- What's New
- Function Overview
- Service Overview
- Billing
- Getting Started
- User Guide
- Best Practices
- SDK Reference
-
FAQs
-
Product Consulting
- What Does SA Do?
- Why Is There No Attack Data or Only A Small Amount of Attack Data?
- What Is the Data Source of Situation Awareness?
- How Do I Get Information About the Most Vulnerable Assets?
- What Are the Dependencies and Differences Between SA and Other Security Services?
- What Are the Differences Between SA and HSS?
- Why Cannot the Total ECS Quota Be Less Than the Number of Existing ECSs?
- Can SA Be Used Across Accounts?
- How Do I Update My Security Score?
- How Do I Handle a Brute-force Attack?
- How Do I Assign Operation Permissions to an Account?
- How Do I Handle the 403 forbidden Error Reported by SA?
- Why Is the Event Data in SA Inconsistent with That in WAF and HSS?
- What Are Differences Between SA and SecMaster?
- Purchase Consulting
- Regions and AZs
-
Product Consulting
- Videos
-
More Documents
-
User Guide (ME-Abu Dhabi Region)
- Service Overview
- Edition Upgrade
- Permissions Management
- Editions
- Security Overview
- Resource Manager
- Threat Alarms
- Baseline Inspection
- Events
- Logs
- Integrations
- Settings
-
FAQs
-
Product Consulting
- What Does SA Do?
- Why Is There No Attack Data or Only A Small Amount of Attack Data?
- What Is the Data Source of Situation Awareness?
- How Do I Get Information About the Most Vulnerable Assets?
- What Are the Dependencies and Differences Between SA and Other Security Services?
- Why Cannot the Total ECS Quota Be Less Than the Number of Existing ECSs?
- How Do I Update My Security Score?
- How Do I Handle a Brute-force Attack?
- How Do I Assign Operation Permissions to an Account?
- Why Is the Event Data in SA Inconsistent with That in WAF and HSS?
- Purchase Consulting
-
Product Consulting
- Change History
-
User Guide (ME-Abu Dhabi Region)
- General Reference
Show all
Copied.
Functions
You can use SA to centrally manage security posture of your cloud services. It includes Security Overview, Resource Manager, Event Analyses, Threat Alarms, Baseline Inspection, Events, Logs, Integrations, and more. For more information, see Table 1.
Function |
Description |
Reference |
---|---|---|
Security Overview |
Displays a comprehensive overview of asset security posture together with other linked cloud security services.
|
|
Event Analyses |
You can view alarms aggregated from HSS, WAF, and DBSS. This gives you an overall overview of the security status and risks of all your assets on the cloud. |
|
Resource Manager |
SA synchronizes information about your resources and displays overall security posture in one place. |
|
Threat Alarms |
In this module, SA reports alarms based on real-time monitoring, displays details of alarms for the last 180 days, and defends against typical threats by using varied preset protection policies.
|
|
Baseline Inspection |
SA can scan cloud baseline configurations to find out unsafe settings, report alarms for events, and offer hardening suggestions to you. |
|
Events |
SA aggregates detection data from a variety of related services so that you can monitor all events in one place. |
|
Logs |
You can authorize Object Storage Service (OBS) to store SA logs in OBS buckets. This makes it easier for you to store and export SA logs securely and meet audit requirements for storing logs for 180 days. |
|
Integrations |
SA integrates a variety of security products to aggregate their detection data and manage the data sources of events. You can view the amount of transmitted data and manage the health status of data reporting. |
Feedback
Was this page helpful?
Provide feedbackThank you very much for your feedback. We will continue working to improve the documentation.See the reply and handling status in My Cloud VOC.
For any further questions, feel free to contact us through the chatbot.
Chatbot