All Products
Search
Document Center

Security Center:Create a security report

Last Updated:Feb 23, 2024

Security Center provides risk assessment tools to summarize and analyze the risks, security status, and risk fixing progress of protected assets in a comprehensive manner. You can create security reports, and specify custom security statistics and the email addresses to which you want to send security reports on a regular basis. This way, you can monitor the security status of your assets in real time.

Limits

Only the Advanced, Enterprise, and Ultimate editions of Security Center support this feature. For more information about how to purchase and upgrade Security Center, see Purchase Security Center and Upgrade and downgrade Security Center.

Procedure

In addition to the default security report in Security Center, you can create up to nine security reports.

  1. Log on to the Security Center console. In the top navigation bar, select the region in which your asset resides. You can select China or Outside China.

  2. In the left-side navigation pane, choose System Configuration > Reports.

  3. On the Reports page, click Create Report.

  4. In the Configure Basic Information step, configure the following parameters and click Next.

    Parameter

    Description

    Report Name

    The name of the security report.

    Report Scope

    The assets on which security statistics are collected for the security report. Valid values: Single Account, Multiple Accounts, and Multiple Groups.

    • If you need to view statistics on the assets within an account, select Single Account.

      If you select Single Account, the system collects statistics on all assets within the current account. If you need to view statistics on the assets within groups, select Multiple Groups and configure the Report Group parameter.

    • If you need to view statistics on the assets within multiple accounts, select Multiple Accounts.

      If you select Multiple Accounts, you must specify accounts for the Accounts parameter. The system collects statistics on the assets within the specified accounts.

    Report Group

    Accounts

    Data Collection Period

    The time range during which security statistics are collected for the security report. Valid values: Last 1 Day, Last 1 Week, Last 1 Month, Last 1 Year, Custom Days, and Custom Time Range.

    If you select Custom Time Range, you do not need to configure the Sent At parameter. You must manually publish the security report for which a custom time range is specified on the Reports page.

    Language

    The language of the content in the security report. Valid values: Simplified Chinese and English.

    Sent At

    The time at which the security report is sent to the specified email address.

    Recipient

    The email address to which the security report is sent. You can enter multiple email addresses.

    Note

    Enter a verified email address. If the specified email address is not verified, Security Center sends a verification email to the email address. After you receive the email, you must complete the verification based on the instructions provided in the email.

    Sticky

    Specifies whether to display the security report as the first report on the Reports page and whether to add an entry point to the security report in the upper-right corner of the Overview page.

  5. In the Specify Reported Data step, select the items whose statistics you want to include in the security report.

    In this step, you can select items to meet your security management requirements and the requirements of different roles in various scenarios. The following list describes the supported items:

    • Multi-Account Ranking Metrics: This item is supported only if you select Multiple Accounts in the Configure Basic Information step. This item provides the comparison data for each account and the ranking of all accounts in a multi-account environment. This item helps you identify the accounts that are at high risk and manage account security in a centralized manner.

    • Overall Operation Metrics: This item provides an overview of security status, which helps you understand the overall security status and the details of core security features. This item is suitable for senior managers to manage business security.

    • Asset Operation Metrics: This item provides an overview of business asset status and the trend of at-risk assets. This item facilitates asset management and priority classification.

    • Security Alert Operation Metrics: This item provides the details of alert handling, which are used to monitor and analyze the trend of alerts as well as evaluate threat detection and response capabilities. This item is suitable for security operations personnel to monitor alerts and improve the process of alert handling.

    • Vulnerability Operation Metrics: This item provides an overview of system vulnerability status, which allows you to monitor vulnerability fixing progress and efficiency and helps you manage vulnerabilities. This item is suitable for IT O&M and security teams to fix vulnerabilities and reduce potential security risks.

    • Baseline Operation Metrics: This item provides the monitoring statistics on the compliance status of your system and the details of baseline configurations. This item helps you maintain the configuration security of your system.

    • Cloud Product Operation Metrics: This item provides the security status of configurations for your cloud services, the monitoring statistics on changes to the configurations, and the handling details of configuration risks.

    • Honeypot Operation Metrics: This item provides the monitoring statistics on your system after the cloud honeypot feature is enabled, and the trend and handling details of attacks. This item facilitates the understanding of threat intelligence.

  6. Click Save. The security report is created.

    By default, a newly created report is enabled. If you specify a value other than Custom Time Range for the Data Collection Period parameter of the security report, Security Center automatically sends the report to the specified email address at the time that you specify for the Sent At parameter. If you specify Custom Time Range for the Data Collection Period parameter of the security report, you can find the security report on the Reports page and click Send Now to send the report to the specified email address.

What to do next

You can perform the following operations on a security report based on your business requirements:

  • Stop the automatic sending of a security report

    By default, a newly created security report is enabled. If you no longer want to receive a security report, you can find the report and click the 启用图标 icon. The security report is no longer sent to the specified email address.

  • Modify a security report

    You can find a security report and click Edit to modify the basic information and content of the security report.

  • Clone a security report

    You can find a security report and choose More > Clone to clone the security report.

  • Export a security report

    You can find a security report, click Export, and then select a format to download the report. The security report can be saved as an HTML or PDF file.

  • Delete a security report

    You can find a security report and choose More > Delete to delete the security report.

    Note
    • A deleted security report cannot be restored. Proceed with caution.

    • The default security report cannot be deleted.

References

After you receive a security report that notifies you of risks on your assets, we recommend that you check the security status of your assets and handle the risks at the earliest opportunity. For more information about different types of risks and the handling methods of risks, see the following topics: