Security Center aggregates related security alerts into a single security event to help you understand the full scope of an attack. By assessing the event's impact, executing response actions to contain the threat, and hardening your system, you can prevent similar events from recurring.
Security incident handling flowchart
Security incident response assessment
Before you respond, you must thoroughly assess the event's severity, scope of impact, and whether it is a false positive to develop the right response strategy.
Go to the event details page
Log on to the Security Center console.
In the navigation pane on the left, choose
NoteIf you purchased the Agentic SOC service, in the navigation pane on the left, choose .
Select a Occurred Within to find the security event.
ImportantThe Security Incident page displays events from the last 180 days only.
Enable event notifications in . This lets you use information from the notifications, such as the event name, to quickly find the event.
In the Actions column, click Details to go to the event details page.
Assessment methods and examples
You can assess an event's urgency, coverage, and whether it is a false positive using the , the event Overview information, the Timeline information, the Alert, and the Entity information.
Overview area
This area provides basic information about the event and its ATT&CK attack stage. You can use the data in this area, such as the number of affected assets, associated alerts, the occurrence time, and the alert source, to assess whether the security event requires handling.
Example assessment:
Number of affected assets: If many assets are affected, including core business assets such as database servers or application servers, the event may have a significant impact and requires high-priority handling.
Number of associated alerts: A higher number of associated alerts indicates that the event may have a wider scope and a greater potential risk.
Occurrence time: Recent events need to be handled more promptly than historical events because they may still be causing an impact.
Alert source: The credibility and severity of alerts can vary by source. Alerts from authoritative detection modules, such as a dedicated virus scanning module, indicate a higher risk for the corresponding event.
Timeline
On this tab, you can view the attack timeline and the event chain diagram. The big data analytics engine processes, aggregates, and visualizes data to form an event chain diagram. This diagram helps you quickly identify the cause of the event and create a handling policy. To view the details, perform the following steps:
Click the
icon to enter full-screen mode.Click a node in the event chain diagram to view its details.
Use the timeline to assess whether the security event requires handling. The following are examples of assessments:
If the timeline shows that an initial, small-scale probing attack alert quickly evolves into multiple, closely related attack alerts of different types, the security event is high-risk and must be handled immediately. This is especially true if the attack pace is accelerating and the scope of affected assets is expanding.
If no new related alerts appear on the timeline for a long period and the attack behavior shows no signs of further spreading, the handling priority can be relatively lower.
Alert
On this tab, you can view the list of all security alerts aggregated into this event. You can use multi-dimensional alert statistics, including the number of alerts, defense measures, and occurrence times, to determine the attack method, the attack stage, and the appropriate handling plan. The following are examples of assessments:
Many alerts of the same type or related types may indicate a large-scale attack or a more severe threat.
For defense measures, determine whether the measures taken have effectively blocked the attack. If the defense measures have failed or are insufficient, the urgency of handling the event increases.
If the Occurrence time of recent security alerts is concentrated in a specific period, it may indicate that the attack is in an active phase.
Entity
This section displays the entities extracted from the event. Supported entity types include hosts, files, processes, IP addresses, and host accounts. You can view and manage entities from the following dimensions:
All entities: Displays all entities extracted from the event. You can view the number of associated events, associated alerts, and associated handling tasks in the last 30 days, and perform operations such as running a playbook.
Affected assets: Displays the assets affected by the event. This helps you quickly assess the scope of the impact on your assets.
Use the affected entities to assess whether the security event requires handling. The following are examples of assessments:
In the entity details, you can view the basic information of an IP address entity, its Alibaba Cloud threat intelligence, and the number of associated events, alerts, and handling tasks in the last 30 days. If these numbers are high, it may indicate that an attacker is continuously using the IP address for attacks. You must handle this IP address, for example, by blocking it.
On the Affected Asset tab, if multiple assets are attacked by the same IP address within the same period, this may indicate a targeted attack from that IP address. You need to handle this IP address, for example, by blocking it.
Response Activity
The Response Activity section provides a complete record of the event investigation, risk analysis, and response handling process. It also provides access to key handling policies, tasks, and the Activity Log. This allows team members to share investigation progress and handling information during collaboration. After the event, you can review and summarize the event activities to improve future responses.
Respond to a security event
Handle a security event
Handling solution | Description |
Use Recommended Handling Policy |
Note If the Use Recommended Handling Policy pane is empty, this means that the current entity does not have a built-in handling policy. |
Add Alert to Whitelist | Add Alert to Whitelist: Adds programs, IPs, or behaviors that are confirmed to be harmless to the whitelist to prevent them from triggering alerts. |
Run Playbook | Based on the experience of Alibaba Cloud security experts, Security Center provides a set of built-in playbooks for handling malicious entities. Examples include host offline investigation, in-depth virus scanning, and interaction with WAF to block IP addresses. |
Update Incident Status |
|
Use Recommended Handling Policy
Procedure
Go to the event details page. On the Entity tab, click the Use Recommended Handling Policy button.
NoteOn the Security Incident page, for the target event, click Response in the Actions column, or select Use Recommended Handling Policy.
In the Use Recommended Handling Policy panel, select the malicious entities that you want to handle.
(Optional) Modify the handling policy. In the Actions column for the entity, click Edit. In the Edit Policy panel, modify parameters such as the destination account and the action validity period for the blocking rule.
Action validity period: The period during which the handling policy is effective. The policy automatically becomes invalid after this period expires.
Destination account: The current account and manageable member accounts. For more information about how to manage member accounts, see Multi-account security management.
Click Confirm and update the incident status.. In the Update Incident Status dialog box, set Event Status to Handling or Handled, and then click OK.
ImportantAfter you complete this step, Security Center automatically creates a handling policy and executes a handling task. If the handling task fails, the event status changes to Failed. Otherwise, the event status changes to the status that you set here.
Handling: Indicates that in addition to the current handling operation, there are other actions related to event handling, such as immediate remediation, source tracing, and vulnerability fixing.
Handled: Indicates that there are no subsequent handling actions besides the current one. The impacts are as follows:
Updates the status of associated alerts to Handled in the security incident.
Subsequent alerts will generate a new security event and will no longer be associated with the current event.
Impact of the operation
This operation interacts with other Alibaba Cloud products for event response to handle malicious entities, for example, by blocking an IP address.
If you Use Recommended Handling Policy to change an event's status to Handled, the system changes the status of all unhandled alerts associated with the event to Handled in the security incident. The event handling information is also added to the alert details. Subsequently, new alerts are no longer associated with the current security event. Instead, they generate a new security event.
ImportantFor Cloud Workload Protection Platform (CWPP) "Precision Defense" alerts, the default status is "Handled" (defend only, no notification). Updating the security event status does not affect the status of these alerts.
If you use the Use Recommended Handling Policy option to change the status of an event to Handling, the status of associated alerts is unaffected. You can still associate new alerts with the event.
Add Alert to Whitelist
Procedure
Go to the event details page. On the Alert tab, select the alert to whitelist and click Add Alert to Whitelist in the Actions column.
(Optional) Add a new alert whitelist rule. You can click Create Rule to configure multiple whitelist rules.
ImportantMultiple rules have an "OR" relationship, which means the rule takes effect if any one of the conditions is met.
Ensure the precision of the rules that you configure to avoid an overly broad scope. For example, setting "Path contains: /data/" might mistakenly whitelist other sensitive subdirectories, which increases security risks.
Each rule has four configuration boxes from left to right, as described below:
Alert information field: On the details page, under More Information, you can see which alert information fields are supported for the current alert.
Condition type: Supports operations such as Regex Match, greater than, equal to, less than, and contains. Some rules are described as follows:
Regular expression: Use a regular expression to precisely match content with specific patterns. For example, to whitelist all content under the "/data/app/logs/" folder, you can set the rule "Path matches regex: ^/data/app/logs/.*". This will match all files or processes in that folder and its subdirectories.
Contains keyword: Set a rule "Path contains: D:\programs\test\". All events whose paths contain this folder will be whitelisted.
Condition value: Supports constants and regular expressions.
Applicable assets:
All assets: Takes effect for newly added assets and all existing assets.
Only for the current asset: Takes effect only for the asset involved in the current alert.
Click OK.
Impact of the operation
After an alert is whitelisted, notifications for the same or matching alerts will no longer be sent. Use this feature with caution.
For the current alert:
The status of the current alert changes to Manually Add to Whitelist.
If the same alert occurs again, a new alert will not be generated. Instead, the latest occurrence time of the current alert will be updated.
For subsequent alerts:
If you set a specific whitelist rule, Security Center no longer associates alerts that match this rule with the security event.
When an alert that matches a custom whitelist rule occurs again, it will automatically be added to the handled list with the status Automatically Add to Whitelist, and no alert notification will be sent.
For other alerts: A whitelist rule takes effect only for alerts with the specified alert name that meet the conditions. It does not affect other alerts for which no rules are set.
Cancel Whitelisting
Cancel an automatic whitelist rule
ImportantThis action affects only subsequently generated alerts. Alerts that match the whitelist rule are no longer automatically whitelisted.
This has no effect on already handled alerts. The alert status remains unchanged.
Log on to the . In the navigation pane on the left, choose .
NoteIf you have purchased the Agentic SOC service, in the navigation pane on the left, choose .
In the upper-right corner of the CWPP tab, click Cloud Workload Alert Management and select Alert Settings.
On the Alert Settings page, in the Alert Handling Rule section, set Handling Method to Automatically Add to Whitelist.
Find the target rule and click Delete in the Actions column to cancel the automatic whitelist rule.
Cancel whitelisting for an alert
ImportantAfter you cancel the whitelisting, the alert reappears in the Unhandled alert list. You must re-evaluate and handle the alert.
Log on to the . In the navigation pane on the left, choose .
NoteIf you have purchased the Agentic SOC service, in the navigation pane on the left, choose .
On the CWPP tab, set the Handled or Not filter to Handled.
Find the alert data that you want to remove from the whitelist and click the Remove from Whitelist button in the Actions column to cancel the whitelisting for the current alert.
NoteYou can also select multiple alert data items and click the Remove from Whitelist button at the bottom of the list to perform a batch cancellation.

Run Playbook
Procedure
On the event details page, locate the entity to handle on the Entity tab.
In the Actions column, click Run Playbook. On the Run Playbook configuration page, configure the playbook parameters as described below.
Playbook: The system automatically retrieves the corresponding built-in playbook based on the type of the current entity.
ImportantIf the built-in playbooks do not meet your needs, you can use the Response Orchestration feature provided by Agentic SOC to create custom playbooks.
Action validity period: The period during which the playbook runs. The playbook will no longer be executed after this period expires.
Destination account: The current account and manageable member accounts. For more information about how to manage member accounts, see Multi-account security management.
Click OK.
Impact of the operation
The event is handled according to the process configured in the playbook (such as blocking an IP address), and the event status is changed to Processed.
Update Incident Status
Procedure
On the event details page, click the Incident Response drop-down list in the upper-right corner and select Update Incident Status. Alternatively, on the Security Events page, find the target event, click the Response drop-down list in the Actions column, and select Update Incident Status.
In the Update Incident Status dialog box, select Handled, Unhandled, or Handling.
(Optional) Add a remark, such as "I have handled this manually", "Ignore", "Manually whitelisted", or "Re-handle".
Impact of the operation
If you update the status to Handled:
All unhandled alerts associated with the event are updated to the Handled in the security incident status, and information about the security event operations is added to the alert details.
ImportantFor Cloud Workload Protection Platform (CWPP) "Precision Defense" alerts, the default status is "Handled" (defend only, no notification). Updating the security event status does not affect the status of these alerts.
Subsequent alerts are no longer associated with the current security event. They will generate a new security event.
If the status of the event is Unhandled or Handling, you can select a different handling method.
Manage event properties
Management operation | Procedure |
Update Owner | Security event response often involves multiple teams and members. To ensure a clear workflow, assign or change the event owner at different stages of the process. |
Update Incident Level | Adjust the event's risk level. If the automatically assigned risk level is too high or too low, you can change it manually. This helps your team prioritize responses and allocate resources to the most urgent events. |
Update Owner
Procedure
Go to the event details page. In the upper-right corner, under Incident Response, click Update Owner. Alternatively, on the Security Events page, find the event, click Response in the Actions column, and select Update Owner.
In the dialog box that appears, enter the following information and click OK.
Owner: Select the current account or a Resource Access Management (RAM) user under the account.
ImportantEnsure that the target Owner (RAM user) has the necessary permissions to handle security events.
Remarks: Enter handover instructions, suggestions, or other notes. This helps the new owner quickly understand the context and begin work.
Impacts
When the operation is complete, the system creates a change record. View the details of this change in the Activity Log on the Response Activity tab of the event details page.
Update Incident Level
Procedure
Go to the event details page. In the upper-right corner, under Incident Response, click Update Incident Level. Alternatively, on the Security Events page, find the event, click Response in the Actions column, and select Update Incident Level.
In the dialog box that appears, modify the Incident Severity and Remarks.
Operational Impact
After you change the level, the system records the operation in the event's activity log. View the details of this change in the Activity Log on the Response Activity tab of the event details page.
Export security events
You can export security event details to a local Excel file. This helps different departments collaborate on security events and facilitates internal information sharing and event tracking.
(Optional) On the Security Incident page, set filter conditions such as event risk level, status, and occurrence time.
Select the security events to download (up to 1,000 records), and click the
icon in the upper-right corner of the security event list.After the file is exported, click Download to save the file to your local machine.
NoteThe exported file contains three tabs: a list of security event records, a list of assets involved in the security events, and a list of entities involved in the security events.
Threat prevention
To prevent future virus attacks, harden the server. This makes it more difficult and costly for an attacker to breach its defenses.
Upgrade Security Center: The Enterprise and Ultimate editions support automatic virus isolation, which provides precise defense and more security check items.
Tighten access control: Open only necessary service ports, such as 80 and 443. Configure strict IP address whitelists for management ports, such as 22 and 3389, and database ports, such as 3306.
NoteFor Alibaba Cloud ECS servers, see Manage Security Groups.
Set complex server passwords: Create complex passwords that contain uppercase letters, lowercase letters, digits, and special characters for your servers and applications.
Upgrade software: Promptly update your applications to the latest official versions. Avoid using old versions that are no longer maintained or that have known security vulnerabilities.
Perform regular backups: Create an automatic snapshot policy for important data and system disks.
NoteIf you use an Alibaba Cloud ECS server, see Create an automatic snapshot policy.
Fix vulnerabilities promptly: Regularly use the Vulnerability Fix feature in Security Center to promptly fix important system vulnerabilities and application vulnerabilities.
Reset the server system (use with caution).
If a virus deeply infects the system and compromises underlying system components, we strongly recommend that you back up important data and then reset the server. Perform the following steps:
Create a snapshot to back up important data on the server. For more information, see Create a snapshot.
Reinitialize the operating system of the server. For more information, see Reinitialize a system disk.
Create a disk from the snapshot. For more information, see Create a data disk from a snapshot.
Attach the disk to the server on which you reinstalled the operating system. For more information, see Attach a data disk.
Quotas and limits
Data retention: The Security Incident page displays events from the last 180 days for viewing and handling.
Entity details: An entity's details page shows the count of associated events, alerts, and response tasks from the last 30 days.
Export limit: You can export a maximum of 1,000 security event records at a time.
Status synchronization: Updating the status of a security event does not affect the status of CWPP 'Precision Defense' alerts. By default, these alerts are set to 'Handled', which means the system provides defense but does not send a notification.