
Detection And Response
Events
Attack awareness
Log analysis
FAQ about detection and response
Show more
Show less
Host Protection
Use the agentless detection feature
Anti-ransomware protection
Use the antivirus feature
Use the feature of web tamper proofing
Use the application whitelist feature
Use the malicious behavior defense feature
Use the rule management feature
FAQ
Show more
Show less
Container Protection
Image security scans
Use the feature of proactive defense for containers
Use container escape prevention
Container firewall feature
Use the container signature feature
Configure CI/CD-based container image scan
FAQ about container protection
Show more
Show less
Application protection
Show more
Show less
System Configurations
Overview
Create a security report
Feature Settings
Use the notification feature
Use the multi-account control feature
Compliance check
Service-linked roles for Security Center
FAQ about the Settings feature of Security Center
Show more
Show less
Best Practices
Best practices to manage permissions of RAM users
Improve the security score of your assets
Best practices to prevent AccessKey pair leaks
Fix vulnerabilities
Detect and remove trojans in a Linux operating system
Best practices for handling mining programs
Best practices for defense against trojan attacks
Install the Security Center agent on multiple ECS instances at a time
Use Security Center to protect servers in on-premises data centers
Reinforce password security
Best practices for configuring custom defense rules by using the malicious behavior defense feature
Show more
Show less
API Reference
List of operations by function
Endpoints
RAM authorization
Flow Control Information
API Catalog
Data Structure
API Change Records
Show more
Show less
FAQ
Show more
Show less
Videos
Introduction to Security Center
Show more
Show less