After network attacks occur, Security Center presents and analyzes the attacks on your assets. This allows you to construct a protection system at a finer-grained level. This topic describes the best practices for tracing attacks.
Prerequisites
- An Elastic Compute Service (ECS) instance that runs Ubuntu 16.04 is created, and the runtime of the instance exceeds 2 hours. For more information, see Create and manage an ECS instance by using the ECS console (express version)Quick start.
- The Enterprise or Ultimate edition of Security Center is purchased two hours before you perform the operations in this topic. For more information, see Purchase Security Center.