This topic describes the limits of Security Center.

Threat detection limits

When Security Center detects risks, it sends security alerts to you without delay. You can manage security alerts, scan for vulnerabilities, analyze attacks, and perform configuration assessment in the Security Center console. Security Center can also analyze alerts and automatically trace attacks. This reinforces the security of your assets. To protect your assets against attacks, we recommend that you regularly install the latest security patches on your server, and use other security services along with Security Center, such as Cloud Firewall and Web Application Firewall (WAF).

Note Due to the evolution of attacks and viruses, and the variation of workload environments, security breaches may occur. We recommend that you use the alerting, vulnerability detection, baseline check, and configuration assessment features provided by Security Center to protect your assets against attacks.

Logstore limits

All logs of Security Center are stored in a dedicated Logstore.

  • You cannot use the Log Service API or SDK to import data into the dedicated Logstore or modify the attributes of the Logstore, such as the retention period.
  • The Logstore has no limits on queries, statistics, alerts, or streaming consumption.
  • The Logstore does not incur charges if Log Service does not have overdue payments.
  • The default reports may be updated in later versions.