Security Report Overview
CFW provides security reports, which can be generated daily, weekly, or at a custom interval. The reports provide statistics about the security trends, key events, and risks of protected assets.
Constraints
- A security report is retained for only three months. You are advised to periodically download security reports for audit.
Security Report Description
The content and generation time of a report are as follows:
- Report content:
- Security event details: intrusion prevention status, event severity distribution, security event trend, top external attack source IP addresses, top attack destination IP addresses, attack types, and top attack distribution
- Internet border firewall:
- Access control policies, asset management, threat events, and traffic peak
- EIP protection statistics and traffic trend
- Information about the EIP assets managed by CFW, access control policies, threat events, and traffic peaks in the statistical period
- Inbound traffic: top access source IP addresses, top access destination IP addresses, and top access ports
- Outbound traffic: top access source IP addresses, top access domain names, and top open ports
- VPC border firewall: VPC protection, number of rules, and inter-VPC traffic analysis
- Access control policies, asset management, threat events, and traffic peak
- Inter-VPC protection statistics and traffic trend
- Information about the VPC assets managed by CFW, access control policies, threat events, and traffic peaks in the statistical period
- Top destination IP addresses, top source IP addresses, and top applications
- Report generation time:
- Daily
Statistical period: 00:00:00 to 24:00:00 every day
A report will be sent to the recipients the day after it is generated.
- Weekly
Statistical period: 00:00:00 on Monday to 24:00:00 on Sunday
A report will be sent to the recipients at the specified time after it is generated.
- Custom: Customize a time range.
Statistical Period: Configure a statistical period for your report.
A report will be sent to the specified recipients after it is generated.
- Daily
You can create a security report as needed. For details, see Creating a Security Report.
You can check security reports. For details, see Viewing/Downloading a Security Report.
Feedback
Was this page helpful?
Provide feedbackThank you very much for your feedback. We will continue working to improve the documentation.