Creating a Workspace
Scenario
Workspaces are top-level workbenches in SecMaster. A workspace can be associated with general projects, regions, and enterprise projects to support security operations in different scenarios.
Before using baseline inspection, alert management, security analysis, and security orchestration in SecMaster, you need to create at least one workspace first. You can use workspaces to group your resources by application scenario. This will make security operations more efficient.
This section describes how to create a workspace.
Limitations and Constraints
- Paid SecMaster: A maximum of five workspaces can be created for an account in a region.
- Free SecMaster: Only one workspace can be created for an account in a region.
- The newly created workspace needs to be initialized. After the workspace is created, wait for about 10 minutes and refresh the page to view the workspace. You can check workspaces by referring to Viewing a Workspace.
Creating a Workspace
- Log in to the SecMaster console.
- Click
in the upper left corner of the management console and select a region or project.
- Click
in the upper left corner of the page and choose Security & Compliance > SecMaster.
- In the navigation pane on the left, choose Workspaces > Management.
Figure 1 Workspaces > Management
- (Optional) Complete authorization. Authorization is required only the first time you access the workspace management page.
- In the upper part of the workspace management page, choose Entrusted Service Authorization - Current Tenant.
- On the page for assigning permissions, select all required permissions (which are selected by default), select Agree to authorize, and click Confirm.
- On the Management page, click Create. The Create Workspace slide-out panel is displayed.
- Configure workspace parameters by referring to the following table.
Table 1 Parameters for creating a workspace Parameter
Description
Region
Select the region where you want to create the workspace.
Workspace Name
Specify the workspace name. The name must meet the following requirements:
- Only letters (A to Z and a to z), numbers (0 to 9), and the following special characters are allowed: -_()
- A maximum of 64 characters are allowed.
Tag (Optional)
(Optional) Tag of the workspace, which is used to identify the workspace and help you classify and track your workspaces.
TMS's predefined tag function is recommended for adding the same tag to different cloud resources. You can also create tags when purchasing SecMaster.
Description (Optional)
(Optional) You provide a description of the workspace.
- Click OK.
- Choose in the navigation pane on the left. On the displayed page, check the new workspace.
Operations You Can Do with a Workspace
You can perform security operations after adding a workspace. Functions you can use vary depending on the SecMaster edition in use. For details, see Functions.
- Checking the Situation Overview, Checking Security Situation through Large Screens, Security Reports, and Task Center: Check the security situation in a workspace, create security reports, handle to-do tasks, and check security situation on large screens.
- Resource Manager: Manage assets centrally.
- Risk Prevention: Prevent risks through baseline inspections, vulnerability management, emergency vulnerability notifications, and security policy management.
- Threats: Manage threats, including incidents, alerts, and indicators, use intelligent modeling, and perform security analysis.
- Security Orchestration: Implement security orchestration. Security orchestration combines security functions of different systems or components in a system involved in security operations in your organizations based on certain logical relationships to complete a specific security operations process and procedure. It aims to help security teams of enterprises and organizations quickly and efficiently respond to network threats and implement efficient and automatic response and handling of security incidents. You can manage operations objects, playbooks, page layouts, and plug-ins.
- Settings: Configure log collection and access to aggregate logs into SecMaster.
Feedback
Was this page helpful?
Provide feedbackThank you very much for your feedback. We will continue working to improve the documentation.