All Products
Search
Document Center

Security Center:Client configuration

Last Updated:Mar 31, 2026

The Security Center agent supports four advanced features that let you harden agent integrity, improve threat detection coverage, and control resource consumption: Agent Protection, Local File Detection Engine, In-depth Detection Engine, and Client Resource Management.

Agent Protection

Agent Protection is a built-in self-protection mechanism that blocks unauthorized attempts to remove or terminate the Security Center agent. When an attacker compromises a server and tries to disable the agent, Agent Protection intercepts the attempt and keeps the agent running.

Important

Agent Protection secures the agent process itself. It does not directly provide server security scanning or threat detection.

What Agent Protection covers

When Agent Protection is active, the following actions are blocked from unauthorized processes on a protected server:

  • Uninstalling the agent

  • Terminating core agent processes

  • Interrupting security protection continuity caused by agent failure

Agent Protection depends on the operating system and kernel version of the server. If the server's kernel is not supported, the protection status displays Protection failed: Incompatible kernel version and the feature does not take effect. See Supported operating systems and kernel versions for the full compatibility list.

Enable Agent Protection

Before you begin, ensure that you have:

  • A Security Center account (free or paid editions are both supported)

  • The Security Center agent installed on the target servers

  1. Log on to the Security Center consoleSecurity Center consoleSecurity Center consoleSecurity Center consoleSecurity Center consoleSecurity Center console.

  2. In the left navigation pane, choose System Settings > Feature Settings. In the upper-left corner, select the region where your assets are located: Chinese Mainland or Outside Chinese Mainland.

  3. Click the Settings > Agent Settings tab. In the Agent Protection section, turn on the Defense Mode switch.

  4. To the right of Protection Scope, click Manage.

  5. In the Agent Protection panel, select the servers to protect, then click OK.

Agent Protection is automatically applied to all servers in the protection scope that have the agent installed. Protection takes effect immediately.

If you disable Agent Protection, the protection mechanism stops after 5 minutes.

Verify Agent Protection status

  1. Log on to the Security Center consoleSecurity Center consoleSecurity Center consoleSecurity Center consoleSecurity Center consoleSecurity Center console.

  2. In the left navigation pane, choose Assets > Host. Select the region in the upper-left corner.

  3. In the host list, find the target server. Click the server name or click View in the Actions column.

  4. On the server details page, click the Basic Information > Details tab. In the Defense Status section, check the Agent Protection status.

image.png

Uninstall the agent when Agent Protection is enabled

Agent Protection restricts uninstallation to authorized methods only. Choose the approach that fits your workflow:

MethodWhen to use
Uninstall from the consoleCentralized management; no direct server access required
Disable protection first, then uninstall locallyDirect server access available; disable Agent Protection for the server in the console first, then run the uninstall command locally

Local File Detection Engine

The Local File Detection Engine scans files directly on the server using a proprietary Alibaba Cloud threat detection engine. This engine reduces performance overhead from data uploads and cloud-based scanning, which improves detection efficiency. After you enable this feature, files are scanned using a dual-engine mode that combines local and cloud-based scanning. The system first uses the local engine to scan files. If no threats are found, the files are then uploaded to the cloud for a secondary scan to ensure comprehensive detection.

Enable local file detection

Before you begin, ensure that you have:

  1. Log on to the Security Center consoleSecurity Center consoleSecurity Center consoleSecurity Center consoleSecurity Center consoleSecurity Center console.

  2. In the left navigation pane, choose System Settings > Feature Settings. Select the region in the upper-left corner.

  3. Click the Settings > Agent Settings tab. In the Local File Detection Engine section, turn on the File Test switch.

  4. To the right of Installation Scope, click Manage.

  5. In the Local File Detection Engine panel, select the servers to enable, then click OK.

In-depth Detection Engine

The In-depth Detection Engine helps you discover advanced security risks, such as rootkits, tunneling, and backdoors.

Enable deep detection

Before you begin, ensure that you have:

  1. Log on to the Security Center consoleSecurity Center consoleSecurity Center consoleSecurity Center consoleSecurity Center consoleSecurity Center console.

  2. In the left navigation pane, choose System Settings > Feature Settings. Select the region in the upper-left corner.

  3. Click the Settings > Agent Settings tab. In the In-depth Detection Engine section, turn on the Depth Test switch.

  4. To the right of Installation Scope, click Manage.

  5. In the In-depth Detection Engine panel, select the servers to enable, then click OK.

Client Resource Management

The Security Center agent consumes a small amount of server resources during normal operation. Client Resource Management lets you choose a resource mode that balances protection coverage against server performance.

Important

If the agent exceeds the memory or CPU limit configured for its mode, the agent pauses automatically. It restarts once resource usage drops to an acceptable level.

Choose a resource mode

ModeMemory limitCPU limitSupported editionsDefaultBest for
Low Consumption ModeUp to 200 MBUp to 10%All editionsYes (for newly added assets)Servers with low security requirements. Some resource-intensive detection features are downgraded, which may delay threat detection. We recommend that you enable Smooth Mode.
Smooth ModeUp to 300 MBUp to 30%Anti-virus, Advanced, Enterprise, UltimateNoCritical business servers. The agent collects more data to support timely risk detection.
Custom Mode200, 300, 400, or 500 MBSingle-core: 5%, 10%, 20%, or 30%; Overall: 5%, 10%, 20%, 30%, 40%, 50%, or 60%Enterprise, UltimateNoMajor events or situations where you need precise control over memory and CPU consumption.

Custom Mode CPU threshold enforcement:

  • Linux: The limit applies to single-core CPU usage.

  • Windows: The limit applies to overall CPU usage.

Important

Setting the CPU or memory threshold too low may cause some detection capabilities to fail. Configure this setting with caution.

In Custom Mode, more types of alerts are detected and the detection engine is more sensitive. This may increase the false positive rate. Monitor and handle alerts promptly.

Each server can be assigned only one mode. If you assign Custom Mode to a server already in Smooth Mode, the mode changes to Custom Mode.

Set a resource mode

  1. Log on to the Security Center consoleSecurity Center consoleSecurity Center consoleSecurity Center consoleSecurity Center consoleSecurity Center console.

  2. In the left navigation pane, choose System Settings > Feature Settings. Select the region in the upper-left corner.

  3. Click the Feature Settings > Agent Settings tab. In the Client Resource Management section, click Manage to the right of Smooth Mode or Custom Mode.

  4. In the panel, select the servers to apply the mode to, then click OK.

  5. (Optional) If you selected Custom Mode, adjust the memory and CPU usage thresholds. Higher thresholds allow more precise protection.

Appendix: Supported operating systems and kernel versions for agent self-protection

The following table lists the operating systems and kernel versions that support agent self-protection.

Operating systemSupported versionsSupported kernel series
Windows (64-bit)Windows Server 2008 R2, 2012 R2, 2016, 2019, 2022, 2025All versions
CentOS (64-bit)CentOS 6.3–6.10, 7.0–7.9, 8.0–8.52.6.32, 3.10.0, 4.x.x, 5.x.x series
Ubuntu (64-bit)Ubuntu 14.04, 16.04, 18.04, 20.043.x.x, 4.x.x, 5.x.x series
Alibaba Cloud Linux / Alinux (64-bit)Alinux 2.19033.10.0, 4.x.x, 5.x.x series
Anolis (64-bit)All versions3.10.0, 4.x.x series
RHELRHEL 6, 7, 8Selected 3.10.0 and 2.6.32 builds

For the full list of verified kernel builds, expand the sections below.

CentOS (64-bit)

5.x.x series

  • 5.6.5-1.el7.elrepo.x86_64

  • 5.5.7-1.el7.elrepo.x86_64

  • 5.5.5-1.el7.elrepo.x86_64

  • 5.5.1-1.el7.elrepo.x86_64

  • 5.4.208-1.el7.elrepo.x86_64

  • 5.4.201-1.el7.elrepo.x86_64

  • 5.4.195-1.el7.elrepo.x86_64

  • 5.4.188-1.el7.elrepo.x86_64

  • 5.4.181-1.el7.elrepo.x86_64

  • 5.4.173-1.el7.elrepo.x86_64

  • 5.4.168-1.el7.elrepo.x86_64

  • 5.4.157-1.el7.elrepo.x86_64

  • 5.4.155-1.el7.elrepo.x86_64

  • 5.4.148-1.el7.elrepo.x86_64

  • 5.4.144-1.el7.elrepo.x86_64

  • 5.4.143-1.el7.elrepo.x86_64

  • 5.4.132-1.el7.elrepo.x86_64

  • 5.4.129-1.el7.elrepo.x86_64

  • 5.4.109-1.el7.elrepo.x86_64

  • 5.4.91-1.el7.elrepo.x86_64

  • 5.4.86-1.el7.elrepo.x86_64

  • 5.4.42-200.el7.x86_64

  • 5.4.8-1.el7.elrepo.x86_64

  • 5.3.8-1.el7.elrepo.x86_64

  • 5.3.7-1.el7.elrepo.x86_64

  • 5.3.0-1.el7.elrepo.x86_64

4.x.x series

  • 4.20.13-1.el7.elrepo.x86_64

  • 4.19.113-300.el7.x86_64

  • 4.19.104-300.el7.x86_64

  • 4.19.110-300.el7.x86_64

  • 4.19.94-300.el7.x86_64

  • 4.19.12-1.el7.elrepo.x86_64

  • 4.18.10-1.el7.elrepo.x86_64

  • 4.18.8-1.el7.elrepo.x86_64

  • 4.18.0-408.el8.x86_64

  • 4.18.0-394.el8.x86_64

  • 4.18.0-383.el8.x86_64

  • 4.18.0-373.el8.x86_64

  • 4.18.0-372.19.1.el8_6.x86_64

  • 4.18.0-372.9.1.el8.x86_64

  • 4.18.0-365.el8.x86_64

  • 4.18.0-358.el8.x86_64

  • 4.18.0-348.20.1.el8_5.x86_64

  • 4.18.0-348.12.2.el8_5.x86_64

  • 4.18.0-348.7.1.el8_5.x86_64

  • 4.18.0-348.2.1.el8_5.x86_64

  • 4.18.0-348.el8.x86_64

  • 4.18.0-305.25.1.el8_4.x86_64

  • 4.18.0-305.19.1.el8_4.x86_64

  • 4.18.0-305.17.1.el8_4.x86_64

  • 4.18.0-305.12.1.el8_4.x86_64

  • 4.18.0-305.10.2.el8_4.x86_64

  • 4.18.0-305.7.1.el8_4.x86_64

  • 4.18.0-305.3.1.el8.x86_64

  • 4.18.0-240.22.1.el8_3.x86_64

  • 4.18.0-240.15.1.el8_3.x86_64

  • 4.18.0-240.10.1.el8_3.x86_64

  • 4.18.0-240.1.1.el8_3.x86_64

  • 4.18.0-193.28.1.el8_2.x86_64

  • 4.18.0-193.19.1.el8_2.x86_64

  • 4.18.0-193.14.2.el8_2.x86_64

  • 4.18.0-193.6.3.el8_2.x86_64

  • 4.18.0-193.1.2.el8_2.x86_64

  • 4.18.0-193.el8.x86_64

  • 4.18.0-147.8.1.el8_1.x86_64

  • 4.18.0-147.5.1.el8_1.x86_64

  • 4.18.0-147.3.1.el8_1.x86_64

  • 4.18.0-80.11.2.el8_0.x86_64

  • 4.14.1-1.el7.elrepo.x86_64

  • 4.13.3-1.el7.elrepo.x86_64

  • 4.13.2-1.el7.elrepo.x86_64

  • 4.11.8-1.el7.elrepo.x86_64

  • 4.9.220-37.el7.x86_64

  • 4.9.215-36.el7.x86_64

  • 4.4.248-1.el7.elrepo.x86_64

  • 4.4.169-1.el7.elrepo.x86_64

  • 4.4.196-1.el7.elrepo.x86_64

  • 4.4.216-1.el7.elrepo.x86_64

  • 4.4.219-1.el7.elrepo.x86_64

  • 4.4.223-1.el7.elrepo.x86_64

  • 4.4.225-1.el7.elrepo.x86_64

  • 4.4.228-2.el7.elrepo.x86_64

  • 4.4.231-1.el7.elrepo.x86_64

  • 4.4.240-1.el7.elrepo.x86_64

  • 4.4.71-1.el7.elrepo.x86_64

3.10.0 series

  • 3.10.0-1160.90.1.el7.x86_64

  • 3.10.0-1160.88.1.el7.x86_64

  • 3.10.0-1160.83.1.el7.x86_64

  • 3.10.0-1160.81.1.el7.x86_64

  • 3.10.0-1160.80.1.el7.x86_64

  • 3.10.0-1160.76.1.el7.x86_64

  • 3.10.0-1160.71.1.el7.x86_64

  • 3.10.0-1160.66.1.el7.x86_64

  • 3.10.0-1160.62.1.el7.x86_64

  • 3.10.0-1160.59.1.el7.x86_64

  • 3.10.0-1160.53.1.el7.x86_64

  • 3.10.0-1160.49.1.el7.x86_64

  • 3.10.0-1160.45.1.el7.x86_64

  • 3.10.0-1160.42.2.el7.x86_64

  • 3.10.0-1160.41.1.el7.x86_64

  • 3.10.0-1160.36.2.el7.x86_64

  • 3.10.0-1160.31.1.el7.x86_64

  • 3.10.0-1160.25.1.el7.x86_64

  • 3.10.0-1160.24.1.el7.x86_64

  • 3.10.0-1160.21.1.el7.x86_64

  • 3.10.0-1160.15.2.el7.x86_64

  • 3.10.0-1160.11.1.el7.x86_64

  • 3.10.0-1160.6.1.el7.x86_64

  • 3.10.0-1160.2.2.el7.x86_64

  • 3.10.0-1160.2.1.el7.x86_64

  • 3.10.0-1160.el7.x86_64

  • 3.10.0-1127.19.1.el7.x86_64

  • 3.10.0-1127.18.2.el7.x86_64

  • 3.10.0-1127.13.1.el7.x86_64

  • 3.10.0-1127.10.1.el7.x86_64

  • 3.10.0-1127.8.2.el7.x86_64

  • 3.10.0-1127.el7.x86_64

  • 3.10.0-1062.18.1.el7.x86_64

  • 3.10.0-1062.12.1.el7.x86_64

  • 3.10.0-1062.9.1.el7.x86_64

  • 3.10.0-1062.7.1.el7.x86_64

  • 3.10.0-1062.4.3.el7.x86_64

  • 3.10.0-1062.4.2.el7.x86_64

  • 3.10.0-1062.4.1.el7.x86_64

  • 3.10.0-1062.1.2.el7.x86_64

  • 3.10.0-1062.1.1.el7.x86_64

  • 3.10.0-1062.el7.x86_64

  • 3.10.0-957.27.2.el7.x86_64

  • 3.10.0-957.21.3.el7.x86_64

  • 3.10.0-957.21.2.el7.x86_64

  • 3.10.0-957.12.2.el7.x86_64

  • 3.10.0-957.12.1.el7.x86_64

  • 3.10.0-957.10.1.el7.x86_64

  • 3.10.0-957.5.1.el7.x86_64

  • 3.10.0-957.1.3.el7.x86_64

  • 3.10.0-957.el7.x86_64

  • 3.10.0-862.14.4.el7.x86_64

  • 3.10.0-862.11.6.el7.x86_64

  • 3.10.0-862.9.1.el7.x86_64

  • 3.10.0-862.6.3.el7.x86_64

  • 3.10.0-862.3.3.el7.x86_64

  • 3.10.0-862.3.2.el7.x86_64

  • 3.10.0-862.2.3.el7.x86_64

  • 3.10.0-862.el7.x86_64

  • 3.10.0-693.21.1.el7.x86_64

  • 3.10.0-693.17.1.el7.x86_64

  • 3.10.0-693.11.6.el7.x86_64

  • 3.10.0-693.11.1.el7.x86_64

  • 3.10.0-693.5.2.el7.x86_64

  • 3.10.0-693.2.2.el7.x86_64

  • 3.10.0-693.el7.x86_64

  • 3.10.0-514.26.2.el7.x86_64

  • 3.10.0-514.26.1.el7.x86_64

  • 3.10.0-514.21.2.el7.x86_64

  • 3.10.0-514.21.1.el7.x86_64

  • 3.10.0-514.16.1.el7.x86_64

  • 3.10.0-514.10.2.el7.x86_64

  • 3.10.0-514.6.2.el7.x86_64

  • 3.10.0-514.6.1.el7.x86_64

  • 3.10.0-514.2.2.el7.x86_64

  • 3.10.0-514.el7.x86_64

  • 3.10.0-327.36.3.el7.x86_64

  • 3.10.0-327.28.3.el7.x86_64

  • 3.10.0-327.28.2.el7.x86_64

  • 3.10.0-327.22.2.el7.x86_64

  • 3.10.0-327.18.2.el7.x86_64

  • 3.10.0-327.13.1.el7.x86_64

  • 3.10.0-327.10.1.el7.x86_64

  • 3.10.0-327.el7.x86_64

  • 3.10.0-229.el7.x86_64

2.6.32 series

  • 2.6.32-754.35.1.el6.x86_64

  • 2.6.32-754.33.1.el6.x86_64

  • 2.6.32-754.31.1.el6.x86_64

  • 2.6.32-754.30.2.el6.x86_64

  • 2.6.32-754.29.2.el6.x86_64

  • 2.6.32-754.29.1.el6.x86_64

  • 2.6.32-754.28.1.el6.x86_64

  • 2.6.32-754.27.1.el6.x86_64

  • 2.6.32-754.25.1.el6.x86_64

  • 2.6.32-754.24.3.el6.x86_64

  • 2.6.32-754.23.1.el6.x86_64

  • 2.6.32-754.22.1.el6.x86_64

  • 2.6.32-754.18.2.el6.x86_64

  • 2.6.32-754.17.1.el6.x86_64

  • 2.6.32-754.15.3.el6.x86_64

  • 2.6.32-754.14.2.el6.x86_64

  • 2.6.32-754.12.1.el6.x86_64

  • 2.6.32-754.11.1.el6.x86_64

  • 2.6.32-754.10.1.el6.x86_64

  • 2.6.32-754.9.1.el6.x86_64

  • 2.6.32-754.6.3.el6.x86_64

  • 2.6.32-754.3.5.el6.x86_64

  • 2.6.32-754.2.1.el6.x86_64

  • 2.6.32-754.el6.x86_64

  • 2.6.32-696.30.1.el6.x86_64

  • 2.6.32-696.28.1.el6.x86_64

  • 2.6.32-696.23.1.el6.x86_64

  • 2.6.32-696.20.1.el6.x86_64

  • 2.6.32-696.18.7.el6.x86_64

  • 2.6.32-696.16.1.el6.x86_64

  • 2.6.32-696.13.2.el6.x86_64

  • 2.6.32-696.10.2.el6.x86_64

  • 2.6.32-696.10.1.el6.x86_64

  • 2.6.32-696.6.3.el6.x86_64

  • 2.6.32-696.3.2.el6.x86_64

  • 2.6.32-696.3.1.el6.x86_64

  • 2.6.32-696.1.1.el6.x86_64

  • 2.6.32-696.el6.x86_64

  • 2.6.32-642.15.1.el6.x86_64

  • 2.6.32-642.13.1.el6.x86_64

  • 2.6.32-642.11.1.el6.x86_64

  • 2.6.32-642.6.2.el6.centos.plus.x86_64

  • 2.6.32-642.6.2.el6.x86_64

  • 2.6.32-642.6.1.el6.x86_64

  • 2.6.32-642.4.2.el6.x86_64

  • 2.6.32-642.3.1.el6.x86_64

  • 2.6.32-642.1.1.el6.x86_64

  • 2.6.32-642.el6.x86_64

  • 2.6.32-573.22.1.el6.x86_64

  • 2.6.32-573.18.1.el6.x86_64

  • 2.6.32-573.12.1.el6.x86_64

  • 2.6.32-573.26.1.el6.x86_64

  • 2.6.32-573.3.1.el6.x86_64

  • 2.6.32-573.7.1.el6.x86_64

  • 2.6.32-573.8.1.el6.x86_64

  • 2.6.32-573.el6.x86_64

  • 2.6.32-504.30.3.el6.x86_64

  • 2.6.32-504.16.2.el6.x86_64

  • 2.6.32-504.12.2.el6.x86_64

  • 2.6.32-504.8.1.el6.x86_64

  • 2.6.32-504.el6.x86_64

  • 2.6.32-431.29.2.el6.x86_64

  • 2.6.32-431.23.3.el6.x86_64

  • 2.6.32-431.20.3.el6.x86_64

  • 2.6.32-431.17.1.el6.x86_64

  • 2.6.32-431.el6.x86_64

  • 2.6.32-358.6.2.el6.x86_64

  • 2.6.32-358.el6.x86_64

  • 2.6.32-279.el6.x86_64

  • 2.6.32-220.el6.x86_64

Ubuntu (64-bit)

5.x.x series

  • 5.4.0-139-generic

  • 5.4.0-137-generic

  • 5.4.0-136-generic

  • 5.4.0-135-generic

  • 5.4.0-132-generic

  • 5.4.0-131-generic

  • 5.4.0-126-generic

  • 5.4.0-125-generic

  • 5.4.0-124-generic

  • 5.4.0-123-generic

  • 5.4.0-122-generic

  • 5.4.0-121-generic

  • 5.4.0-120-generic

  • 5.4.0-117-generic

  • 5.4.0-113-generic

  • 5.4.0-110-generic

  • 5.4.0-109-generic

  • 5.4.0-108-generic

  • 5.4.0-107-generic

  • 5.4.0-106-generic

  • 5.4.0-105-generic

  • 5.4.0-104-generic

  • 5.4.0-102-generic

  • 5.4.0-100-generic

  • 5.4.0-99-generic

  • 5.4.0-97-generic

  • 5.4.0-96-generic

  • 5.4.0-94-generic

  • 5.4.0-92-generic

  • 5.4.0-91-generic

  • 5.4.0-90-generic

  • 5.4.0-89-generic

  • 5.4.0-88-generic

  • 5.4.0-86-generic

  • 5.4.0-84-generic

  • 5.4.0-83-generic

  • 5.4.0-81-generic

  • 5.4.0-80-generic

  • 5.4.0-77-generic

  • 5.4.0-75-generic

  • 5.4.0-74-generic

  • 5.4.0-73-generic

  • 5.4.0-72-generic

  • 5.4.0-70-generic

  • 5.4.0-67-generic

  • 5.4.0-66-generic

  • 5.4.0-65-generic

  • 5.4.0-62-generic

  • 5.4.0-60-generic

  • 5.4.0-59-generic

  • 5.4.0-58-generic

  • 5.4.0-54-generic

  • 5.4.0-52-generic

  • 5.4.0-48-generic

  • 5.4.0-47-generic

  • 5.4.0-45-generic

  • 5.4.0-42-generic

  • 5.4.0-31-generic

  • 5.3.0-40-generic

4.x.x series

  • 4.18.0-21-generic

  • 4.18.0-15-generic

  • 4.15.0-202-generic

  • 4.15.0-200-generic

  • 4.15.0-197-generic

  • 4.15.0-196-generic

  • 4.15.0-192-generic

  • 4.15.0-191-generic

  • 4.15.0-190-generic

  • 4.15.0-189-generic

  • 4.15.0-188-generic

  • 4.15.0-187-generic

  • 4.15.0-184-generic

  • 4.15.0-181-generic

  • 4.15.0-180-generic

  • 4.15.0-177-generic

  • 4.15.0-176-generic

  • 4.15.0-175-generic

  • 4.15.0-173-generic

  • 4.15.0-171-generic

  • 4.15.0-170-generic

  • 4.15.0-169-generic

  • 4.15.0-167-generic

  • 4.15.0-166-generic

  • 4.15.0-161-generic

  • 4.15.0-163-generic

  • 4.15.0-162-generic

  • 4.15.0-159-generic

  • 4.15.0-158-generic

  • 4.15.0-156-generic

  • 4.15.0-154-generic

  • 4.15.0-153-generic

  • 4.15.0-151-generic

  • 4.15.0-147-generic

  • 4.15.0-145-generic

  • 4.15.0-144-generic

  • 4.15.0-143-generic

  • 4.15.0-141-generic

  • 4.15.0-142-generic

  • 4.15.0-140-generic

  • 4.15.0-139-generic

  • 4.15.0-137-generic

  • 4.15.0-136-generic

  • 4.15.0-135-generic

  • 4.15.0-134-generic

  • 4.15.0-132-generic

  • 4.15.0-130-generic

  • 4.15.0-129-generic

  • 4.15.0-128-generic

  • 4.15.0-124-generic

  • 4.15.0-122-generic

  • 4.15.0-121-generic

  • 4.15.0-117-generic

  • 4.15.0-118-generic

  • 4.15.0-112-generic

  • 4.15.0-111-generic

  • 4.15.0-109-generic

  • 4.15.0-108-generic

  • 4.15.0-106-generic

  • 4.15.0-101-generic

  • 4.15.0-99-generic

  • 4.15.0-96-generic

  • 4.15.0-91-generic

  • 4.15.0-88-generic

  • 4.15.0-76-generic

  • 4.15.0-74-generic

  • 4.15.0-72-generic

  • 4.15.0-70-generic

  • 4.15.0-66-generic

  • 4.15.0-65-generic

  • 4.15.0-64-generic

  • 4.15.0-58-generic

  • 4.15.0-54-generic

  • 4.15.0-55-generic

  • 4.15.0-52-generic

  • 4.15.0-48-generic

  • 4.15.0-46-generic

  • 4.15.0-45-generic

  • 4.15.0-43-generic

  • 4.15.0-42-generic

  • 4.15.0-23-generic

  • 4.15.0-13-generic

  • 4.11.0-14-generic

  • 4.4.0-210-generic

  • 4.4.0-206-generic

  • 4.4.0-203-generic

  • 4.4.0-201-generic

  • 4.4.0-198-generic

  • 4.4.0-197-generic

  • 4.4.0-194-generic

  • 4.4.0-193-generic

  • 4.4.0-190-generic

  • 4.4.0-189-generic

  • 4.4.0-187-generic

  • 4.4.0-186-generic

  • 4.4.0-185-generic

  • 4.4.0-184-generic

  • 4.4.0-179-generic

  • 4.4.0-178-generic

  • 4.4.0-177-generic

  • 4.4.0-176-generic

  • 4.4.0-174-generic

  • 4.4.0-173-generic

  • 4.4.0-171-generic

  • 4.4.0-170-generic

  • 4.4.0-169-generic

  • 4.4.0-165-generic

  • 4.4.0-164-generic

  • 4.4.0-161-generic

  • 4.4.0-159-generic

  • 4.4.0-157-generic

  • 4.4.0-154-generic

  • 4.4.0-151-generic

  • 4.4.0-150-generic

  • 4.4.0-148-generic

  • 4.4.0-146-generic

  • 4.4.0-145-generic

  • 4.4.0-143-generic

  • 4.4.0-142-generic

  • 4.4.0-141-generic

  • 4.4.0-140-generic

  • 4.4.0-139-generic

  • 4.4.0-138-generic

  • 4.4.0-135-generic

  • 4.4.0-131-generic

  • 4.4.0-130-generic

  • 4.4.0-128-generic

  • 4.4.0-127-generic

  • 4.4.0-124-generic

  • 4.4.0-119-generic

  • 4.4.0-117-generic

  • 4.4.0-116-generic

  • 4.4.0-105-generic

  • 4.4.0-104-generic

  • 4.4.0-101-generic

  • 4.4.0-97-generic

  • 4.4.0-96-generic

  • 4.4.0-93-generic

  • 4.4.0-87-generic

  • 4.4.0-85-generic

  • 4.4.0-81-generic

  • 4.4.0-79-generic

  • 4.4.0-63-generic

  • 4.4.0-62-generic

  • 4.4.0-57-generic

  • 4.4.0-53-generic

3.x.x series

  • 3.19.0-80-generic

Alibaba Cloud Linux / Alinux (64-bit) — Alinux 2.1903

5.x.x series

  • 5.10.134-14.1.al8.x86_64

  • 5.10.134-13.1.al8.x86_64

  • 5.10.134-13.al8.x86_64

  • 5.10.134-12.2.al8.x86_64

  • 5.10.134-12.al8.x86_64

  • 5.10.112-11.2.al8.x86_64

  • 5.10.112-11.1.al8.x86_64

  • 5.10.112-11.al8.x86_64

  • 5.10.84-10.4.al8.x86_64

  • 5.10.84-10.3.al8.x86_64

  • 5.10.84-10.2.al8.x86_64

  • 5.10.60-9.al8.x86_64

  • 5.10.23-6.al8.x86_64

  • 5.10.23-6.1.al8.x86_64

  • 5.10.23-5.al8.x86_64

4.x.x series

  • 4.19.91-27.al7.x86_64

  • 4.19.91-26.6.al7.x86_64

  • 4.19.91-26.5.al7.x86_64

  • 4.19.91-26.4.al7.x86_64

  • 4.19.91-26.2.al7.x86_64

  • 4.19.91-26.1.al7.x86_64

  • 4.19.91-26.al7.x86_64

  • 4.19.91-25.8.al7.x86_64

  • 4.19.91-25.7.al7.x86_64

  • 4.19.91-25.6.al7.x86_64

  • 4.19.91-25.3.al7.x86_64

  • 4.19.91-25.1.al7.x86_64

  • 4.19.91-25.al7.x86_64

  • 4.19.91-24.1.al7.x86_64

  • 4.19.91-24.al7.x86_64

  • 4.19.91-23.1.al7.x86_64

  • 4.19.91-23.al7.x86_64

  • 4.19.91-22.2.al7.x86_64

  • 4.19.91-22.1.al7.x86_64

  • 4.19.91-22.fc.1.al7.x86_64

  • 4.19.91-22.al7.x86_64

  • 4.19.91-21.2.al7.x86_64

  • 4.19.91-21.al7.x86_64

  • 4.19.91-19.2.al7.x86_64

  • 4.19.91-19.1.al7.x86_64

  • 4.19.91-18.al7.x86_64

  • 4.19.81-17.2.al7.x86_64

  • 4.19.81-17.1.al7.x86_64

  • 4.19.81-17.al7.x86_64

  • 4.19.57-15.1.al7.x86_64

  • 4.19.43-13.2.al7.x86_64

  • 4.19.36-12.al7.x86_64

  • 4.19.34-11.al7.x86_64

  • 4.19.24-9.al7.x86_64

  • 4.19.24-7.14.al7.x86_64

  • 4.4.95-3.al7.x86_64

  • 4.4.95-2.al7.x86_64

  • 4.4.95-1.al7.x86_64

  • 4.4.24-2.al7.x86_64

  • 4.19.91-009.ali4000.alios7.x86_64

3.10.0 series

  • 3.10.0-1160.al7.1.x86_64

  • 3.10.0-1127.19.1.al7.1.x86_64

  • 3.10.0-1127.al7.1.x86_64

  • 3.10.0-1062.12.1.al7.1.x86_64

  • 3.10.0-1062.4.1.al7.1.x86_64

  • 3.10.0-514.2.3.al7.x86_64

Anolis (64-bit) — All versions

4.x.x series

  • 4.19.91-27.an7.x86_64

  • 4.19.91-26.6.an8.x86_64

  • 4.19.91-26.6.an7.x86_64

  • 4.19.91-26.5.an8.x86_64

  • 4.19.91-26.5.an7.x86_64

  • 4.19.91-26.4.an7.x86_64

  • 4.19.91-26.1.an8.x86_64

  • 4.19.91-26.an8.x86_64

  • 4.19.91-26.an7.x86_64

  • 4.19.91-25.8.an8.x86_64

  • 4.19.91-25.7.an8.x86_64

  • 4.19.91-25.2.an7.x86_64

  • 4.18.0-372.32.1.an8_6.x86_64

  • 4.18.0-372.26.1.an8_6.x86_64

  • 4.18.0-372.19.1.an8_6.x86_64

  • 4.18.0-372.16.1.an8_6.x86_64

  • 4.18.0-372.9.1.an8.x86_64

  • 4.18.0-348.23.1.an8_5.x86_64

  • 4.18.0-348.20.1.an8_5.x86_64

  • 4.18.0-348.12.2.an8.x86_64

  • 4.18.0-348.2.1.an8_4.x86_64

  • 4.18.0-305.an8.x86_64

3.10.0 series

  • 3.10.0-1160.81.1.0.1.an7.x86_64

  • 3.10.0-1160.76.1.0.1.an7.x86_64

  • 3.10.0-1160.71.1.0.1.an7.x86_64

  • 3.10.0-1160.66.1.0.1.an7.x86_64

  • 3.10.0-1160.62.1.0.1.an7.x86_64

  • 3.10.0-1062.an7.x86_64

  • 3.10.0-1160.an7.x86_64

RHEL — RHEL 6, 7, and 8

  • 3.10.0-1160.42.2.el7.x86_64

  • 3.10.0-1160.76.1.el7.x86_64

  • 2.6.32-754.el6.x86_64

Agent communication management

Configure the file collection limit for the agent to meet your business and security requirements. This setting helps you balance effective data collection with minimal resource consumption.

Important

Important: If Client Resource Management is set to custom mode, setting the file collection limit too low may delay data collection. Configure this setting carefully.

  1. Log on to the Security Center console.

  2. In the left-side navigation pane, choose System Settings > Feature Settings. In the upper-left corner of the console, select the region where your assets are located: Chinese Mainland or Outside Chinese Mainland.

  3. Select the Settings > Agent Settings tab. In the Agent Communication Management section, configure the file collection limit.

    • Selecting Custom allows you to set the file collection frequency. The valid range is 100 to 10,000 collections per second.

    • Selecting Unlimited removes the limit on the agent's file collection frequency.