All Products
Search
Document Center

Security Center:Agentless detection

Last Updated:Oct 30, 2025

The agentless detection feature lets you assess security risks on Elastic Compute Service (ECS) instances without installing the Security Center agent. This feature scans server images in an isolated environment to detect vulnerabilities, malware, configuration baselines, and sensitive files. This process identifies potential security risks with almost no impact on server performance.

Scope

  • Supported asset types:

    • In regions in Chinese Mainland: You can scan only Alibaba Cloud ECS instances, disk snapshots, and custom images.

    • In regions Outside Chinese Mainland: You can scan Alibaba Cloud ECS instances, disk snapshots, custom images, and AWS EC2 instances.

  • Region restrictions: This feature is available only in the following regions:

    • China (Qingdao), China (Beijing), and China (Zhangjiakou)

    • China (Hangzhou) and China (Shanghai)

    • China (Shenzhen)

    • China (Chengdu)

    • China (Hong Kong), Singapore, US (Virginia), and Indonesia (Jakarta)

  • Storage and disk restrictions:

    • Encrypted system disks or data disks cannot be scanned.

    • Data disks that use Logical Volume Management (LVM), RAID arrays, or the ReFS file system cannot be scanned.

  • Operating system compatibility:

How it works

Agentless detection uses offline analysis of images. This process has a minimal impact on the performance of the target server.

  1. Create image (for host detection tasks only): Based on the task configuration, the system creates a a full-machine image of the disks of the target ECS instance.

  2. Share and mount: The system shares the created snapshot or image with a dedicated analysis cluster in Security Center.

  3. Isolated scan: In an isolated and dedicated environment, the analysis engine mounts the snapshot or image file system and performs a security scan. This process does not consume computing resources of the target server.

  4. Generate report and clean up: After the scan is complete, the system generates a risk report and automatically deletes the temporarily created image based on the configured policy to save storage costs.

Common use cases

  • Zero-impact risk assessment: Perform non-intrusive risk assessments on core production systems that cannot have agents installed or tolerate any performance impact, ensuring business continuity.

  • Unified security detection for all platform assets: Cover all asset types, including legacy and proprietary systems, to quickly gain a complete view of your security posture across your entire multi-platform environment from a unified view.

  • Comprehensive risk visibility: Detect multi-dimensional risks such as vulnerabilities, malicious files, configuration baselines, and sensitive information in a single scan to gain global security visibility.

  • Asset compliance and security review: Conduct security reviews on Custom Images and server snapshots before instance creation or service launch to ensure that the production environment meets security and compliance standards.

Procedure

Activate the service

  1. Activate the service

    1. Log on to the Security Center console. In the top navigation bar, select the region where your assets are located: Chinese Mainland or Outside Chinese Mainland.

    2. In the navigation pane on the left, choose Protection Configuration > Host Protection > Agentless Detection. On the page that appears, click Activate Now and agree to the terms of service.

      Important

      Agentless detection uses a pay-as-you-go billing method.

  2. Complete service authorization (first-time users only)

    The first time you use this feature, the system prompts you to authorize a service-linked role. Follow the on-screen instructions and click Authorize Now.

    Note

    After the authorization is successful, Security Center automatically creates the AliyunServiceRoleForSas service-linked role. For more information about AliyunServiceRoleForSas, see Service-linked role for Security Center.

Create and run a detection task

Create a detection task

Agentless detection supports two types of detection tasks: immediate and periodic.

Immediate detection task

This task is used for one-time security scans of specific assets.

Host detection

  1. On the Agentless Detection > Server Check tab, in the Risk Detection section, click Detect Now.

  2. In the Detect Now panel, configure the parameters as described below and click OK.

    • Scan Scope: We recommend that you select data disks. The more complete the data source, the more accurate the detection results for vulnerabilities and alerts.

    • Image Retention Duration:

      • The value can range from 1 to 365 days.

      • Creating images incurs charges. The longer the images are stored, the higher the charges.

        Important

        If you select Retain Only At-risk Image, the system automatically deletes risk-free images after the scan is complete.

  3. After you create the task, Security Center automatically creates an image and performs the scan and subsequent operations. For more information, see Automatic creation of images.

    Note

    The time required to complete the task is proportional to the amount of server data to be scanned. Please wait for the task to finish.

Custom image detection

  1. On the Agentless Detection > Custom Image Check tab, in the Risk Detection section, click Detect Now.

  2. In the Detect Now panel, select the target image and click OK.

    Note

    If you cannot find the image that you want to scan in the detection task panel, go to the Assets > Cloud Service page. Click Synchronize Assets. After the synchronization is complete, repeat this step.

Periodic detection task

This task is used for regular and automated security inspections of asset groups.

  1. Navigate to the configuration page

    On the Agentless Detection page, click Scan Configuration in the upper-right corner.

  2. Configure the detection scope

    On the Security Check Scope tab, configure the parameters as described below and click Save.

    • Baseline Check Scope: You can click Manage to view and configure the supported baseline detection scope on the Baseline Check Configuration page.

    • Sensitive File: You can click Manage to view and configure check items on the Sensitive File Scan Settings page.

      Important

      If you select Default Scan for New Check Items, the system automatically scans for new check items when they are updated.

  3. Configure the detection policy

    On the Automatic Detection Policy tab, configure the parameters as described below and click Save.

    • Check Host: Configure the scan object, scan cycle, scan assets, scan scope, and image retention period. For more information about the configuration, see Host detection.

    • Custom Image Check: If you enable Incremental Check, the system performs automated incremental scans on unscanned custom images.

      Important

      Incremental detection requires you to enable Data Delivery of ActionTrail. On the Feature Settings > Settings > Other Configurations tab, turn on the Data Delivery of ActionTrail switch. For more information, see Feature settings.

Automatic creation of images

When a Server Check task is run, the system uses the AliyunServiceRoleForSas service-linked role to complete the following automated operations:

  1. Create an image: The system automatically creates a temporary server snapshot with a name that starts with SAS_Agentless.

  2. Secure sharing: The system shares the image with the official Security Center service account for scanning and analysis.

  3. Automatic cleanup: After the scan is complete, the system automatically deletes the image and revokes the sharing relationship.

Note
  • The image is used only for security scans. No fees are charged for the sharing process.

  • You can find a record of AliyunServiceRoleForSas creating an image in the Event Query of the ActionTrail console.

image

Manage detection tasks

View task progress

The time required for a scan task is proportional to the amount of server data. You can view the task progress in the console.

  1. On the Agentless Detection page, click Task Management in the upper-right corner.

  2. In the Task Management panel that appears, select the appropriate tab based on the detection type.

  3. You can view the Progress and Status of the task in the list.

  4. To view task details, such as to confirm whether a server has been scanned, click Details in the Actions column of the target task.

Troubleshoot failed tasks

If a task has an abnormal status, you can view the failure reason on the Task Details page and refer to the following table for solutions.

Failure message

Reason

Solution

The current region is not supported

The specified region is not supported.

Refer to Scope to confirm whether the region of the ECS instance is supported.

Failed to connect to the disk

A temporary error occurred when the system was mounting the snapshot disk.

Click Retry in the Actions column of the task. The system will try again.

Failed to create the image

The number of ECS images has reached the quota limit.

You can increase the image quota in the ECS console or delete historical images that are no longer in use.

Task processing timed out

The task did not complete within the specified time because the amount of data to be scanned was too large or the system was busy.

You can split the task into multiple subtasks based on the detection scope and run them again.

Download detection reports (optional)

In the Task Management panel, select the appropriate tab based on the detection type.

  • Download the report for the entire task:

    Click Download Report in the Actions column of the target task.

  • Download the report for a single server:

    1. Click Details or View in the Actions column of the target task.

    2. In the Task Details panel, click Download Report in the Actions column.

Analyze and handle risks

After a task is successfully completed, you can view and handle the detected security risks on the Agentless Detection page.

Important

If the same server is scanned multiple times, the page displays only the results of the most recent scan. Previous results are overwritten.

  1. View risk details

    On the Agentless Detection page, go to the tab for the relevant detection policy, such as Server Check. Then, go to the tab for the target risk type, such as Vul Risk. In the list, find the target risk item and click View or Details in its Actions column to view specific information.

  2. Handle risk alerts

    Vulnerability risks

    • How to handle: Find the vulnerability that you want to handle and click Add to Whitelist in the Actions column.

      Warning

      Agentless detection does not support vulnerability fixing.

    • Supported action: Add to whitelist.

      Important
      • This action adds the specified vulnerability to the whitelist. You will no longer receive alerts for the vulnerability. Proceed with caution.

      • After you add a vulnerability to the whitelist, the system automatically synchronizes this setting to the Scan Configuration > Manage Whitelist > Vulnerability Whitelist tab. You can view the added whitelist rules on the corresponding tab.

    Baseline checks

    • How to handle: In the list of check items, find the item that you want to handle and click Add to Whitelist in the Actions column.

    • Supported action: Add to whitelist.

      Important
      • After you add a check item to the whitelist, this check is no longer performed on new servers. Proceed with caution.

      • After you add a check item to the whitelist, the system automatically synchronizes this setting to the Scan Configuration > Manage Whitelist > Baseline Whitelist tab. You can view the added whitelist rules on the corresponding tab.

    Malicious samples

    • How to handle: In the alert list, find the alert that you want to handle and click Change Status or Handle in the Actions column.

    • Supported actions:

      • Add to Whitelist: If you confirm that the file is not malicious, you can add the alert to the whitelist based on the whitelist rules and their scope.

        Important
        • If you add an alert to the whitelist, any future occurrences of the same alert are automatically moved to the processed list, and you no longer receive notifications. Proceed with caution.

        • You can handle identical alerts in batches. The supported actions vary based on the alert type. For more information, see the console.

        • After you add an alert to the whitelist, the system automatically synchronizes this setting to the Scan Configuration > Manage Whitelist > Malicious Sample Whitelist tab. You can view the added whitelist rules on the corresponding tab.

      • Manually Handled: After you manually resolve the risk that caused the alert, you can mark the alert as Manually Handled.

      • Mark as False Positive: You can mark this alert as a false positive. Security Center uses your feedback to continuously optimize its scanning capabilities.

      • Ignore: This action ignores only the current alert. If the same issue is detected again, a new alert is generated.

    Sensitive files

    • How to handle:

      1. In the sensitive file alert list, find the alert that you want to handle and click Details in the Actions column to view a detailed description and hardening suggestions.

      2. In the risk list of the details panel, click Handle in the Actions column. In the dialog box that appears, select how to handle the alert and click OK.

    • Supported actions:

      • Add to Whitelist: If you confirm that the file is not malicious, you can add the alert to the whitelist based on the following rules:

        Important
        • If you add an alert to the whitelist, any future occurrences of the same alert are automatically moved to the processed list, and you no longer receive notifications. Proceed with caution.

        • You can configure multiple rules. All rules have an AND relationship. This means that all conditions must be met for the alert to be whitelisted.

        • After you add an alert to the whitelist, the system automatically synchronizes this setting to the Scan Configuration > Manage Whitelist > Sensitive File Whitelist tab. You can view the added whitelist rules on the corresponding tab.

        • MD5: For the wildcard character, you can select only equals and then enter the MD5 hash of the file.

        • Path: For the wildcard character, you can select contains, prefix, or suffix and then enter the specific path.

      • Manually Handled: After you manually resolve the risk that caused the alert, you can mark the alert as Manually Handled.

      • Mark as False Positive: You can mark this alert as a false positive. Security Center uses your feedback to continuously optimize its scanning capabilities.

      • Ignore: This action ignores only the current alert. If the same issue is detected again, a new alert is generated.

Advanced configuration

Set detection whitelists

Note

Whitelist rules that you set when you analyze and handle risks are also automatically synchronized to whitelist management, where you can modify or delete them.

  1. On the Agentless Detection page, click Scan Settings and go to the Manage Whitelist tab.

  2. Based on the risk type, click Create Rule on the corresponding tab.

  3. Configure the whitelist rule as described below.

    Important

    The following whitelist configurations apply to all assets.

    Vulnerability whitelist

    • Vulnerability Type: Only Linux Software Vulnerability, Windows System Vulnerability, and Application Vulnerability are supported.

    • Vulnerability Name: The system retrieves the latest vulnerability data based on the selected Vulnerability Type.

    Malicious sample whitelist

    • Alert Name: The default value is ALL, which means the whitelist rule applies to all types of alerts. This cannot be modified.

    • Whitelist Field: The default value is fileMd5, which means the MD5 hash of the file is whitelisted. This cannot be modified.

    • Wildcard Character: You can select only equals.

    • Rule Content: Enter the MD5 hash of the file.

    Baseline whitelist

    • Check Item Type: Specify the baseline check items that you do not want to scan.

    • Check Item: The check items that are pulled depend on the selected Check Item Type.

    Sensitive file whitelist

    • Check Item for Sensitive Files: Specify the items that you do not want to scan.

    • Configure Whitelist Conditions:

      Note

      You can configure multiple rules. All rules have an AND relationship. This means that all conditions must be met for the alert to be whitelisted.

      • MD5: For the wildcard character, you can select only equals and then enter the MD5 hash of the file.

      • Path: For the wildcard character, you can select contains, prefix, or suffix and then enter the specific path.

Connect and detect multicloud assets

Agentless detection supports connecting to Amazon Web Services (AWS) in regions Outside Chinese Mainland. To connect, perform the following steps:

  1. Prepare AWS access credentials In your AWS account, create an IAM user with programmatic access and obtain the Access Key ID and Secret Access Key. Ensure that this user has permissions to access and create EC2 snapshots.

    Important

    To use the Agentless Detection feature, you must create a custom IAM policy with specific permissions for Security Center in your AWS account. For more information, see Create a custom policy for agentless detection.

  2. Configure the connection solution

    1. In the upper-left corner of the console, select the Outside Chinese Mainland region.Agentless Detection On the Server Check tab, in the Add Multi-cloud Asset section, click Access below the image icon.

    2. On the Add Assets Outside Cloud page, on the Create Sub-account tab, configure the parameters as described below and click Next.

      • Solution: Manual Configuration.

      • Permission Description: Select Agentless Detection.

  3. Submit credential information

    On the Submit AccessKey Pair tab, accurately enter the credential information that you created in your AWS account and click Next.

    1. RAM User SecretID and RAM User SecretKey: Enter the AWS RAM user API key information that you obtained in Step 1.

    2. Provisioning Region: Select an available region. The system uses the selected region to verify asset accessibility and retrieve the corresponding cloud resource data.

    3. Domain: Configure this parameter based on the selected provisioning region. For AWS China regions, select China. For all other regions, select International.

  4. Policy configuration

    On the Policy Configuration tab, configure the parameters as described below.

    • Select region: Select the regions of the AWS assets that you want to provision.

      Note

      The asset data is automatically stored in the data center that corresponds to the region selected in the upper-left corner of the Security Center console.

      • Chinese Mainland: Data centers located in the Chinese mainland.

      • Outside Chinese Mainland: The data center is in Singapore.

    • Region Management: Select this option. When selected, assets in new regions for this AWS account are automatically synchronized and do not need to be added manually.

    • AK Service Status Check: You can set the interval at which Security Center automatically checks the validity of the API key for the AWS account, or select "Shutdown" to disable the check.

  5. Click OK.

    After you complete the permission verification and policy configuration, you can create agentless detection tasks for your AWS EC2 instances.

Apply in production

  • Performance impact: The agentless detection scanning process does not consume resources of the target server.

  • Cost control: The fees for agentless detection consist of a scan fee and an image storage fee. To control costs, we recommend that you select Retain Only At-risk Image when you set the Image Retention Duration for a task. You should also periodically clean up snapshots that are no longer needed.

Quotas and limitations

  • Disk specifications: A single disk can be up to 1 TiB. A maximum of 20,000,000 files can be scanned per disk. Files that exceed this limit are not scanned.

  • Server limits: A maximum of 15 disks can be scanned per server. Disks that exceed this limit are not scanned.

  • Result retention: Detection task results are retained for only 30 days and are automatically cleared after this period. If the same asset is scanned multiple times, the system retains only the results of the most recent scan.

  • Repair capability: This feature supports only detection and alerting. It does not provide automatic repair capabilities. You must handle risk items based on the instructions on the risk details page.

  • Compressed file limits: Only JAR files are supported for compressed file scans. Only the first layer is decompressed for scanning.

  • File system limits: ext2, ext3, ext4, XFS, and NTFS are supported. For NTFS, check items that rely on file permission information are not supported.

Billing

The fees for using the agentless detection feature are as follows:

  • Agentless detection scan fee

    • Billing method: Pay-as-you-go.

    • Billing cycle: Daily.

    • Unit price: USD 0.03/GB.

    • Billable amount: The billable amount is calculated based on the actual data size of the scanned image, not the total disk capacity.

  • ECS resource usage fee

    Important

    When you configure a host detection task, we recommend that you select Retain Only At-risk Image. The system automatically deletes risk-free images after the scan to save storage costs. For more information, see Retention period configuration.

    • Image fees: The detection task creates an image for the server. Fees are charged based on the image usage and duration. These fees are charged by ECS. For more information, see Images.

FAQ

  • What is the difference between agentless detection and the virus removal feature?

    Comparison item

    Agentless detection

    Virus removal

    Working mode

    Scans offline snapshots, static analysis

    Online real-time monitoring and scanning, dynamic + static analysis

    Server status

    Can scan servers that are running or stopped

    Can only scan servers that are running and have the agent online

    Detection scope

    Vulnerabilities, baselines, malicious samples, sensitive files.

    Viruses, webshells, intrusions, vulnerabilities, etc.

    Response capability

    Supports detection, alerting, and whitelisting. Does not provide repair.

    Provides one-click isolation, removal, and repair capabilities.

    Performance impact

    None.

    Slight (agent consumes a small amount of system resources).

    Billing model

    Pay-as-you-go (per GB scanned)

    Subscription (Anti-virus Edition or higher) or pay-as-you-go.

    Scan mode

    Supports full disk scans.

    Supports quick scans and custom directory scans.

  • Can agentless detection automatically fix all risks?

    No. It supports only operations such as detection, alerting, whitelisting, and ignoring. It does not provide automatic repair capabilities. You must handle risk items based on the instructions on the risk details page.

    Note

    We recommend that you prioritize handling high-risk vulnerabilities and malware. You can optimize baselines as needed.

  • How can I use the advanced detection feature for non-Alibaba Cloud servers?

    Currently, agentless detection supports connecting to only Alibaba Cloud ECS and AWS EC2 (only in regions Outside Chinese Mainland). For more information, see Connect and detect multicloud assets.

    Important

    For servers from other cloud providers or in on-premises data centers, we recommend that you install the Security Center agent and purchase the Anti-virus Edition or a higher edition to obtain comprehensive security protection. For more information, see Purchase Security Center and Install the agent.

  • Why is the asset IP address not displayed for some agentless detection alerts?

    The asset IP may be empty during agentless detection for the following reasons:

    • The instance has been released

      When the asset instance that corresponds to an alert is released, Security Center can no longer obtain the IP address of that instance because the instance no longer exists. Therefore, the IP address of the instance cannot be tracked or displayed.

    • Data cleanup mechanism

      Security Center may clean up records of released instances. This makes the related information unavailable.

Appendix

Detection capabilities

The following table lists the main detection items that are supported by agentless detection.

Detection category

Detection scope

Details

Vulnerability risks

Linux software vulnerabilities, Windows system vulnerabilities, application vulnerabilities

For supported operating system versions, see Supported operating systems for vulnerability scans.

Baseline checks

Configuration compliance for operating systems, applications, and databases

Supports scanning hundreds of configuration items, including but not limited to:

  • Classified protection compliance

  • De facto standards such as CIS

  • Password policy checks

  • Access control

  • Log audits

For more information, go to Scan Configuration in the console. For more information, see Baseline Detection Scope.

Malicious samples

Malicious scripts, webshells, malware

  • Malicious scripts: Shell, Python, Perl, etc.

  • Webshells: PHP, JSP, ASP, ASPX, etc.

  • Malware: Mining programs, Trojans, worms, DDoS botnet programs, etc.

For more information, see Malicious Samples.

Sensitive files

Credential information, key files, configuration files

Supports scanning for common sensitive files, including but not limited to:

  • Plaintext passwords in application configurations

  • Certificate key files (.key, .pem)

  • Authentication/logon credentials

  • Cloud provider credentials (AccessKey)

For more information, go to the Scan Configuration page in the console. For more information about the operations, see Sensitive File Check Items.

Supported operating systems for vulnerability scans

Operating system type

Version

Windows Server

  • Windows Server 2008 (vulnerabilities before EOL)

  • Windows Server 2012 (vulnerabilities before EOL)

  • Windows Server 2016

  • Windows Server 2019

  • Windows Server 2022

Red Hat

  • Red Hat 5 (vulnerabilities before EOL)

  • Red Hat 6 (vulnerabilities before EOL)

  • Red Hat 7

CentOS

  • CentOS 5 (vulnerabilities before EOL)

  • CentOS 6 (vulnerabilities before EOL)

  • CentOS 7

Ubuntu

  • Ubuntu 12.04 (vulnerabilities before EOL)

  • Ubuntu 14.04 (vulnerabilities before EOL)

  • Ubuntu 16.04 (vulnerabilities before EOL)

  • Ubuntu 18.04 (vulnerabilities before EOL)

  • Ubuntu 18.10 (vulnerabilities before EOL)

Debian

  • Debian 6

  • Debian 7

  • Debian 8

  • Debian 9

  • Debian 10

Alpine

  • Alpine 2.3

  • Alpine 2.4

  • Alpine 2.5

  • Alpine 2.6

  • Alpine 2.7

  • Alpine 3.1

  • Alpine 3.2

  • Alpine 3.3

  • Alpine 3.4

  • Alpine 3.5

  • Alpine 3.6

  • Alpine 3.7

  • Alpine 3.8

  • Alpine 3.9

  • Alpine 3.10

  • Alpine 3.11

  • Alpine 3.12

Amazon Linux

  • Amazon Linux 2

  • Amazon Linux AMI

Oracle Linux

  • Oracle Linux 5

  • Oracle Linux 6

  • Oracle Linux 7

  • Oracle Linux 8

SUSE Linux Enterprise Server

  • SUSE Linux Enterprise Server 5

  • SUSE Linux Enterprise Server 6

  • SUSE Linux Enterprise Server 7

  • SUSE Linux Enterprise Server 8

  • SUSE Linux Enterprise Server 9

  • SUSE Linux Enterprise Server 10

  • SUSE Linux Enterprise Server 10 SP4

  • SUSE Linux Enterprise Server 11 SP3

  • SUSE Linux Enterprise Server 12 SP2

  • SUSE Linux Enterprise Server 12 SP5

Fedora Linux

  • Fedora Linux 2X

  • Fedora Linux 3X

openSUSE

  • openSUSE 10.0 (vulnerabilities before EOL)

  • openSUSE Leap 15.2 (vulnerabilities before EOL)

  • openSUSE Leap 42.3 (vulnerabilities before EOL)

Malicious samples

Malicious sample classification

Description

Supported detection items

Malicious script

Detects whether the system functions of an asset have been attacked or tampered with by malicious scripts and displays possible malicious script attacks in the detection results.

Malicious scripts are divided into file-based and fileless scripts. After gaining server permissions, attackers use scripts as a vehicle for further attacks. Methods include implanting mining programs, adding system back doors, and adding system accounts.

Supported languages include Shell, Python, Perl, PowerShell, VBScript, BAT, etc.

Webshell

Checks whether web script files in an asset are malicious and whether they have back door communication or management functions. After implanting a webshell, an attacker can control the server and use it as a back door for further attacks.

Supported languages include PHP, JSP, ASP, ASPX, etc.

Malware

Checks whether binary files in an asset are malicious and whether they have the ability to damage the asset or maintain persistent control. After implanting malicious binary files, an attacker can control the server for mining, DDoS attacks, or encrypting asset files. Malicious binaries are mainly classified by function, including mining programs, Trojan horses, back door programs, hacking tools, ransomware, and worms.

Contaminated basic software

Suspicious program

Spyware

Trojan horse

Infectious virus

Worm

Exploit

Metamorphic Trojan

Hacking tool

DDoS Trojan

Reverse shell back door

Malicious program

Rootkit

Downloader Trojan

Scanner

Riskware

Proxy tool

Ransomware

Back door program

Mining program