Security Center provides a comprehensive view of security alerts and helps you enable protection features to quickly identify and handle security risks. You can view and manage ongoing security alerts, and also archive and export historical alert data for later analysis.
View security alert statistics
Security Center displays statistics about your security alerts and protection features. This helps you quickly understand the status of your security alerts and identify which protection features are enabled or disabled.
Log on to the Security Center console. In the upper-left corner of the console, select the region where your assets are deployed: Chinese Mainland or Outside Chinese Mainland.
In the navigation pane on the left, choose .
NoteIf you have enabled Cloud Threat Detection and Response (CTDR), the navigation path changes to .
On the Alert page, above the CWPP tab, view the alert statistics.
Statistic
Description
Related operations
Alerting Servers
The number of servers that have security alerts.
Click the number to go to the Host Assets page for details.
Urgent Alerts
The number of pending alerts with a risk level of Urgent.
NoteHandle these alerts first.
Click the number to filter for all Urgent alerts.
Total Unhandled Alerts
The total number of pending alerts.
These alerts are displayed by default in the alert list on the Cloud Workload Protection Platform (CWPP) tab. For more information, see Analyze and handle security alerts.
Precise Defense
The number of virus alerts automatically blocked by the Malicious Host Behavior Defense feature.
NoteAn automatically blocked virus indicates a successful defense by Security Center. No manual action is required.
Click the number to view all automatically blocked virus alerts.
Enabled IP Address Blocking Policies/All Policies
Active IP blocking policies: The number of enabled brute-force attacks protection policies.
Total policies: The total number of brute-force attacks protection policies, including disabled ones.
Click the number to open the IP Rule Policy Library panel and view details about the IP blocking policies. For more information, see Brute-force attacks protection.
Quarantined Files
The number of malicious files quarantined while handling alerts. After a malicious file is quarantined, it no longer poses a risk to your services.
Click the number to open the File Quarantine panel and view details about the quarantined files. For more information, see View and recover quarantined files.
Network Defense Alert
By default, this shows attack analysis statistics for the last 7 days: the number of basic attacks that were detected and automatically blocked.
Click the number to view the number of attacks, Attack Type Distribution, Top 5 Attack Source IP Addresses, Top 5 Attacked Assets, and the attack details list. For more information, see Network defense alerts (formerly Attack Analysis).
View archived alert data
When the number of handled alerts exceeds 100, Security Center automatically archives alert data that is older than 30 days. Unhandled alerts are not archived. You cannot view archived alerts directly in the console, but you can download them for local analysis.
Log on to the Security Center console. In the upper-left corner of the console, select the region where your assets are deployed: Chinese Mainland or Outside Chinese Mainland.
In the navigation pane on the left, choose .
NoteIf you have enabled CTDR, the navigation path changes to .
In the upper-right corner of the Alert page, click .
In the Archive data dialog box, view the archived data.
In the Download Link column for the archived data, click Download to save the data to your computer.
The archived data is in XLSX format. The download time depends on your network bandwidth and the file size, and usually takes 2 to 5 minutes.
After the download is complete, you can open the file to view historical alert information, including Alert ID, Alert Name, Alert Details, Alert Level, Status, Affected Asset, Affected Asset Remarks, Impact Overview, and Alert Time.
NoteAn alert with the Expired status was not handled within 30 days of its generation. Handle security alert events detected by Security Center promptly.
Export alert data
Security Center lets you filter and export security alert data based on criteria such as urgency, processing status, time of occurrence, asset group, and alert name.
Log on to the Security Center console. In the upper-left corner of the console, select the region where your assets are deployed: Chinese Mainland or Outside Chinese Mainland.
In the navigation pane on the left, choose .
NoteIf you have enabled CTDR, the navigation path changes to .
On the Alert page, on the CWPP tab, filter the alert data that you want to export.
Security Center exports the filtered alert data.
In the upper-right corner of the alert list, click the
icon.After the data is exported, in the Exported dialog box that appears in the upper-right corner of the page, click Download to save the alert data to your computer.
View and recover quarantined files
Security Center can quarantine detected malicious files. Quarantined files are added to the File Quarantine panel and are automatically purged after 30 days. If you determine that a quarantined file is not a security risk, you can recover it during this period.
Log on to the Security Center console. In the upper-left corner of the console, select the region where your assets are deployed: Chinese Mainland or Outside Chinese Mainland.
In the navigation pane on the left, choose .
NoteIf you have enabled CTDR, the navigation path changes to
In the upper-right corner of the CTDR > Alert page, click Quarantined Files or .
In the Quarantined Files panel, perform the following operations:
View quarantined files: The list shows the host, path, status, and quarantine time for each quarantined file.
Recover a file: In the Operation column for the target file, click Recover. The file is removed from quarantine and may reappear in the list of pending alerts.
Network Defense Alert (formerly Attack Analysis)
Background information
If you enable Network Threat Prevention rules in the Host Rules - Malicious Behavior Defense and Host Rules - Brute-force Attacks Protection policies, Security Center automatically blocks detected attacks and displays the related data on the Network Defense Alert page.
For newly purchased cloud products, you must wait for Security Center to automatically synchronize network attack data. Data synchronization takes about 3 hours. After the synchronization is complete, you can view the attack analysis information.
Defense alerts are the result of automatic blocking by Security Center. No action is required.
Notes
This feature provides basic protection. For assets that host core services or experience high-risk attack events, consider the following suggestions to build a more fine-grained, in-depth defense system.
Use Web Application Firewall (WAF) to protect against more complex application-layer attacks.
Configure Cloud Firewall to implement fine-grained network access control and border protection.
For high-risk attack source IP addresses, you can create policies in Cloud Firewall or security groups to block them for more thorough isolation.
Attack data details
Data category | Details | Core purpose |
Number of attacks | The total count of basic network attacks on all assets under your account within a specified time range. | Quickly understand the overall attack intensity and assess the security risk to your assets. |
Attack Type Distribution | Displays the number and proportion of different attack types in a chart, such as a pie chart or column chart. Common types include brute-force attacks, web attacks, vulnerability exploits, and DDoS attacks. | Identify the most common attack methods and the main threat vectors. This provides a basis for targeted security hardening. For example, if brute-force attacks are prevalent, prioritize strengthening account password policies. |
Top 5 attack sources | Aggregates and displays the top 5 source IP addresses with the most attacks. In some scenarios, basic information such as the region and carrier of the IP address is included. | Quickly identify major threat sources. For persistent, high-frequency attacks, you can analyze these IP addresses further (for example, to trace the attack organization) or add them directly to a blocklist. |
Top 5 attacked assets | Displays the top 5 cloud assets with the most attacks, clearly indicating the asset type (such as ECS instances, SLB instances, and RDS instances) and asset ID. | Identify "hot spot" assets in network attacks. This helps you prioritize high-risk service nodes and focus resources on security hardening for key assets, such as upgrading mitigation policies or patching vulnerabilities. |
Attack details list | Records complete logs for all network defense events. It also provides information about Attack-associated Vulnerabilities (CVE) and the Attack Payload. | Provides raw, detailed attack data to support in-depth analysis of security events, compliance audits (to meet industry requirements for log retention), and attack event tracing (for example, to track the full path of a specific attack). |
Number of attacks
In the Attacks area, you can view a curve chart showing the total number of attacks on your assets within a specified time range, including peak and trough values. Hover your mouse over the curve chart to display the date, time, and number of attacks.
Attack Type Distribution
In the Attack Type Distribution area, you can view the names of attack types and the total number of occurrences for each type.
Top 5 attack sources
In the Top 5 Attack Sources area, you can view the top five attack source IP addresses and their corresponding number of attacks.
Tab body
Top 5 attacked assets
In the Top 5 Attacked Assets area, you can view the top five public IP addresses of your attacked assets and their corresponding number of attacks.
Attack details list
In the attack details list, you can view detailed information about attacks on your assets, including the attack time, source IP address, attacked asset information, attack type, attack method, and attack status.
The attack details list can display a maximum of 10,000 attack data entries. To view more data, change the Time Range to view all attack data for a specific period.
Attack details parameter table
Parameter | Description |
Attacked At | The time when the attack occurred. |
Attack Source | The source IP address and region from which the attack was initiated. |
Attacked Asset | The name and the public and private IP addresses of the attacked asset. |
Attack Method | The HTTP request method used to initiate the attack, which can be POST or GET. |
Port | The attacked port number. This is displayed only when the attack type is SSH brute-force attack. |
Attack Type | The type of the attack event, such as SSH brute-force attack or code execution. |
Attack Status | The current status of the attack event. Security Center defends against common attacks when it detects them. The status of a defended attack event is Defended. Abnormal intrusion events are displayed on the Cloud Workload Protection Platform (CWPP) tab of the Security Alert page. |
Supported operations
View attack source details
Click Details in the Actions column to view the detailed analysis of the specified network defense alert.
Attack Source Intelligence:
Analyzes various properties of the attack source, including the following:
Basic Information: Discovery Time, Attack Source IP, Last Active Time, Country/Region, Threat Tag.
IP Report Details: Click Details to the right of the attack source IP address to go to the Threat Intelligence console and view the complete profile report and all associated threat data for the IP address.
Attack-associated Vulnerabilities (CVE): Displays vulnerability information directly related to this alert behavior. If there are associated vulnerabilities, see View and handle vulnerabilities to handle them promptly and resolve the security risk.
Attack Payload: The most malicious part of the attack traffic, which usually contains malicious instructions or data. For example, in an HTTP request, the attack payload might be the JSON or XML data carried in a POST request, used to trigger a vulnerability or execute malicious behavior.
View attacked asset information
You can view information about the attacked asset in the attack event list.

Export the attack event list
Click the
icon in the upper-left corner of the attack event list to export all attack events detected by Security Center and save them to your computer. The exported file is in Excel format.
Disable blocking rules
In the attack event list, an
icon appears in the Attack Type column for events of certain attack types, such as SQL Server brute-force attacks and SSH brute-force attacks. When you hover your mouse over the icon, a Close Block Rule tooltip appears. You can close system block rules for the following attack types:SQL Server brute-force attack
SSH brute-force attack
RDP brute-force attack
AntSword WebShell communication
China Chopper WebShell communication
XISE WebShell communication
WebShell upload
PHP WebShell upload
JSP WebShell upload
ASP WebShell upload
WebShell upload with special suffix
Intelligent defense for WebShell upload
Adaptive web attack defense
Java generic RCE vulnerability blocking
If you do not want Security Center to automatically block this type of attack, you can click Go to the Malicious behavior Defense page. to open the Malicious Behavior Defense page and disable the corresponding system defense rule.