Use this page to determine which Security Center features are available for your server type before you deploy or expand coverage.
Security Center supports three server types:
Alibaba Cloud Elastic Compute Service (ECS)
Alibaba Cloud Simple Application Server
Non-Alibaba Cloud servers — includes servers from other cloud providers, local servers, and IDC servers
The following icons indicate feature availability:
: Supported
: Not supported
Asset Center
| Navigation path | Feature | Alibaba Cloud ECS | Alibaba Cloud Simple Application Server | Non-Alibaba Cloud servers | Notes |
|---|---|---|---|---|---|
| Assets > Overview | Overview | ||||
| Assets > Host | Sync latest assets | ||||
| Add multi-cloud assets | |||||
| Security check | |||||
| Troubleshoot client issues | |||||
| Asset collection | |||||
| Batch operations and Cloud Monitor | Cloud Assistant must be installed on non-Alibaba Cloud servers. | ||||
| Enable or pause protection | |||||
| Detach | |||||
| Asset Fingerprint investigation | |||||
| Assets > Container | Container Assets | ||||
| Assets > Cloud Product | Cloud Products | ||||
| Assets > Website | Websites |
Threat Administration
Detection and Response
| Navigation path | Feature | Alibaba Cloud ECS | Alibaba Cloud Simple Application Server | Non-Alibaba Cloud servers |
|---|---|---|---|---|
| Detection and Response > Alert | Web directory definition | |||
| Alert handling rules | ||||
| Data archiving | ||||
| Evaluate and handle security alerts | ||||
| Detection and Response > Attack Analysis | Attack analysis |
Mitigation Settings
| Navigation path | Feature | Alibaba Cloud ECS | Alibaba Cloud Simple Application Server | Non-Alibaba Cloud servers |
|---|---|---|---|---|
| Protection Configuration > Host Protection > Agentless Detection | Agentless detection | |||
| Protection Configuration > Host Protection > Anti-ransomware | Anti-ransomware | |||
| Protection Configuration > Host Protection > Virus Detection and Removal | Virus scan | |||
| Protection Configuration > Host Protection > Web Tamper Proofing | Web tamper-proofing | |||
| Protection Configuration > Host Protection > Host-specific Rule Management | Malicious behavior defense | |||
| Brute-force attack protection | ||||
| Common logon management | ||||
| Protection Configuration > Host Protection > Core File Monitoring | Core file monitoring | |||
| Protection Configuration > Container Protection > Container Image Scan | Image system vulnerability scan | |||
| Image application vulnerability scan | ||||
| Image baseline check scan | ||||
| Malicious sample scan for images | ||||
| Image system vulnerability fix | ||||
| Image application vulnerability fix | ||||
| Malicious sample fix for images | ||||
| Protection Configuration > Container Protection > Proactive Defense for Containers | Proactive defense for containers | |||
| Protection Configuration > Container Protection > Container File Protection | Container file protection | |||
| Protection Configuration > Container Protection > Container Microsegmentation | Container firewall | |||
| Protection Configuration > Application Protection | Connect to Application Protection |
System Settings
| Navigation path | Feature | Alibaba Cloud ECS | Alibaba Cloud Simple Application Server | Non-Alibaba Cloud servers |
|---|---|---|---|---|
| System Settings > Playbook | Task Hub | |||
| System Settings > Security Report | Security reports | |||
| System Settings > Feature Settings | Feature settings | |||
| System Settings > Notification Settings | Notification settings |