Ali cloud Ann Knight is subjected to a stability test of one million host mainframe security reinforcement products, support for automated real-time intrusion threat detection, virus killing, smart repair vulnerabilities, a key baseline examination, tamper-resistant features such as web pages, it is to build the host unified management platform security line of defense.
Functional differences between Enterprise Edition and Ann Knight basic version with the following identification mark:
the X-: represents not included in the scope of the service.
√: representation included in the scope of the service.
Detected only: it indicates that the version provides only detection function does not provide other functions such as processing or repair.
Features | Functional items | description | Basic Edition | Enterprise Edition |
Safety Precautions | Vulnerability Management | Linux software vulnerabilities: Benchmarking CVE official vulnerability database, automatically detect and provide rehabilitation program. | Only detects | √ |
Window vulnerabilities: Microsoft's official website synchronous patches automatically detects and supports one-click fix. | Only detects | √ | ||
Web-CMS vulnerabilities: from the research bug fixes, support for a key repair 0 day vulnerabilities. | Only detects | √ | ||
Detection cycle: automatic detection once every other day vulnerabilities. Other vulnerabilities: vulnerabilities such as software configuration type, system components type vulnerabilities, supports automatic detection. | √ | √ | ||
Baseline measurement (to be launched Enterprise Edition) | Account security detection: the detection server exists on the left after hacking accounts, to the shadow account, hidden accounts, clone accounts, while the password policy compliance, systems and applications to detect weak passwords. | X | √ | |
Detection System Configuration: Group Policy, landing baseline strategy, risk registry configuration. | X | √ | ||
Database Risk Detection: |