How to Use Security Analysis
Table 1 shows the process of using the security analysis function.
Step |
Description |
---|---|
Add a workspace for resource isolation and control. |
|
Configure the source of security data you need to collect. SecMaster can integrate log data of multiple products, such as storage, management and supervision, and security. After the integration, you can search for and analyze all collected logs. |
|
(Optional) Adding a Data Space |
Create a data space for storing collected log data. For data accessed through the console, the system creates a default data space. You do not need to create a data space. |
(Optional) Creating a Pipeline |
Create pipelines for collecting, storing, and querying log data. For data accessed through the console, the system creates a default data pipeline. You do not need to create a pipeline. |
Configure indexes to narrow down the query scope. |
|
Query and analyze the accessed data. |
|
Allows you to download raw logs or queried and analyzed logs. |
|
After you run query and analysis statements, SecMaster can display the query and analysis results in charts and tables. Currently, data can be displayed in tables, line charts, bar charts, and pie charts. |
Feedback
Was this page helpful?
Provide feedbackThank you very much for your feedback. We will continue working to improve the documentation.See the reply and handling status in My Cloud VOC.
For any further questions, feel free to contact us through the chatbot.
Chatbot