Deze pagina is nog niet beschikbaar in uw eigen taal. We werken er hard aan om meer taalversies toe te voegen. Bedankt voor uw steun.
- What's New
- Function Overview
- Service Overview
- Billing
- Getting Started
-
User Guide
- Buying SecMaster
- Authorizing SecMaster
- Viewing Security Overview
- Workspaces
- Viewing Purchased Resources
- Security Situation
- Resource Manager
- Risk Prevention
- Threat Operations
- Security Orchestration
-
Playbook Overview
- Ransomware Incident Response Solution
- Attack Link Analysis Alert Notification
- HSS Isolation and Killing of Malware
- Automatic Renaming of Alert Names
- Auto High-Risk Vulnerability Notification
- Automatic Notification of High-Risk Alerts
- Auto Blocking for High-risk Alerts
- Real-time Notification of Critical Organization and Management Operations
-
Settings
- Data Integration
-
Log Data Collection
- Data Collection Overview
- Adding a Node
- Configuring a Component
- Adding a Connection
- Creating and Editing a Parser
- Adding and Editing a Collection Channel
- Managing Connections
- Managing Parsers
- Managing Collection Channels
- Viewing Collection Nodes
- Managing Nodes and Components
- Partitioning a Disk
- Logstash Configuration Description
- Connector Rules
- Parser Rules
- Upgrading the Component Controller
- Customizing Directories
- Permissions Management
- Key Operations Recorded by CTS
-
Best Practices
-
Log Access and Transfer Operation Guide
- Solution Overview
- Resource Planning
- Process Flow
-
Procedure
- (Optional) Step 1: Buy an ECS
- (Optional) Step 2: Buy a Data Disk
- (Optional) Step 3: Attach a Data Disk
- Step 4: Create a Non-administrator IAM User
- Step 5: Configure Network Connection
- Step 6: Install the Component Controller (isap-agent)
- Step 7: Install the Log Collection Component (Logstash)
- (Optional) Step 8: Creating a Log Storage Pipeline
- Step 9: Configure a Connector
- (Optional) Step 10: Configure a Log Parser
- Step 11: Configure a Log Collection Channel
- Step 12: Verify Log Access and Transfer
- Credential Leakage Response Solution
-
Log Access and Transfer Operation Guide
-
API Reference
- Before You Start
- API Overview
- Calling APIs
-
API
- Alert Management
- Incident Management
- Indicator Management
- Playbook Management
- Alert Rule Management
- Playbook Version Management
- Playbook Rule Management
- Playbook Instance Management
- Playbook Approval Management
- Playbook Action Management
- Incident Relationship Management
- Data Class Management
- Workflow Management
- Data Space Management
- Pipelines
- Workspace Management
- Metering and Billing
- Metric Query
- Baseline Inspection
- Appendix
- FAQs
Show all
About Metrics
Metric |
ID |
Metric Description |
Metric Parameter |
---|---|---|---|
Total assets |
6f8d4892-713c-4d12-8584-dc04f7847b32 |
Total number of assets in the workspace |
None |
High-Risk Resources |
a5597747-8cef-4342-9855-3fdaf00ad460 |
Total number of high-risk assets in the workspace |
None |
Number of assets at other risk levels |
09ca4eb8-a4ca-4ef4-b75f-e9172f39393b |
Total number of assets except high-risk assets in the workspace |
None |
Distribution of alerts by severity |
1f0f5e29-5a92-17a5-2c16-5f37c6dc109c |
Alert distribution by severity in the workspace from the specified start time to the current time |
Set params to start_date, which indicates the start time of statistics collection. For example: "start_date": "2024-06-21T00:00:00.000+08:00" |
Distribution of vulnerabilities by severity |
815c8a73-c855-fd29-63e2-b093d05a7ef0 |
Distribution of vulnerabilities at different severity levels in the workspace |
None |
Distribution of failed baseline check results |
fee4d416-25b4-46c6-aa1b-851c7251e04b |
Distribution of baseline check results at different levels for the past 30 days in the workspace |
None |
Security score trend |
39d386dc-5868-adb6-a8e9-d5e92bb75663 |
Daily security scores for the last seven days in the workspace |
None |
Top 5 threat events |
aaa6e851-601b-53c5-61ef-ffc95889ebf3 |
Top 5 threat alarm events in the workspace from the specified start time to the current time |
Set params to start_date, which indicates the start time of statistics collection. For example: "start_date": "2024-06-21T00:00:00.000+08:00" |
Workspace security score |
cf6cce38-bc32-fd89-c0b5-3ba2cdf98eda |
Latest security score in the workspace |
None |
Feedback
Was this page helpful?
Provide feedbackThank you very much for your feedback. We will continue working to improve the documentation.