Skip to main content

Benefits

Baseline check

Performs security baseline checks for Elastic Compute Service (ECS) instances. The check items include accounts, weak passwords, and at-risk configuration items. The baseline checks ensure that the ECS instances comply with the security standards for enterprise servers.

Vulnerability management

Provides quick fixes for critical vulnerabilities in applications and operating systems on your ECS instances.

Web shell detection and removal

Detects and removes web shells based on specified rules, and allows you to manually quarantine web shells.

Brute-force attack blocking

Detects and blocks brute-force attacks in real-time.

Unusual login alerting

Detects unusual logons based on the approved logon settings and generates alerts.

Suspicious server detection

Detects suspicious activities such as reverse shells, Java processes running CMD commands, and unusual file downloads by using Bash.

Asset fingerprints

Collects up-to-date information about the servers, such as ports, accounts, processes, and applications, to perform event tracking.

Log retrieval

Centrally manages server logs of processes, networks, and system logins. This helps you to use logs to locate the cause of an issue.