Updated on 2025-07-23 GMT+08:00

Security Report Overview

CFW provides security reports, which can be generated daily, weekly, or at a custom interval. The reports provide statistics about the security trends, key events, and risks of protected assets.

Constraints

  • A security report is retained for only three months. You are advised to periodically download security reports for audit.

Security Report Description

The content and generation time of a report are as follows:

  • Report content:
    • Security event details: intrusion prevention status, event severity distribution, security event trend, top external attack source IP addresses, top attack destination IP addresses, attack types, and top attack distribution
    • Internet border firewall:
      • Access control policies, asset management, threat events, and traffic peak
      • EIP protection statistics and traffic trend
      • Information about the EIP assets managed by CFW, access control policies, threat events, and traffic peaks in the statistical period
      • Inbound traffic: top access source IP addresses, top access destination IP addresses, and top access ports
      • Outbound traffic: top access source IP addresses, top access domain names, and top open ports
    • VPC border firewall: VPC protection, number of rules, and inter-VPC traffic analysis
      • Access control policies, asset management, threat events, and traffic peak
      • Inter-VPC protection statistics and traffic trend
      • Information about the VPC assets managed by CFW, access control policies, threat events, and traffic peaks in the statistical period
      • Top destination IP addresses, top source IP addresses, and top applications
  • Report generation time:
    • Daily

      Statistical period: 00:00:00 to 24:00:00 every day

      A report will be sent to the recipients the day after it is generated.

    • Weekly

      Statistical period: 00:00:00 on Monday to 24:00:00 on Sunday

      A report will be sent to the recipients at the specified time after it is generated.

    • Custom: Customize a time range.

      Statistical Period: Configure a statistical period for your report.

      A report will be sent to the specified recipients after it is generated.

You can create a security report as needed. For details, see Creating a Security Report.

You can check security reports. For details, see Viewing/Downloading a Security Report.