All Products
Search
Document Center

Cloud Firewall:Breach detection

Last Updated:Mar 01, 2026

When a server is compromised, Cloud Firewall Breach Detection identifies intrusion events so you can investigate and respond before they cause business losses. Use this page to review security threats by risk level, analyze event details with AI-assisted tools, and enable blocking to prevent further damage.

Prerequisites

Before you begin, make sure that:

Open the Breach Detection page

  1. Log in to the Cloud Firewall console.

  2. In the navigation pane, choose Detection and Response > Breach Detection.

On the Breach Detection page, you can perform the following operations.

image

View and filter intrusion events

The intrusion event list displays the following columns:

ColumnDescription
Risk LevelThe severity of the intrusion event
Event NameThe name of the detected intrusion event
Asset TypeThe type of the affected asset
Instance ID/NameThe ID or name of the affected instance
Affected Asset IP Address/UIDThe IP address and UID of the affected asset
Occurrence TimeThe time when the intrusion event occurred
Handling StatusThe current handling state of the event
AI AnalysisAI-assisted analysis entry point
ActionsAvailable operations for the event

To find a specific event, use the filter options in the menu bar:

  • All Risk Levels: Filter by risk level.

  • All Events: Filter by event type.

  • All Status: Filter by handling status.

  • Ignored/Not Ignored: Filter by whether the event has been ignored.

You can also perform a fuzzy search by instance IP address, ID, name, or UID.

Analyze events with AI

Click the image icon in the AI Analysis column to analyze breach alerts with the Security AI Assistant. The analysis covers three areas:

Analysis componentDescription
Payload content analysisA brief description of the selected alert and the AI analysis results
Attacker intentThe predicted intent of the attacker based on AI analysis
Defense recommendationsSuggestions for Cloud Firewall mitigation settings, such as Access Control List (ACL) policies and intrusion prevention system (IPS) configurations, and asset investigation

View event details

Find the event and click Details in the Actions column to view detailed information about the intrusion event and the corresponding security recommendations.

Ignore an intrusion event

If an intrusion event is normal activity, find the event and click Ignore in the Actions column.

Note

An ignored event is removed from the intrusion event list. Cloud Firewall no longer generates alerts for this event.

Enable Block Mode for the threat engine

After you enable the Internet firewall, Block Mode is enabled for the threat engine by default. If Block Mode is disabled, the Breach Detection page can detect risk events but cannot block them.

To re-enable Block Mode, click Quick Blocking in the Actions column. After you confirm the operation, Cloud Firewall automatically enables the firewall switch, resets IPS rules, and applies the default IPS configuration for the threat engine.

Important

Quick Blocking does not control individual events. Enabling or disabling Quick Blocking toggles the intrusion prevention feature for the entire Cloud Firewall.

References