All Products
Search
Document Center

Security Center:Investigate asset fingerprints

Last Updated:Mar 31, 2026

Security Center collects asset fingerprint data from your servers — accounts, open ports, running processes, middleware, databases, web services, and more — giving you a detailed inventory of your IT environment. Use this data to spot configuration drift, identify exposed services, and accelerate threat investigation.

Automatic collection is disabled for all fingerprint types by default. No data is collected until you configure a collection schedule or trigger a manual collection.

Limitations

How data collection works

Security Center supports three collection methods:

MethodWhen to use
Automatic periodic collection (recommended)Set a collection frequency per fingerprint type. Security Center collects data on the configured schedule and keeps fingerprint tabs up to date. Start here if you want ongoing visibility.
Collect latest data for all assetsTrigger an immediate collection across all servers when you need a fresh snapshot before the next scheduled run.
Collect data for a single assetTrigger an immediate collection for one specific server.
Important

The AI Component tab has three subtabs — AI Application, AI Tools, and AI Service — with different data sources:

  • AI Application data is collected by the Security Center client installed on your servers.

  • AI Tools and AI Service data comes from the agentless scanning feature. If you don't use agentless scanning or have no AI-related assets, these subtabs show no data.

Prerequisites

Before you begin, ensure that you have:

Configure automatic periodic collection

  1. Log on to the Security Center consoleSecurity Center console. In the upper-left corner, select the region where your assets are located: Chinese Mainland or Outside Chinese Mainland.

  2. In the left navigation pane, choose Assets > Host.

  3. On the Assets > Host > Account tab, click Configuration Management.

  4. In the Configuration Management dialog box, set a collection frequency for each fingerprint type, then click OK.

Important
  • The default refresh rate for all fingerprint types is Disabled. Set different frequencies for different types based on how often that data changes.

  • The collection frequency you set for Middleware also applies to Database, Web Service, and AI Component.

After you save the configuration, Security Center automatically collects fingerprint data at the specified frequency and updates the corresponding tabs.

Collect the latest data for all assets

  1. On the Assets > Host > Account tab, click Collect Latest Data.

  2. In the Collect Latest Data dialog box, select the fingerprint types to collect, then click OK.

image
Collection takes 1–5 minutes.

Collect data for a single asset

  1. On the Assets > Host > Servers tab, find the server and click View in the Actions column.

  2. On the asset details page, click the Asset Fingerprints tab, then click the tab for the fingerprint type you want.

    Important

    The Asset Fingerprint Investigation tab appears only for servers protected by Security Center Enterprise or Ultimate edition.

    image

  3. In the upper-right corner, click Collect Data Now. In the Data Collection Task Submitted dialog box, click OK.

Collection takes 1–5 minutes.

View asset fingerprint data

View fingerprints across all assets

  1. Log on to the Security Center consoleSecurity Center console. In the upper-left corner, select your region.

  2. In the left navigation pane, choose Assets > Host.

  3. Click the tab for the fingerprint type you want to view, such as Account.

image

The page has three areas:

  • Fingerprint list — All fingerprints of the selected type, with a count of servers where each fingerprint appears.

  • Detail list — Click a fingerprint in the left list (for example, an account name) to see which servers have that fingerprint and its full details.

  • Search — Enter a value to filter fingerprints. Fuzzy match is supported. For example, search for an account name to find all servers where that account exists.

View fingerprints for a single asset

  1. On the Servers tab, find the server and click View in the Actions column.

  2. On the asset details page, click the Asset Fingerprint Investigation tab, then select the fingerprint type you want to view.

    Important

    The Asset Fingerprint Investigation tab appears only for servers protected by Security Center Enterprise or Ultimate edition.

Asset fingerprint reference

Account

Information about OS accounts on the server:

FieldDescription
Server informationThe server the account belongs to.
AccountThe account name.
ROOT permissionWhether the account has root permissions.
User groupThe user group the account belongs to.
Expiration timeWhen the account password expires.
Password expiredWhether the account password has expired.
Password lockedWhether the account password is locked.
Account expiredWhether the account has expired.
Sudo accountWhether the account has sudo permissions.
Interactive logon accountWhether the account has logon permissions.
Last logonThe last time the account was used to log on to the server.
Last scan timeThe last time Security Center collected this data.

Port

Information about listening ports on the server:

FieldDescription
Server informationThe server name and IP address.
PortThe listener port number.
Network protocolThe protocol used by the listener port.
PIDThe ID of the process bound to the listener port.
Associated processThe process bound to the listener port.
IPThe IP address of the network interface card (NIC) the listener port is attached to.
Last scan timeThe last time Security Center collected this data.

Process

Information about running processes on the server:

FieldDescription
Server informationThe server name and IP address.
Process nameThe process name.
Process pathThe startup path of the process.
Startup parameterThe startup parameters of the process.
Start timeWhen the process started.
Running userThe user who started the process.
Running permissionThe permissions of the user who started the process.
PIDThe process ID.
Parent process PIDThe ID of the parent process.
File MD5The MD5 hash of the process binary.
Package processWhether the process comes from an installation package.
Process statusThe current status of the process.
Last scan timeThe last time Security Center collected this data.

Middleware

Information about middleware running on the server. Middleware refers to independently runnable system components, such as MySQL and Docker.

FieldDescription
Server informationThe server name and IP address.
MiddlewareThe middleware name.
TypeThe middleware type.
Runtime environment versionThe version of the middleware runtime environment.
VersionThe middleware version number.
PIDThe ID of the middleware startup process.
Startup pathThe startup path of the middleware.
Version authentication informationThe method used to determine the middleware version.
Parent process PIDThe ID of the parent process.
Running userThe user who started the middleware.
Listener IPThe IP address the middleware listens on.
Listener portThe port the middleware listens on.
Listener statusThe current listener status.
Listener port protocolThe network protocol of the listener port.
Start timeWhen the middleware started.
Process command lineThe command and parameters used to start the middleware.
Container nameThe container where the middleware is running (if applicable).
Image nameThe image the container is based on (if applicable).
Configuration pathThe absolute path to the middleware startup configuration.
Last scan timeThe last time Security Center collected this data.

AI components

The AI Component tab has three subtabs.

AI Application — Information about AI applications collected by the Security Center client. AI components are functional modules that make up an AI system, such as data modules, model modules, and inference modules.

FieldDescription
Server informationThe server name and IP address.
AI componentThe component name.
TypeThe component type.
VersionThe component version.
PIDThe process ID.
Startup pathThe startup path.
Version authentication informationThe method and path used to determine the component version.
Parent process PIDThe ID of the parent process.
Running userThe system user account the component process runs under.
Listener IPThe network address the component listens on. 0.0.0.0 means all IPv4 interfaces; :: means all IPv6 interfaces.
Listener portThe port the component listens on.
Listener statusThe current listener status.
Listener port protocolThe network protocol of the listener port.
Start timeWhen the component started.
Startup command lineThe full startup command and parameters.
Container nameThe container instance where the component runs (if applicable).
Image nameThe full image path in the image repository (if applicable).
Configuration pathAbsolute paths to the component's key configuration files.
Last scan timeThe last time Security Center collected this data.

AI Tools — Information about AI tools detected by agentless scanning in ECS instances and images. AI tools are software libraries and frameworks used to develop, train, deploy, or run AI models — typically Python packages that underpin large model applications.

FieldDescription
Server informationThe server name and IP address.
AI toolThe tool name.
VersionThe tool version number.
Installation pathWhere the tool is installed.
Last scan timeThe last time agentless scanning collected this data.

AI Services — Information about AI services detected by agentless scanning in ECS instances and images. AI services are large language model (LLM) interfaces provided by external platforms, callable over the network for AI chat, code generation, image understanding, and similar features.

FieldDescription
Server informationThe server name and IP address.
AI serviceThe service name.
EndpointThe interface address used to access the service.
File locationThe configuration file path.
Last scan timeThe last time agentless scanning collected this data.

Database

Information about databases running on the server:

FieldDescription
Server informationThe server name and IP address.
Database nameThe database name.
TypeThe database type.
VersionThe database version number.
PIDThe ID of the database startup process.
Startup pathThe startup path.
Version authentication informationThe method used to determine the database version.
Parent process PIDThe ID of the parent process.
Running userThe user who started the database.
Listener IPThe IP address the database listens on.
Listener portThe port the database listens on.
Listener statusThe current listener status.
Listener port protocolThe network protocol of the listener port.
Start timeWhen the database started.
Startup command lineThe command and parameters used to start the database.
Container nameThe container where the database runs (if applicable).
Image nameThe image the container is based on (if applicable).
Configuration pathThe absolute path to the database startup configuration.
Last scan timeThe last time Security Center collected this data.

Web service

Information about web services running on the server:

FieldDescription
Server informationThe server name and IP address.
Web service nameThe web service name.
TypeThe web service type.
Runtime environment versionThe JDK runtime environment version.
VersionThe web service version number.
PIDThe ID of the web service startup process.
Startup pathThe startup path.
Version authentication informationThe method used to determine the version.
Parent process PIDThe ID of the parent process.
Running userThe user who started the web service.
Listener IPThe IP address the web service listens on.
Listener portThe port the web service listens on.
Listener statusThe current listener status.
Listener port protocolThe network protocol of the listener port.
Start timeWhen the web service started.
Startup command lineThe command and parameters used to start the web service.
Container nameThe container where the web service runs (if applicable).
Image nameThe image the container is based on (if applicable).
Configuration pathThe absolute path to the web service startup configuration.
Web directoryThe path to the web configuration page.
Last scan timeThe last time Security Center collected this data.

Software

Information about software installed on the server:

FieldDescription
Server informationThe server name and IP address.
Software nameThe software name.
VersionThe software version number.
Software startup pathThe startup path.
Software update timeWhen the software version was last updated.
Last scan timeThe last time Security Center collected this data.

Scheduled task

Information about scheduled tasks configured on the server:

FieldDescription
Server informationThe server name and IP address.
CommandThe command line the scheduled task runs.
Task scheduleThe task schedule.
MD5The MD5 hash of the scheduled task process.
Account nameThe account that starts the task.
Last scan timeThe last time Security Center collected this data.

Startup item

Information about services and programs configured to start automatically:

FieldDescription
Server informationThe server name and IP address.
Startup item pathThe path to the startup service.
Last scan timeThe last time Security Center collected this data.

Kernel module

Information about kernel modules loaded on the server:

FieldDescription
Server informationThe server name and IP address.
Module nameThe kernel module name.
Module sizeThe size of the kernel module file.
Module file pathThe path to the kernel module.
Number of dependent modulesThe number of other modules this module depends on.
Last scan timeThe last time Security Center collected this data.

Website

Information about websites hosted on the server:

FieldDescription
Server informationThe server name and IP address.
Domain nameThe domain name configured for the website.
Site typeThe web server software type.
PortThe listener port.
Web pathThe path to the WebHome directory.
Web root pathThe root directory path in the web configuration.
UserThe user who started the web service.
Directory permissionThe permissions on the web directory.
Listener protocolThe listener protocol.
PIDThe process ID.
Start timeWhen the web service started.
Image nameThe image the container is based on (if applicable).
Container nameThe container where the website runs (if applicable).
Last scan timeThe last time Security Center collected this data.

What's next