All Products
Search
Document Center

Security Center:Supported regions in Security Center

Last Updated:Aug 14, 2025

This topic describes the regions supported by Security Center and features available in each region.

Background

Supported regions

Note

Security Center has two service centers: the Shanghai service center and the Singapore service center. The Shanghai service center provides security detection and protection for assets in the China region. The Singapore service center provides security detection and protection for assets in regions outside of mainland China. The Security Center console displays assets and security risks separately for each region. Before you use features in the Security Center console, you must select the region where your assets are located.

For more information, see Region Description.

China regions

Region name

Region ID

Module

Supported features

China (Qingdao)

cn-qingdao

Overview

Overview

Assets

Asset overview, server assets, container assets, serverless assets, cloud products, and websites

Risk Governance

Asset exposure analysis, vulnerability management, Cloud Security Posture Management (CSPM), detection of AccessKey pair leaks, cloud honeypot, and log analysis

Detection and Response

Security alerts, attack analysis, and log management

Cloud Threat Detection and Response (CTDR)

Dashboard, security alerts, security incident handling, Security Orchestration, Automation and Response (SOAR), disposal center, log management, rule management, and integration center

Host Protection

Agentless detection, anti-ransomware, virus detection, web tamper proofing, host rule management, and core file monitoring

Container Protection

Container image scan, container proactive defense, container file protection, container firewall, container image signing, and CI/CD integration settings

Application Protection

Application protection

System Configurations

Playbook, security report, feature settings, notification settings, multi-account management, and compliance check

China (Beijing)

cn-beijing

Overview

Overview

Assets

Asset overview, server assets, container assets, serverless assets, cloud products, and websites

Risk Governance

Asset exposure analysis, vulnerability management, CSPM, detection of AccessKey pair leaks, cloud honeypot, SDK for Malicious File Detection, and log analysis

Detection and Response

Security alerts, attack analysis, and log management

CTDR

Dashboard, security alerts, security incident handling, SOAR, disposal center, log management, rule management, and integration center

Host Protection

Agentless detection, anti-ransomware, virus detection, web tamper proofing, host rule management, and core file monitoring

Container Protection

Container image scan, container proactive defense, container file protection, container firewall, container image signing, and CI/CD integration settings

Application Protection

Application protection

System Configurations

Playbook, security report, feature settings, notification settings, multi-account management, and compliance check

China (Zhangjiakou)

cn-zhangjiakou

Overview

Overview

Assets

Asset overview, server assets, container assets, serverless assets, cloud products, and websites

Risk Governance

Asset exposure analysis, vulnerability management, CSPM, detection of AccessKey pair leaks, cloud honeypot, SDK for Malicious File Detection, and log analysis

Detection and Response

Security alerts, attack analysis, and log management

CTDR

Dashboard, security alerts, security incident handling, SOAR, disposal center, log management, rule management, and integration center

Host Protection

Agentless detection, anti-ransomware, virus detection, web tamper proofing, host rule management, and core file monitoring

Container Protection

Container image scan, container proactive defense, container file protection, container firewall, container image signing, and CI/CD integration settings

Application Protection

Application protection

System Configurations

Playbook, security report, feature settings, notification settings, multi-account management, and compliance check

China (Hohhot)

cn-huhehaote

Overview

Overview

Assets

Asset overview, server assets, container assets, serverless assets, cloud products, and websites

Risk Governance

Asset exposure analysis, vulnerability management, CSPM, detection of AccessKey pair leaks, cloud honeypot, SDK for Malicious File Detection, and log analysis

Detection and Response

security alerts, attack analysis, and log management

CTDR

Dashboard, security alerts, security incident handling, SOAR, disposal center, log management, rule management, and integration center

Host Protection

Anti-ransomware, virus detection, web tamper proofing, host rule management, and core file monitoring

Container Protection

Container image scan, container proactive defense, container file protection, container firewall, container image signing, and CI/CD integration settings

Application Protection

Application protection

System Configurations

Playbook, security report, feature settings, notification settings, multi-account management, and compliance check

China (Ulanqab)

cn-wulanchabu

Overview

Overview

Assets

Asset overview, server assets, container assets, serverless assets, cloud products, and websites

Risk Governance

Asset exposure analysis, vulnerability management, CSPM, detection of AccessKey pair leaks, cloud honeypot, SDK for Malicious File Detection, and log analysis

Detection and Response

security alerts, attack analysis, and log management

CTDR

Dashboard, security alerts, security incident handling, SOAR, disposal center, log management, rule management, and integration center

Host Protection

Virus detection, web tamper proofing, host rule management, and core file monitoring

Container Protection

Container image scan, container proactive defense, container file protection, container firewall, container image signing, and CI/CD integration settings

Application Protection

Application protection

System Configurations

Playbook, security report, feature settings, notification settings, multi-account management, and compliance check

China (Hangzhou)

cn-hangzhou

Overview

Overview

Assets

Asset overview, server assets, container assets, serverless assets, cloud products, and websites

Risk Governance

Asset exposure analysis, vulnerability management, CSPM, detection of AccessKey pair leaks, cloud honeypot, SDK for Malicious File Detection, and log analysis

Detection and Response

Security alert, attack analysis, and log management

CTDR

Dashboard, security alerts, security incident handling, SOAR, disposal center, log management, rule management, and integration center

Host Protection

Agentless detection, anti-ransomware, virus detection, web tamper proofing, host rule management, and core file monitoring

Container Protection

Container image scan, container proactive defense, container file protection, container firewall, container image signing, and CI/CD integration settings

Application Protection

Application protection

System Configurations

Playbook, security report, feature settings, notification settings, multi-account management, and compliance check

China (Shanghai)

cn-shanghai

Overview

Overview

Assets

Asset overview, server assets, container assets, serverless assets, cloud products, and websites

Risk Governance

Asset exposure analysis, vulnerability management, CSPM, detection of AccessKey pair leaks, cloud honeypot, SDK for Malicious File Detection, and log analysis

Detection and Response

Security alerts, attack analysis, and log management

CTDR

Dashboard, security alerts, security incident handling, SOAR, disposal center, log management, rule management, and integration center

Host Protection

Agentless detection, anti-ransomware, virus scan, web tamper proofing, host rule management, and core file monitoring

Container protection

Container image scan, container proactive defense, container file protection, container firewall, container image signing, and CI/CD integration settings

Application protection

Application protection

System Configurations

Playbook, security report, feature settings, notification settings, multi-account management, and compliance checks

China (Nanjing - Local Region) (Closing Down)

cn-nanjing

Overview

Overview

Assets

Asset overview, server assets, container assets, serverless assets, cloud products, and websites

Risk governance

Asset exposure analysis, vulnerability management, CSPM, detection of AccessKey pair leaks, cloud honeypot, SDK for Malicious File Detection, and log analysis

Important

In this region, the SDK for malicious file detection feature only supports calling the SDK in servers to detect offline files. It does not support detecting files stored in OSS through the console.

Detection and Response

Security alerts, attack analysis, and log management

CTDR

Dashboard, security alert, security incident handling, SOAR, handling center, log management, rule management, and integration center

Host protection

Virus removal, web tamper proofing, host rule management, and core file monitoring

Container protection

Container proactive defense, container file protection, container firewall, container image signing, and CI/CD integration settings

Application protection

Application protection

System Configurations

Playbook, security report, feature settings, notification settings, multi-account management, and compliance checks

China (Fuzhou - Local Region) (Closing Down)

cn-fuzhou

Overview

Overview

Assets

Assets overview, server assets, container assets, serverless assets, cloud products, and websites

Risk governance

Asset exposure analysis, vulnerability management, CSPM, detection of AccessKey pair leaks, cloud honeypot, SDK for Malicious File Detection, and log analysis

Important

In this region, the SDK for malicious file detection feature only supports calling the SDK in servers to detect offline files. It does not support detecting files stored in OSS through the console.

Detection and response

Security alerts, attack analysis, and log management

CTDR

Dashboard, security alert, security incident handling, SOAR, handling center, log management, rule management, and integration center

Host protection

Virus removal, web tamper proofing, host rule management, and core file monitoring

Container protection

Container proactive defense, container file protection, container firewall, container image signing, and CI/CD integration settings

Application protection

Application protection

System Configurations

Playbook, security report, feature settings, notification settings, multi-account management, and compliance checks

China (Wuhan - Local Region)

cn-wuhan-lr

Overview

Overview

Assets

Asset overview, server assets, container assets, serverless assets, cloud products, and websites

Risk governance

Asset exposure analysis, vulnerability management, CSPM, detection of AccessKey pair leaks, cloud honeypot, SDK for Malicious File Detection, and log analysis

Important

In this region, the SDK for malicious file detection feature only supports calling the SDK in servers to detect offline files. It does not support detecting files stored in OSS through the console.

Detection and Response

Security alert, attack analysis, and log management

CTDR

Dashboard, security alert, security incident handling, SOAR, handling center, log management, rule management, and integration center

Host protection

Virus removal, web tamper proofing, host rule management, and core file monitoring

Container protection

Container proactive defense, container file protection, container firewall, container image signing, and CI/CD integration settings

Application protection

Application protection

System Configurations

Playbook, security report, feature settings, notification settings, multi-account management, and compliance checks

China (Shenzhen)

cn-shenzhen

Overview

Overview

Assets

Asset overview, server assets, container assets, serverless assets, cloud products, and websites

Risk governance

Asset exposure analysis, vulnerability management, CSPM, detection of AccessKey pair leaks, cloud honeypot, SDK for Malicious File Detection, and log analysis

Detection and Response

Security alerts, attack analysis, and log management

CTDR

Dashboard, security alert, security incident handling, SOAR, handling center, log management, rule management, and integration center

Host protection

Agentless detection, anti-ransomware, virus removal, web tamper proofing, host rule management, and core file monitoring

Container protection

Container image scan, container proactive defense, container file protection, container firewall, container image signing, and CI/CD integration settings

Application protection

Application protection

System Configurations

Playbook, security report, feature settings, notification settings, multi-account management, and compliance checks

China (Heyuan)

cn-heyuan

Overview

Overview

Assets

Asset overview, server assets, container assets, serverless assets, cloud products, and websites

Risk governance

Asset exposure analysis, vulnerability management, CSPM, detection of AccessKey pair leaks, cloud honeypot, malicious file detection software development kit (SDK), and log analysis

Detection and Response

Security alert, attack analysis, and log management

CTDR

Dashboard, security alert, security incident handling, SOAR, handling center, log management, rule management, and integration center

Host protection

Anti-ransomware, virus removal, web tamper proofing, host rule management, and core file monitoring

Container protection

Container image scan, container proactive defense, container file protection, container firewall, container image signing, and CI/CD integration settings

Application protection

Application protection

System Configurations

Playbook, security report, feature settings, notification settings, multi-account management, and compliance checks

China (Guangzhou)

cn-guangzhou

Overview

Overview

Assets

Asset overview, server assets, container assets, serverless assets, cloud products, and websites

Risk governance

Asset exposure analysis, vulnerability management, CSPM, detection of AccessKey pair leaks, cloud honeypot, SDK for Malicious File Detection, and log analysis

Detection and Response

Security alert, attack analysis, and log management

CTDR

Dashboard, security alert, security incident handling, SOAR, handling center, log management, rule management, and integration center

Host protection

Anti-ransomware, virus removal, web tamper proofing, host rule management, and core file monitoring

Container protection

Container image scan, container proactive defense, container file protection, container firewall, container image signing, and CI/CD integration settings

Application protection

Application protection

System Configurations

Playbook, security report, feature settings, notification settings, multi-account management, and compliance checks

China (Chengdu)

cn-chengdu

Overview

Overview

Assets

Asset overview, server assets, container assets, serverless assets, cloud products, and websites

Risk governance

Asset exposure analysis, vulnerability management, CSPM, detection of AccessKey pair leaks, cloud honeypot, SDK for Malicious File Detection, and log analysis

Detection and Response

Security alert, attack analysis, and log management

CTDR

Dashboard, security alert, security incident handling, SOAR, handling center, log management, rule management, and integration center

Host protection

Agentless detection, anti-ransomware, virus removal, web tamper proofing, host rule management, and core file monitoring

Container protection

Container image scan, container proactive defense, container file protection, container firewall, container image signing, and CI/CD integration settings

Application protection

Application protection

System Configurations

Playbook, security report, feature settings, notification settings, multi-account management, and compliance checks

China (Hong Kong)

cn-hongkong

Overview

Overview

Assets

Asset overview, server assets, container assets, serverless assets, cloud products, and websites

Risk governance

Asset exposure analysis, vulnerability management, CSPM, detection of AccessKey pair leaks, cloud honeypot, SDK for Malicious File Detection, and log analysis

Detection and Response

Security alert, attack analysis, and log management

CTDR

Dashboard, security alert, security incident handling, SOAR, handling center, log management, rule management, and integration center

Host protection

Agentless detection, anti-ransomware, virus removal, web tamper proofing, host rule management, and core file monitoring

Container protection

Container image scan, container proactive defense, container file protection, container firewall, container image signing, and CI/CD integration settings

Application protection

Application protection

System Configurations

Security report, feature settings, notification settings, and multi-account management

Regions outside China

Region name

Region ID

Module

Supported features

Singapore

ap-southeast-1

Overview

Overview

Assets

Asset overview, server assets, container assets, serverless assets, cloud products, and websites

Risk Governance

Asset exposure analysis, vulnerability management, CSPM, detection of AccessKey pair leaks, cloud honeypot, SDK for Malicious File Detection, and log analysis

Detection and Response

Security alert, attack analysis, and log management

CTDR

Dashboard, security alerts, security incident handling, SOAR, disposal center, log management, rule management, and integration center

Host Protection

Agentless detection, anti-ransomware, virus detection, web tamper proofing, host rule management, and core file monitoring

Container Protection

Container image scan, container proactive defense, container file protection, container firewall, container image signing, and CI/CD integration settings

Application Protection

Application Protection

System Configurations

Security report, feature settings, notification settings, and multi-account management

Malaysia (Kuala Lumpur)

ap-southeast-3

Overview

Overview

Assets

Asset overview, server assets, container assets, serverless assets, cloud products, and websites

Risk Governance

Asset exposure analysis, vulnerability management, CSPM, detection of AccessKey pair leaks, cloud honeypot, SDK for Malicious File Detection, and log analysis

Detection and Response

Security alert, attack analysis, and log management

CTDR

Dashboard, security alerts, security incident handling, SOAR, disposal center, log management, rule management, and integration center

Host Protection

Anti-ransomware, virus detection, web tamper proofing, host rule management, and core file monitoring

Container Protection

Container image scan, container proactive defense, container file protection, container firewall, container image signing, and CI/CD integration settings

Application Protection

Application Protection

System Configurations

Security report, feature settings, notification settings, and multi-account management

Indonesia (Jakarta)

ap-southeast-5

Overview

Overview

Assets

Asset overview, server assets, container assets, serverless assets, cloud products, and websites

Risk Governance

Asset exposure analysis, vulnerability management, CSPM, detection of AccessKey pair leaks, cloud honeypot, SDK for Malicious File Detection, and log analysis

Detection and Response

Security alert, attack analysis, and log management

CTDR

Dashboard, security alerts, security incident handling, SOAR, disposal center, log management, rule management, and integration center

Host Protection

Agentless detection, anti-ransomware, virus detection, web tamper proofing, host rule management, and core file monitoring

Container Protection

Container image scan, container proactive defense, container file protection, container firewall, container image signing, and CI/CD integration settings

Application Protection

Application protection

System Configurations

Security report, feature settings, notification settings, and multi-account management

Philippines (Manila)

ap-southeast-6

Overview

Overview

Assets

Asset overview, server assets, container assets, serverless assets, cloud products, and websites

Risk Governance

Asset exposure analysis, vulnerability management, CSPM, detection of AccessKey pair leaks, cloud honeypot, SDK for Malicious File Detection, and log analysis

Detection and Response

Security alert, attack analysis, and log management

CTDR

Dashboard, security alerts, security incident handling, SOAR, disposal center, log management, rule management, and integration center

Host Protection

Anti-ransomware, virus detection, web tamper proofing, host rule management, and core file monitoring

Container Protection

Container image scan, container proactive defense, container file protection, container firewall, container image signing, and CI/CD integration settings

Application Protection

Application protection

System Configurations

Security report, feature settings, notification settings, and multi-account management

Thailand (Bangkok)

ap-southeast-7

Overview

Overview

Assets

Asset overview, server assets, container assets, serverless assets, cloud products, and websites

Risk Governance

Asset exposure analysis, vulnerability management, CSPM, detection of AccessKey pair leaks, cloud honeypot, SDK for Malicious File Detection, and log analysis

Detection and Response

Security alert, attack analysis, and log management

CTDR

Dashboard, security alerts, security incident handling, SOAR, disposal center, log management, rule management, and integration center

Host Protection

Virus detection, web tamper proofing, host rule management, and core file monitoring

Container Protection

Container image scan, container proactive defense, container file protection, container firewall, container image signing, and CI/CD integration settings

Application Protection

Application Protection

System Configurations

Security report, feature settings, notification settings, and multi-account management

Japan (Tokyo)

ap-northeast-1

Overview

Overview

Assets

Asset overview, server assets, container assets, serverless assets, cloud products, and websites

Risk Governance

Asset exposure analysis, vulnerability management, CSPM, detection of AccessKey pair leaks, cloud honeypot, SDK for Malicious File Detection, and log analysis

Detection and Response

Security alert, attack analysis, and log management

CTDR

Dashboard, security alerts, security incident handling, SOAR, disposal center, log management, rule management, and integration center

Host Protection

Anti-ransomware, virus detection, web tamper proofing, host rule management, and core file monitoring

Container Protection

Container image scan, container proactive defense, container file protection, container firewall, container image signing, and CI/CD integration settings

Application Protection

Application protection

System Configurations

Security report, feature settings, notification settings, and multi-account management

South Korea (Seoul)

ap-northeast-2

Overview

Overview

Assets

Asset overview, server assets, container assets, serverless assets, cloud products, and websites

Risk Governance

Asset exposure analysis, vulnerability management, CSPM, detection of AccessKey pair leaks, cloud honeypot, SDK for Malicious File Detection, and log analysis

Detection and Response

Security alert, attack analysis, and log management

CTDR

Dashboard, security alerts, security incident handling, SOAR, disposal center, log management, rule management, and integration center

Host Protection

Virus detection, web tamper proofing, host rule management, and core file monitoring

Container Protection

Container image scan, container proactive defense, container file protection, container firewall, container image signing, and CI/CD integration settings

Application Protection

Application Protection

System Configurations

Security report, feature settings, notification settings, and multi-account management

US (Silicon Valley)

us-west-1

Overview

Overview

Assets

Asset overview, server assets, container assets, serverless assets, cloud products, and websites

Risk Governance

Asset exposure analysis, vulnerability management, CSPM, detection of AccessKey pair leaks, cloud honeypot, SDK for Malicious File Detection, and log analysis

Detection and Response

Security alert, attack analysis, and log management

CTDR

Dashboard, security alerts, security incident handling, SOAR, disposal center, log management, rule management, and integration center

Host Protection

Anti-ransomware, virus detection, web tamper proofing, host rule management, and core file monitoring

Container Protection

Container image scan, container proactive defense, container file protection, container firewall, container image signing, and CI/CD integration settings

Application Protection

Application protection

System Configurations

Security report, feature settings, notification settings, and multi-account management

US (Virginia)

us-east-1

Overview

Overview

Assets

Asset overview, server assets, container assets, serverless assets, cloud products, and websites

Risk Governance

Asset exposure analysis, vulnerability management, CSPM, detection of AccessKey pair leaks, cloud honeypot, SDK for Malicious File Detection, and log analysis

Detection and Response

Security alert, attack analysis, and log management

CTDR

Dashboard, security alerts, security incident handling, SOAR, disposal center, log management, rule management, and integration center

Host Protection

Agentless detection, anti-ransomware, virus detection, web tamper proofing, host rule management, and core file monitoring

Container Protection

Container image scan, container proactive defense, container file protection, container firewall, container image signing, and CI/CD integration settings

Application Protection

Application protection

System Configurations

Security report, feature settings, notification settings, and multi-account management

Germany (Frankfurt)

eu-central-1

Overview

Overview

Assets

Asset overview, server assets, container assets, serverless assets, cloud products, and websites

Risk Governance

Asset exposure analysis, vulnerability management, CSPM, detection of AccessKey pair leaks, cloud honeypot, SDK for Malicious File Detection, and log analysis

Detection and Response

Security alert, attack analysis, and log management

CTDR

Dashboard, security alerts, security incident handling, SOAR, disposal center, log management, rule management, and integration center

Host Protection

Anti-ransomware, virus detection, web tamper proofing, host rule management, and core file monitoring

Container Protection

Container image scan, container proactive defense, container file protection, container firewall, container image signing, and CI/CD integration settings

Application Protection

Application Protection

System Configurations

Security report, feature settings, notification settings, and multi-account management

UK (London)

eu-west-1

Overview

Overview

Assets

Asset overview, server assets, container assets, serverless assets, cloud products, and websites

Risk Governance

Asset exposure analysis, vulnerability management, CSPM, detection of AccessKey pair leaks, cloud honeypot, SDK for Malicious File Detection, and log analysis

Detection and Response

Security alert, attack analysis, and log management

CTDR

Dashboard, security alerts, security incident handling, SOAR, disposal center, log management, rule management, and integration center

Host Protection

Anti-ransomware, virus detection, web tamper proofing, host rule management, and core file monitoring

Container Protection

Container image scan, container proactive defense, container file protection, container firewall, container image signing, and CI/CD integration settings

Application Protection

Application protection

System Configurations

Security report, feature settings, notification settings, and multi-account management

UAE (Dubai)

me-east-1

Overview

Overview

Assets

Asset overview, server assets, container assets, serverless assets, cloud products, and websites

Risk Governance

Asset exposure analysis, vulnerability management, CSPM, detection of AccessKey pair leaks, cloud honeypot, SDK for Malicious File Detection, and log analysis

Important

In this region, the SDK for malicious file detection feature only supports calling the SDK in servers to detect offline files. It does not support detecting files stored in OSS through the console.

Detection and Response

Security alert, attack analysis, and log management

CTDR

Dashboard, security alerts, security incident handling, SOAR, disposal center, log management, rule management, and integration center

Host Protection

Virus detection, web tamper proofing, host rule management, and core file monitoring

Container Protection

Container proactive defense, container file protection, container firewall, container image signing, and CI/CD integration settings

Application Protection

Application protection

System Configurations

Security report, feature settings, notification settings, and multi-account management

Mexico

na-south-1

Overview

Intelligent Assistant and overview

Assets

Asset overview, server assets, container assets, serverless assets, cloud products, and websites

Risk Governance

Asset exposure analysis, vulnerability management, CSPM, detection of AccessKey pair leaks, cloud honeypot, SDK for Malicious File Detection, and log analysis

Important

In this region, the SDK for malicious file detection feature only supports calling the SDK in servers to detect offline files. It does not support detecting files stored in OSS through the console.

Detection and Response

Security alert, attack analysis, and log management

CTDR

Dashboard, security alerts, security incident handling, SOAR, disposal center, log management, rule management, and integration center

Host Protection

Virus detection, web tamper proofing, host rule management, and core file monitoring

Container Protection

Container proactive defense, container file protection, container firewall, container image signing, and CI/CD integration settings

Application Protection

Application protection

System Configurations

Security report, feature settings, notification settings, and multi-account management

SAU (Riyadh - Partner Region)

Important

The SAU (Riyadh - Partner Region) region is operated by a partner.

me-central-1

Overview

Intelligent Assistant and overview

Assets

Asset overview, server assets, container assets, serverless assets, cloud products, and websites

Risk Governance

Asset exposure analysis, vulnerability management, CSPM, detection of AccessKey pair leaks, cloud honeypot, SDK for Malicious File Detection, and log analysis

Important

In this region, the SDK for malicious file detection feature only supports calling the SDK in servers to detect offline files. It does not support detecting files stored in OSS through the console.

Detection and Response

Security alert, attack analysis, and log management

CTDR

Dashboard, security alerts, security incident handling, SOAR, disposal center, log management, rule management, and integration center

Host Protection

Anti-ransomware, virus detection, web tamper proofing, host rule management, and core file monitoring

Container Protection

Container proactive defense, container file protection, container firewall, container image signing, and CI/CD integration settings

Application Protection

Application protection

System Configurations

Security report, feature settings, notification settings, and multi-account management

Relation between regions and endpoints

Endpoints are domain names that Security Center provides for external access, including public network access addresses and VPC access addresses. When you integrate Security Center into your business system, you must configure endpoints in your programming tools, such as SDK, CLI, and API, to communicate with the server. For information about the endpoints supported by Security Center, see:

  • To use host protection, container protection, agentless detection, CSPM, and other capabilities, see Endpoints.

  • To use the detection and response capabilities provided by CTDR, see CTDR endpoints.

  • To use the SOAR capabilities provided by CTDR, see SOAR endpoints.