Vulnerability Management Overview
Vulnerability management can detect Linux, Windows, Web-CMS, application vulnerabilities, and emergency vulnerabilities and provide suggestions, helping you learn about server vulnerabilities in real time. Linux and Windows vulnerabilities can be fixed in one-click mode. This section describes how the vulnerabilities are detected and the vulnerabilities that can be scanned and fixed in each HSS edition.
How Vulnerability Scan Works
Table 1 describes how different types of vulnerabilities are detected.
Type | Mechanism |
---|---|
Linux vulnerability | Based on the vulnerability database, checks and handles vulnerabilities in the software (such as kernel, OpenSSL, vim, glibc) you obtained from official Linux sources and have not compiled, reports the results to the management console, and generates alarms. |
Windows vulnerability | Synchronizes Microsoft official patches, checks whether the patches on the server have been updated, pushes Microsoft official patches, reports the results to the management console, and generates vulnerability alarms. |
Web-CMS vulnerability | Checks web directories and files for Web-CMS vulnerabilities, reports the results to the management console, and generates vulnerability alarms. |
Application vulnerability | HSS detects the vulnerabilities in the software and dependency packages running on servers and container server machines, reports risky vulnerabilities to the console, and displays vulnerability alarms. |
Emergency Vulnerabilities | Checks whether the software and any dependencies running on the server have vulnerabilities through version comparison and POC verification. Reports risky vulnerabilities to the console and provides vulnerability alarms for you. |
Types of Vulnerabilities That Can Be Scanned and Fixed
For details about the types of vulnerabilities that can be scanned and fixed in different HSS editions, see Types of vulnerabilities that can be scanned and fixed in each HSS edition.
The meanings of the symbols in the table are as follows:
- √: supported
- ×: not supported
Vulnerability Type | Function | Enterprise Edition | Premium Edition | Web Tamper Protection Edition | Container Edition |
---|---|---|---|---|---|
Linux vulnerability | Automatic vulnerability scan (daily by default) | √ | √ | √ | √ |
Scheduled vulnerability scan (once a week by default) | √ | √ | √ | √ | |
Vulnerability whitelist | √ | √ | √ | √ | |
Manual vulnerability scan | √ | √ | √ | √ | |
One-click vulnerability fix | √ (A maximum of 50 vulnerabilities can be fixed at a time.) | √ | √ | √ | |
Windows vulnerability | Automatic vulnerability scan (daily by default) | √ | √ | √ | × |
Scheduled vulnerability scan (once a week by default) | √ | √ | √ | × | |
Vulnerability whitelist | √ | √ | √ | × | |
Manual vulnerability scan | √ | √ | √ | × | |
One-click vulnerability fix | √ (A maximum of 50 vulnerabilities can be fixed at a time.) | √ | √ | × | |
Web-CMS vulnerability | Automatic vulnerability scan (daily by default) | √ | √ | √ | √ |
Scheduled vulnerability scan (once a week by default) | √ | √ | √ | √ | |
Vulnerability whitelist | √ | √ | √ | √ | |
Manual vulnerability scan | √ | √ | √ | √ | |
One-click vulnerability fix | × | × | × | × | |
Application vulnerability | Automatic vulnerability scan (weekly by default) | √ | √ | √ | √ |
Scheduled vulnerability scan (once a week by default) | √ | √ | √ | √ | |
Vulnerability whitelist | √ | √ | √ | √ | |
Manual vulnerability scan | √ | √ | √ | √ | |
One-click vulnerability fix | × | × | × | × | |
Emergency vulnerability | Automatic vulnerability scan | × | × | × | × |
Scheduled vulnerability scan (disabled by default) | √ | √ | √ | √ | |
Vulnerability whitelist | × | × | × | × | |
Manual vulnerability scan | √ | √ | √ | √ | |
One-click vulnerability fix | × | × | × | × |
HSS can scan for Web-CMS vulnerabilities, emergency vulnerabilities, and application vulnerabilities but cannot fix them. You can log in to your server to manually fix the vulnerability by referring to the suggestions displayed on the vulnerability details page.
Procedure
- Log in to the management console.
- In the left navigation pane, choose Prediction > Vulnerabilities.Note
If your servers are managed by enterprise projects, you can select an enterprise project to view or operate the asset and scan information.
- How Vulnerability Scan Works
- Types of Vulnerabilities That Can Be Scanned and Fixed
- Procedure