This topic describes the regions supported by Security Center and features available in each region.
Background
If you are not familiar with regions and zones, learn about these concepts in Regions and zones.
You can view the global deployment of Alibaba Cloud services on the map: Alibaba Cloud Global Infrastructure.
Supported regions
Security Center has two service centers: the Shanghai service center and the Singapore service center. The Shanghai service center provides security detection and protection for assets in the China region. The Singapore service center provides security detection and protection for assets in regions outside of mainland China. The Security Center console displays assets and security risks separately for each region. Before you use features in the Security Center console, you must select the region where your assets are located.
For more information, see Region Description.
China regions
Region name | Region ID | Module | Supported features |
China (Qingdao) | cn-qingdao | Overview | Overview |
Assets | Asset overview, server assets, container assets, serverless assets, cloud products, and websites | ||
Risk Governance | Asset exposure analysis, vulnerability management, Cloud Security Posture Management (CSPM), detection of AccessKey pair leaks, cloud honeypot, and log analysis | ||
Detection and Response | Security alerts, attack analysis, and log management | ||
Cloud Threat Detection and Response (CTDR) | Dashboard, security alerts, security incident handling, Security Orchestration, Automation and Response (SOAR), disposal center, log management, rule management, and integration center | ||
Host Protection | Agentless detection, anti-ransomware, virus detection, web tamper proofing, host rule management, and core file monitoring | ||
Container Protection | Container image scan, container proactive defense, container file protection, container firewall, container image signing, and CI/CD integration settings | ||
Application Protection | Application protection | ||
System Configurations | Playbook, security report, feature settings, notification settings, multi-account management, and compliance check | ||
China (Beijing) | cn-beijing | Overview | Overview |
Assets | Asset overview, server assets, container assets, serverless assets, cloud products, and websites | ||
Risk Governance | Asset exposure analysis, vulnerability management, CSPM, detection of AccessKey pair leaks, cloud honeypot, SDK for Malicious File Detection, and log analysis | ||
Detection and Response | Security alerts, attack analysis, and log management | ||
CTDR | Dashboard, security alerts, security incident handling, SOAR, disposal center, log management, rule management, and integration center | ||
Host Protection | Agentless detection, anti-ransomware, virus detection, web tamper proofing, host rule management, and core file monitoring | ||
Container Protection | Container image scan, container proactive defense, container file protection, container firewall, container image signing, and CI/CD integration settings | ||
Application Protection | Application protection | ||
System Configurations | Playbook, security report, feature settings, notification settings, multi-account management, and compliance check | ||
China (Zhangjiakou) | cn-zhangjiakou | Overview | Overview |
Assets | Asset overview, server assets, container assets, serverless assets, cloud products, and websites | ||
Risk Governance | Asset exposure analysis, vulnerability management, CSPM, detection of AccessKey pair leaks, cloud honeypot, SDK for Malicious File Detection, and log analysis | ||
Detection and Response | Security alerts, attack analysis, and log management | ||
CTDR | Dashboard, security alerts, security incident handling, SOAR, disposal center, log management, rule management, and integration center | ||
Host Protection | Agentless detection, anti-ransomware, virus detection, web tamper proofing, host rule management, and core file monitoring | ||
Container Protection | Container image scan, container proactive defense, container file protection, container firewall, container image signing, and CI/CD integration settings | ||
Application Protection | Application protection | ||
System Configurations | Playbook, security report, feature settings, notification settings, multi-account management, and compliance check | ||
China (Hohhot) | cn-huhehaote | Overview | Overview |
Assets | Asset overview, server assets, container assets, serverless assets, cloud products, and websites | ||
Risk Governance | Asset exposure analysis, vulnerability management, CSPM, detection of AccessKey pair leaks, cloud honeypot, SDK for Malicious File Detection, and log analysis | ||
Detection and Response | security alerts, attack analysis, and log management | ||
CTDR | Dashboard, security alerts, security incident handling, SOAR, disposal center, log management, rule management, and integration center | ||
Host Protection | Anti-ransomware, virus detection, web tamper proofing, host rule management, and core file monitoring | ||
Container Protection | Container image scan, container proactive defense, container file protection, container firewall, container image signing, and CI/CD integration settings | ||
Application Protection | Application protection | ||
System Configurations | Playbook, security report, feature settings, notification settings, multi-account management, and compliance check | ||
China (Ulanqab) | cn-wulanchabu | Overview | Overview |
Assets | Asset overview, server assets, container assets, serverless assets, cloud products, and websites | ||
Risk Governance | Asset exposure analysis, vulnerability management, CSPM, detection of AccessKey pair leaks, cloud honeypot, SDK for Malicious File Detection, and log analysis | ||
Detection and Response | security alerts, attack analysis, and log management | ||
CTDR | Dashboard, security alerts, security incident handling, SOAR, disposal center, log management, rule management, and integration center | ||
Host Protection | Virus detection, web tamper proofing, host rule management, and core file monitoring | ||
Container Protection | Container image scan, container proactive defense, container file protection, container firewall, container image signing, and CI/CD integration settings | ||
Application Protection | Application protection | ||
System Configurations | Playbook, security report, feature settings, notification settings, multi-account management, and compliance check | ||
China (Hangzhou) | cn-hangzhou | Overview | Overview |
Assets | Asset overview, server assets, container assets, serverless assets, cloud products, and websites | ||
Risk Governance | Asset exposure analysis, vulnerability management, CSPM, detection of AccessKey pair leaks, cloud honeypot, SDK for Malicious File Detection, and log analysis | ||
Detection and Response | Security alert, attack analysis, and log management | ||
CTDR | Dashboard, security alerts, security incident handling, SOAR, disposal center, log management, rule management, and integration center | ||
Host Protection | Agentless detection, anti-ransomware, virus detection, web tamper proofing, host rule management, and core file monitoring | ||
Container Protection | Container image scan, container proactive defense, container file protection, container firewall, container image signing, and CI/CD integration settings | ||
Application Protection | Application protection | ||
System Configurations | Playbook, security report, feature settings, notification settings, multi-account management, and compliance check | ||
China (Shanghai) | cn-shanghai | Overview | Overview |
Assets | Asset overview, server assets, container assets, serverless assets, cloud products, and websites | ||
Risk Governance | Asset exposure analysis, vulnerability management, CSPM, detection of AccessKey pair leaks, cloud honeypot, SDK for Malicious File Detection, and log analysis | ||
Detection and Response | Security alerts, attack analysis, and log management | ||
CTDR | Dashboard, security alerts, security incident handling, SOAR, disposal center, log management, rule management, and integration center | ||
Host Protection | Agentless detection, anti-ransomware, virus scan, web tamper proofing, host rule management, and core file monitoring | ||
Container protection | Container image scan, container proactive defense, container file protection, container firewall, container image signing, and CI/CD integration settings | ||
Application protection | Application protection | ||
System Configurations | Playbook, security report, feature settings, notification settings, multi-account management, and compliance checks | ||
China (Nanjing - Local Region) (Closing Down) | cn-nanjing | Overview | Overview |
Assets | Asset overview, server assets, container assets, serverless assets, cloud products, and websites | ||
Risk governance | Asset exposure analysis, vulnerability management, CSPM, detection of AccessKey pair leaks, cloud honeypot, SDK for Malicious File Detection, and log analysis Important In this region, the SDK for malicious file detection feature only supports calling the SDK in servers to detect offline files. It does not support detecting files stored in OSS through the console. | ||
Detection and Response | Security alerts, attack analysis, and log management | ||
CTDR | Dashboard, security alert, security incident handling, SOAR, handling center, log management, rule management, and integration center | ||
Host protection | Virus removal, web tamper proofing, host rule management, and core file monitoring | ||
Container protection | Container proactive defense, container file protection, container firewall, container image signing, and CI/CD integration settings | ||
Application protection | Application protection | ||
System Configurations | Playbook, security report, feature settings, notification settings, multi-account management, and compliance checks | ||
China (Fuzhou - Local Region) (Closing Down) | cn-fuzhou | Overview | Overview |
Assets | Assets overview, server assets, container assets, serverless assets, cloud products, and websites | ||
Risk governance | Asset exposure analysis, vulnerability management, CSPM, detection of AccessKey pair leaks, cloud honeypot, SDK for Malicious File Detection, and log analysis Important In this region, the SDK for malicious file detection feature only supports calling the SDK in servers to detect offline files. It does not support detecting files stored in OSS through the console. | ||
Detection and response | Security alerts, attack analysis, and log management | ||
CTDR | Dashboard, security alert, security incident handling, SOAR, handling center, log management, rule management, and integration center | ||
Host protection | Virus removal, web tamper proofing, host rule management, and core file monitoring | ||
Container protection | Container proactive defense, container file protection, container firewall, container image signing, and CI/CD integration settings | ||
Application protection | Application protection | ||
System Configurations | Playbook, security report, feature settings, notification settings, multi-account management, and compliance checks | ||
China (Wuhan - Local Region) | cn-wuhan-lr | Overview | Overview |
Assets | Asset overview, server assets, container assets, serverless assets, cloud products, and websites | ||
Risk governance | Asset exposure analysis, vulnerability management, CSPM, detection of AccessKey pair leaks, cloud honeypot, SDK for Malicious File Detection, and log analysis Important In this region, the SDK for malicious file detection feature only supports calling the SDK in servers to detect offline files. It does not support detecting files stored in OSS through the console. | ||
Detection and Response | Security alert, attack analysis, and log management | ||
CTDR | Dashboard, security alert, security incident handling, SOAR, handling center, log management, rule management, and integration center | ||
Host protection | Virus removal, web tamper proofing, host rule management, and core file monitoring | ||
Container protection | Container proactive defense, container file protection, container firewall, container image signing, and CI/CD integration settings | ||
Application protection | Application protection | ||
System Configurations | Playbook, security report, feature settings, notification settings, multi-account management, and compliance checks | ||
China (Shenzhen) | cn-shenzhen | Overview | Overview |
Assets | Asset overview, server assets, container assets, serverless assets, cloud products, and websites | ||
Risk governance | Asset exposure analysis, vulnerability management, CSPM, detection of AccessKey pair leaks, cloud honeypot, SDK for Malicious File Detection, and log analysis | ||
Detection and Response | Security alerts, attack analysis, and log management | ||
CTDR | Dashboard, security alert, security incident handling, SOAR, handling center, log management, rule management, and integration center | ||
Host protection | Agentless detection, anti-ransomware, virus removal, web tamper proofing, host rule management, and core file monitoring | ||
Container protection | Container image scan, container proactive defense, container file protection, container firewall, container image signing, and CI/CD integration settings | ||
Application protection | Application protection | ||
System Configurations | Playbook, security report, feature settings, notification settings, multi-account management, and compliance checks | ||
China (Heyuan) | cn-heyuan | Overview | Overview |
Assets | Asset overview, server assets, container assets, serverless assets, cloud products, and websites | ||
Risk governance | Asset exposure analysis, vulnerability management, CSPM, detection of AccessKey pair leaks, cloud honeypot, malicious file detection software development kit (SDK), and log analysis | ||
Detection and Response | Security alert, attack analysis, and log management | ||
CTDR | Dashboard, security alert, security incident handling, SOAR, handling center, log management, rule management, and integration center | ||
Host protection | Anti-ransomware, virus removal, web tamper proofing, host rule management, and core file monitoring | ||
Container protection | Container image scan, container proactive defense, container file protection, container firewall, container image signing, and CI/CD integration settings | ||
Application protection | Application protection | ||
System Configurations | Playbook, security report, feature settings, notification settings, multi-account management, and compliance checks | ||
China (Guangzhou) | cn-guangzhou | Overview | Overview |
Assets | Asset overview, server assets, container assets, serverless assets, cloud products, and websites | ||
Risk governance | Asset exposure analysis, vulnerability management, CSPM, detection of AccessKey pair leaks, cloud honeypot, SDK for Malicious File Detection, and log analysis | ||
Detection and Response | Security alert, attack analysis, and log management | ||
CTDR | Dashboard, security alert, security incident handling, SOAR, handling center, log management, rule management, and integration center | ||
Host protection | Anti-ransomware, virus removal, web tamper proofing, host rule management, and core file monitoring | ||
Container protection | Container image scan, container proactive defense, container file protection, container firewall, container image signing, and CI/CD integration settings | ||
Application protection | Application protection | ||
System Configurations | Playbook, security report, feature settings, notification settings, multi-account management, and compliance checks | ||
China (Chengdu) | cn-chengdu | Overview | Overview |
Assets | Asset overview, server assets, container assets, serverless assets, cloud products, and websites | ||
Risk governance | Asset exposure analysis, vulnerability management, CSPM, detection of AccessKey pair leaks, cloud honeypot, SDK for Malicious File Detection, and log analysis | ||
Detection and Response | Security alert, attack analysis, and log management | ||
CTDR | Dashboard, security alert, security incident handling, SOAR, handling center, log management, rule management, and integration center | ||
Host protection | Agentless detection, anti-ransomware, virus removal, web tamper proofing, host rule management, and core file monitoring | ||
Container protection | Container image scan, container proactive defense, container file protection, container firewall, container image signing, and CI/CD integration settings | ||
Application protection | Application protection | ||
System Configurations | Playbook, security report, feature settings, notification settings, multi-account management, and compliance checks | ||
China (Hong Kong) | cn-hongkong | Overview | Overview |
Assets | Asset overview, server assets, container assets, serverless assets, cloud products, and websites | ||
Risk governance | Asset exposure analysis, vulnerability management, CSPM, detection of AccessKey pair leaks, cloud honeypot, SDK for Malicious File Detection, and log analysis | ||
Detection and Response | Security alert, attack analysis, and log management | ||
CTDR | Dashboard, security alert, security incident handling, SOAR, handling center, log management, rule management, and integration center | ||
Host protection | Agentless detection, anti-ransomware, virus removal, web tamper proofing, host rule management, and core file monitoring | ||
Container protection | Container image scan, container proactive defense, container file protection, container firewall, container image signing, and CI/CD integration settings | ||
Application protection | Application protection | ||
System Configurations | Security report, feature settings, notification settings, and multi-account management |
Regions outside China
Region name | Region ID | Module | Supported features |
Singapore | ap-southeast-1 | Overview | Overview |
Assets | Asset overview, server assets, container assets, serverless assets, cloud products, and websites | ||
Risk Governance | Asset exposure analysis, vulnerability management, CSPM, detection of AccessKey pair leaks, cloud honeypot, SDK for Malicious File Detection, and log analysis | ||
Detection and Response | Security alert, attack analysis, and log management | ||
CTDR | Dashboard, security alerts, security incident handling, SOAR, disposal center, log management, rule management, and integration center | ||
Host Protection | Agentless detection, anti-ransomware, virus detection, web tamper proofing, host rule management, and core file monitoring | ||
Container Protection | Container image scan, container proactive defense, container file protection, container firewall, container image signing, and CI/CD integration settings | ||
Application Protection | Application Protection | ||
System Configurations | Security report, feature settings, notification settings, and multi-account management | ||
Malaysia (Kuala Lumpur) | ap-southeast-3 | Overview | Overview |
Assets | Asset overview, server assets, container assets, serverless assets, cloud products, and websites | ||
Risk Governance | Asset exposure analysis, vulnerability management, CSPM, detection of AccessKey pair leaks, cloud honeypot, SDK for Malicious File Detection, and log analysis | ||
Detection and Response | Security alert, attack analysis, and log management | ||
CTDR | Dashboard, security alerts, security incident handling, SOAR, disposal center, log management, rule management, and integration center | ||
Host Protection | Anti-ransomware, virus detection, web tamper proofing, host rule management, and core file monitoring | ||
Container Protection | Container image scan, container proactive defense, container file protection, container firewall, container image signing, and CI/CD integration settings | ||
Application Protection | Application Protection | ||
System Configurations | Security report, feature settings, notification settings, and multi-account management | ||
Indonesia (Jakarta) | ap-southeast-5 | Overview | Overview |
Assets | Asset overview, server assets, container assets, serverless assets, cloud products, and websites | ||
Risk Governance | Asset exposure analysis, vulnerability management, CSPM, detection of AccessKey pair leaks, cloud honeypot, SDK for Malicious File Detection, and log analysis | ||
Detection and Response | Security alert, attack analysis, and log management | ||
CTDR | Dashboard, security alerts, security incident handling, SOAR, disposal center, log management, rule management, and integration center | ||
Host Protection | Agentless detection, anti-ransomware, virus detection, web tamper proofing, host rule management, and core file monitoring | ||
Container Protection | Container image scan, container proactive defense, container file protection, container firewall, container image signing, and CI/CD integration settings | ||
Application Protection | Application protection | ||
System Configurations | Security report, feature settings, notification settings, and multi-account management | ||
Philippines (Manila) | ap-southeast-6 | Overview | Overview |
Assets | Asset overview, server assets, container assets, serverless assets, cloud products, and websites | ||
Risk Governance | Asset exposure analysis, vulnerability management, CSPM, detection of AccessKey pair leaks, cloud honeypot, SDK for Malicious File Detection, and log analysis | ||
Detection and Response | Security alert, attack analysis, and log management | ||
CTDR | Dashboard, security alerts, security incident handling, SOAR, disposal center, log management, rule management, and integration center | ||
Host Protection | Anti-ransomware, virus detection, web tamper proofing, host rule management, and core file monitoring | ||
Container Protection | Container image scan, container proactive defense, container file protection, container firewall, container image signing, and CI/CD integration settings | ||
Application Protection | Application protection | ||
System Configurations | Security report, feature settings, notification settings, and multi-account management | ||
Thailand (Bangkok) | ap-southeast-7 | Overview | Overview |
Assets | Asset overview, server assets, container assets, serverless assets, cloud products, and websites | ||
Risk Governance | Asset exposure analysis, vulnerability management, CSPM, detection of AccessKey pair leaks, cloud honeypot, SDK for Malicious File Detection, and log analysis | ||
Detection and Response | Security alert, attack analysis, and log management | ||
CTDR | Dashboard, security alerts, security incident handling, SOAR, disposal center, log management, rule management, and integration center | ||
Host Protection | Virus detection, web tamper proofing, host rule management, and core file monitoring | ||
Container Protection | Container image scan, container proactive defense, container file protection, container firewall, container image signing, and CI/CD integration settings | ||
Application Protection | Application Protection | ||
System Configurations | Security report, feature settings, notification settings, and multi-account management | ||
Japan (Tokyo) | ap-northeast-1 | Overview | Overview |
Assets | Asset overview, server assets, container assets, serverless assets, cloud products, and websites | ||
Risk Governance | Asset exposure analysis, vulnerability management, CSPM, detection of AccessKey pair leaks, cloud honeypot, SDK for Malicious File Detection, and log analysis | ||
Detection and Response | Security alert, attack analysis, and log management | ||
CTDR | Dashboard, security alerts, security incident handling, SOAR, disposal center, log management, rule management, and integration center | ||
Host Protection | Anti-ransomware, virus detection, web tamper proofing, host rule management, and core file monitoring | ||
Container Protection | Container image scan, container proactive defense, container file protection, container firewall, container image signing, and CI/CD integration settings | ||
Application Protection | Application protection | ||
System Configurations | Security report, feature settings, notification settings, and multi-account management | ||
South Korea (Seoul) | ap-northeast-2 | Overview | Overview |
Assets | Asset overview, server assets, container assets, serverless assets, cloud products, and websites | ||
Risk Governance | Asset exposure analysis, vulnerability management, CSPM, detection of AccessKey pair leaks, cloud honeypot, SDK for Malicious File Detection, and log analysis | ||
Detection and Response | Security alert, attack analysis, and log management | ||
CTDR | Dashboard, security alerts, security incident handling, SOAR, disposal center, log management, rule management, and integration center | ||
Host Protection | Virus detection, web tamper proofing, host rule management, and core file monitoring | ||
Container Protection | Container image scan, container proactive defense, container file protection, container firewall, container image signing, and CI/CD integration settings | ||
Application Protection | Application Protection | ||
System Configurations | Security report, feature settings, notification settings, and multi-account management | ||
US (Silicon Valley) | us-west-1 | Overview | Overview |
Assets | Asset overview, server assets, container assets, serverless assets, cloud products, and websites | ||
Risk Governance | Asset exposure analysis, vulnerability management, CSPM, detection of AccessKey pair leaks, cloud honeypot, SDK for Malicious File Detection, and log analysis | ||
Detection and Response | Security alert, attack analysis, and log management | ||
CTDR | Dashboard, security alerts, security incident handling, SOAR, disposal center, log management, rule management, and integration center | ||
Host Protection | Anti-ransomware, virus detection, web tamper proofing, host rule management, and core file monitoring | ||
Container Protection | Container image scan, container proactive defense, container file protection, container firewall, container image signing, and CI/CD integration settings | ||
Application Protection | Application protection | ||
System Configurations | Security report, feature settings, notification settings, and multi-account management | ||
US (Virginia) | us-east-1 | Overview | Overview |
Assets | Asset overview, server assets, container assets, serverless assets, cloud products, and websites | ||
Risk Governance | Asset exposure analysis, vulnerability management, CSPM, detection of AccessKey pair leaks, cloud honeypot, SDK for Malicious File Detection, and log analysis | ||
Detection and Response | Security alert, attack analysis, and log management | ||
CTDR | Dashboard, security alerts, security incident handling, SOAR, disposal center, log management, rule management, and integration center | ||
Host Protection | Agentless detection, anti-ransomware, virus detection, web tamper proofing, host rule management, and core file monitoring | ||
Container Protection | Container image scan, container proactive defense, container file protection, container firewall, container image signing, and CI/CD integration settings | ||
Application Protection | Application protection | ||
System Configurations | Security report, feature settings, notification settings, and multi-account management | ||
Germany (Frankfurt) | eu-central-1 | Overview | Overview |
Assets | Asset overview, server assets, container assets, serverless assets, cloud products, and websites | ||
Risk Governance | Asset exposure analysis, vulnerability management, CSPM, detection of AccessKey pair leaks, cloud honeypot, SDK for Malicious File Detection, and log analysis | ||
Detection and Response | Security alert, attack analysis, and log management | ||
CTDR | Dashboard, security alerts, security incident handling, SOAR, disposal center, log management, rule management, and integration center | ||
Host Protection | Anti-ransomware, virus detection, web tamper proofing, host rule management, and core file monitoring | ||
Container Protection | Container image scan, container proactive defense, container file protection, container firewall, container image signing, and CI/CD integration settings | ||
Application Protection | Application Protection | ||
System Configurations | Security report, feature settings, notification settings, and multi-account management | ||
UK (London) | eu-west-1 | Overview | Overview |
Assets | Asset overview, server assets, container assets, serverless assets, cloud products, and websites | ||
Risk Governance | Asset exposure analysis, vulnerability management, CSPM, detection of AccessKey pair leaks, cloud honeypot, SDK for Malicious File Detection, and log analysis | ||
Detection and Response | Security alert, attack analysis, and log management | ||
CTDR | Dashboard, security alerts, security incident handling, SOAR, disposal center, log management, rule management, and integration center | ||
Host Protection | Anti-ransomware, virus detection, web tamper proofing, host rule management, and core file monitoring | ||
Container Protection | Container image scan, container proactive defense, container file protection, container firewall, container image signing, and CI/CD integration settings | ||
Application Protection | Application protection | ||
System Configurations | Security report, feature settings, notification settings, and multi-account management | ||
UAE (Dubai) | me-east-1 | Overview | Overview |
Assets | Asset overview, server assets, container assets, serverless assets, cloud products, and websites | ||
Risk Governance | Asset exposure analysis, vulnerability management, CSPM, detection of AccessKey pair leaks, cloud honeypot, SDK for Malicious File Detection, and log analysis Important In this region, the SDK for malicious file detection feature only supports calling the SDK in servers to detect offline files. It does not support detecting files stored in OSS through the console. | ||
Detection and Response | Security alert, attack analysis, and log management | ||
CTDR | Dashboard, security alerts, security incident handling, SOAR, disposal center, log management, rule management, and integration center | ||
Host Protection | Virus detection, web tamper proofing, host rule management, and core file monitoring | ||
Container Protection | Container proactive defense, container file protection, container firewall, container image signing, and CI/CD integration settings | ||
Application Protection | Application protection | ||
System Configurations | Security report, feature settings, notification settings, and multi-account management | ||
Mexico | na-south-1 | Overview | Intelligent Assistant and overview |
Assets | Asset overview, server assets, container assets, serverless assets, cloud products, and websites | ||
Risk Governance | Asset exposure analysis, vulnerability management, CSPM, detection of AccessKey pair leaks, cloud honeypot, SDK for Malicious File Detection, and log analysis Important In this region, the SDK for malicious file detection feature only supports calling the SDK in servers to detect offline files. It does not support detecting files stored in OSS through the console. | ||
Detection and Response | Security alert, attack analysis, and log management | ||
CTDR | Dashboard, security alerts, security incident handling, SOAR, disposal center, log management, rule management, and integration center | ||
Host Protection | Virus detection, web tamper proofing, host rule management, and core file monitoring | ||
Container Protection | Container proactive defense, container file protection, container firewall, container image signing, and CI/CD integration settings | ||
Application Protection | Application protection | ||
System Configurations | Security report, feature settings, notification settings, and multi-account management | ||
SAU (Riyadh - Partner Region) Important The SAU (Riyadh - Partner Region) region is operated by a partner. | me-central-1 | Overview | Intelligent Assistant and overview |
Assets | Asset overview, server assets, container assets, serverless assets, cloud products, and websites | ||
Risk Governance | Asset exposure analysis, vulnerability management, CSPM, detection of AccessKey pair leaks, cloud honeypot, SDK for Malicious File Detection, and log analysis Important In this region, the SDK for malicious file detection feature only supports calling the SDK in servers to detect offline files. It does not support detecting files stored in OSS through the console. | ||
Detection and Response | Security alert, attack analysis, and log management | ||
CTDR | Dashboard, security alerts, security incident handling, SOAR, disposal center, log management, rule management, and integration center | ||
Host Protection | Anti-ransomware, virus detection, web tamper proofing, host rule management, and core file monitoring | ||
Container Protection | Container proactive defense, container file protection, container firewall, container image signing, and CI/CD integration settings | ||
Application Protection | Application protection | ||
System Configurations | Security report, feature settings, notification settings, and multi-account management |
Relation between regions and endpoints
Endpoints are domain names that Security Center provides for external access, including public network access addresses and VPC access addresses. When you integrate Security Center into your business system, you must configure endpoints in your programming tools, such as SDK, CLI, and API, to communicate with the server. For information about the endpoints supported by Security Center, see:
To use host protection, container protection, agentless detection, CSPM, and other capabilities, see Endpoints.
To use the detection and response capabilities provided by CTDR, see CTDR endpoints.
To use the SOAR capabilities provided by CTDR, see SOAR endpoints.