This topic provides answers to some frequently asked questions about Security Center.
The following list provides the answers to some frequently asked questions about Security Center by category.
- Pre-sales
- Purchase and renew Security Center
- Access Security Center
- Operations in the Security Center console
- Security score
- Unbinding of a server and uninstallation of the Security Center agent
- Virus defense
- Web tamper proofing
- Linux software vulnerabilities
- Vulnerability fixing
- Vulnerability detection
- Baseline checks
- Alerting
- Brute-force attacks
- AccessKey pair leaks
- Notifications
Pre-sales
I used the free trial of Security Center before. Can I apply for the free trial again?
How do I apply for the 7-day free trial of Security Center Ultimate?
Can I purchase Security Center on a monthly basis?
Are there differences among the editions of Security Center?
I do not have an ECS instance. Can I use Security Center to protect servers in data centers?
Can Security Center protect third-party cloud servers?
How do I use Security Center to protect servers in data centers and third-party cloud servers?
Does Security Center remove viruses?
Which edition of Security Center provides the automatic vulnerability fixing feature?
Purchase and renew Security Center
What do I do if Security Center prompts that the subscription is due to expire?
Why am I unable to view the DDoS alerts in the Security Center console?
Access Security Center
How do I view a log file of the Security Center agent?
How do I use Security Center to protect servers not deployed on Alibaba Cloud?
Operations in the Security Center console
The error message "Invalid token" is returned in the Security Center console. What do I do?
How do I address the browser compatibility issues when I log on to the console?
Security score
What are the priorities to handle security events that I can access in the Secure Score section?
How do I enable the feature of protection against brute-force attacks?
How do I handle common alerts?
How does the vulnerability scan level affect the security score?
How does the baseline check level affect the security score?
Unbinding of a server and uninstallation of the Security Center agent
How do I unbind an external server from Security Center?
How do I unbind an Elastic Compute Service (ECS) instance from Security Center?
Virus defense
How do I purchase the anti-ransomware capacity?
What is the anti-ransomware feature? Why do I must pay for the anti-ransomware feature?
After I purchase the antivirus feature, can the existing features properly run?
What is the relationship between the anti-ransomware feature and Alibaba Cloud HBR?
What capabilities does the antivirus feature provide?
Is the data backup feature automatically enabled after I purchase the anti-ransomware capacity?
What do I do if the anti-ransomware agent consumes excessive server CPU or memory resources?
What are the differences between the general anti-ransomware solution and the snapshot feature?
What do I do if the anti-ransomware capacity that I purchased is insufficient?
What do I do if the status of an anti-ransomware policy is abnormal?
What do I do if the anti-ransomware capacity that I purchased is insufficient?
Web tamper proofing
Can web tamper proofing protect files of all sizes?
What are the requirements for the local backup directory of web tamper proofing?
What do I do if I receive a message that indicates that a protected directory is invalid?
Why does web tamper proofing remain disabled after I specify a protected directory?
Can I write files to a protected directory on a server for which web tamper proofing is configured?
Linux software vulnerabilities
How do I manually detect Linux software vulnerabilities on my servers?
How do I view the current software version and vulnerability details?
How do I update kernel 3.1* to kernel 4.4 on Ubuntu 14.04?
Do I need to restart my server after I fix a vulnerability?
What do I do If no update is released for the software package that has a vulnerability?
How do I view the parameters of Linux software vulnerabilities?
What is the rule of the wget buffer overflow vulnerability in Security Center?
Vulnerability fixing
Troubleshoot vulnerability fix failures
How do I delete a Windows patch from the directory of the Security Center agent?
Can Security Center detect Elasticsearch vulnerabilities?
How do I handle a connection timeout between my server and the YUM repository of Alibaba Cloud?
The "Invalid token" error message appears when I fix a vulnerability. What do I do?
What do I do if Security Center fails to verify the fix of a system vulnerability?
Why does Security Center fail to roll back a fix for a vulnerability?
How do I verify whether a vulnerability is fixed?
How do I handle urgent vulnerabilities?
How do I manually detect system software vulnerabilities on a server?
How do I fix the software vulnerabilities on a server?
How do I troubleshoot the failures of vulnerability fixing?
I fail to verify the fixes of Windows system vulnerabilities. What do I do?
The status of a vulnerability is not updated to fixed after it is fixed. What do I do?
What is the rule of the wget buffer overflow vulnerability in Security Center?
Vulnerability detection
How often does Security Center detect vulnerabilities?
Can Security Center detect system- and application-layer vulnerabilities?
How does Security Center implement real-time vulnerability scans?
Baseline checks
What do I do if Security Center fails to verify a fixed baseline check risk?
What are the differences between baselines and vulnerabilities?
Alerting
How do I view the protection features that are enabled?
How do I check whether mining programs exist in my assets?
How does Security Center detect intrusions?
What alerts can I add to the whitelist?
How do I handle common alerts?
How does Security Center detect unusual logons and generate alerts on unusual logons?
How do I view all alerts that are generated on assets?
How do I add an alert to the whitelist?
How do I check whether a website is attacked?
How does Security Center detect unusual logons and generate alerts on unusual logons?
What do I do after sensitive information is breached?
How do I use Security Center Basic to handle webshells?
An alert is generated. It indicates access to a malicious domain name. How do I handle this alert?
Brute-force attacks
What do I do if my server passwords are cracked?
Does Security Center detect only weak passwords of RDP and SSH services?
AccessKey pair leaks
Notifications
How do I modify the contacts that receive alert notifications?