This topic describes the features provided by Security Center and provides links to the related topics.


The Security Center agent is installed on your server. Security Center protects your server only when the agent is online.

To use Security Center, make sure that the agent installed on your server is online.

Security Center agent

Install the Security Center agent

Install the Security Center agent on servers in Alibaba Finance Cloud or VPC

Uninstall the Security Center agent

View the statistics of security overview


Security score

Use container network topology

Entry points to the features of Security Center Ultimate

View and manage the status of assets


View the security status of a server

View the security information of containers

View website status

View the security status of cloud services

View the details of an asset

Enable or disable server protection

Use the security check feature

Manage asset groups

Manage asset tags

Unbind a server not deployed on Alibaba Cloud from Security Center

Configure the container security feature

Container security

Use container network topology

Overview of image security scans

Enable container image scan

Add third-party image repositories to Security Center

Scan container images

View container image scan results

Use the container signature feature

Use threat detection on Kubernetes containers

Use the asset exposure analysis feature

Use the asset exposure analysis feature

Use the anti-ransomware feature


Enable the anti-ransomware feature

Create a protection policy

Manage a protection policy

Create a restoration task

Troubleshoot the abnormal status of the anti-ransomware client

Clear backup caches

Protect servers from viruses


Scan for viruses

Handle virus alerts

Comparison between the virus blocking feature and the anti-virus feature

Configure web tamper proofing

Overview of web tamper proofing

Enable tamper protection

Enable the web tamper proofing feature

Purchase licenses

View the protection status

Add blocked processes to the whitelist

Detect and handle vulnerabilities


Vulnerability priorities

Use the quick scan feature

View and handle Linux software vulnerabilities

View and handle Windows system vulnerabilities

View and handle Web-CMS vulnerabilities

View and handle application vulnerabilities

View and handle urgent vulnerabilities

Configure vulnerability settings

Fix software vulnerabilities

Troubleshoot vulnerability fix failures

Configure and view baseline checks


Baseline checks

Set baseline check policies

Run a baseline check

View and manage baseline risks

Add a check item to the whitelist

Detect and check cloud services


Perform configuration assessment on cloud services

View and manage configuration risks

View and handle alerts


View and handle alert events

View exceptions related to an alert

Use the attack source tracing feature

Use the quarantine feature

Configure blocking policies based on IP addresses

Archive alerts

Export the alert list

Configure security alerts

Cloud threat detection

View information about attack analysis

Attack awareness

Detect the leaks of AccessKey pairs and passwords

Detection of AccessKey pair leaks

Analyze logs


Enable log analysis

Log types and parameters

Use custom log query and analysis

View the distribution of logs within a specific time range

View raw logs

View graphs

Perform quick analysis

Query logs

Log report dashboards

View log reports

Export log data

Advanced settings

Descriptions of log fields

Manage asset fingerprints

Overview of asset fingerprints

Collect asset fingerprints

View asset fingerprints

View security reports

Create a security report

Use the playbook


Create a task

View the details of a task

Configure the container signature feature

Use the container signature feature

Control multiple accounts

Enable multi-account control

Configure features on the Settings page

Overview of features on the Settings page

Use proactive defense

Use the webshell detection feature

Use threat detection on Kubernetes containers

Use adaptive threat detection

Enable automatic alert correlation analysis

Use the security control feature


Manage protection modes

Use the client protection feature

Configure the notification feature

Install or uninstall the Security Center agent

Configuration check of security groups

Security group checks


Pre-sales FAQ

FAQ about pricing

FAQ about the Overview tab of the Security Center console

FAQ about assets

FAQ about proactive defense

FAQ about security control

FAQ about threat detection