Document Center

    Security Center

    • Release notes
    • Documentation overview
    • Product Introduction
      • What is Security Center?
      • Benefits
      • Features
      • Scenarios
      • Limits
      • Information collection scope
      • FAQ
      • Terms
    • Pricing
      • Billing methods
      • Apply for a free trial of Security Center Enterprise
      • Purchase Security Center
      • Renew the subscription to Security Center
      • Upgrade and downgrade Security Center
      • FAQ
    • Quick Start
      • Configure best practices tasks
      • Get started
      • Configure common features
    • Access Cloud Security Center
      • Security Center agent overview
      • Install the Security Center agent
      • Install the agent on servers in private networks
      • Uninstall the Security Center agent
      • Troubleshoot why the Security Center agent is offline
    • Overview of Console
      • Overview
      • Security scores
      • FAQ
    • Assets
      • Overview
      • View the security status of a server
      • View the security information of containers
      • View website status
      • View the security status of cloud services
      • View the details of an asset
      • Enable and disable server protection
      • Use the security check feature
      • Manage asset groups
      • Manage asset tags
      • Disassociate an external server
      • FAQ
    • Container security
    • Defense
      • Anti-ransomware protection
        • Anti-ransomware overview
        • Enable the anti-ransomware feature
        • Create a protection policy
        • Manage a protection policy
        • Create a restoration task
        • Troubleshoot the abnormal status of the anti-ransomware client
      • Anti-Virus
        • Overview
        • Scan for viruses
        • Handle virus alerts
        • Comparison between virus blocking and the anti-virus feature
      • Website tamper-proofing
        • Overview
        • Enable tamper protection
        • Enable the web tamper proofing feature
        • Purchase licenses
        • View the protection status
        • Add blocked processes to the whitelist
      • Application whitelist
      • FAQ
    • Precautions
      • Vulnerabilities
        • Overview
        • Vulnerability priorities
        • Quick scan
        • Linux software vulnerabilities
        • Windows system vulnerabilities
        • Web-CMS vulnerabilities
        • Application vulnerabilities
        • Emergency vulnerability detection
        • Configure vulnerability settings
        • Fix software vulnerabilities
        • Troubleshoot vulnerability fix failures
      • Baseline check
        • Overview
        • Baseline checks
        • Set baseline check policies
        • Run a baseline check
        • View and manage baseline risks
        • Add a check item to the whitelist
      • Cloud platform configuration assessment
        • Overview
        • Perform configuration assessment on cloud services
        • View and manage configuration risks
      • Image security scans
        • Configure image security scanning
      • FAQ
    • Threat Detection
      • Events
        • Overview
        • Alerts
        • View and handle alert events
        • Archive alerts
        • View exceptions related to an alert
        • Use the attack source tracing feature
        • Configure IP blocking policy
        • Use the quarantine feature
        • Export the alert list
        • Configure security alerts
        • Cloud threat detection
      • Attack awareness
      • AccessKey pair leak detection
      • FAQ
    • Investigation
      • Log analysis
        • Limits
        • Activate log analysis
        • Log types and parameters
        • Real-time log analysis
          • Use custom log query and analysis
          • View the distribution of log dates
          • View raw logs
          • View statistics graphs
          • Quick analysis
          • Query logs
        • View log report dashboards
        • View log report
        • Export logs
        • Advanced settings
        • Descriptions of log fields
      • Asset fingerprint
        • Overview of asset fingerprints
        • Collect asset fingerprint data
        • View asset fingerprints data
    • Operation
      • Security reports
      • Task management
        • Playbook overview
        • Create a task
        • View task details
      • Use the container signature feature
      • Multi-account control
    • Settings
      • Feature Settings
        • Settings
      • Use the notification feature
      • Install and uninstall the Security Center agent
      • FAQ
    • Application market
      • Classified protection compliance checks
      • Security group checks
    • Service agreement
      • Security Center Service Level Agreement (SLA)
      • Security Center Terms of Service
    • Best Practices
      • Create custom policies and attach the policies to RAM users
      • Understand ECS security posture
      • Improve the security score
      • Best practices for MongoDB vulnerability detection
      • Best practices to prevent AccessKey pair and password leak
      • Fix the remote code execution vulnerability (CVE-2019-0708) of Windows RDP
      • Fix Linux software vulnerabilities
      • Detect and remove Trojans in Linux
      • Best practices for managing mining programs
      • Best practices for defense against trojan attacks
      • Install the Security Center agent on multiple Alibaba Cloud ECS instances
      • Install the Security Center agent on external instances
      • Use Security Center to protect servers in on-premises data centers
    • API Reference
      • List of operations by function
      • Request method
      • Common parameters
      • Asset management
        • DescribeAllEntity
        • DescribeFieldStatistics
        • DescribeGroupedTags
        • DescribeAllGroups
        • DeleteGroup
        • CreateOrUpdateAssetGroup
        • ModifyTagWithUuid
        • DescribeInstanceStatistics
        • DescribeCloudProductFieldStatistics
        • DescribeDomainCount
        • DescribeDomainList
        • DescribeDomainDetail
        • DescribeCloudCenterInstances
        • DescribeSummaryInfo
        • DescribeSearchCondition
        • DescribeAssetDetailByUuid
        • DescribePropertyUsageNewest
        • DeleteTagWithUuid
        • ModifyPushAllTask
        • DescribeCriteria
        • DescribeExportInfo
        • DescribeAssetDetailByUuids
        • DescribeImageStatistics
        • ModifyLoginBaseConfig
        • DescribeSasAssetStatisticsColumn
        • ModifyLoginSwitchConfig
        • DeleteLoginBaseConfig
        • DescribeContainerStatistics
      • Container management
        • DescribeGroupedContainerInstances
      • Security score
        • DescribeSecureSuggestion
      • Alerts
        • DescribeAlarmEventList
        • DescribeAlarmEventDetail
        • DescribeSuspEvents
        • DescribeSuspEventDetail
        • HandleSimilarSecurityEvents
        • DescribeSecurityEventOperations
        • CreateSimilarSecurityEventsQueryTask
        • DescribeSimilarSecurityEvents
        • RollbackSuspEventQuaraFile
        • DescribeSuspEventQuaraFiles
        • DescribeSecurityEventOperationStatus
        • DescribeSimilarEventScenarios
        • OperationSuspEvents
        • DescribeUserLayoutAuthorization
        • HandleSecurityEvents
        • DescribeSecurityStatInfo
      • Configuration Assessment
        • DescribeRiskItemType
        • StartBaselineSecurityCheck
        • DescribeRiskCheckSummary
        • ModifyRiskCheckStatus
        • DescribeRiskCheckResult
        • DescribeSecurityCheckScheduleConfig
        • ModifyRiskSingleResultStatus
        • ModifySecurityCheckScheduleConfig
        • DescribeRiskListCheckResult
        • DescribeRiskCheckItemResult
      • Brute-force attacks protection
        • ModifyAntiBruteForceRule
        • ModifyInstanceAntiBruteForceRule
        • DescribeBruteForceSummary
        • DescribeInstanceAntiBruteForceRules
        • DescribeAntiBruteForceRules
      • Vulnerabilities
        • ModifyVulTargetConfig
        • DescribeVulList
        • DescribeEmgVulGroup
        • DescribeVulWhitelist
        • DescribeConcernNecessity
        • DescribeGroupedVul
        • ModifyCreateVulWhitelist
        • DescribeAutoDelConfig
        • ModifyOperateVul
        • ModifyEmgVulSubmit
        • DescribeImageVulList
        • ModifyStartVulScan
        • StartImageVulScan
      • Image security scans
        • DescribeAffectedMaliciousFileImages
        • DescribeGroupedMaliciousFiles
      • Baselines
        • DescribeCheckWarningSummary
        • DescribeStratety
        • DescribeStrategyExecDetail
        • DescribeCheckWarnings
        • DescribeCheckWarningDetail
        • DescribeWarningMachines
        • ValidateHcWarnings
        • DescribeCheckEcsWarnings
        • DescribeUserBaselineAuthorization
        • FixCheckWarnings
        • IgnoreHcCheckWarnings
      • Asset fingerprints
        • DescribePropertyCronDetail
        • DescribePropertySoftwareItem
        • DescribePropertyUserItem
        • DescribeModuleConfig
        • DescribePropertyCount
        • DescribePropertyPortDetail
        • DescribePropertyPortItem
        • DescribePropertyProcDetail
        • DescribePropertyProcItem
        • DescribePropertyScaDetail
        • DescribePropertySoftwareDetail
        • DescribePropertyUserDetail
      • Notifications
        • DescribeDingTalk
        • DescribeNoticeConfig
      • Agent client
        • SasInstallCode
        • PauseClient
      • Export check results
        • ExportRecord
      • Virus detection
        • OperateSuspiciousTargetConfig
      • Tamper protection
        • DescribeWebLockConfigList
        • DescribeWebLockBindList
        • ModifyWebLockDeleteConfig
        • ModifyWebLockCreateConfig
        • ModifyWebLockUpdateConfig
        • ModifyWebLockStart
        • ModifyWebLockStatus
      • Latest release
        • DescribeDialogMessages
    • General Reference
      • Guidelines for the use of documentation
        • Alibaba Cloud documentation
        • Instructions for open source documentation
          • Open-Source Documentation Code of Conduct
          • Editing Open-Source Documentation
      • Alibaba Cloud console
      • Regions and zones
      • Service limits
      • Create an AccessKey pair
      • ICP Filing
      • Glossary
 
All Products
Search
  • Document Center
  • Security Center
  • Service agreement
  • Security Center Terms of Service

This Product

  • This Product
  • All Products

    Security Center Terms of Service

    Document Center
    Product Details

    Security Center Terms of Service

    Last Updated: Jun 17, 2020

    Security Center Terms of Service

    Previous: Security Center Service Level Agreement (SLA) Next: Create custom policies and attach the policies to RAM users

    How helpful was this page?

    What might be the problems?

      More suggestions?

      Thank you! We've received your feedback.
      Free Trial Free Trial