All Products
Search
Document Center

Data Security Center:View and handle audit alerts

Last Updated:Nov 18, 2025

The Audit Alerts page displays audit alerts for data assets based on the configured audit modes and alert rules. You can use the alert details to identify and trace risks, such as abnormal database operations, vulnerability attacks, and data breaches. This topic describes how to view audit alerts for data assets. This helps you understand the risk status of your assets and handle the identified risks.

Prerequisites

View audit alert information

  1. Log on to the Data Security Center console.

  2. In the navigation pane on the left, choose Data Auditing > Native Data Auditing.

  3. On the Risk Detection tab, view the statistics on the Alert Overview and Alert Logs subtabs.

Alert overview

  • This tab displays the Audit Risk Score, which is calculated based on the cumulative alert data from the last 24 hours. It also lists the deduction rules and actual deductions. If no new alerts are detected within 24 hours, your Audit Risk Score increases.

    image

  • This tab displays real-time alert information for data assets. You can click Details in the Actions column to view suggested actions, a list of assets, and a list of access sources.

    image

Alert logs

  1. Above the alert list, select a data type, such as RDS, from the Current Data Type drop-down list. By default, the audit alert information for the selected asset type from the last day is displayed.

    image

  2. You can filter alerts by time range, instance name, risk level, operation type, rule classification, rule name, account, client IP address, and SQL command.

    image

  3. Click Details in the Actions column to view the alert time, client information, server information, behavior information, and execution result to identify the risk.

    You can click One-Click screenshot to save a screenshot of the alert details to the default download path of your browser.

    image

Handle audit alert events

  • If you confirm that an alert event poses a threat to data security, use the alert log to locate where the event occurred and manually handle the threat on the corresponding data asset.

  • If you confirm that an alert event is a normal operation and requires no action, you can add the event to the whitelist. Data Security Center (DSC) no longer generates alerts for this type of event on the data asset.

Add to the whitelist

Follow these steps to add an alert event to the whitelist. The accounts, IP addresses, and other information that you add to the whitelist are displayed in the system whitelist. During subsequent checks, if a database or OSS operation or event hits a whitelist rule, DSC no longer generates an alert. For more information, see Manage whitelists.

  1. On the Alert Overview or Alert Logs tab, find the alert event that you want to whitelist and click Details in the Actions column.

  2. On the alert event details page, in the Alert Assets or the client IP list under Source, find the asset or IP address that you want to add to the whitelist and click Add To Whitelist in the Actions column.

    image

  3. In the Add To Whitelist dialog box, the corresponding asset instance or IP address and its database account information are displayed. You can add more information to the whitelist rule, and then click OK.

    image

References