All Products
Search
Document Center

Security Center:View and handle alert events

Last Updated:Mar 31, 2026

After you deploy a honeypot on your server, Cloud Honeypot captures attacks from inside and outside the cloud. Each detected attack appears as an alert event on the Alert Event page. Review and handle these events promptly to keep your servers secure.

Prerequisites

Before you begin, make sure that you have:

View alert events

  1. Log in to the Security Center consoleSecurity Center console. In the top navigation bar, select the region of the asset you want to manage — either China or Outside China.

  2. In the left-side navigation pane, choose Risk Governance > Cloud Honeypot > Alert Event.

  3. At the top of the Alert Event page, review the honeypot statistics: If you need more probes, click Upgrade Configuration to purchase additional probes.

    StatisticDescription
    Manage Node StatusStatus of your honeypot management nodes
    Authorized ProbesNumber of probes you are licensed to use
    Available ProbesNumber of probes available for deployment
    Deployed Host ProbesNumber of probes currently deployed on hosts
  4. In the alert event list, review detected attacks. Each event shows the Risk Level, Risk Overview, and Attack Source.

  5. To investigate a specific event:

    1. Find the event and click View Logs in the Actions column. The Event Log page lists all logs related to the event.

    2. Find a log entry and click Details in the Actions column. The Log Details page shows Basic Information and the Attack Timeline for that log entry.

Handle alert events

  1. Log in to the Security Center consoleSecurity Center console. In the top navigation bar, select the region of the asset you want to manage — either China or Outside China.

  2. In the left-side navigation pane, choose Risk Governance > Cloud Honeypot > Alert Event.

  3. Find the alert event you want to handle and click Handle in the Actions column.

  4. In the Handle Alert dialog box, set Solution based on the nature of the event:

    SolutionWhen to useWhat happens
    Add to WhitelistThe event is generated by a known, legitimate workload — not an actual attackAlert events with the same attack information are no longer displayed in the alert event list and no longer trigger alerts
    Mark as HandledThe event is a confirmed attack and you have already remediated it on the server or Virtual Private Cloud (VPC)The event is marked as resolved
  5. Click OK.

Important

After you add an alert event to the whitelist, other alert events with the same attack information are no longer displayed in the alert event list, and the attack no longer triggers alert events. To ensure the security of your asset, we recommend that you do not add alert events to the whitelist unless necessary. To reverse the action, find the event in the handled alert event list, click Handle, set Solution to Remove from Whitelist, and click OK.