SecMaster
SecMaster
All results for "
" in this service
All results for "
" in this service
What's New
Function Overview
Service Overview
SecMaster Infographics
What Is SecMaster?
What Is a SOC?
Product Advantages
Application Scenarios
Functions
Limitations and Constraints
Permissions Management
SecMaster and Other Services
Basic Concepts
Billing
Billing Overview
Billing Modes
Overview
Yearly/Monthly Billing
Billing Items
Billing Examples
Changing the Billing Mode
Renewing Your Subscription
Overview
Manually Renewing SecMaster
Auto-renewing SecMaster
Bills
Arrears
Billing Termination
Cost Management
Billing FAQs
How Is SecMaster Billed?
Can I Use SecMaster for Free?
How Do I Change or Disable Auto Renewal for SecMaster?
Will SecMaster Be Billed After It Expires?
How Do I Renew SecMaster When It Is About to Expire?
Can I Unsubscribe from SecMaster?
Change History
Getting Started
Overview
Purchasing SecMaster
Configuring Service Authorization
Creating a Workspace
Enabling Data Access
Enabling Asset Subscription
Enabling Log Access
Configuring and Enabling Related Checks
Configuring Policies
Enabling an Alert Model
Enabling a Playbook
Performing Baseline Inspection
Creating a Report
Security Operations
Getting Started with Common Practices
Change History
User Guide
Buying SecMaster
Buying SecMaster
Purchasing Value-Added Packages
Upgrading the Service Edition
Increasing the Quota
Authorizing SecMaster
Security Overview
Overview
Security Score
Workspaces
Workspace Overview
Creating a Workspace
Managing Workspaces
Viewing Workspace Details
Editing a Workspace
Managing Workspace Tags
Deleting a Workspace
Workspace Agencies
Workspace Agency Overview
Creating an Agency View
Creating an Agency
Authorizing an Agency
Managing Agencies
Viewing Purchased Resources
Security Situation
Situation Overview
Large Screen
Overall Situation Screen
Security Response Screen
Asset Security Screen
Threat Situation Screen
Venerability Situation Screen
Security Reports
Creating and Copying a Security Report
Viewing a Security Report
Downloading a Security Report
Managing Security Reports
Task Center
Viewing To-Do Tasks
Handling a To-Do Task
Viewing Completed Tasks
Resource Manager
Overview
Configuring the Asset Subscription
Viewing Resource Information
Importing and Exporting Assets
Editing and Deleting Resources
Risk Prevention
Baseline Inspection
Baseline Inspection Overview
Creating a Custom Check Plan
Starting an Immediate Baseline Check
Viewing Check Results
Handling Check Results
Viewing Compliance Packs
Creating a Custom Compliance Pack
Importing and Exporting a Compliance Pack
Viewing Check Items
Creating a Custom Check Item
Importing and Exporting Check Items
Vulnerability Management
Overview
Viewing Vulnerability Details
Fixing Vulnerabilities
Importing and Exporting Vulnerabilities
Ignoring and Unignoring a Vulnerability
Policy Management
Overview
Adding and Editing an Emergency Policy
Viewing Emergency Policies
Deleting an Emergency Policy
Blocking or Canceling Blocking of an IP Address or IP Address Range
Threat Operations
Incident Management
Viewing Incidents
Adding and Editing an Incident
Importing and Exporting Incidents
Closing or Deleting Incidents
Alert Management
Viewing Alerts
Converting an Alert to an Incident or Associating an Alert with an Incident
Adding and Editing an Alert
Importing and Exporting Alerts
Closing or Deleting an Alert
Handling Alerts based on Suggestions
One-click Blocking or Unblocking
Indicator Management
Adding and Editing an Indicator
Disabling and Deleting an Indicator
Importing and Exporting Intelligence Indicators
Viewing Indicators
Intelligent Modeling
Viewing Available Model Templates
Creating and Editing a Model
Viewing Available Models
Managing Models
Security Analysis
Security Analysis Overview
How to Use Security Analysis
Log Fields
Configuring Indexes
Querying and Analyzing Data
Downloading Logs
Query and Analysis Statements - SQL Syntax
Basic Syntax
Limitations and Constraints
Query Statements
Analysis Statements - SELECT
Analysis Statements - GROUP BY
Analysis Statements - HAVING
Analysis Statements - ORDER BY
Analysis Statements - LIMIT
Analysis Statements - Functions
Analysis Statements - Aggregate Functions
Quick Query
Quickly Adding a Log Alarm Model
Charts
Overview
Tables
Line Charts
Bar Charts
Pie Charts
Managing Data Spaces
Creating a Data Space
Viewing Data Space Details
Editing a Data Space
Deleting a Data Space
Managing Pipelines
Creating a Pipeline
Viewing Pipeline Details
Editing a Pipeline
Deleting a Pipeline
Data Consumption
Data Monitoring
Data Delivery
Creating a Data Delivery
Data Delivery Authorization
Checking the Data Delivery Status
Managing Data Delivery
Delivering Logs to LTS
Security Orchestration
Security Orchestration Overview
Built-in Playbooks
Security Orchestration Process
(Optional) Configuring and Enabling a Workflow
Configuring and Enabling a Playbook
Operation Object Management
Data Class
Viewing Data Classes
Type Management
Managing Alert Types
Managing Incident Types
Viewing Threat Intelligence Types
Managing Vulnerability Types
Viewing Custom Types
Classification & Mapping
Viewing Categorical Mappings
Creating, Copying, and Editing a Categorical Mapping
Managing Categorical Mappings
Playbook Orchestration Management
Playbooks
Submitting a Playbook Version
Reviewing a Playbook Version
Enabling a Playbook
Managing Playbooks
Managing Playbook Versions
Workflows
Reviewing a Workflow Version
Enabling a Workflow
Managing Workflows
Managing Workflow Versions
Asset Connections
Adding an Asset Connection
Managing Asset Connections
Instance Management
Viewing Monitored Playbook Instances
Layout Management
Viewing an Existing Layout Template
View Existing Layouts
Plug-in Management
Plug-in Management Overview
Viewing Plug-in Details
Playbook Overview
Credential Leakage Response Solution
Ransomware Incident Response Solution
Attack Link Analysis Alert Notification
Playbook Overview
Configuring Playbooks
HSS Isolation and Killing of Malware
Playbook Overview
Configuring Playbooks
Automatic Renaming of Alert Names
Auto High-Risk Vulnerability Notification
Automatic Notification of High-Risk Alerts
Auto Blocking for High-risk Alerts
Real-time Notification of Critical Organization and Management Operations
Settings
Data Collection
Data Collection Overview
Component Management
Creating and Editing a Node
Partitioning a Disk
Managing Nodes
Configuring a Component
Logstash Configuration Description
Viewing Component Details
Collection Management
Adding and Editing a Connection
Rules for Configuring Connectors
Managing Connections
Creating and Editing a Parser
Rules for Configuring Parsers
Managing Parsers
Adding and Editing a Collection Channel
Managing Collection Channels
Viewing Collection Nodes
Upgrading the Component Controller
Data Integration
Log Access Supported by SecMaster
Enabling Log Access
Customizing Directories
Permissions Management
Creating a User and Granting Permissions
SecMaster Custom Policies
SecMaster Permissions and Supported Actions
Key Operations Recorded by CTS
SecMaster Operations Recorded by CTS
Querying Real-Time Traces
Best Practices
Log Access and Transfer Operation Guide
Solution Overview
Resource Planning
Process Flow
Procedure
(Optional) Step 1: Buy an ECS
(Optional) Step 2: Buy a Data Disk
(Optional) Step 3: Attach a Data Disk
Step 4: Create a Non-administrator IAM User
Step 5: Configure Network Connection
Step 6: Install the Component Controller (isap-agent)
Step 7: Install the Log Collection Component (Logstash)
(Optional) Step 8: Creating a Log Storage Pipeline
Step 9: Configure a Connector
(Optional) Step 10: Configure a Log Parser
Step 11: Configure a Log Collection Channel
Step 12: Test and Verify Log Access and Transfer
Credential Leakage Response Solution
FAQs
Product Consulting
Why Is There No Attack Data or Only A Small Amount of Attack Data?
Where Does SecMaster Obtain Its Data From?
What Are the Dependencies and Differences Between SecMaster and Other Security Services?
What Are the Differences Between SecMaster and HSS?
What Are the Relationships and Differences Between SecMaster and SA?
Why Cannot the Total ECS Quota Be Less Than the Number of Existing ECSs?
Can I Use SecMaster Across Accounts?
How Do I Update My Security Score?
How Do I Handle a Brute-force Attack?
Issues About Data Synchronization and Data Consistency
How Do I Grant Permissions to an IAM User?
How Long Are Logs Stored in SecMaster?
Purchase Consulting
How Do I Change SecMaster Editions or Specifications?
How Do I Obtain Permissions to Purchase SecMaster?
How Do I Release an ECS or VPC Endpoint?
About Data Collection Faults
Component Controller Installation Failure
Collection Node or Collection Channel Faults
Common Commands for the Component Controller
Regions and AZs
What Are Regions and AZs?