If HSS detects a vulnerability on a server, you need to handle the vulnerability in a timely manner based on its severity and your business conditions to prevent the vulnerability from being exploited by intruders.
Vulnerabilities can be handled in the following ways:
If a vulnerability may harm your services, fix it as soon as possible. For Linux and Windows vulnerabilities, you can let HSS fix them in one-click. Web-CMS vulnerabilities and application vulnerabilities cannot be automatically fixed. Handle them by referring to the suggestions provided on the vulnerability details page.
Some vulnerabilities are risky only in specific conditions. For example, if a vulnerability can be exploited only through an open port, but the target server does not open any ports, the vulnerability will not harm the server. If you can confirm that a vulnerability is harmless, you can ignore it. If the vulnerability is detected again in the next vulnerability scan, HSS will still report it.
HSS' vulnerability scan system classifies vulnerability fix priorities into four levels: critical, high, medium, and low. You can refer to the priorities to fix the vulnerabilities that have significant impact on your server first.
Detected vulnerabilities will be displayed in the vulnerability list for seven days, regardless of whether you have handled them.
You can only fix Linux and Windows vulnerabilities with one-click on the console.
A maximum of 1,000 server vulnerabilities can be fixed at a time. If there are more than 1,000 vulnerabilities, fix them in batches.
Locate the row containing a target vulnerability and click Fix in the Operation column.
Select all target vulnerabilities and click Fix in the upper left corner of the vulnerability list to fix vulnerabilities in batches.
To fix all Linux or Windows vulnerabilities, select Select all Linux vulnerabilities or Select all Windows vulnerabilities in the Fix dialog box.
You can also select all target servers and click Fix above the server list to fix vulnerabilities for the servers in batches.
Status |
Description |
---|---|
Unhandled |
The vulnerability is not fixed. |
Ignored |
The vulnerability does not affect your services. You have ignored the vulnerability. |
Verifying |
HSS is verifying whether a fixed vulnerability is successfully fixed. |
Fixing |
HSS is fixing the vulnerability. |
Fixed |
The vulnerability has been successfully fixed. |
Restart required |
The vulnerability has been successfully fixed. You need to restart the server as soon as possible. |
Failed |
The vulnerability fails to be fixed. The possible cause is that the vulnerability does not exist or has been changed. |
Restart the server and try again |
This status is displayed only for vulnerabilities that exist on Windows servers. The vulnerability has not been fixed on the Windows server for a long time. As a result, the latest patch cannot be installed. You need to install an earlier patch, restart the server, and then install the latest patch. |
You can only fix Linux and Windows vulnerabilities with one-click on the console.
You can also select multiple servers and click Fix in the upper part of the vulnerability list. To fix all server vulnerabilities, you can select all servers in the batch fix dialog box.
Only Linux and Windows vulnerabilities can be automatically fixed with one-click. Web-CMS and application vulnerabilities need to be manually fixed by logging in to the server.
Alternatively, you can select all target vulnerabilities and click Fix above the vulnerability list to fix vulnerabilities in batches.
Status |
Description |
---|---|
Unhandled |
The vulnerability is not fixed. |
Ignored |
The vulnerability does not affect your services. You have ignored the vulnerability. |
Verifying |
HSS is verifying whether a fixed vulnerability is successfully fixed. |
Fixing |
HSS is fixing the vulnerability. |
Fixed |
The vulnerability has been successfully fixed. |
Restart required |
The vulnerability has been successfully fixed. You need to restart the server as soon as possible. |
Failed |
The vulnerability fails to be fixed. The possible cause is that the vulnerability does not exist or has been changed. |
Restart the server and try again |
This status is displayed only for vulnerabilities that exist on Windows servers. The vulnerability has not been fixed on the Windows server for a long time. As a result, the latest patch cannot be installed. You need to install an earlier patch, restart the server, and then install the latest patch. |
Some vulnerabilities are risky only in specific conditions. For example, if a vulnerability can be exploited only through an open port, but the target server does not open any ports, the vulnerability will not harm the server. Such vulnerabilities can be ignored.
After the vulnerability is ignored, no alarm will be generated for the vulnerability.
If you evaluate that some vulnerabilities do not affect your services and do not want to view the vulnerabilities in the vulnerability list, you can whitelist the vulnerabilities. After they are whitelisted, the vulnerabilities will be ignored in the vulnerability list and no alarms will be reported. The vulnerabilities will not be scanned and the vulnerability information will not be displayed when the next vulnerability scan task is executed.
HSS will ignore the vulnerability when scanning for vulnerabilities on all servers.
You can also select multiple vulnerabilities and click Add to Whitelist above the vulnerability list.
HSS will ignore the vulnerability when scanning for vulnerabilities on these servers.
You can also select multiple servers and click Add to Whitelist above the server list.
Parameter |
Description |
---|---|
Type |
Select the type of vulnerabilities to be whitelisted. Possible values are as follows:
|
Vulnerability |
Select one or more vulnerabilities to be whitelisted. |
Rule Scope |
Select the servers affected by the vulnerabilities. Possible values are as follows:
|
Remarks (Optional) |
Enter the remarks. |
OS |
Verification Command |
---|---|
CentOS/Fedora /Euler/Redhat/Oracle |
rpm -qa | grep Software_name |
Debian/Ubuntu |
dpkg -l | grep Software_name |
Gentoo |
emerge --search Software_name |