Asset fingerprint data helps you understand your assets, quickly find security vulnerabilities, and block threats by accurately identifying the features of your IT resources. Security Center provides the asset fingerprint investigation feature, which collects various types of asset fingerprint data from your servers, such as accounts, ports, and processes. This topic describes how to use the asset fingerprint investigation feature to collect and view asset fingerprint data.
Edition requirements
Subscription: Enterprise or Ultimate (you must upgrade if you are using a lower edition).
NoteThe protection edition for the server must be set to Enterprise or Ultimate. For more information, see Attach a protection edition to a server.
Pay-as-you-go: The pay-as-you-go billing method must be enabled for Host and Container Security. If this billing method is not enabled, see Purchase.
NoteThe server's protection level must be Host Protection or Host and Container Protection. For more information, see Attach a protection level to a server.
Data collection methods
Security Center does not automatically collect asset fingerprint data. You must configure automatic periodic collection or start a manual collection task to obtain the latest data.
Collection method | Description |
Security Center can automatically collect asset fingerprint data for all your assets. You can configure the frequency for automatic data collection. | |
To immediately view the fingerprint data for all your assets, use the Collect Latest Data feature. | |
Manually collect the latest fingerprint data for a single asset | To immediately view the fingerprint data for a specific asset, you can use the Collect Data Now feature to retrieve the latest data for that asset. |
The AI Component tab on the page contains three subtabs: AI Application, AI Tools, and AI Service. The data collection methods and data sources are different for each subtab. The following list describes these differences:
The AI Application subtab displays information collected by the Security Center client about AI applications on your servers.
The AI Tools and AI Service subtabs display information about AI tools and services detected by the agentless detection feature. If you do not use the agentless detection feature or have no AI-related assets, no data is displayed.
Collect asset fingerprints
Prerequisites
The Security Center client is installed and online on the servers from which you want to collect data. For more information, see Install the Security Center client.
Configure automatic periodic collection
Log on to the Security Center console. In the upper-left corner, select the region where your assets are located: Chinese Mainland or Outside Chinese MainlandOutside China.
In the left navigation pane, choose .
On the tab, click Configuration Management.
In the Configuration Management dialog box, set the collection frequency for each asset fingerprint type and click OK.
ImportantSecurity Center does not automatically trigger tasks to collect the latest asset fingerprint data. By default, the refresh rate for all asset fingerprints is set to Disabled. You can set different refresh rates for different asset fingerprint types.
The fingerprint collection frequency for Middleware,Database, Web Service, and AI Component is determined by the frequency set for the Middleware configuration item.
After you configure the collection frequency, Security Center automatically triggers asset fingerprint collection tasks at the specified frequency and updates the data on the corresponding asset fingerprint tabs. You can view the latest fingerprint data on these tabs.
Manually collect the latest fingerprint data for all assets
On the tab, click Collect Latest Data.
In the Collect Latest Data dialog box, select the asset fingerprint data to collect and click OK.
NoteData collection takes about 1 to 5 minutes.
Manually collect the latest fingerprint data for a single asset
On the tab, find the server from which to collect asset fingerprints and click View in the Actions column.
On the asset details page, click the Asset Fingerprints tab, and then click the tab for the type of asset fingerprint that you want to collect.
ImportantThe Asset Fingerprint Investigation tab is displayed only for servers protected by Security Center Enterprise or Ultimate Edition.

In the upper-right corner, click Collect Data Now. In the Data Collection Task Submitted dialog box, click OK.
Data collection takes about 1 to 5 minutes.
View asset fingerprint data
Log on to the Security Center console. In the upper-left corner of the console, select the region where your assets are located: Chinese Mainland or Outside Chinese Mainland.
In the left navigation pane, choose .
On the Host page, you can view the asset fingerprint data.
View asset fingerprints for all assets
On the Host page, click the tab for an asset fingerprint type, such as Account, to view the corresponding data.

①: A list of asset fingerprints. This list includes all asset fingerprints and the number of servers on which each fingerprint is found.
②: The details list for an asset fingerprint. If you click a fingerprint in the list on the left, such as an account name, the details of that fingerprint are displayed in the list on the right.
③: The search component for asset fingerprints. You can enter information in the search box to find a specific fingerprint. Fuzzy match is supported.
View asset fingerprints for a single asset
On the Servers tab, find the target server and click View in the Actions column.
On the asset details page, click the Asset Fingerprint Investigation tab, and then select the tab for the asset fingerprint type that you want to view.
ImportantThe Asset Fingerprint Investigation tab is displayed only for servers protected by Security Center Enterprise or Ultimate Edition.
Asset fingerprint details
Asset fingerprint type | Description |
Account | Information about server accounts. This includes the following items:
|
Port | Information about the external ports of a server. This includes the following items:
|
Process | Information about server processes. This includes the following items:
|
Middleware | Information about middleware on the server. Middleware refers to independently runnable system components, such as MySQL (database) and Docker (container component). This includes the following items:
|
AI Components | AI Applications: Information about AI applications on your servers that is collected by the Security Center client. AI components are basic functional modules that make up an artificial intelligence system, such as data modules, model modules, and inference modules. This includes the following information:
|
AI Tools: Information about AI tools detected in ECS instances, and images by the agentless detection feature. AI tools are software libraries and framework components used to develop, train, deploy, or call artificial intelligence models. These tools are usually Python packages and are fundamental to building and running large model applications. This includes the following information:
| |
AI Services: Information about AI services detected in ECS instances, and images by the agentless detection feature. AI services are large language model (LLM) interfaces provided by external platforms. They can be called over the network to implement AI features such as AI chat, code generation, and image understanding. This includes the following information:
| |
Database | Information about databases on the server. This includes the following items:
|
Web Service | Information about web services. This includes the following items:
|
Software | Information about software assets. This includes the following items:
|
Scheduled Task | Information about the paths of tasks that are periodically run on your server. This includes the following items:
|
Startup Item | Information about startup items. This includes the following items:
|
Kernel Module | Information about kernel modules. This includes the following items:
|
Web Site | Information about web sites. This includes the following items:
|
References
To view detailed information about the security status of an asset, you can view the server details in Asset Center. For more information, see Manage servers.
For more information about the IDC probe discovery feature, see Connect to IDC assets.