- What's New
- Function Overview
- Service Overview
- Billing
- Getting Started
-
User Guide
- Buying SecMaster
- Authorizing SecMaster
- Viewing Security Overview
- Workspaces
- Viewing Purchased Resources
- Security Situation
- Resource Manager
- Risk Prevention
- Threat Operations
- Security Orchestration
-
Playbook Overview
- Ransomware Incident Response Solution
- Attack Link Analysis Alert Notification
- HSS Isolation and Killing of Malware
- Automatic Renaming of Alert Names
- Auto High-Risk Vulnerability Notification
- Automatic Notification of High-Risk Alerts
- Auto Blocking for High-risk Alerts
- Real-time Notification of Critical Organization and Management Operations
-
Settings
- Data Integration
-
Log Data Collection
- Data Collection Overview
- Adding a Node
- Configuring a Component
- Adding a Connection
- Creating and Editing a Parser
- Adding and Editing a Collection Channel
- Managing Connections
- Managing Parsers
- Managing Collection Channels
- Viewing Collection Nodes
- Managing Nodes and Components
- Partitioning a Disk
- Logstash Configuration Description
- Connector Rules
- Parser Rules
- Upgrading the Component Controller
- Customizing Directories
- Permissions Management
- Key Operations Recorded by CTS
-
Best Practices
-
Log Access and Transfer Operation Guide
- Solution Overview
- Resource Planning
- Process Flow
-
Procedure
- (Optional) Step 1: Buy an ECS
- (Optional) Step 2: Buy a Data Disk
- (Optional) Step 3: Attach a Data Disk
- Step 4: Create a Non-administrator IAM User
- Step 5: Configure Network Connection
- Step 6: Install the Component Controller (isap-agent)
- Step 7: Install the Log Collection Component (Logstash)
- (Optional) Step 8: Creating a Log Storage Pipeline
- Step 9: Configure a Connector
- (Optional) Step 10: Configure a Log Parser
- Step 11: Configure a Log Collection Channel
- Step 12: Verify Log Access and Transfer
- Credential Leakage Response Solution
-
Log Access and Transfer Operation Guide
-
API Reference
- Before You Start
- API Overview
- Calling APIs
-
API
- Alert Management
- Incident Management
- Indicator Management
- Playbook Management
- Alert Rule Management
- Playbook Version Management
- Playbook Rule Management
- Playbook Instance Management
- Playbook Approval Management
- Playbook Action Management
- Incident Relationship Management
- Data Class Management
- Workflow Management
- Data Space Management
- Pipelines
- Workspace Management
- Metering and Billing
- Metric Query
- Baseline Inspection
- Appendix
- FAQs
Show all
SecMaster
SecMaster is a next-generation Huawei cloud native security operation center. It integrates years of security experience of Huawei Cloud and provides capabilities such as cloud asset management, security posture management, security information and event management, and security orchestration and response, helping you implement integrated and automatic security operation management.
Progressive Knowledge
SecMaster knowledge for users from beginner level to expert level
01

Understand
Understanding the functions, working principles, and application scenarios of SecMaster will help you quickly get familiar with SecMaster and accurately learn your global security posture.
Service Overview
03

Start
To visualize your global security posture, you need to configure Data Integration to aggregate your security data. In addition, you can use the asset management function to view your asset status.
Data Integration
Asset Management
02

Purchase
You can buy the SecMaster professional edition with the functions of large screen, intelligent analysis, and security response to evaluate your global threat risks and display your asset security status.
Service Specification
Quick Config
04

Be a Power User
SecMaster detects security risks on the cloud, making it easier for you to learn how an attack occurs and predict attack trends. You can query or view events and get suggestions before, when, and after a threat is detected.
Overview
Security Situation
Risk Prevention
Security Response
Security Orchestration
FAQs
Learn more about common issues and solutions.