All Products
Search
Document Center

Security Center:ECS security posture

Last Updated:Mar 27, 2026

After you purchase an ECS instance, it is automatically protected by Security Center Basic. Security Center helps you quickly assess the security status of your ECS instances by detecting potential security risks.

Background

Security Center is a unified security management system that identifies, analyzes, and alerts you to security threats in real time. With features such as anti-ransomware, anti-virus, tamper protection, and compliance checks, Security Center helps you automate a closed-loop process for threat detection, response, and tracing. This protects your cloud assets and on-premises hosts, and helps you meet regulatory and compliance requirements.

The Advanced, Enterprise, and Ultimate editions of Security Center support automatic virus blocking. They provide proactive defense against common ransomware, such as WannaCry and Globelmposter, and DDoS trojans, such as XorDDos and BillGates. We recommend that you enable this feature to protect your assets. To learn how to enable the malicious host behavior prevention feature, see proactive defense.

For more information about the features supported by each Security Center edition, see Features.

Prerequisites

When you purchase an ECS instance, you must select the Security Hardening option to enable Security Center to protect your ECS instance.

image.png

View security risks for ECS instances

You can use the following methods to view security risks on your ECS instances and handle them promptly.

  • Log on to the ECS console. On the Overview page, in the Security Protection section on the right, hover over a pending task and click Handle Now. You are redirected to the Host page of the Security Center console, where you can view and handle existing security risks. For more information, see Manage servers.

    image.png

  • Log on to the Security Center console. On the Overview page, in the Security Score section, click Handle Now. The Security Risk Handling panel appears, where you can view and handle existing security risks. For more information, see Overview (Old Version).

    image.png

Security details for an ECS instance

You can use the following methods to view security risk details for a single ECS instance.

  • Log on to the ECS console. On the Instance page, find the target ECS instance. In the Monitoring column, click the image.png icon to view the security status of the instance. If high-severity risks exist, we recommend that you handle them as instructed to avoid affecting your workloads.

    Note

    The color of the image.png icon varies based on the security status. The icon shown on the page reflects the actual security status.

  • Log on to the Security Center console. Select the region where your asset is located: China or Outside China. In the left-side navigation pane, choose Assets > Host to view the security details of the target ECS instance. For more information, see View information about a single server.

Note

On the asset list page, if the icon in the agent column indicates that the agent is offline, your ECS instance is not protected by Security Center. You must reinstall the agent. For more information, see Install or uninstall the agent.