This document describes the features of different CWPP editions.
The features of different CWPP editions are listed below.
Category | Feature | Description | CWPP Basic Free of charge |
CWPP Pro Monthly subscription: 12 USD/license/month |
CWPP Ultimate Monthly subscription: 27 USD/license/month |
---|---|---|---|---|---|
Security Dashboard | Security Dashboard | Displays the health score, protection status, pending risks, risk trend, and new security incidents in real time. | ✓ | ✓ | ✓ |
Asset Management | Asset Dashboard | Displays the statistics of all servers and asset fingerprints, as well as top 5 accounts, ports, processes, software applications, databases, Web applications, Web services, Web frameworks, and Web sites. | ✓ | ✓ | ✓ |
Server List | Displays the information of all servers connected to CWPP, helping you get a full picture of the security status of your assets. | ✓ | ✓ | ✓ | |
Asset Fingerprint | Provides detailed asset inventory data about server resource monitoring, accounts, ports, and processes and helps you quickly investigate the risks of security events that have occurred. | × | ✓ Supports 10 kinds of fingerprints |
✓ Supports 15 kinds of fingerprints |
|
Intrusion Detection | |||||
Malicious File Scan |
|
✓ Detects at most 5 risks for free |
✓ Supports detection (no auto isolation) |
✓ Supports detection, and auto isolation |
|
Password Cracking |
|
✓ Supports detection only (no blocking) |
✓ Supports detection and auto blocking |
✓ Supports detection and auto blocking |
|
Unusual Login |
|
✓ | ✓ | ✓ | |
Malicious Requests | Detects the server's internal or external connection requests with malicious domain names in real time, provides threat source information and event records, and sends alarms automatically to users. | × | ✓ | ✓ | |
Local Privilege Escalation |
|
× | ✓ | ✓ | |
Reverse Shell |
|
× | ✓ | ✓ | |
High-risk Commands |
|
× | ✓ | ✓ | |
Vulnerability Management | Urgent Vulnerability |
|
✓ Detects at most 5 risks for free |
✓ Supports detection (no fixing) |
✓ Supports detection and partial fixing |
Linux Software Vulnerability |
|
||||
Windows System Vulnerability |
|
||||
Web-CMS Vulnerability |
|
||||
Application Vulnerability |
|
||||
Security Baseline | CIS Baseline Standard |
|
✓ Detects at most 5 risks for free |
✓ Supports detection (no customization) |
✓ Supports detection and customization |
Tencent Cloud Baseline Standard | |||||
Weak Password Baseline | |||||
Advanced Defense | Core File Monitoring | You can configure monitoring rules for core files and view and process monitoring events. You can also configure the allowlist to allow permitted access to files. (Only operating systems with Linux kernel 3.10 or above are supported.) | × | × | ✓ |
Settings | Alarm Notification | Supports alarm notifications via SMS and email, and lists of alarm events. | ✓ | ✓ | ✓ |
License Management | If you have purchased the CWPP Pro or CWPP Ultimate, you can bind the server to upgrade its protection level on the License Management page. You can also unbind an upgraded server. | ✓ | ✓ | ✓ | |
Performance | Resource Consumption | Each agent requires low resource usage with CPU usage below 5% and memory below 30 MB, which does not affect the system performance. | ✓ | ✓ | ✓ |
High Stability | With a high-reliability and high-stability system, CVM can implement mechanisms such as downgrade or suicide to ensure the availability of your business. | ✓ | ✓ | ✓ | |
Multi-Operating System Support | Compatible with major operating systems such as Windows, CentOS, Debian, and RedHat. | ✓ | ✓ | ✓ |
Was this page helpful?