All Products
Search
Document Center

Security Center:Security Center features supported by different types of servers

Last Updated:Feb 29, 2024

This topic describes Security Center features that are supported by Elastic Compute Service (ECS) instances, simple application servers, and servers outside Alibaba Cloud.

Note
  • Servers outside Alibaba Cloud include on-premises servers, servers in data centers, and servers on third-party clouds, such as Amazon Elastic Compute Cloud (EC2) instances.

  • The following symbols are used in the tables of this topic:

    • 对: The feature is supported.

    • 错: The feature is not supported.

Assets

Entry point in the left-side navigation pane

Feature

Alibaba Cloud ECS instance

Simple application server

Server outside Alibaba Cloud

Assets > Overview

Asset overview

对

对

对

Assets > Host

Synchronize the information about the most recent servers

对

对

对

Add a third-party asset to Security Center

对

对

对

Use the security check feature

对

对

对

Use the agent troubleshooting feature

对

对

对

Asset information collection

对

对

对

Batch O&M and CloudMonitor

对

错

对

(Cloud Assistant must be installed.)

Enable protection or stop protection

对

对

对

Server unbinding

错

对

对

Use the asset fingerprints feature

对

对

对

Assets > Container

Container assets

对

错

错

Assets > Cloud Product

Cloud services

对

错

错

Assets > Website

Websites

对

错

错

Risk Governance

Entry point in the left-side navigation pane

Feature

Alibaba Cloud ECS instance

Simple application server

Server outside Alibaba Cloud

Risk Governance > Exposure Analysis

Asset exposure analysis

对

错

错

Risk Governance > Vulnerabilities

Linux software vulnerabilities

  • Vulnerability detection: 对

  • Vulnerability fixing: 对

  • Vulnerability detection: 对

  • Vulnerability fixing: 对

  • Vulnerability detection: 对

  • Vulnerability fixing: 对

Windows system vulnerabilities

  • Vulnerability detection: 对

  • Vulnerability fixing: 对

  • Vulnerability detection: 对

  • Vulnerability fixing: 对

  • Vulnerability detection: 对

  • Vulnerability fixing: 对

Web-CMS vulnerabilities

  • Vulnerability detection: 对

  • Vulnerability fixing: 对

  • Vulnerability detection: 对

  • Vulnerability fixing: 对

  • Vulnerability detection: 对

  • Vulnerability fixing: 对

Urgent vulnerabilities

  • Vulnerability detection: 对

  • Vulnerability fixing: 错

  • Vulnerability detection: 对

  • Vulnerability fixing: 错

  • Vulnerability detection: 对

  • Vulnerability fixing: 错

Application vulnerabilities

  • Network scan: 对

  • Web scanner: 对

  • Vulnerability fixing: 错

  • Network scan: 对

  • Web scanner: 错

  • Vulnerability fixing: 错

  • Network scan: 对

  • Web scanner: 错

  • Vulnerability fixing: 错

Risk Governance > Baseline Check

Baseline check

  • Baseline check: 对

  • Baseline risk fixing: 对

  • Baseline check: 对

  • Baseline risk fixing: 对

  • Baseline check: 对

  • Baseline risk fixing: 对

Risk Governance > Configuration Assessment

Configuration assessment

对

错

错

Risk Governance >

Detection of AccessKey pair leaks

对

错

错

Risk Governance > Cloud Honeypot

Cloud honeypot

  • Host honeypot: 对

  • VPC honeypot: 对

  • Host honeypot: 对

  • VPC honeypot: 错

  • Host honeypot: 对

  • VPC honeypot: 错

Risk Governance > SDK for Malicious File Detection

SDK for malicious file detection

对

对

对

Risk Governance > Log Analysis

Log analysis

  • Host logs: 对

  • Security logs: 对

  • Network logs: 对

  • Host logs: 对

  • Security logs: 对

  • Network logs: 错

  • Host logs: 对

  • Security logs: 对

  • Network logs: 错

Detection and Response

Entry point in the left-side navigation pane

Feature

Alibaba Cloud ECS instance

Simple application server

Server outside Alibaba Cloud

Detection and Response > Alerts

Web directories for scans

对

对

对

Alert handling rules

对

对

对

Data archiving

对

对

对

View and restore quarantined files

对

对

对

Detection and Response > Attack Awareness

Attack awareness

对

对

对

Protection Configuration

Entry point in the left-side navigation pane

Feature

Alibaba Cloud ECS instance

Simple application server

Server outside Alibaba Cloud

Protection Configuration > Host Protection > Agentless Detection

Use the agentless detection feature

对

错

错

Protection Configuration > Host Protection > Anti-ransomware

Anti-ransomware

对

对

对

Protection Configuration > Host Protection > Virus Detection and Removal

Use the virus detection and removal feature

对

对

对

Protection Configuration > Host Protection > Tamper Protection

Use the web tamper proofing feature

对

对

对

Protection Configuration > Host Protection > Host-specific Rule Management

Malicious behavior defense

对

对

对

Defense against brute-force attacks

对

错

错

Approved logon management

对

对

对

Protection Configuration > Container Protection > Image Security

Scan for image system vulnerabilities

对

对

对

Scan for image application vulnerabilities

对

对

对

Scan for image baseline risks

对

对

对

Scan for malicious image samples

对

对

对

Fixing of image system vulnerabilities

对

对

对

Fixing of image application vulnerabilities

对

对

对

Fixing of malicious image samples

对

对

对

Protection Configuration > Container Protection > Proactive Defense for Containers

Proactive defense for containers

对

对

对

Protection Configuration > Container Protection > Container Firewall

Container firewall

对

对

对

Protection Configuration > Application Protection

Application protection

对

对

对

System Configuration

Entry point in the left-side navigation pane

Feature

Alibaba Cloud ECS instance

Simple application server

Server outside Alibaba Cloud

System Configuration > Playbook

Use the playbook feature

对

错

错

System Configuration > Reports

Create a security report

对

对

对

System Configuration > Feature Settings

Feature settings

对

对

对

System Configuration > Notification Settings

Configure notification settings

对

对

对