This topic describes the regions that Security Center supports and the features available in each region.
Background information
If you are not familiar with regions and zones, see Regions and zones.
You can view a map of the global deployment of Alibaba Cloud services at Alibaba Cloud Global Infrastructure.
Security Center deploys two service centers globally to ensure data compliance and proximity services. Data and configurations in different regions are isolated from each other. In the Security Center console, you can select the region that matches your asset's location from the top navigation bar.
Data center in the Chinese mainland: Provides security detection and mitigation capabilities for assets in the Chinese Mainland region.
Singapore data center: Provides security detection and mitigation capabilities for assets in regions Outside Chinese Mainland.
Supported regions
China Region
Region name | Region ID | Area | Functional Module | Supported features |
China (Qingdao) | cn-qingdao | China | Overview | Overview |
Asset Center | Asset overview, server assets, container assets, Serverless assets, cloud products, and websites | |||
Risk Governance | Asset exposure analysis, vulnerability management, Cloud Security Posture Management (CSPM), detection of AccessKey pair leaks, cloud honeypot, malicious file detection, and log analysis | |||
Detection and Response | Security alerts, attack analysis, Log Management, security incident handling, and disposal center | |||
Agentic SOC | Dashboard, security alerts, security incident handling, Security Orchestration, Automation and Response (SOAR), disposal center, Log Management, rule management, and Integration Center | |||
Host Protection | Agentless detection, anti-ransomware, virus detection, web tamper-proofing, host rule management, and core file monitoring | |||
Container Protection | Container image scan, container proactive defense, container file protection, container firewall, container image signing, and CI/CD integration settings | |||
Application Protection | Application protection | |||
System Configurations | Task Hub, security report, feature settings, notification settings, multi-account security management, and compliance check | |||
China (Beijing) | cn-beijing | China | Overview | Overview |
Asset Center | Asset overview, server assets, container assets, Serverless assets, cloud products, and websites | |||
Risk Governance | Asset exposure analysis, vulnerability management, Cloud Security Posture Management (CSPM), detection of AccessKey pair leaks, cloud honeypot, malicious file detection, and log analysis | |||
Detection and Response | Security alerts, attack analysis, Log Management, security incident handling, and disposal center | |||
Agentic SOC | Dashboard, security alerts, security incident handling, Security Orchestration, Automation and Response (SOAR), disposal center, Log Management, rule management, and Integration Center | |||
Host Protection | Agentless detection, anti-ransomware, virus detection, web tamper-proofing, host rule management, and core file monitoring | |||
Container Protection | Container image scan, container proactive defense, container file protection, container firewall, container image signing, and CI/CD integration settings | |||
Application Protection | Application protection | |||
System Configurations | Task Hub, security report, feature settings, notification settings, multi-account security management, and compliance check | |||
China (Zhangjiakou) | cn-zhangjiakou | China | Overview | Overview |
Asset Center | Asset overview, server assets, container assets, Serverless assets, cloud products, and websites | |||
Risk Governance | Asset exposure analysis, vulnerability management, Cloud Security Posture Management (CSPM), detection of AccessKey pair leaks, cloud honeypot, malicious file detection, and log analysis | |||
Detection and Response | Security alerts, attack analysis, Log Management, security incident handling, and disposal center | |||
Agentic SOC | Dashboard, security alerts, security incident handling, Security Orchestration, Automation and Response (SOAR), disposal center, Log Management, rule management, and Integration Center | |||
Host Protection | Agentless detection, anti-ransomware, virus detection, web tamper-proofing, host rule management, and core file monitoring | |||
Container Protection | Container image scan, container proactive defense, container file protection, container firewall, container image signing, and CI/CD integration settings | |||
Application Protection | Application protection | |||
System Configurations | Task Hub, security report, feature settings, notification settings, multi-account security management, and compliance check | |||
China (Hohhot) | cn-huhehaote | China | Overview | Overview |
Asset Center | Asset overview, server assets, container assets, Serverless assets, cloud products, and websites | |||
Risk Governance | Asset exposure analysis, vulnerability management, Cloud Security Posture Management (CSPM), detection of AccessKey pair leaks, cloud honeypot, malicious file detection, and log analysis | |||
Detection and Response | Security alerts, attack analysis, Log Management, security incident handling, and disposal center | |||
Agentic SOC | Dashboard, security alerts, security incident handling, Security Orchestration, Automation and Response (SOAR), disposal center, Log Management, rule management, and Integration Center | |||
Host Protection | anti-ransomware, virus detection, web tamper-proofing, host rule management, and core file monitoring | |||
Container Protection | Container image scan, container proactive defense, container file protection, container firewall, container image signing, and CI/CD integration settings | |||
Application Protection | Application protection | |||
System Configurations | Task Hub, security report, feature settings, notification settings, multi-account security management, and compliance check | |||
China (Ulanqab) | cn-wulanchabu | China | Overview | Overview |
Asset Center | Asset overview, server assets, container assets, Serverless assets, cloud products, and websites | |||
Risk Governance | Asset exposure analysis, vulnerability management, Cloud Security Posture Management (CSPM), detection of AccessKey pair leaks, cloud honeypot, malicious file detection, and log analysis | |||
Detection and Response | Security alerts, attack analysis, Log Management, security incident handling, and disposal center | |||
Agentic SOC | Dashboard, security alerts, security incident handling, Security Orchestration, Automation and Response (SOAR), disposal center, Log Management, rule management, and Integration Center | |||
Host Protection | virus detection, web tamper-proofing, host rule management, and core file monitoring | |||
Container Protection | Container image scan, container proactive defense, container file protection, container firewall, container image signing, and CI/CD integration settings | |||
Application Protection | Application protection | |||
System Configurations | Task Hub, security report, feature settings, notification settings, multi-account security management, and compliance check | |||
China (Hangzhou) | cn-hangzhou | China | Overview | Overview |
Asset Center | Asset overview, server assets, container assets, Serverless assets, cloud products, and websites | |||
Risk Governance | Asset exposure analysis, vulnerability management, Cloud Security Posture Management (CSPM), detection of AccessKey pair leaks, cloud honeypot, malicious file detection, and log analysis | |||
Detection and Response | Security alerts, attack analysis, Log Management, security incident handling, and disposal center | |||
Agentic SOC | Dashboard, security alerts, security incident handling, Security Orchestration, Automation and Response (SOAR), disposal center, Log Management, rule management, and Integration Center | |||
Host Protection | Agentless detection, anti-ransomware, virus detection, web tamper-proofing, host rule management, and core file monitoring | |||
Container Protection | Container image scan, container proactive defense, container file protection, container firewall, container image signing, and CI/CD integration settings | |||
Application Protection | Application protection | |||
System Configurations | Task Hub, security report, feature settings, notification settings, multi-account security management, and compliance check | |||
China (Shanghai) | cn-shanghai | China | Overview | Overview |
Asset Center | Asset overview, server assets, container assets, Serverless assets, cloud products, and websites | |||
Risk Governance | Asset exposure analysis, vulnerability management, Cloud Security Posture Management (CSPM), detection of AccessKey pair leaks, cloud honeypot, malicious file detection, and log analysis | |||
Detection and Response | Security alerts, attack analysis, Log Management, security incident handling, and disposal center | |||
Agentic SOC | Dashboard, security alerts, security incident handling, Security Orchestration, Automation and Response (SOAR), disposal center, Log Management, rule management, and Integration Center | |||
Host Protection | Agentless detection, anti-ransomware, virus detection, web tamper-proofing, host rule management, and core file monitoring | |||
Container Protection | Container image scan, container proactive defense, container file protection, container firewall, container image signing, and CI/CD integration settings | |||
Application Protection | Application protection | |||
System Configurations | Task Hub, security report, feature settings, notification settings, multi-account security management, and compliance check | |||
China (Nanjing - Local Region) Closing Down | cn-nanjing | China | Overview | Overview |
Asset Center | Asset overview, server assets, container assets, Serverless assets, cloud products, and websites | |||
Risk Governance | Asset exposure analysis, vulnerability management, Cloud Security Posture Management (CSPM), detection of AccessKey pair leaks, cloud honeypot, malicious file detection, and log analysis Important In this region, the malicious file detection feature only supports calling the SDK in servers to detect offline files. It does not support detecting files stored in OSS through the console. | |||
Detection and Response | Security alerts, attack analysis, Log Management, security incident handling, and disposal center | |||
Agentic SOC | Dashboard, security alerts, security incident handling, Security Orchestration, Automation and Response (SOAR), disposal center, Log Management, rule management, and Integration Center | |||
Host Protection | virus detection, web tamper-proofing, host rule management, and core file monitoring | |||
Container Protection | container proactive defense, container file protection, container firewall, container image signing, and CI/CD integration settings | |||
Application Protection | Application protection | |||
System Configurations | Task Hub, security report, feature settings, notification settings, multi-account security management, and compliance check | |||
China (Fuzhou - Local Region) Closing Down | cn-fuzhou | China | Overview | Overview |
Asset Center | Asset overview, server assets, container assets, Serverless assets, cloud products, and websites | |||
Risk Governance | Asset exposure analysis, vulnerability management, Cloud Security Posture Management (CSPM), detection of AccessKey pair leaks, cloud honeypot, malicious file detection, and log analysis Important In this region, the malicious file detection feature only supports calling the SDK in servers to detect offline files. It does not support detecting files stored in OSS through the console. | |||
Detection and Response | Security alerts, attack analysis, Log Management, security incident handling, and disposal center | |||
Agentic SOC | Dashboard, security alerts, security incident handling, Security Orchestration, Automation and Response (SOAR), disposal center, Log Management, rule management, and Integration Center | |||
Host Protection | virus detection, web tamper-proofing, host rule management, and core file monitoring | |||
Container Protection | container proactive defense, container file protection, container firewall, container image signing, and CI/CD integration settings | |||
Application Protection | Application protection | |||
System Configurations | Task Hub, security report, feature settings, notification settings, multi-account security management, and compliance check | |||
China (Wuhan - Local Region) | cn-wuhan-lr | China | Overview | Overview |
Asset Center | Asset overview, server assets, container assets, Serverless assets, cloud products, and websites | |||
Risk Governance | Asset exposure analysis, vulnerability management, Cloud Security Posture Management (CSPM), detection of AccessKey pair leaks, cloud honeypot, malicious file detection, and log analysis Important In this region, the malicious file detection feature only supports calling the SDK in servers to detect offline files. It does not support detecting files stored in OSS through the console. | |||
Detection and Response | Security alerts, attack analysis, Log Management, security incident handling, and disposal center | |||
Agentic SOC | Dashboard, security alerts, security incident handling, Security Orchestration, Automation and Response (SOAR), disposal center, Log Management, rule management, and Integration Center | |||
Host Protection | virus detection, web tamper-proofing, host rule management, and core file monitoring | |||
Container Protection | container proactive defense, container file protection, container firewall, container image signing, and CI/CD integration settings | |||
Application Protection | Application protection | |||
System Configurations | Task Hub, security report, feature settings, notification settings, multi-account security management, and compliance check | |||
China (Shenzhen) | cn-shenzhen | China | Overview | Overview |
Asset Center | Asset overview, server assets, container assets, Serverless assets, cloud products, and websites | |||
Risk Governance | Asset exposure analysis, vulnerability management, Cloud Security Posture Management (CSPM), detection of AccessKey pair leaks, cloud honeypot, malicious file detection, and log analysis | |||
Detection and Response | Security alerts, attack analysis, Log Management, security incident handling, and disposal center | |||
Agentic SOC | Dashboard, security alerts, security incident handling, Security Orchestration, Automation and Response (SOAR), disposal center, Log Management, rule management, and Integration Center | |||
Host Protection | Agentless detection, anti-ransomware, virus detection, web tamper-proofing, host rule management, and core file monitoring | |||
Container Protection | Container image scan, container proactive defense, container file protection, container firewall, container image signing, and CI/CD integration settings | |||
Application Protection | Application protection | |||
System Configurations | Task Hub, security report, feature settings, notification settings, multi-account security management, and compliance check | |||
China (Heyuan) | cn-heyuan | China | Overview | Overview |
Asset Center | Asset overview, server assets, container assets, Serverless assets, cloud products, and websites | |||
Risk Governance | Asset exposure analysis, vulnerability management, Cloud Security Posture Management (CSPM), detection of AccessKey pair leaks, cloud honeypot, malicious file detection, and log analysis | |||
Detection and Response | Security alerts, attack analysis, Log Management, security incident handling, and disposal center | |||
Agentic SOC | Dashboard, security alerts, security incident handling, Security Orchestration, Automation and Response (SOAR), disposal center, Log Management, rule management, and Integration Center | |||
Host Protection | anti-ransomware, virus detection, web tamper-proofing, host rule management, and core file monitoring | |||
Container Protection | Container image scan, container proactive defense, container file protection, container firewall, container image signing, and CI/CD integration settings | |||
Application Protection | Application protection | |||
System Configurations | Task Hub, security report, feature settings, notification settings, multi-account security management, and compliance check | |||
China (Guangzhou) | cn-guangzhou | China | Overview | Overview |
Asset Center | Asset overview, server assets, container assets, Serverless assets, cloud products, and websites | |||
Risk Governance | Asset exposure analysis, vulnerability management, Cloud Security Posture Management (CSPM), detection of AccessKey pair leaks, cloud honeypot, malicious file detection, and log analysis | |||
Detection and Response | Security alerts, attack analysis, Log Management, security incident handling, and disposal center | |||
Agentic SOC | Dashboard, security alerts, security incident handling, Security Orchestration, Automation and Response (SOAR), disposal center, Log Management, rule management, and Integration Center | |||
Host Protection | anti-ransomware, virus detection, web tamper-proofing, host rule management, and core file monitoring | |||
Container Protection | Container image scan, container proactive defense, container file protection, container firewall, container image signing, and CI/CD integration settings | |||
Application Protection | Application protection | |||
System Configurations | Task Hub, security report, feature settings, notification settings, multi-account security management, and compliance check | |||
China (Chengdu) | cn-chengdu | China | Overview | Overview |
Asset Center | Asset overview, server assets, container assets, Serverless assets, cloud products, and websites | |||
Risk Governance | Asset exposure analysis, vulnerability management, Cloud Security Posture Management (CSPM), detection of AccessKey pair leaks, cloud honeypot, malicious file detection, and log analysis | |||
Detection and Response | Security alerts, attack analysis, Log Management, security incident handling, and disposal center | |||
Agentic SOC | Dashboard, security alerts, security incident handling, Security Orchestration, Automation and Response (SOAR), disposal center, Log Management, rule management, and Integration Center | |||
Host Protection | Agentless detection, anti-ransomware, virus detection, web tamper-proofing, host rule management, and core file monitoring | |||
Container Protection | Container image scan, container proactive defense, container file protection, container firewall, container image signing, and CI/CD integration settings | |||
Application Protection | Application protection | |||
System Configurations | Task Hub, security report, feature settings, notification settings, multi-account security management, and compliance check | |||
China (Hong Kong) | cn-hongkong | China | Overview | Overview |
Asset Center | Asset overview, server assets, container assets, Serverless assets, cloud products, and websites | |||
Risk Governance | Asset exposure analysis, vulnerability management, Cloud Security Posture Management (CSPM), detection of AccessKey pair leaks, cloud honeypot, malicious file detection, and log analysis | |||
Detection and Response | Security alerts, attack analysis, Log Management, security incident handling, and disposal center | |||
Agentic SOC | Dashboard, security alerts, security incident handling, Security Orchestration, Automation and Response (SOAR), disposal center, Log Management, rule management, and Integration Center | |||
Host Protection | Agentless detection, anti-ransomware, virus detection, web tamper-proofing, host rule management, and core file monitoring | |||
Container Protection | Container image scan, container proactive defense, container file protection, container firewall, container image signing, and CI/CD integration settings | |||
Application Protection | Application protection | |||
System Configurations | security report, feature settings, notification settings, multi-account security management |
Other countries and regions
Region name | Region ID | Area | Functional Module | Supported features |
Singapore | ap-southeast-1 | Global (excluding China) | Overview | Overview |
Asset Center | Asset overview, server assets, container assets, Serverless assets, cloud products, and websites | |||
Risk Governance | Asset exposure analysis, vulnerability management, Cloud Security Posture Management (CSPM), detection of AccessKey pair leaks, cloud honeypot, malicious file detection, and log analysis | |||
Detection and Response | Security alerts, attack analysis, Log Management, security incident handling, and disposal center | |||
Agentic SOC | Dashboard, security alerts, security incident handling, Security Orchestration, Automation and Response (SOAR), disposal center, Log Management, rule management, and Integration Center | |||
Host Protection | Agentless detection, anti-ransomware, virus detection, web tamper-proofing, host rule management, and core file monitoring | |||
Container Protection | Container image scan, container proactive defense, container file protection, container firewall, container image signing, and CI/CD integration settings | |||
Application Protection | Application protection | |||
System Configurations | security report, feature settings, notification settings, multi-account security management | |||
Malaysia (Kuala Lumpur) | ap-southeast-3 | Global (excluding China) | Overview | Overview |
Asset Center | Asset overview, server assets, container assets, Serverless assets, cloud products, and websites | |||
Risk Governance | Asset exposure analysis, vulnerability management, Cloud Security Posture Management (CSPM), detection of AccessKey pair leaks, cloud honeypot, malicious file detection, and log analysis | |||
Detection and Response | Security alerts, attack analysis, Log Management, security incident handling, and disposal center | |||
Agentic SOC | Dashboard, security alerts, security incident handling, Security Orchestration, Automation and Response (SOAR), disposal center, Log Management, rule management, and Integration Center | |||
Host Protection | anti-ransomware, virus detection, web tamper-proofing, host rule management, and core file monitoring | |||
Container Protection | Container image scan, container proactive defense, container file protection, container firewall, container image signing, and CI/CD integration settings | |||
Application Protection | Application protection | |||
System Configurations | security report, feature settings, notification settings, multi-account security management | |||
Indonesia (Jakarta) | ap-southeast-5 | Global (excluding China) | Overview | Overview |
Asset Center | Asset overview, server assets, container assets, Serverless assets, cloud products, and websites | |||
Risk Governance | Asset exposure analysis, vulnerability management, Cloud Security Posture Management (CSPM), detection of AccessKey pair leaks, cloud honeypot, malicious file detection, and log analysis | |||
Detection and Response | Security alerts, attack analysis, Log Management, security incident handling, and disposal center | |||
Agentic SOC | Dashboard, security alerts, security incident handling, Security Orchestration, Automation and Response (SOAR), disposal center, Log Management, rule management, and Integration Center | |||
Host Protection | Agentless detection, anti-ransomware, virus detection, web tamper-proofing, host rule management, and core file monitoring | |||
Container Protection | Container image scan, container proactive defense, container file protection, container firewall, container image signing, and CI/CD integration settings | |||
Application Protection | Application protection | |||
System Configurations | security report, feature settings, notification settings, multi-account security management | |||
Philippines (Manila) | ap-southeast-6 | Global (excluding China) | Overview | Overview |
Asset Center | Asset overview, server assets, container assets, Serverless assets, cloud products, and websites | |||
Risk Governance | Asset exposure analysis, vulnerability management, Cloud Security Posture Management (CSPM), detection of AccessKey pair leaks, cloud honeypot, malicious file detection, and log analysis | |||
Detection and Response | Security alerts, attack analysis, Log Management, security incident handling, and disposal center | |||
Agentic SOC | Dashboard, security alerts, security incident handling, Security Orchestration, Automation and Response (SOAR), disposal center, Log Management, rule management, and Integration Center | |||
Host Protection | anti-ransomware, virus detection, web tamper-proofing, host rule management, and core file monitoring | |||
Container Protection | Container image scan, container proactive defense, container file protection, container firewall, container image signing, and CI/CD integration settings | |||
Application Protection | Application protection | |||
System Configurations | security report, feature settings, notification settings, multi-account security management | |||
Thailand (Bangkok) | ap-southeast-7 | Global (excluding China) | Overview | Overview |
Asset Center | Asset overview, server assets, container assets, Serverless assets, cloud products, and websites | |||
Risk Governance | Asset exposure analysis, vulnerability management, Cloud Security Posture Management (CSPM), detection of AccessKey pair leaks, cloud honeypot, malicious file detection, and log analysis | |||
Detection and Response | Security alerts, attack analysis, Log Management, security incident handling, and disposal center | |||
Agentic SOC | Dashboard, security alerts, security incident handling, Security Orchestration, Automation and Response (SOAR), disposal center, Log Management, rule management, and Integration Center | |||
Host Protection | virus detection, web tamper-proofing, host rule management, and core file monitoring | |||
Container Protection | Container image scan, container proactive defense, container file protection, container firewall, container image signing, and CI/CD integration settings | |||
Application Protection | Application protection | |||
System Configurations | security report, feature settings, notification settings, multi-account security management | |||
Japan (Tokyo) | ap-northeast-1 | Global (excluding China) | Overview | Overview |
Asset Center | Asset overview, server assets, container assets, Serverless assets, cloud products, and websites | |||
Risk Governance | Asset exposure analysis, vulnerability management, Cloud Security Posture Management (CSPM), detection of AccessKey pair leaks, cloud honeypot, malicious file detection, and log analysis | |||
Detection and Response | Security alerts, attack analysis, Log Management, security incident handling, and disposal center | |||
Agentic SOC | Dashboard, security alerts, security incident handling, Security Orchestration, Automation and Response (SOAR), disposal center, Log Management, rule management, and Integration Center | |||
Host Protection | anti-ransomware, virus detection, web tamper-proofing, host rule management, and core file monitoring | |||
Container Protection | Container image scan, container proactive defense, container file protection, container firewall, container image signing, and CI/CD integration settings | |||
Application Protection | Application protection | |||
System Configurations | security report, feature settings, notification settings, multi-account security management | |||
South Korea (Seoul) | ap-northeast-2 | Global (excluding China) | Overview | Overview |
Asset Center | Asset overview, server assets, container assets, Serverless assets, cloud products, and websites | |||
Risk Governance | Asset exposure analysis, vulnerability management, Cloud Security Posture Management (CSPM), detection of AccessKey pair leaks, cloud honeypot, malicious file detection, and log analysis | |||
Detection and Response | Security alerts, attack analysis, Log Management, security incident handling, and disposal center | |||
Agentic SOC | Dashboard, security alerts, security incident handling, Security Orchestration, Automation and Response (SOAR), disposal center, Log Management, rule management, and Integration Center | |||
Host Protection | virus detection, web tamper-proofing, host rule management, and core file monitoring | |||
Container Protection | Container image scan, container proactive defense, container file protection, container firewall, container image signing, and CI/CD integration settings | |||
Application Protection | Application protection | |||
System Configurations | security report, feature settings, notification settings, multi-account security management | |||
US (Silicon Valley) | us-west-1 | Global (excluding China) | Overview | Overview |
Asset Center | Asset overview, server assets, container assets, Serverless assets, cloud products, and websites | |||
Risk Governance | Asset exposure analysis, vulnerability management, Cloud Security Posture Management (CSPM), detection of AccessKey pair leaks, cloud honeypot, malicious file detection, and log analysis | |||
Detection and Response | Security alerts, attack analysis, Log Management, security incident handling, and disposal center | |||
Agentic SOC | Dashboard, security alerts, security incident handling, Security Orchestration, Automation and Response (SOAR), disposal center, Log Management, rule management, and Integration Center | |||
Host Protection | anti-ransomware, virus detection, web tamper-proofing, host rule management, and core file monitoring | |||
Container Protection | Container image scan, container proactive defense, container file protection, container firewall, container image signing, and CI/CD integration settings | |||
Application Protection | Application protection | |||
System Configurations | security report, feature settings, notification settings, multi-account security management | |||
US (Virginia) | us-east-1 | Global (excluding China) | Overview | Overview |
Asset Center | Asset overview, server assets, container assets, Serverless assets, cloud products, and websites | |||
Risk Governance | Asset exposure analysis, vulnerability management, Cloud Security Posture Management (CSPM), detection of AccessKey pair leaks, cloud honeypot, malicious file detection, and log analysis | |||
Detection and Response | Security alerts, attack analysis, Log Management, security incident handling, and disposal center | |||
Agentic SOC | Dashboard, security alerts, security incident handling, Security Orchestration, Automation and Response (SOAR), disposal center, Log Management, rule management, and Integration Center | |||
Host Protection | Agentless detection, anti-ransomware, virus detection, web tamper-proofing, host rule management, and core file monitoring | |||
Container Protection | Container image scan, container proactive defense, container file protection, container firewall, container image signing, and CI/CD integration settings | |||
Application Protection | Application protection | |||
System Configurations | security report, feature settings, notification settings, multi-account security management | |||
Germany (Frankfurt) | eu-central-1 | Global (excluding China) | Overview | Overview |
Asset Center | Asset overview, server assets, container assets, Serverless assets, cloud products, and websites | |||
Risk Governance | Asset exposure analysis, vulnerability management, Cloud Security Posture Management (CSPM), detection of AccessKey pair leaks, cloud honeypot, malicious file detection, and log analysis | |||
Detection and Response | Security alerts, attack analysis, Log Management, security incident handling, and disposal center | |||
Agentic SOC | Dashboard, security alerts, security incident handling, Security Orchestration, Automation and Response (SOAR), disposal center, Log Management, rule management, and Integration Center | |||
Host Protection | anti-ransomware, virus detection, web tamper-proofing, host rule management, and core file monitoring | |||
Container Protection | Container image scan, container proactive defense, container file protection, container firewall, container image signing, and CI/CD integration settings | |||
Application Protection | Application protection | |||
System Configurations | security report, feature settings, notification settings, multi-account security management | |||
UK (London) | eu-west-1 | Global (excluding China) | Overview | Overview |
Asset Center | Asset overview, server assets, container assets, Serverless assets, cloud products, and websites | |||
Risk Governance | Asset exposure analysis, vulnerability management, Cloud Security Posture Management (CSPM), detection of AccessKey pair leaks, cloud honeypot, malicious file detection, and log analysis | |||
Detection and Response | Security alerts, attack analysis, Log Management, security incident handling, and disposal center | |||
Agentic SOC | Dashboard, security alerts, security incident handling, Security Orchestration, Automation and Response (SOAR), disposal center, Log Management, rule management, and Integration Center | |||
Host Protection | anti-ransomware, virus detection, web tamper-proofing, host rule management, and core file monitoring | |||
Container Protection | Container image scan, container proactive defense, container file protection, container firewall, container image signing, and CI/CD integration settings | |||
Application Protection | Application protection | |||
System Configurations | security report, feature settings, notification settings, multi-account security management | |||
UAE (Dubai) | me-east-1 | Global (excluding China) | Overview | Overview |
Asset Center | Asset overview, server assets, container assets, Serverless assets, cloud products, and websites | |||
Risk Governance | Asset exposure analysis, vulnerability management, Cloud Security Posture Management (CSPM), detection of AccessKey pair leaks, cloud honeypot, malicious file detection, and log analysis Important In this region, the malicious file detection feature only supports calling the SDK in servers to detect offline files. It does not support detecting files stored in OSS through the console. | |||
Detection and Response | Security alerts, attack analysis, Log Management, security incident handling, and disposal center | |||
Agentic SOC | Dashboard, security alerts, security incident handling, Security Orchestration, Automation and Response (SOAR), disposal center, Log Management, rule management, and Integration Center | |||
Host Protection | virus detection, web tamper-proofing, host rule management, and core file monitoring | |||
Container Protection | container proactive defense, container file protection, container firewall, container image signing, and CI/CD integration settings | |||
Application Protection | Application protection | |||
System Configurations | security report, feature settings, notification settings, multi-account security management | |||
Mexico | na-south-1 | Global (excluding China) | Overview | Intelligent Assistant, Overview |
Asset Center | Asset overview, server assets, container assets, Serverless assets, cloud products, and websites | |||
Risk Governance | Asset exposure analysis, vulnerability management, Cloud Security Posture Management (CSPM), detection of AccessKey pair leaks, cloud honeypot, malicious file detection, and log analysis Important In this region, the malicious file detection feature only supports calling the SDK in servers to detect offline files. It does not support detecting files stored in OSS through the console. | |||
Detection and Response | Security alerts, attack analysis, Log Management, security incident handling, and disposal center | |||
Agentic SOC | Dashboard, security alerts, security incident handling, Security Orchestration, Automation and Response (SOAR), disposal center, Log Management, rule management, and Integration Center | |||
Host Protection | virus detection, web tamper-proofing, host rule management, and core file monitoring | |||
Container Protection | container proactive defense, container file protection, container firewall, container image signing, and CI/CD integration settings | |||
Application Protection | Application protection | |||
System Configurations | security report, feature settings, notification settings, multi-account security management | |||
SAU (Riyadh - Partner Region) Important The SAU (Riyadh - Partner Region) region is operated by a partner. | me-central-1 | Global (excluding China) | Overview | Intelligent Assistant, Overview |
Asset Center | Asset overview, server assets, container assets, Serverless assets, cloud products, and websites | |||
Risk Governance | Asset exposure analysis, vulnerability management, Cloud Security Posture Management (CSPM), detection of AccessKey pair leaks, cloud honeypot, malicious file detection, and log analysis Important In this region, the malicious file detection feature only supports calling the SDK in servers to detect offline files. It does not support detecting files stored in OSS through the console. | |||
Detection and Response | Security alerts, attack analysis, security incident handling, and disposal center | |||
Agentic SOC | Dashboard, security alerts, security incident handling, Security Orchestration, Automation and Response (SOAR), disposal center, rule management, and Integration Center | |||
Host Protection | anti-ransomware, virus detection, web tamper-proofing, host rule management, and core file monitoring | |||
Container Protection | container proactive defense, container file protection, container firewall, container image signing, and CI/CD integration settings | |||
Application Protection | Application protection | |||
System Configurations | security report, feature settings, notification settings, multi-account security management |
Relation between regions and endpoints
Endpoints are domain names that Security Center provides for external access. These include public network access addresses and VPC access addresses. When you integrate Security Center with your business system, you must configure endpoints in your programming tools, such as an SDK, CLI, or API, to communicate with the server. For information about the endpoints supported by Security Center, see:
To use host protection, container protection, agentless detection, Cloud Security Posture Management (CSPM), and other capabilities, see Security Center endpoints.
To use the detection and response capabilities provided by Agentic SOC, see Agentic SOC endpoints.
To use the Security Orchestration, Automation, and Response (SOAR) capabilities provided by Agentic SOC, see SOAR endpoints.