All Products
Search
Document Center

Data Security Center:Configure and enable an audit alert rule

Last Updated:Mar 31, 2026

DSC audit alert rules scan your data assets for security threats — including abnormal operations, data leaks, vulnerability exploits, and SQL injections — and send alert notifications when risks are detected. Built-in rules for databases, OSS, and MaxCompute are enabled by default. Create custom rules for fine-grained monitoring across specific databases, tables, fields, sources, or sensitive data types.

Prerequisites

Before you begin, ensure that you have:

Rule types

Rule typeDescription
Built-in rulesDSC provides built-in rules for OSS, MaxCompute, RDS, and PolarDB. These rules are enabled by default and apply automatically to supported asset types.
Custom rulesCreate rules tailored to your environment by filtering on sensitive data type, data sensitivity, database, table, field, source, or database instance. Custom rules are enabled by default after creation.

View built-in audit alert rules

Built-in rules are organized into three policy tabs: Database Policy, OSS Policy, and MaxCompute Policy.

  1. Log on to the Data Security Center console.

  2. In the left-side navigation pane, choose Data Auditing > Native Data Auditing.

  3. On the Policy Management tab, click Database Policy, OSS Policy, or MaxCompute Policy.

  4. In the Rule classification list, select a rule type to view all rules of that type.

    image

  5. In the rule list on the right, review the Rule Name, Rule Type, Risk Level, Status, and Hits columns.

  6. Click Details in the Actions column to view the supported Asset Type and rule configuration details.

    image

Create a custom audit alert rule

If the built-in rules do not cover your monitoring needs, create a custom rule.

Important

The Asset Type you select must be compatible with the Rule Type. If they are incompatible, the rule does not take effect. Check the built-in rules on the Database Policy, OSS Policy, and MaxCompute Policy tabs to confirm which asset types each rule type supports.

  1. On the Policy Management tab, click Custom Policy, then click Add Rule.

  2. In the Add Rule panel, configure the following parameters and click Submit.

ParameterDescription
Basic Information
Rule NameA name for the rule. Use a descriptive name that identifies the rule's purpose.
Rule TypeThe threat category the rule monitors. Valid values: Attempt to Exploit SQL Injections, Bypass Attempt by Using SQL Injections, Stored Procedure Abuse, Buffer Overflow, Error-based SQL Injection, Boolean-based SQL Injection, Time-based SQL Injection, Denial-of-service Vulnerability, Database Detection, Data Breach Attack, Covert Channel Attack, Risky Operation by Application Account, Risk Operation by O&M Engineer, Abnormal Statement, High Traffic Volume, Configuration Operation, Sensitive Data Audit, Union-based SQL Injection, and Other.
Risk LevelThe severity of the alert. Valid values: High, Medium, and Low.
Asset TypeThe type of asset the rule applies to. Must be compatible with the selected Rule Type (see Important note above).
Rule Description(Optional) A description of the rule.
Sensitive Data ModelWhen Asset Type is set to RDS, PolarDB, or Self-Managed Database, configure the sensitive data identification template and model.
AssetThe specific assets the rule applies to, based on the selected asset type.
ClientThe client conditions under which the rule takes effect.
BehaviorThe operation types and status codes that trigger the rule.
ResultThe result conditions under which the rule takes effect. Not supported when Asset Type is set to Redis.

Enable or disable an audit alert rule

Toggle any built-in or custom rule on or off at any time. If you no longer need a rule, you can turn off Status for the rule. To re-use a rule, you can turn on Status for the rule.

  1. On the Policy Management tab, click Database Policy, OSS Policy, MaxCompute Policy, or Custom Policy.

  2. In the rule list, find the rule and toggle the switch in the Status column.

    image

Configure notification settings

To receive alert notifications, configure your notification channels in System Settings > Alert Notification. For more information, see Configure email, phone call, and text message alert notifications.

What's next

After enabling audit alert rules, DSC generates alerts for matching operations. View and handle these alerts on the Audit Alerts page. For more information, see View and handle audit alerts.

To reduce false alerts, add trusted accounts and IP addresses to the whitelist. DSC skips alert generation for operations from whitelisted accounts or IP addresses. For more information, see Manage the whitelist.