- What's New
- Function Overview
- Service Overview
- Billing
- Getting Started
-
User Guide
- Buying SecMaster
- Authorizing SecMaster
- Viewing Security Overview
- Workspaces
- Viewing Purchased Resources
- Security Situation
- Resource Manager
- Risk Prevention
- Threat Operations
- Security Orchestration
-
Playbook Overview
- Ransomware Incident Response Solution
- Attack Link Analysis Alert Notification
- HSS Isolation and Killing of Malware
- Automatic Renaming of Alert Names
- Auto High-Risk Vulnerability Notification
- Automatic Notification of High-Risk Alerts
- Auto Blocking for High-risk Alerts
- Real-time Notification of Critical Organization and Management Operations
-
Settings
- Data Integration
-
Log Data Collection
- Data Collection Overview
- Adding a Node
- Configuring a Component
- Adding a Connection
- Creating and Editing a Parser
- Adding and Editing a Collection Channel
- Managing Connections
- Managing Parsers
- Managing Collection Channels
- Viewing Collection Nodes
- Managing Nodes and Components
- Partitioning a Disk
- Logstash Configuration Description
- Connector Rules
- Parser Rules
- Upgrading the Component Controller
- Customizing Directories
- Permissions Management
- Key Operations Recorded by CTS
-
Best Practices
-
Log Access and Transfer Operation Guide
- Solution Overview
- Resource Planning
- Process Flow
-
Procedure
- (Optional) Step 1: Buy an ECS
- (Optional) Step 2: Buy a Data Disk
- (Optional) Step 3: Attach a Data Disk
- Step 4: Create a Non-administrator IAM User
- Step 5: Configure Network Connection
- Step 6: Install the Component Controller (isap-agent)
- Step 7: Install the Log Collection Component (Logstash)
- (Optional) Step 8: Creating a Log Storage Pipeline
- Step 9: Configure a Connector
- (Optional) Step 10: Configure a Log Parser
- Step 11: Configure a Log Collection Channel
- Step 12: Verify Log Access and Transfer
- Credential Leakage Response Solution
-
Log Access and Transfer Operation Guide
-
API Reference
- Before You Start
- API Overview
- Calling APIs
-
API
- Alert Management
- Incident Management
- Indicator Management
- Playbook Management
- Alert Rule Management
- Playbook Version Management
- Playbook Rule Management
- Playbook Instance Management
- Playbook Approval Management
- Playbook Action Management
- Incident Relationship Management
- Data Class Management
- Workflow Management
- Data Space Management
- Pipelines
- Workspace Management
- Metering and Billing
- Metric Query
- Baseline Inspection
- Appendix
- FAQs
Viewing Baseline Check Results
Scenarios
After a check plan is set, you can perform an immediate check on the Baseline Inspection page. It takes about 10 minutes for the check results to be displayed on the result page. For details about how to perform an immediate check, see Starting an Immediate Baseline Check.
If you do not perform an immediate check, the system performs the check at the specified time according to the check plan. For example, the system performs the check every three days by default, and the check is performed from 00:00 to 06:00 each time. You can view the check results on the Check Result page.
This topic describes where to view results of a baseline check plan.
Prerequisites
- Cloud service baseline scanning has been performed.
Viewing Baseline Check Results
- Log in to the management console.
- Click
in the upper left corner of the management console and select a region or project.
- Click
in the upper left corner of the page and choose Security & Compliance > SecMaster.
- In the navigation pane on the left, choose Workspaces > Management. In the workspace list, click the name of the target workspace.
Figure 1 Workspace management page
- (Optional) In the navigation pane on the left, choose Settings > Data Integration. On the displayed page, locate the row where SecMaster is located, enable the log access to compliance baseline logs in the Logs column.
SecMaster synchronizes all security data within a region to the first workspace in the region. For the non-first workspaces, you need to configure log access manually.
This topic describes how to enable log access to SecMaster manually.
Figure 2 Compliance baseline logAfter the setting is complete, you can start an immediate check on the Baseline Inspection page. It takes about 10 minutes for the check results to be displayed on the result page. For details about how to perform an immediate check, see Starting an Immediate Baseline Check.
If you do not perform an immediate check, the system performs the check at the specified time according to the check plan. For example, the system performs the check every three days by default, and the check is performed from 00:00 to 06:00 each time. You can view the check results on the Check Result page.
- In the navigation pane on the left, choose Risk Prevention > Baseline Inspection.
Figure 3 Accessing the check result page
- On the Check Result tab, view the check results of check items. For details about the parameters, see Table 1.
Feedback
Was this page helpful?
Provide feedbackThank you very much for your feedback. We will continue working to improve the documentation.