After HSS is enabled, you can configure HSS policies based on your service requirements.
If your servers are managed by enterprise projects, you can select an enterprise project to view or operate the asset and scan information.
Parameter |
Description |
---|---|
Policy Group |
Name of a policy group The preset policy group names are as follows:
|
ID |
Unique ID of a policy group |
Description |
Description of a policy group |
Supported Version |
HSS edition supported by a policy group. |
Associated Servers |
To view details about the servers associated with a policy group, click the number in the Servers column of the group. |
You can click Enable or Disable in the Operation column of a policy. After a policy is disabled, the detection of the policy is not performed.
Parameter |
Description |
---|---|
Software Scanned |
|
Software Search Path |
Path for software search. This parameter is not required for Windows servers. |
Scanned Web Directories |
Specifies a web directory to be scanned. |
Scanned Web Directory Depth |
Specifies the level depth for web directory scanning. |
Weak passwords are not attributed to a certain type of vulnerabilities, but they bring no less security risks than any type of vulnerabilities. Data and programs will become insecure if their passwords are cracked.
HSS proactively detects the accounts using weak passwords and generates alarms for the accounts. You can also add a password that may have been leaked to the weak password list to prevent server accounts from using the password.
Parameter |
Description |
---|---|
Scan Time |
Time point when detections are performed. It can be accurate to the minute. |
Random Deviation Time (s) |
Random deviation time of the weak password based on Scan Time. The value range is 0 to 7200s. |
Scan Days |
Days in a week when weak passwords are scanned. You can select one or more days. |
Detection Break Time (ms) |
Interval between the checks of two accounts. The value range is 0 to 2,000. For example, if this parameter is set to 50, the system checks /bin/ls every 50 milliseconds. |
User-defined Weak Passwords |
You can add a password that may have been leaked to this weak password text box to prevent server accounts from using the password. Enter only one weak password per line. Up to 300 weak passwords can be added. |
Parameter |
Description |
---|---|
Scan Time |
Time point when detections are performed. It can be accurate to the minute. |
Random Deviation Time (Seconds) |
Random deviation time of the system detection. The value ranges from 0 to 7,200s. |
Scan Days |
Day in a week when a detection is performed. You can select any days from Monday to Sunday. |
System Default Baseline Library |
The detection baseline has been configured in the system. You only need to select the baseline you want to scan. All parameters are in their default values and cannot be modified. The parameters are as follows:
|
If User-defined Scan Paths is not specified, the website paths in your assets are scanned by default. If User-defined Scan Paths is specified, only the specified paths are scanned.
Parameter |
Description |
---|---|
Scan Time |
Time point when detections are performed. It can be accurate to the minute. |
Random Deviation Time (Seconds) |
Random deviation time. The value ranges from 0 to 7,200s. |
Scan Days |
Days in a week when web shells are scanned. You can select one or more days. |
User-defined Scan Paths |
Web paths to be scanned. A file path must:
|
Monitored Files Types |
Extensions of files to be checked. Valid values include jsp, jspx, jspf, php, php5, php4. |
Parameter |
Description |
---|---|
File Privilege Escalation |
|
File Integrity |
|
Important File Directory Change |
|
Directory Monitoring Mode |
|
Parameter |
Description |
---|---|
Block Attacking IP Address |
After the function of blocking attacking IP addresses is enabled, HSS blocks the brute-force IP address logins. The agent modifies system configurations to block the source IP addresses of account cracking attacks.
|
Lock Time (Min.) |
This parameter is used to determine how many minutes the brute-force attacks are locked. The value range is 1 to 43,200 min. (Login is not allowed in the lockout duration.) |
Cracking Behavior Determination Threshold (s) |
This parameter is used together with Cracking Behavior Determination Threshold (Login Attempts). The value range is 5 to 3,600. For example, if this parameter is set to 30 and Cracking Behavior Determination Threshold (Login Attempts) is set to 5, the system determines that an account is cracked when the same IP address fails to log in to the system for five times within 30 seconds. |
Cracking Behavior Determination Threshold (Login Attempts) |
This parameter is used together with Cracking Behavior Determination Threshold. The value range is 1 to 36,000. |
Threshold for slow brute force attack (second) |
This parameter is used together with Threshold for slow brute force attack (failed login attempt). The value range is 600 to 86,400s. For example, if this parameter is set to 3600 and Threshold for slow brute force attack (failed login attempt) is set to 15, the system determines that an account is cracked when the same IP address fails to log in to the system for fifteen times within 3,600 seconds. |
Threshold for slow brute-force attack (failed login attempt) |
This parameter is used together with Threshold for slow brute force attack (second). The value range is 6 to 100. |
Cracking Behavior Determination Release Time (s) |
Interval for clearing login failure records generated due to cracking. The value range is 60 to 86,400s. The unblocked IP addresses are those that triggered brute-force alarms. |
Check Whether the Audit Login Is Successful |
|
Parameter |
Description |
---|---|
Whitelist Paths in Reverse Shell Check |
Process file path to be ignored in reverse shell detection Start with a slash (/) and end with no slashes (/). Occupy a separate line and cannot contain spaces. |
Reverse Shell Scanning Interval (s): |
Reverse shell scanning period. The value range is 30 to 86,400. |
Audit detection enhancement |
|
Max. open files per process |
Maximum number of files that can be opened by a process. The value range is 10 to 300,000. |
Detect Reverse Shells |
|
Auto-block Reverse Shells |
Specifies whether to enable automatic blocking of reverse shells. You are advised to enable this function.
|
Abnormal Shell Detection |
|
Parameter |
Description |
Example Value |
---|---|---|
Detection and Scanning Cycle (Seconds) |
Interval for checking the running programs on the host. The value range is 30 to 1,800. |
1800 |
Detection Mode |
Select the method for abnormal process behavior detection.
|
Balanced |
Threshold for Score Reporting |
Score reporting threshold. The value range is 1 to 100. |
3 |
Parameter |
Description |
---|---|
Full Process Report Interval (s) |
Interval for reporting the full process. The value range is 3,600 to 86,400. |
High-Risk Commands |
High-risk commands that contain keywords during detection. |
Whitelist (Do Not Record Logs) |
Paths or programs that are allowed or ignored during detection. You can enter the regular expression of the command to be added to the whitelist. The command regular expression is optional. |
Parameter |
Description |
Example Value |
---|---|---|
Scanning Interval (s) |
Interval for executing the check policy. The value ranges from 60 to 86,400. |
86400 |
Check Library |
Check files and folders in the existing libraries. You are advised to enable this function.
|
|
Check Kernel Space |
Perform the check by kernel modules. All kernel modules will be checked. You are advised to enable this function.
|
|
Kernel Module Whitelist |
Add the kernel modules that can be ignored during the detection. Up to 10 kernel modules can be added. Each module occupies a line. |
xt_conntrack virtio_scsi tun |
Parameter |
Description |
Example Value |
---|---|---|
Real-Time Protection |
After this function is enabled, AV detection is performed in real time when the current policy is executed. You are advised to enable this function.
|
|
Protected File Type |
Type of the files to be checked in real time.
|
All |
Action |
Handling method for the object detection alarms.
|
Automatic handling |
The whitelist has a higher priority than blacklist. If a directory is specified in both the whitelist and blacklist, it is regarded as a whitelisted item.
Parameter |
Description |
Example Value |
---|---|---|
Mount Path Whitelist |
Enter the directory that can be mounted. |
/test/docker or /root/* Note: If a directory ends with an asterisk (*), it indicates all the sub-directories under the directory (excluding the main directory). For example, if /var/test/* is specified in the whitelist, all sub-directories in /var/test/ are whitelisted, excluding the test directory. |
Mount Path Blacklist |
Enter the directories that cannot be mounted. For example, user and bin, the directories of key host information files, are not advised being mounted. Otherwise, important information may be exposed. |
Parameter |
Description |
Example Value |
---|---|---|
Basic Detection Cases |
Select basic check items as required. |
Select all |
Whitelist |
You can customize the types and values that need to be ignored during the detection. You can add and delete types and values as required. The following types are supported:
|
Type: IP address filtering Value: 192.168.x.x |
After this policy is configured, you need to enable the log audit function and deploy the HSS agent on the management node (node where the APIServer is located) of the cluster to make the policy take effect.
If a monitored file path is under the mount path rather than the writable layer of the container on the server, changes on the file cannot trigger container file modification alarms. To protect such files, configure a file protection policy.
Parameter |
Description |
Example Value |
---|---|---|
Fuzzy match |
Indicates whether to enable fuzzy match for the target file. You are advised to select this option. |
Selected |
Block New Executable |
Monitor the behavior of the adding executable files. If this option is selected, adding executable files is prohibited. You are advised to select this option. |
Selected |
Image Name |
Name of the target image to be checked |
test_bj4 |
Image ID |
ID of the target image to be checked |
- |
File |
Name of the file in the target image to be checked |
/tmp/testw.txt |
Parameter |
Description |
Example Value |
---|---|---|
Fuzzy Match |
Indicates whether to enable fuzzy match for the target file. You are advised to select this option. |
Selected |
Image Name |
Name of the target image to be detected |
test_bj4 |
Image ID |
ID of the target image to be checked |
- |
File |
Path of the file in the target image to be checked |
/tmp/testw |
Parameter |
Description |
Example Value |
---|---|---|
Rule Name |
Name of a rule |
- |
Description |
Brief description of a rule |
- |
Template |
|
- |
Permissions Name |
Description |
---|---|
AUDIT_WRITE |
Write records to kernel auditing log. |
CHOWN |
Make arbitrary changes to file UIDs and GIDs. |
DAC_OVERRIDE |
Bypass file read, write, and execute permission checks. |
FOWNER |
Bypass permission checks on operations that normally require the file system UID of the process to match the UID of the file. |
FSETID |
Do not clear set-user-ID and set-group-ID permission bits when a file is modified. |
KILL |
Bypass permission checks for sending signals |
MKNOD |
Create special files using mknod. |
NET_BIND_SERVICE |
Bind a socket to internet domain privileged ports (port numbers less than 1024). |
NET_RAW |
Use RAW and PACKET sockets. |
SETFCAP |
Set file capabilities. |
SETGID |
Make arbitrary manipulations of process GIDs and supplementary GID list. |
SETPCAP |
Modify process capabilities. |
SETUID |
Make arbitrary manipulations of process UIDs. |
SYS_CHROOT |
Use chroot to change the root directory. |
AUDIT_CONTROL |
Enable and disable kernel auditing; change auditing filter rules; retrieve auditing status and filtering rules. |
AUDIT_READ |
Allow reading audit logs via multicast netlink socket. |
BLOCK_SUSPEND |
Allow suspension prevention. |
BPF |
Allow creating BPF maps, loading BPF Type Format (BTF) data, retrieve JITed code of BPF programs, and more. |
CHECKPOINT_RESTORE |
Allow operations related to checkpoints and restoration. |
DAC_READ_SEARCH |
Bypass file read permission checks and directory read and execute permission checks. |
IPC_LOCK |
Lock memory (such as mlock, mlockall, mmap, and shmctl). |
IPC_OWNER |
Bypass permission checks for operations on System V IPC objects. |
LEASE |
Establish leases on arbitrary files |
LINUX_IMMUTABLE |
Set the FS_APPEND_FL and FS_IMMUTABLE_FL i-node flags. |
MAC_ADMIN |
Allow MAC configuration or state changes. |
MAC_OVERRIDE |
Override Mandatory Access Control (MAC). |
NET_ADMIN |
Perform various network-related operations. |
NET_BROADCAST |
Make socket broadcasts, and listen to multicasts. |
PERFMON |
Allow privileged system performance and observability operations using perf_events, i915_perf and other kernel subsystems. |
SYS_ADMIN |
Perform a range of system administration operations. |
SYS_BOOT |
Use reboot and kexec_load. Reboot and load a new kernel for later execution. |
SYS_MODULE |
Load and unload kernel modules. |
SYS_NICE |
Raise process nice value (nice, set priority) and change the nice value for arbitrary processes. |
SYS_PACCT |
Enable or disable process accounting. |
SYS_PTRACE |
Trace arbitrary processes using ptrace. |
SYS_RAWIO |
Perform I/O port operations (ipl and ioperm). |
SYS_RESOURCE |
Override resource limits. |
SYS_TIME |
Set the system clock (settimeofday, stime, and adjtimex) and real-time (hardware) clock. |
SYS_TTY_CONFIG |
Use vhangup. Employ various privileged ioctl operations on virtual terminals. |
SYSLOG |
Perform privileged syslog operations. |
WAKE_ALARM |
Trigger something that will wake up the system. |
Parameter |
Description |
Example Value |
---|---|---|
Process Information Collection Interval (s): |
Interval for obtaining processes |
Selected |
Source IP Address Whitelist |
Enter the IP address whitelist. Separate multiple IP addresses with semicolons (;). |
test_bj4 |
Packet Quantity Threshold |
- |
- |
Ports to Scan |
Details about the port number and protocol type to be detected |
- |