All Products
Search
Document Center

Security Center:Supported regions

Last Updated:Feb 11, 2026

This topic describes the regions that Security Center supports and the features available in each region.

Background information

  • If you are not familiar with regions and zones, see Regions and zones.

  • You can view a map of the global deployment of Alibaba Cloud services at Alibaba Cloud Global Infrastructure.

  • Security Center deploys two service centers globally to ensure data compliance and proximity services. Data and configurations in different regions are isolated from each other. In the Security Center console, you can select the region that matches your asset's location from the top navigation bar.

    • Data center in the Chinese mainland: Provides security detection and mitigation capabilities for assets in the Chinese Mainland region.

    • Singapore data center: Provides security detection and mitigation capabilities for assets in regions Outside Chinese Mainland.

Supported regions

China Region

Region name

Region ID

Area

Functional Module

Supported features

China (Qingdao)

cn-qingdao

China

Overview

Overview

Asset Center

Asset overview, server assets, container assets, Serverless assets, cloud products, and websites

Risk Governance

Asset exposure analysis, vulnerability management, Cloud Security Posture Management (CSPM), detection of AccessKey pair leaks, cloud honeypot, malicious file detection, and log analysis

Detection and Response

Security alerts, attack analysis, Log Management, security incident handling, and disposal center

Agentic SOC

Dashboard, security alerts, security incident handling, Security Orchestration, Automation and Response (SOAR), disposal center, Log Management, rule management, and Integration Center

Host Protection

Agentless detection, anti-ransomware, virus detection, web tamper-proofing, host rule management, and core file monitoring

Container Protection

Container image scan, container proactive defense, container file protection, container firewall, container image signing, and CI/CD integration settings

Application Protection

Application protection

System Configurations

Task Hub, security report, feature settings, notification settings, multi-account security management, and compliance check

China (Beijing)

cn-beijing

China

Overview

Overview

Asset Center

Asset overview, server assets, container assets, Serverless assets, cloud products, and websites

Risk Governance

Asset exposure analysis, vulnerability management, Cloud Security Posture Management (CSPM), detection of AccessKey pair leaks, cloud honeypot, malicious file detection, and log analysis

Detection and Response

Security alerts, attack analysis, Log Management, security incident handling, and disposal center

Agentic SOC

Dashboard, security alerts, security incident handling, Security Orchestration, Automation and Response (SOAR), disposal center, Log Management, rule management, and Integration Center

Host Protection

Agentless detection, anti-ransomware, virus detection, web tamper-proofing, host rule management, and core file monitoring

Container Protection

Container image scan, container proactive defense, container file protection, container firewall, container image signing, and CI/CD integration settings

Application Protection

Application protection

System Configurations

Task Hub, security report, feature settings, notification settings, multi-account security management, and compliance check

China (Zhangjiakou)

cn-zhangjiakou

China

Overview

Overview

Asset Center

Asset overview, server assets, container assets, Serverless assets, cloud products, and websites

Risk Governance

Asset exposure analysis, vulnerability management, Cloud Security Posture Management (CSPM), detection of AccessKey pair leaks, cloud honeypot, malicious file detection, and log analysis

Detection and Response

Security alerts, attack analysis, Log Management, security incident handling, and disposal center

Agentic SOC

Dashboard, security alerts, security incident handling, Security Orchestration, Automation and Response (SOAR), disposal center, Log Management, rule management, and Integration Center

Host Protection

Agentless detection, anti-ransomware, virus detection, web tamper-proofing, host rule management, and core file monitoring

Container Protection

Container image scan, container proactive defense, container file protection, container firewall, container image signing, and CI/CD integration settings

Application Protection

Application protection

System Configurations

Task Hub, security report, feature settings, notification settings, multi-account security management, and compliance check

China (Hohhot)

cn-huhehaote

China

Overview

Overview

Asset Center

Asset overview, server assets, container assets, Serverless assets, cloud products, and websites

Risk Governance

Asset exposure analysis, vulnerability management, Cloud Security Posture Management (CSPM), detection of AccessKey pair leaks, cloud honeypot, malicious file detection, and log analysis

Detection and Response

Security alerts, attack analysis, Log Management, security incident handling, and disposal center

Agentic SOC

Dashboard, security alerts, security incident handling, Security Orchestration, Automation and Response (SOAR), disposal center, Log Management, rule management, and Integration Center

Host Protection

anti-ransomware, virus detection, web tamper-proofing, host rule management, and core file monitoring

Container Protection

Container image scan, container proactive defense, container file protection, container firewall, container image signing, and CI/CD integration settings

Application Protection

Application protection

System Configurations

Task Hub, security report, feature settings, notification settings, multi-account security management, and compliance check

China (Ulanqab)

cn-wulanchabu

China

Overview

Overview

Asset Center

Asset overview, server assets, container assets, Serverless assets, cloud products, and websites

Risk Governance

Asset exposure analysis, vulnerability management, Cloud Security Posture Management (CSPM), detection of AccessKey pair leaks, cloud honeypot, malicious file detection, and log analysis

Detection and Response

Security alerts, attack analysis, Log Management, security incident handling, and disposal center

Agentic SOC

Dashboard, security alerts, security incident handling, Security Orchestration, Automation and Response (SOAR), disposal center, Log Management, rule management, and Integration Center

Host Protection

virus detection, web tamper-proofing, host rule management, and core file monitoring

Container Protection

Container image scan, container proactive defense, container file protection, container firewall, container image signing, and CI/CD integration settings

Application Protection

Application protection

System Configurations

Task Hub, security report, feature settings, notification settings, multi-account security management, and compliance check

China (Hangzhou)

cn-hangzhou

China

Overview

Overview

Asset Center

Asset overview, server assets, container assets, Serverless assets, cloud products, and websites

Risk Governance

Asset exposure analysis, vulnerability management, Cloud Security Posture Management (CSPM), detection of AccessKey pair leaks, cloud honeypot, malicious file detection, and log analysis

Detection and Response

Security alerts, attack analysis, Log Management, security incident handling, and disposal center

Agentic SOC

Dashboard, security alerts, security incident handling, Security Orchestration, Automation and Response (SOAR), disposal center, Log Management, rule management, and Integration Center

Host Protection

Agentless detection, anti-ransomware, virus detection, web tamper-proofing, host rule management, and core file monitoring

Container Protection

Container image scan, container proactive defense, container file protection, container firewall, container image signing, and CI/CD integration settings

Application Protection

Application protection

System Configurations

Task Hub, security report, feature settings, notification settings, multi-account security management, and compliance check

China (Shanghai)

cn-shanghai

China

Overview

Overview

Asset Center

Asset overview, server assets, container assets, Serverless assets, cloud products, and websites

Risk Governance

Asset exposure analysis, vulnerability management, Cloud Security Posture Management (CSPM), detection of AccessKey pair leaks, cloud honeypot, malicious file detection, and log analysis

Detection and Response

Security alerts, attack analysis, Log Management, security incident handling, and disposal center

Agentic SOC

Dashboard, security alerts, security incident handling, Security Orchestration, Automation and Response (SOAR), disposal center, Log Management, rule management, and Integration Center

Host Protection

Agentless detection, anti-ransomware, virus detection, web tamper-proofing, host rule management, and core file monitoring

Container Protection

Container image scan, container proactive defense, container file protection, container firewall, container image signing, and CI/CD integration settings

Application Protection

Application protection

System Configurations

Task Hub, security report, feature settings, notification settings, multi-account security management, and compliance check

China (Nanjing - Local Region) Closing Down

cn-nanjing

China

Overview

Overview

Asset Center

Asset overview, server assets, container assets, Serverless assets, cloud products, and websites

Risk Governance

Asset exposure analysis, vulnerability management, Cloud Security Posture Management (CSPM), detection of AccessKey pair leaks, cloud honeypot, malicious file detection, and log analysis

Important

In this region, the malicious file detection feature only supports calling the SDK in servers to detect offline files. It does not support detecting files stored in OSS through the console.

Detection and Response

Security alerts, attack analysis, Log Management, security incident handling, and disposal center

Agentic SOC

Dashboard, security alerts, security incident handling, Security Orchestration, Automation and Response (SOAR), disposal center, Log Management, rule management, and Integration Center

Host Protection

virus detection, web tamper-proofing, host rule management, and core file monitoring

Container Protection

container proactive defense, container file protection, container firewall, container image signing, and CI/CD integration settings

Application Protection

Application protection

System Configurations

Task Hub, security report, feature settings, notification settings, multi-account security management, and compliance check

China (Fuzhou - Local Region) Closing Down

cn-fuzhou

China

Overview

Overview

Asset Center

Asset overview, server assets, container assets, Serverless assets, cloud products, and websites

Risk Governance

Asset exposure analysis, vulnerability management, Cloud Security Posture Management (CSPM), detection of AccessKey pair leaks, cloud honeypot, malicious file detection, and log analysis

Important

In this region, the malicious file detection feature only supports calling the SDK in servers to detect offline files. It does not support detecting files stored in OSS through the console.

Detection and Response

Security alerts, attack analysis, Log Management, security incident handling, and disposal center

Agentic SOC

Dashboard, security alerts, security incident handling, Security Orchestration, Automation and Response (SOAR), disposal center, Log Management, rule management, and Integration Center

Host Protection

virus detection, web tamper-proofing, host rule management, and core file monitoring

Container Protection

container proactive defense, container file protection, container firewall, container image signing, and CI/CD integration settings

Application Protection

Application protection

System Configurations

Task Hub, security report, feature settings, notification settings, multi-account security management, and compliance check

China (Wuhan - Local Region)

cn-wuhan-lr

China

Overview

Overview

Asset Center

Asset overview, server assets, container assets, Serverless assets, cloud products, and websites

Risk Governance

Asset exposure analysis, vulnerability management, Cloud Security Posture Management (CSPM), detection of AccessKey pair leaks, cloud honeypot, malicious file detection, and log analysis

Important

In this region, the malicious file detection feature only supports calling the SDK in servers to detect offline files. It does not support detecting files stored in OSS through the console.

Detection and Response

Security alerts, attack analysis, Log Management, security incident handling, and disposal center

Agentic SOC

Dashboard, security alerts, security incident handling, Security Orchestration, Automation and Response (SOAR), disposal center, Log Management, rule management, and Integration Center

Host Protection

virus detection, web tamper-proofing, host rule management, and core file monitoring

Container Protection

container proactive defense, container file protection, container firewall, container image signing, and CI/CD integration settings

Application Protection

Application protection

System Configurations

Task Hub, security report, feature settings, notification settings, multi-account security management, and compliance check

China (Shenzhen)

cn-shenzhen

China

Overview

Overview

Asset Center

Asset overview, server assets, container assets, Serverless assets, cloud products, and websites

Risk Governance

Asset exposure analysis, vulnerability management, Cloud Security Posture Management (CSPM), detection of AccessKey pair leaks, cloud honeypot, malicious file detection, and log analysis

Detection and Response

Security alerts, attack analysis, Log Management, security incident handling, and disposal center

Agentic SOC

Dashboard, security alerts, security incident handling, Security Orchestration, Automation and Response (SOAR), disposal center, Log Management, rule management, and Integration Center

Host Protection

Agentless detection, anti-ransomware, virus detection, web tamper-proofing, host rule management, and core file monitoring

Container Protection

Container image scan, container proactive defense, container file protection, container firewall, container image signing, and CI/CD integration settings

Application Protection

Application protection

System Configurations

Task Hub, security report, feature settings, notification settings, multi-account security management, and compliance check

China (Heyuan)

cn-heyuan

China

Overview

Overview

Asset Center

Asset overview, server assets, container assets, Serverless assets, cloud products, and websites

Risk Governance

Asset exposure analysis, vulnerability management, Cloud Security Posture Management (CSPM), detection of AccessKey pair leaks, cloud honeypot, malicious file detection, and log analysis

Detection and Response

Security alerts, attack analysis, Log Management, security incident handling, and disposal center

Agentic SOC

Dashboard, security alerts, security incident handling, Security Orchestration, Automation and Response (SOAR), disposal center, Log Management, rule management, and Integration Center

Host Protection

anti-ransomware, virus detection, web tamper-proofing, host rule management, and core file monitoring

Container Protection

Container image scan, container proactive defense, container file protection, container firewall, container image signing, and CI/CD integration settings

Application Protection

Application protection

System Configurations

Task Hub, security report, feature settings, notification settings, multi-account security management, and compliance check

China (Guangzhou)

cn-guangzhou

China

Overview

Overview

Asset Center

Asset overview, server assets, container assets, Serverless assets, cloud products, and websites

Risk Governance

Asset exposure analysis, vulnerability management, Cloud Security Posture Management (CSPM), detection of AccessKey pair leaks, cloud honeypot, malicious file detection, and log analysis

Detection and Response

Security alerts, attack analysis, Log Management, security incident handling, and disposal center

Agentic SOC

Dashboard, security alerts, security incident handling, Security Orchestration, Automation and Response (SOAR), disposal center, Log Management, rule management, and Integration Center

Host Protection

anti-ransomware, virus detection, web tamper-proofing, host rule management, and core file monitoring

Container Protection

Container image scan, container proactive defense, container file protection, container firewall, container image signing, and CI/CD integration settings

Application Protection

Application protection

System Configurations

Task Hub, security report, feature settings, notification settings, multi-account security management, and compliance check

China (Chengdu)

cn-chengdu

China

Overview

Overview

Asset Center

Asset overview, server assets, container assets, Serverless assets, cloud products, and websites

Risk Governance

Asset exposure analysis, vulnerability management, Cloud Security Posture Management (CSPM), detection of AccessKey pair leaks, cloud honeypot, malicious file detection, and log analysis

Detection and Response

Security alerts, attack analysis, Log Management, security incident handling, and disposal center

Agentic SOC

Dashboard, security alerts, security incident handling, Security Orchestration, Automation and Response (SOAR), disposal center, Log Management, rule management, and Integration Center

Host Protection

Agentless detection, anti-ransomware, virus detection, web tamper-proofing, host rule management, and core file monitoring

Container Protection

Container image scan, container proactive defense, container file protection, container firewall, container image signing, and CI/CD integration settings

Application Protection

Application protection

System Configurations

Task Hub, security report, feature settings, notification settings, multi-account security management, and compliance check

China (Hong Kong)

cn-hongkong

China

Overview

Overview

Asset Center

Asset overview, server assets, container assets, Serverless assets, cloud products, and websites

Risk Governance

Asset exposure analysis, vulnerability management, Cloud Security Posture Management (CSPM), detection of AccessKey pair leaks, cloud honeypot, malicious file detection, and log analysis

Detection and Response

Security alerts, attack analysis, Log Management, security incident handling, and disposal center

Agentic SOC

Dashboard, security alerts, security incident handling, Security Orchestration, Automation and Response (SOAR), disposal center, Log Management, rule management, and Integration Center

Host Protection

Agentless detection, anti-ransomware, virus detection, web tamper-proofing, host rule management, and core file monitoring

Container Protection

Container image scan, container proactive defense, container file protection, container firewall, container image signing, and CI/CD integration settings

Application Protection

Application protection

System Configurations

security report, feature settings, notification settings, multi-account security management

Other countries and regions

Region name

Region ID

Area

Functional Module

Supported features

Singapore

ap-southeast-1

Global (excluding China)

Overview

Overview

Asset Center

Asset overview, server assets, container assets, Serverless assets, cloud products, and websites

Risk Governance

Asset exposure analysis, vulnerability management, Cloud Security Posture Management (CSPM), detection of AccessKey pair leaks, cloud honeypot, malicious file detection, and log analysis

Detection and Response

Security alerts, attack analysis, Log Management, security incident handling, and disposal center

Agentic SOC

Dashboard, security alerts, security incident handling, Security Orchestration, Automation and Response (SOAR), disposal center, Log Management, rule management, and Integration Center

Host Protection

Agentless detection, anti-ransomware, virus detection, web tamper-proofing, host rule management, and core file monitoring

Container Protection

Container image scan, container proactive defense, container file protection, container firewall, container image signing, and CI/CD integration settings

Application Protection

Application protection

System Configurations

security report, feature settings, notification settings, multi-account security management

Malaysia (Kuala Lumpur)

ap-southeast-3

Global (excluding China)

Overview

Overview

Asset Center

Asset overview, server assets, container assets, Serverless assets, cloud products, and websites

Risk Governance

Asset exposure analysis, vulnerability management, Cloud Security Posture Management (CSPM), detection of AccessKey pair leaks, cloud honeypot, malicious file detection, and log analysis

Detection and Response

Security alerts, attack analysis, Log Management, security incident handling, and disposal center

Agentic SOC

Dashboard, security alerts, security incident handling, Security Orchestration, Automation and Response (SOAR), disposal center, Log Management, rule management, and Integration Center

Host Protection

anti-ransomware, virus detection, web tamper-proofing, host rule management, and core file monitoring

Container Protection

Container image scan, container proactive defense, container file protection, container firewall, container image signing, and CI/CD integration settings

Application Protection

Application protection

System Configurations

security report, feature settings, notification settings, multi-account security management

Indonesia (Jakarta)

ap-southeast-5

Global (excluding China)

Overview

Overview

Asset Center

Asset overview, server assets, container assets, Serverless assets, cloud products, and websites

Risk Governance

Asset exposure analysis, vulnerability management, Cloud Security Posture Management (CSPM), detection of AccessKey pair leaks, cloud honeypot, malicious file detection, and log analysis

Detection and Response

Security alerts, attack analysis, Log Management, security incident handling, and disposal center

Agentic SOC

Dashboard, security alerts, security incident handling, Security Orchestration, Automation and Response (SOAR), disposal center, Log Management, rule management, and Integration Center

Host Protection

Agentless detection, anti-ransomware, virus detection, web tamper-proofing, host rule management, and core file monitoring

Container Protection

Container image scan, container proactive defense, container file protection, container firewall, container image signing, and CI/CD integration settings

Application Protection

Application protection

System Configurations

security report, feature settings, notification settings, multi-account security management

Philippines (Manila)

ap-southeast-6

Global (excluding China)

Overview

Overview

Asset Center

Asset overview, server assets, container assets, Serverless assets, cloud products, and websites

Risk Governance

Asset exposure analysis, vulnerability management, Cloud Security Posture Management (CSPM), detection of AccessKey pair leaks, cloud honeypot, malicious file detection, and log analysis

Detection and Response

Security alerts, attack analysis, Log Management, security incident handling, and disposal center

Agentic SOC

Dashboard, security alerts, security incident handling, Security Orchestration, Automation and Response (SOAR), disposal center, Log Management, rule management, and Integration Center

Host Protection

anti-ransomware, virus detection, web tamper-proofing, host rule management, and core file monitoring

Container Protection

Container image scan, container proactive defense, container file protection, container firewall, container image signing, and CI/CD integration settings

Application Protection

Application protection

System Configurations

security report, feature settings, notification settings, multi-account security management

Thailand (Bangkok)

ap-southeast-7

Global (excluding China)

Overview

Overview

Asset Center

Asset overview, server assets, container assets, Serverless assets, cloud products, and websites

Risk Governance

Asset exposure analysis, vulnerability management, Cloud Security Posture Management (CSPM), detection of AccessKey pair leaks, cloud honeypot, malicious file detection, and log analysis

Detection and Response

Security alerts, attack analysis, Log Management, security incident handling, and disposal center

Agentic SOC

Dashboard, security alerts, security incident handling, Security Orchestration, Automation and Response (SOAR), disposal center, Log Management, rule management, and Integration Center

Host Protection

virus detection, web tamper-proofing, host rule management, and core file monitoring

Container Protection

Container image scan, container proactive defense, container file protection, container firewall, container image signing, and CI/CD integration settings

Application Protection

Application protection

System Configurations

security report, feature settings, notification settings, multi-account security management

Japan (Tokyo)

ap-northeast-1

Global (excluding China)

Overview

Overview

Asset Center

Asset overview, server assets, container assets, Serverless assets, cloud products, and websites

Risk Governance

Asset exposure analysis, vulnerability management, Cloud Security Posture Management (CSPM), detection of AccessKey pair leaks, cloud honeypot, malicious file detection, and log analysis

Detection and Response

Security alerts, attack analysis, Log Management, security incident handling, and disposal center

Agentic SOC

Dashboard, security alerts, security incident handling, Security Orchestration, Automation and Response (SOAR), disposal center, Log Management, rule management, and Integration Center

Host Protection

anti-ransomware, virus detection, web tamper-proofing, host rule management, and core file monitoring

Container Protection

Container image scan, container proactive defense, container file protection, container firewall, container image signing, and CI/CD integration settings

Application Protection

Application protection

System Configurations

security report, feature settings, notification settings, multi-account security management

South Korea (Seoul)

ap-northeast-2

Global (excluding China)

Overview

Overview

Asset Center

Asset overview, server assets, container assets, Serverless assets, cloud products, and websites

Risk Governance

Asset exposure analysis, vulnerability management, Cloud Security Posture Management (CSPM), detection of AccessKey pair leaks, cloud honeypot, malicious file detection, and log analysis

Detection and Response

Security alerts, attack analysis, Log Management, security incident handling, and disposal center

Agentic SOC

Dashboard, security alerts, security incident handling, Security Orchestration, Automation and Response (SOAR), disposal center, Log Management, rule management, and Integration Center

Host Protection

virus detection, web tamper-proofing, host rule management, and core file monitoring

Container Protection

Container image scan, container proactive defense, container file protection, container firewall, container image signing, and CI/CD integration settings

Application Protection

Application protection

System Configurations

security report, feature settings, notification settings, multi-account security management

US (Silicon Valley)

us-west-1

Global (excluding China)

Overview

Overview

Asset Center

Asset overview, server assets, container assets, Serverless assets, cloud products, and websites

Risk Governance

Asset exposure analysis, vulnerability management, Cloud Security Posture Management (CSPM), detection of AccessKey pair leaks, cloud honeypot, malicious file detection, and log analysis

Detection and Response

Security alerts, attack analysis, Log Management, security incident handling, and disposal center

Agentic SOC

Dashboard, security alerts, security incident handling, Security Orchestration, Automation and Response (SOAR), disposal center, Log Management, rule management, and Integration Center

Host Protection

anti-ransomware, virus detection, web tamper-proofing, host rule management, and core file monitoring

Container Protection

Container image scan, container proactive defense, container file protection, container firewall, container image signing, and CI/CD integration settings

Application Protection

Application protection

System Configurations

security report, feature settings, notification settings, multi-account security management

US (Virginia)

us-east-1

Global (excluding China)

Overview

Overview

Asset Center

Asset overview, server assets, container assets, Serverless assets, cloud products, and websites

Risk Governance

Asset exposure analysis, vulnerability management, Cloud Security Posture Management (CSPM), detection of AccessKey pair leaks, cloud honeypot, malicious file detection, and log analysis

Detection and Response

Security alerts, attack analysis, Log Management, security incident handling, and disposal center

Agentic SOC

Dashboard, security alerts, security incident handling, Security Orchestration, Automation and Response (SOAR), disposal center, Log Management, rule management, and Integration Center

Host Protection

Agentless detection, anti-ransomware, virus detection, web tamper-proofing, host rule management, and core file monitoring

Container Protection

Container image scan, container proactive defense, container file protection, container firewall, container image signing, and CI/CD integration settings

Application Protection

Application protection

System Configurations

security report, feature settings, notification settings, multi-account security management

Germany (Frankfurt)

eu-central-1

Global (excluding China)

Overview

Overview

Asset Center

Asset overview, server assets, container assets, Serverless assets, cloud products, and websites

Risk Governance

Asset exposure analysis, vulnerability management, Cloud Security Posture Management (CSPM), detection of AccessKey pair leaks, cloud honeypot, malicious file detection, and log analysis

Detection and Response

Security alerts, attack analysis, Log Management, security incident handling, and disposal center

Agentic SOC

Dashboard, security alerts, security incident handling, Security Orchestration, Automation and Response (SOAR), disposal center, Log Management, rule management, and Integration Center

Host Protection

anti-ransomware, virus detection, web tamper-proofing, host rule management, and core file monitoring

Container Protection

Container image scan, container proactive defense, container file protection, container firewall, container image signing, and CI/CD integration settings

Application Protection

Application protection

System Configurations

security report, feature settings, notification settings, multi-account security management

UK (London)

eu-west-1

Global (excluding China)

Overview

Overview

Asset Center

Asset overview, server assets, container assets, Serverless assets, cloud products, and websites

Risk Governance

Asset exposure analysis, vulnerability management, Cloud Security Posture Management (CSPM), detection of AccessKey pair leaks, cloud honeypot, malicious file detection, and log analysis

Detection and Response

Security alerts, attack analysis, Log Management, security incident handling, and disposal center

Agentic SOC

Dashboard, security alerts, security incident handling, Security Orchestration, Automation and Response (SOAR), disposal center, Log Management, rule management, and Integration Center

Host Protection

anti-ransomware, virus detection, web tamper-proofing, host rule management, and core file monitoring

Container Protection

Container image scan, container proactive defense, container file protection, container firewall, container image signing, and CI/CD integration settings

Application Protection

Application protection

System Configurations

security report, feature settings, notification settings, multi-account security management

UAE (Dubai)

me-east-1

Global (excluding China)

Overview

Overview

Asset Center

Asset overview, server assets, container assets, Serverless assets, cloud products, and websites

Risk Governance

Asset exposure analysis, vulnerability management, Cloud Security Posture Management (CSPM), detection of AccessKey pair leaks, cloud honeypot, malicious file detection, and log analysis

Important

In this region, the malicious file detection feature only supports calling the SDK in servers to detect offline files. It does not support detecting files stored in OSS through the console.

Detection and Response

Security alerts, attack analysis, Log Management, security incident handling, and disposal center

Agentic SOC

Dashboard, security alerts, security incident handling, Security Orchestration, Automation and Response (SOAR), disposal center, Log Management, rule management, and Integration Center

Host Protection

virus detection, web tamper-proofing, host rule management, and core file monitoring

Container Protection

container proactive defense, container file protection, container firewall, container image signing, and CI/CD integration settings

Application Protection

Application protection

System Configurations

security report, feature settings, notification settings, multi-account security management

Mexico

na-south-1

Global (excluding China)

Overview

Intelligent Assistant, Overview

Asset Center

Asset overview, server assets, container assets, Serverless assets, cloud products, and websites

Risk Governance

Asset exposure analysis, vulnerability management, Cloud Security Posture Management (CSPM), detection of AccessKey pair leaks, cloud honeypot, malicious file detection, and log analysis

Important

In this region, the malicious file detection feature only supports calling the SDK in servers to detect offline files. It does not support detecting files stored in OSS through the console.

Detection and Response

Security alerts, attack analysis, Log Management, security incident handling, and disposal center

Agentic SOC

Dashboard, security alerts, security incident handling, Security Orchestration, Automation and Response (SOAR), disposal center, Log Management, rule management, and Integration Center

Host Protection

virus detection, web tamper-proofing, host rule management, and core file monitoring

Container Protection

container proactive defense, container file protection, container firewall, container image signing, and CI/CD integration settings

Application Protection

Application protection

System Configurations

security report, feature settings, notification settings, multi-account security management

SAU (Riyadh - Partner Region)

Important

The SAU (Riyadh - Partner Region) region is operated by a partner.

me-central-1

Global (excluding China)

Overview

Intelligent Assistant, Overview

Asset Center

Asset overview, server assets, container assets, Serverless assets, cloud products, and websites

Risk Governance

Asset exposure analysis, vulnerability management, Cloud Security Posture Management (CSPM), detection of AccessKey pair leaks, cloud honeypot, malicious file detection, and log analysis

Important

In this region, the malicious file detection feature only supports calling the SDK in servers to detect offline files. It does not support detecting files stored in OSS through the console.

Detection and Response

Security alerts, attack analysis, security incident handling, and disposal center

Agentic SOC

Dashboard, security alerts, security incident handling, Security Orchestration, Automation and Response (SOAR), disposal center, rule management, and Integration Center

Host Protection

anti-ransomware, virus detection, web tamper-proofing, host rule management, and core file monitoring

Container Protection

container proactive defense, container file protection, container firewall, container image signing, and CI/CD integration settings

Application Protection

Application protection

System Configurations

security report, feature settings, notification settings, multi-account security management

Relation between regions and endpoints

Endpoints are domain names that Security Center provides for external access. These include public network access addresses and VPC access addresses. When you integrate Security Center with your business system, you must configure endpoints in your programming tools, such as an SDK, CLI, or API, to communicate with the server. For information about the endpoints supported by Security Center, see:

  • To use host protection, container protection, agentless detection, Cloud Security Posture Management (CSPM), and other capabilities, see Security Center endpoints.

  • To use the detection and response capabilities provided by Agentic SOC, see Agentic SOC endpoints.

  • To use the Security Orchestration, Automation, and Response (SOAR) capabilities provided by Agentic SOC, see SOAR endpoints.