Skip to content

Host Security Features Introduction

Log in to the backend and enter the host security interface, as shown in the figure

Complete Feature Set:

Asset Inventory, Risk Discovery, Intrusion Detection, Compliance Baseline, Micro Honeypot, Memory Backdoor, File Integrity, Security Dashboard, Virus Detection, Situational Awareness Platform

Asset Inventory

The Asset Inventory function allows users to customize time periods according to their needs, automatically build fine-grained asset information, and conduct comprehensive inventory of host assets, application assets, and Web assets. This ensures users can monitor all host asset situations in real-time, including Web, systems, processes, ports, accounts, and software applications.

Risk Discovery

The Risk Discovery function analyzes potential risks and compliance issues within the system through fine-grained analysis, promptly identifying Web application vulnerabilities, weak passwords, risk files, and misconfigurations. It generates analysis reports with detailed remediation suggestions, making security management clear and measurable. Security policies are established based on business needs to build a complete, customized security system.

Intrusion Detection

By placing characteristic anchor points along the necessary paths of hacker intrusion, analyzing hacker behavior based on behavioral patterns and key models, and combining the latest threat intelligence, intrusion behaviors are detected immediately to minimize enterprise losses.

Compliance Baseline

The Compliance Baseline builds benchmark requirements composed of domestic information security level protection requirements and CIS (Center for Internet Security), covering multiple versions of mainstream operating systems, Web applications, and databases. Combined with these baseline contents, on one hand, users can quickly conduct internal risk self-testing, identify and fix issues promptly to meet regulatory security requirements; on the other hand, enterprises can define their own baseline standards as security benchmarks for internal management.