All Products
Search
Document Center

Security Center:Response activities

Last Updated:Mar 31, 2026

The Disposal Center gives your security team a single place to view, manage, and audit all response actions — whether triggered manually or by automated rules. It abstracts response actions into standardized disposal policies and disposal tasks.

Key concepts

ConceptDescription
Entity ObjectA core object involved in an alert or incident. Examples include IP addresses, domain names, file hashes, processes, hosts, containers, cloud resource IDs such as Elastic Compute Service (ECS) instance IDs, and user accounts.
Handling ComponentAn atomic tool that performs a specific security operation — a single, minimal action such as blocking an IP address or quarantining a file.
ScriptAn automated security workflow composed of one or more Handling Components. It predefines a complete response path, from trigger conditions and decision logic to execution actions.
Handling PoliciesA complete security response decision. When a playbook is triggered, the system generates a disposal policy that specifies which entity to target (What), which playbook to run (How), and where the response takes effect (Where).
Handling TasksThe execution record of a disposal policy on a specific target, such as a cloud account or a resource. A single Handling Policies entry can correspond to multiple Handling Tasks (one-to-many relationship). Each task records the detailed result (success or failure) of a single operation.

Overview

Data sources

Disposal policies and disposal tasks are generated from the following sources:

Trigger typeTrigger conditionRequires Agentic SOC
Manual Handling EventHandle a security event using Use Recommended Handling Policy, Run Playbook, or Add to WhitelistNo
Incident Trigger PlaybookAn automated response rule in Response Rules fires on an Event Occurrence or Event Update and runs a playbookYes
Alert Trigger PlaybookAn automated response rule in Response Rules fires on an Alert Occurrence and runs a playbookYes
Manual Execution PlaybookIn Response Rules, manually run a Custom Playbook or Predefined PlaybookYes

For details, see:

Data retention

Disposal policy and disposal task data is retained for 90 days by default.

Important

If your Agentic SOC service expires or is canceled, data generated by the service is retained for only 15 days. Back up or migrate your data before the service ends.

View disposal policies

  1. Log on to the Security Center console.

  2. In the left-side navigation pane, choose Detection and Response > Incident Response. In the upper-left corner, select the region where your assets are located: Chinese Mainland or Outside Chinese Mainland.

    If you have activated Agentic SOC, the navigation path changes to Agentic SOC > Incident Response.
  3. On the Handling Policies tab, view information about security incident disposal policies. You can filter by Entity Type, Disposal Action, Entity Value, or Policy Status. The following actions are available:

    • Entity Object: Click the name of the Entity Object to view its context, Alibaba Cloud threat intelligence, related alerts, and other information.

    • Associated Source: Click an entry in the Associated Source column to view the alerts, incidents, or playbooks associated with the disposal policy.

    • View Task: In the Actions column, click View Task to go to the Handling Tasks page and view tasks associated with the policy.

    • View Script: Click the name of a Script to view its run and publish history, basic description, and configured workflow components.

    Activating Agentic SOC is required to view playbook information.

View and manage Handling Tasks

View disposal tasks

On the Handling Tasks tab, you can filter by Task Status or Entity Type. The following information is available:

  • Entity Object: Click the name of the Entity Object to view its context, Alibaba Cloud threat intelligence, related alerts, and other information.

  • Handling Component: The disposal component within a playbook that was executed to resolve the security threat. For a full list of components, see Appendix: Common security disposal components.

  • View Script: Click the name of a Script to view its run and publish history, basic description, and configured workflow components.

    Activating Agentic SOC is required to view playbook information.
  • Task Status: A task can have one of the following statuses: Waiting, Executing, Succeeded, Partially Succeeded, Failed, or Ignored. If a task's status is Failed, hover over the image icon to view the failure reason.

Manage Handling Tasks

  • Retry: To retry a failed task, click Retry in the Actions column.

    If Retry is grayed out, the task cannot be retried because the underlying action is irreversible.
  • Unblock: If a task blocked an IP address, click Unblock in the Actions column to remove the block. Only do this after confirming the IP address is no longer a threat.

Billing

The Disposal Center is included in all paid editions of Security Center at no additional charge.

  • Subscription users: Access this feature by purchasing any paid edition.

  • Pay-as-you-go users: Access this feature by enabling any pay-as-you-go module.

Some disposal actions interact with other paid cloud products, such as Web Application Firewall (WAF), CDN, and Anti-DDoS Proxy. These interactions may incur additional API call fees. For details, see the pricing documentation for the relevant products.

Appendix: Common security disposal components

IdentifierAction typeDescription
AegisKillProcessProcess terminationSecurity Center component to terminate a process
AegisDeepCleanUpMalware scanningSecurity Center component for in-depth malware scanning
AegisQuaraFileFile quarantineSecurity Center component to quarantine a file
AegisKillQuaraProcess termination + file quarantineSecurity Center component to terminate a process and quarantine the associated file
AegisStopContainerContainer isolationSecurity Center component to stop a container
SasOfflineCheckHost investigationSecurity Center component for offline host investigation
AliNetBlockIPIP blockingSecurity Center component to add an IP address to the malicious behavior defense blocklist
AliNetWhiteIPIP allowlistingSecurity Center component to add an IP address to the malicious behavior defense allowlist
AliNetBlockDNSDomain blockingSecurity Center component to add a domain name to the malicious behavior defense blocklist
AliNetWhiteDNSDomain allowlistingSecurity Center component to add a domain name to the malicious behavior defense allowlist
AliyunFirewallProcessIP blocking (inbound)Cloud Firewall component to block an inbound IP address
CfwWhiteListBatchIP allowlisting (inbound)Cloud Firewall component to add an inbound IP address to the allowlist
AliyunCFWBlockDNSDomain blocking (outbound)Cloud Firewall component to block an outbound malicious domain name
AliyunFirewallMonitorIPinIP monitoring (inbound)Cloud Firewall component to handle an inbound IP address in monitor mode
AliyunFirewallMonitorIPOutIP monitoring (outbound)Cloud Firewall component to handle an outbound IP address in monitor mode
AliyunWafBlockIPIP blocking (inbound)Alibaba Cloud WAF component to block an inbound IP address
WafWhiteListBatchIP allowlistingAlibaba Cloud WAF component to add an IP address to the allowlist
AliYunWafMonitorIPIP monitoringAlibaba Cloud WAF component to handle an IP address in monitor mode
SecurityPolicyBlockIPIP blocking (inbound)Alibaba Cloud security group component to block an inbound IP address
RegionCLBProcessIP blockingAlibaba Cloud Classic Load Balancer (CLB) component to block an IP address
RegionALBProcessIP blockingAlibaba Cloud Application Load Balancer (ALB) component to block an IP address
CDNProcessIP blockingAlibaba Cloud CDN component to block an IP address
DcdnWafBanIPIP blockingDCDN WAF component to block an IP address
AliyunDDoSProxyBlockIPIP blockingAnti-DDoS Proxy component to block an IP address
AliyunDDoSProxyWhiteIPIP allowlistingAnti-DDoS Proxy component to add an IP address to the allowlist
TencentCFWBlockIPIP blockingTencent Cloud Firewall component to block a high-risk IP address
TencentWafBlockIPIP blockingTencent Cloud WAF component to block a high-risk IP address
HuaWeiRegionCfwBlockIPIP blockingHuawei Cloud Firewall component to block a high-risk IP address
HuaWeiWafBlockIPIP blockingHuawei Cloud WAF component to block a high-risk IP address

FAQ

Why did a disposal task fail?

Check the task details for the specific failure reason. The most common causes are:

  • Insufficient permissions: The RAM role used for the operation lacks the necessary permissions for the target cloud product, such as WAF or Cloud Firewall. Grant the required permissions to the role.

  • Resource not found: The target entity (such as a host or container) was destroyed, or its associated rule was deleted.

  • Quota exceeded: The number of rules for the target cloud product has reached its limit, such as the WAF IP address blocklist quota.

  • Cross-account restrictions: Cross-account operations require both accounts to have the same enterprise real-name verification and to be managed together under Resource Directory. Operations between accounts with different verification entities are not supported.

Why is the Retry button grayed out?

Some disposal tasks cannot be retried because the underlying action is irreversible. Once such an action completes — even if it fails — it cannot be run again.