Updated on 2024-10-28 GMT+08:00

Asset Security Screen

Scenarios

There are always such scenarios as presentation, reporting, or real-time monitoring where you need to present the analysis results of SecMaster on big screens to achieve better demonstration effect. It is not ideal to just zoom in the console. Now, SecMaster Large Screen is a good choice for you to display the service console on bigger screens for a better visual effect.

By default, SecMaster provides an asset screen for you. With this screen, you will learn about overall information about your assets at a glance, including how many assets you have, how many of them have been attacked, and how many of them are unprotected.

Prerequisites

You have enabled Large Screen. For details, see Purchasing Value-Added Packages.

Procedure

  1. Log in to the management console.
  2. Click in the upper left corner of the management console and select a region or project.
  3. Click in the upper left corner of the page and choose Security & Compliance > SecMaster.
  4. In the navigation pane on the left, choose Workspaces > Management. In the workspace list, click the name of the target workspace.

    Figure 1 Workspace management page

  5. In the navigation pane on the left, choose Security Situation > Large Screen.

    Figure 2 Large Screen

  6. Click Play in the lower right corner of the asset security image to access the screen.

    This screen includes many graphs. More details are provided below.

Asset Security Screen Overview

On this screen, you can view the total numbers of assets, attacked assets, unprotected assets, vulnerabilities, and assets with unsafe settings in the current workspace.

Table 1 Asset Security Screen

Parameter

Statistical Period

Update Frequency

Description

Assets

Real-time

Hourly

Total number of assets managed in Resource Manager.

Attacked Assets

Last 7 days

Hourly

Number of assets affected by alerts aggregated in Alerts under Threat Operations in the current workspace.

Unprotected Assets

Real-time

Hourly

Number of assets for which security protection is not enabled, for example, ECSs for which HSS is not enabled and EIPs for which DDoS is not enabled. You will learn of how many assets with Protection Status marked as Unprotected in Resource Manager.

In Resource Manager, the protection status for assets is as follows:

  • Protected: The security product required for an asset is enabled for the asset.
  • Unprotected: The security product required for an asset has not been purchased or enabled for the asset. If you want to protect target assets, purchase corresponding security products and enable protection. For example, if you want to protect ECSs, purchase HSS and enable HSS for each ECS.
  • --: The required security product is not supported in the current region.

Assets with Vulnerabilities or Unsafe Settings

Real-time

Hourly

These assets include assets affected by vulnerabilities and assets have unsafe settings discovered during baseline inspection. The duplicated assets are counted only once.

The vulnerability data comes from Risk Prevention > Vulnerabilities, and the baseline inspection data comes from Risk Prevention > Baseline Inspection > Resources to Check.

Figure 3 Asset Security Screen

Asset Distribution

In this area, you can view assets by type, asset protection rate, asset change trend, and distribution of the five assets attacked most.

Table 2 Asset Distribution

Parameter

Statistical Period

Update Frequency

Description

Assets by Type

Real-time

Hourly

Number of different types of assets in Resource Manager.

Protection by Asset Type (%)

Real-time

Hourly

Percentage of protection for different types of assets.

Protection rate of a certain type of assets = Protected assets/Total number of assets of this type.

Asset Changes

Last 7 days

Hourly

Statistics on the total number of assets, and the number of assets with vulnerabilities and unsafe settings in the last seven days.

Top 5 Attacked Assets

Last 7 days

Hourly

Top 5 attacked assets in the last seven days and the number of attacks.

The data comes from Threat Operations > Alerts. You can view details on this page.

Figure 4 Asset Distribution

Top 5 Assets with the Most Vulnerabilities and Top 5 Departments with the Highest Protection Rate

In this area, you will see the five assets with the most vulnerabilities and the five departments with the highest protection rate.

Table 3 Top 5 Assets with the Most Vulnerabilities and Top 5 Departments with the Highest Protection Rate

Parameter

Statistical Period

Update Frequency

Description

Top 5 Assets with the Most Vulnerabilities

Real-time

Hourly

Top 5 assets with the most vulnerabilities in different departments.

This data is generated based on the assets affected by vulnerabilities in Risk Prevention > Vulnerabilities. Note that the assets must have department details provided, or the affected assets may fail to be counted toward this data.

Top 5 Departments with the Highest Protection Rate

Real-time

Hourly

This graphs list the 5 departments that have the highest protection rate, in descending order.

Note that the assets on Resource Manager must have department details provided, or the assets cannot be counted toward this rate.

Figure 5 Top 5 Assets with the Most Vulnerabilities and Top 5 Departments with the Highest Protection Rate