nav-img
Advanced

Checking or Creating a Policy Group

You can group policies and servers to batch apply policies to servers, easily adapting to business scenarios.

Precautions

  • When you enable the enterprise edition, the default policy group of this edition (including weak password and website shell detection policies) takes effect for all your servers.
  • When you enable the premium or WTP edition, the edition is bound to default_premium_policy_group.

    To create your own policy group, you can copy the default policy group and add or remove policies in the copy.

Policy List

Policy

Action

Supported OS

Enterprise Edition

Premium Edition

WTP Edition

Weak password detection

Change weak passwords to stronger ones based on HSS scan results and suggestions.

Linux and Windows

(Check only custom weak passwords)

Web shell detection

Scan web directories on servers for web shells.

Linux and Windows

(Check only specified detection paths)

Assets

Scan and display all software in one place, including software name, path, and major applications, helping you identify abnormal assets.

Linux and Windows

×

System configuration detection

Check for unsafe Tomcat, Nginx, and SSH login configurations.

Linux and Windows

×

High-risk command detection

Check executed commands in real time and generate alarms if high-risk commands are detected.

Linux

×

Privilege escalation detection

Detect privilege escalation for processes and files in the current system.

The following abnormal privilege escalation operations can be detected:

  • Root privilege escalation by exploiting SUID program vulnerabilities
  • Root privilege escalation by exploiting kernel vulnerabilities
  • File privilege escalation

Linux

×

Abnormal shell detection

Detect actions on abnormal or reverse shells, including moving, copying, and deleting shell files, and modifying the access permissions and hard links of the files.

Linux

×

File integrity monitoring

Check the files in the Linux OS, applications, and other components to detect tampering.

Linux

×

Accessing the Policies Page

  1. Log in to the management console.
  1. In the upper left corner of the page, select a region, click , and choose Security > Host Security Service.
  2. In the navigation pane, choose Security Operations > Policies.

Checking the Policy Group List

  1. Go to the Policies page, as shown in Figure 1. For more information, see Table 1.

    Note
    • default_enterprise_policy_group is the default policy group of the enterprise edition. This policy group can only be viewed, and cannot be copied or deleted.
    • default_premium_policy_group is the default policy group of the premium edition. You can create a policy group by copying this default group and modify the copy.
    • To refresh the list, click in the upper right corner.
    • To view details about the servers associated with a policy group, click the number in the Servers column of the group.

    Figure 1 Policy group list


    Table 1 Policy group parameters

    Parameter

    Description

    Policy Group Name

    Name of a policy group

    ID

    Unique ID of a policy group

    Description

    Description of a policy group

    Supported Version

    HSS edition supported by a policy group

  2. Click the name of a policy group to check policy details, including the names, statuses, function categories, OS type of the policies, as shown in Figure 2.

    Note
    • By default, all policies in the groups default_enterprise_policy_group and default_premium_policy_group are enabled.
    • You can click Enable or Disable in the Operation column of a policy to control what to check.

    Figure 2 Policy group details


  3. Click the name of a policy to check its details. Figure 3 shows the Weak Password Detection policy as an example.

    Note

    For details about how to modify a policy, see Modifying a Policy.

    Figure 3 Policy details


Creating a Policy Group

  1. In the row where default_premium_policy_group (default policy group of the premium edition) resides, click Copy in the Operation column, as shown in Figure 4.

    Figure 4 Copying a policy group


  2. In the dialog box displayed, enter a policy group name and description, and click OK, as shown in Figure 5.

    Note
    • The name of a policy group must be unique, or the group will fail to be created.
    • The policy group name and its description can contain only letters, digits, underscores (_), hyphens (-), and spaces, and cannot start or end with a space.

    Figure 5 Creating a policy group


  3. Click OK.
  4. Click the name of the policy group you just created. The policies in the group will be displayed, as shown in Figure 6.

    Figure 6 Policies in a group


  5. Click a policy name and modify its settings as required. For details, see Modifying a Policy.
  6. Enable or disable the policy by clicking the corresponding button in the Operation column.

Follow-Up Procedure

Deleting a policy group

After a policy group is deleted, the Policy Group column of the servers that were associated with the group will be blank.

  1. Select one or more policy groups to be deleted and click Delete, as shown in Figure 7.

    Figure 7 Deleting policy groups


    Note

    You can also click Delete in the Operation column of a policy group to delete it.

  2. In the displayed dialog box, click OK.