Benefits
Baseline check
Performs security baseline checks for Elastic Compute Service (ECS) instances. The check items include accounts, weak passwords, and at-risk configuration items. The baseline checks ensure that the ECS instances comply with the security standards for enterprise servers.
Vulnerability management
Provides quick fixes for critical vulnerabilities in applications and operating systems on your ECS instances.
Web shell detection and removal
Detects and removes web shells based on specified rules, and allows you to manually quarantine web shells.
Brute-force attack blocking
Detects and blocks brute-force attacks in real-time.
Unusual login alerting
Detects unusual logons based on the approved logon settings and generates alerts.
Suspicious server detection
Detects suspicious activities such as reverse shells, Java processes running CMD commands, and unusual file downloads by using Bash.
Asset fingerprints
Collects up-to-date information about the servers, such as ports, accounts, processes, and applications, to perform event tracking.
Log retrieval
Centrally manages server logs of processes, networks, and system logins. This helps you to use logs to locate the cause of an issue.