All Products
Search
Document Center

Security Center:Host protection settings

Last Updated:Mar 31, 2026

Security Center protects your servers from malicious host behaviors, ransomware, and web shell attacks. This topic covers the available host protection features on the Host Protection Settings tab and how to configure them.

Proactive defense

Proactive defense automatically intercepts common viruses, malicious network connections, and web shell connections, and uses bait to capture ransomware before it can encrypt your data.

Features

The following table summarizes each capability, the editions that support it, and its behavior when enabled.

FeatureAnti-virusAdvancedEnterpriseUltimateDescription
Malicious Host Behavior PreventionYesYesYesYesAutomatically intercepts and removes mainstream ransomware, DDoS Trojans, mining programs, trojans, malicious programs, backdoors, and worms. Enabled by default after purchasing Anti-virus or a higher edition — all servers are added to the detection scope automatically. Edition differences: Anti-virus blocks common viruses such as trojans and mining programs. Advanced, Enterprise, and Ultimate intercept ATT&CK framework attacks, block large-scale intrusions on common services and applications, stop popular ransomware encryption, and support custom defense rules. See Manage host-specific rules.
Anti-ransomware (Bait Capture)YesYesYesYesPlaces bait files on your servers to capture new types of ransomware and uses virus behavior analysis to auto-start defense. The bait files are used only to capture new types of ransomware and do not interrupt your services. View removed ransomware on the Detection and Response > Alert page: go to the CWPP tab and set Alert Type to Precision Defense.
Webshell Prevention--YesYesIntercepts suspicious connections initiated by known webshells and quarantines related files. Enabled by default for Enterprise and Ultimate editions — all servers are added to the detection scope automatically. View related alerts and quarantined files on the Detection and Response > Alert page, on the Cloud Workload Protection Platform (CWPP) tab.
Malicious Network Behavior Prevention-YesYesYesIntercepts network behavior between your servers and disclosed malicious sources.
User Experience Optimization in Proactive Defense--YesYesIf a server unexpectedly shuts down or its defense capabilities are missing, Security Center collects Kdump data for security analysis to continuously improve protection capabilities.
Note

Infection-type viruses are advanced malicious programs that write malicious code into normal program files. Because terminating infected system processes can cause system instability, Security Center does not automatically quarantine infection-type viruses. Handle these viruses manually.

Note

If all features in the Proactive Defense section are disabled, Security Center only sends alerts when viruses are detected — you must handle them manually. Enable all features to strengthen server security. For details on handling alerts, see Evaluate and handle security alerts.

Enable defense capabilities

  1. Log on to the Security Center console.

  2. In the left navigation pane, choose System Settings > Feature Settings. In the upper-left corner, select the region for the assets you want to protect: Chinese Mainland or Outside Chinese Mainland.

  3. On the Settings > Host Protection Settings tab, turn on Malicious Host Behavior Prevention, Anti-ransomware (Bait Capture), Webshell Prevention, and Malicious Network Behavior Prevention in the Proactive Defense section. After enabling all switches, Security Center protects your servers from malicious host behaviors, ransomware, abnormal web shell connections, and access from malicious sources.

  4. Click Manage to the right of a proactive defense type. Select the servers for which you want interception to take effect, then click OK. After enabling these features, Security Center automatically intercepts programs and processes related to virus execution and blocks abnormal connections.

  5. (Optional) Select the User Experience Optimization in Proactive Defense check box. This lets Security Center collect security data when server exceptions occur, which improves your protection over time.

View intercepted threats

On the Detection and Response > Alert page, go to the CWPP tab to view viruses automatically intercepted by proactive defense in the list of Proactive Defense for Containers alerts. Set the search condition to Handled and select Precision Defense for Alert Type.

Precision Defense
Note

After enabling Malicious Host Behavior Prevention, Anti-ransomware (Bait Capture), and Webshell Prevention, some programs may be incorrectly flagged or fail to be quarantined.

Web shell detection

Security Center uses a proprietary detection engine to scan web servers and web directories for web shells and trojan programs. The engine combines two detection mechanisms:

  • Static detection: scans the entire web directory every day at midnight.

  • Dynamic detection: triggered whenever files change in the web directory.

You can configure the asset scope for detection, and isolate, recover, or ignore detected web shell files.

Note

The Free edition supports only some types of web shell detection. Upgrade to Anti-virus, Advanced, Enterprise, or Ultimate for complete coverage. See Upgrade and downgrade.

Configure which servers run web shell detection

Web shell detection is enabled by default for all servers with the Security Center client installed. Enable it for all servers providing public-facing web services. For servers on a completely isolated internal network, disable detection as follows:

  1. Log on to the Security Center console.

  2. In the left navigation pane, choose System Settings > Feature Settings. In the upper-left corner, select the region where your asset is located: Chinese Mainland or Outside Chinese Mainland.

  3. On the Settings > Host Protection Settings tab, in the Webshell Detection and Removal section, click Manage.

  4. In the Configure Servers for Webshell Detection and Removal panel, clear the check boxes for the servers you want to exclude, then click OK.

Handle web shell alerts

After enabling web shell detection, Security Center displays alerts for detected web shell files on the Agentless Detection tab of Detection and Response > Alert. Go to the CWPP tab to view and handle alerts of type Webshell.

Unhandled web shell alerts pose a serious threat to your assets — address them promptly.

Note

One-click handling of web shell alerts is not available in the Free edition. With Anti-virus or higher, you can quarantine detected web shell files with a single click in the console. See Evaluate and handle security alerts.

image

Adaptive threat detection

Adaptive threat detection is disabled by default. When you enable it, Security Center monitors for high-risk threats. If a high-risk alert is detected on a server, Security Center automatically enables strict alert mode on your server client for seven days. In strict alert mode, all security rules and engines are active, enabling more comprehensive detection of hacker activity.

Note

If you manually set a protection mode for the server during the seven-day strict alert period, Security Center will not automatically revert the mode after seven days — the server retains whatever mode you set manually.

Prerequisites

Before you enable adaptive threat detection, confirm the following requirements:

RequirementDetails
EditionEnterprise or Ultimate. If you have a different edition, upgrade. Set the server protection edition to match your purchased edition. See Attach a protection edition to a server.
Billing methodPay-as-you-go, required for Host and Container Security. See Purchase.
Server protection levelMust be set to Host Protection or Host and Container Protection. See Attach a protection level to a server.

Enable adaptive threat detection

  1. Log on to the Security Center console.

  2. In the left navigation pane, choose System Settings > Feature Settings. In the upper-left corner, select the region for the asset you want to protect: Chinese Mainland or Outside Chinese Mainland.

  3. On the Settings > Host Protection Settings tab, turn on the Proactive Defense for Containers switch in the Adaptive Threat Detection Capability section.

Note

If you have not yet authorized Security Center to access your cloud resources, complete the authorization as prompted. This creates a service-linked role under Authorization for Security Center Service-linked Role, which Security Center uses to access resources in other products. See Service-linked roles for Security Center.

Alert settings

Security Center offers two alert modes to match your security posture. By default, Security Center enables Balanced Mode for all connected servers.

ModeBehavior
Balanced Mode (default)Detects suspicious risks while keeping false positives low, based on comprehensive testing by Alibaba Cloud experts.
Strict ModeDetects more suspicious behaviors; higher false positive rate. Use with caution during major event support periods.

Switch servers to Strict Mode

Important

Strict Mode generates more alerts and has a higher risk of false positives. Use it with caution.

  1. Log on to the Security Center console.

  2. In the left navigation pane, choose System Settings > Feature Settings. In the upper-left corner, select the region for the asset you want to protect: Chinese Mainland or Outside Chinese Mainland.

  3. On the Settings > Host Protection Settings tab, in the Alert Settings section, click Manage to the right of Strict Mode.

  4. Select the servers you want to switch to Strict Mode, then click OK.

Related topics