This topic provides suggestions on how to fix baseline configuration risks on the server.
Only enterprise edition, premium edition, web tamper protection edition, and container edition are supported.
If your servers are managed by enterprise projects, you can select an enterprise project to view or operate the asset and scan information.
Parameter |
Description |
---|---|
Baseline check policy |
Available baseline check policies that have been added. You can select, create, edit, and delete these policies. |
Scanned servers |
Total number of detected servers. |
Security baselines |
Number of baselines executed during the server detection. |
Baseline check items |
Total number of checked server configuration items. |
Safe settings rate |
Percentage of configuration items that passed the baseline check to the total number of check items. Failed items are displayed by risk level. |
Top 5 servers with unsafe settings |
Statistics on servers with server configuration risks. The top 5 servers with the highest risks are preferentially sorted. If no high-risk settings exist, the servers are sorted into medium-risk and low-risk ones in sequence. |
Servers with weak passwords |
Total number of detected servers, as well as the numbers of servers with weak passwords, those without weak passwords, and those with weak password detection disabled. |
Top 5 servers with weak passwords |
Statistics on the top 5 servers with most weak password risks. |
Unsafe configuration |
Alarms generated for servers with configuration risks and the risk statistics. |
Password complexity policies |
Statistics on servers with weak passwords that do not meet the baseline requirements. |
Common weak passwords |
Statistics on servers with weak passwords and accounts. |
Parameter |
Description |
---|---|
Risk level |
Level of a detection result.
|
Baseline name |
Name of the baseline that is checked. |
Type |
Policy type of the baseline that has been checked.
|
Check item |
Total number of configuration items that are checked. |
Risky item |
Total number of the risky configurations. |
Affected servers |
Total number of servers affected by the detected risks in a baseline. |
Last scanned |
Time when the last detection was performed. |
Description |
Description of a baseline. |
Click Ignore in the Operation column of the target check item to ignore a check item. Select multiple check items and click Ignore to ignore them in batches.
The status changes to Verifying. The system starts automatic verification. After the verification is complete, check the status. If a check item failed to be fixed, click View Cause to view the cause. Then, fix it again.
Parameter |
Description |
---|---|
Server |
Name and IP address of the detected server. |
Password length |
Whether the password length of the target server meets the requirements.
|
Uppercase letters |
Whether the uppercase letters used in the target server password meet the requirements.
|
Lowercase letters |
Whether the lowercase letters used in the target server password meet the requirements.
|
Digits |
Whether the digits used in the target server password meet the requirements.
|
Special characters |
Whether the special characters used in the target server password meet the requirements.
|
Suggestion |
Suggestion for fixing unsafe passwords |
If you do not perform a manual verification, HSS will automatically check the settings at 00:00:00 the next day.
If you do not perform a manual verification, HSS will automatically check the settings at 00:00:00 the next day.