Security Report Overview
CFW provides security reports, which can be generated daily, weekly, or at a custom interval. The reports provide statistics about the security trends, key events, and risks of protected assets.
Constraints
- A security report is retained for only three months. You are advised to periodically download security reports for audit.
Security Report Description
The content and generation time of a report are as follows:
- Report content:
- Security event details: intrusion prevention status, event severity distribution, security event trend, top external attack source IP addresses, top attack destination IP addresses, attack types, and top attack distribution
- Internet border firewall:
- Access control policies, asset management, threat events, and traffic peak
- EIP protection statistics and traffic trend
- Information about the EIP assets managed by CFW, access control policies, threat events, and traffic peaks in the statistical period
- Inbound traffic: top access source IP addresses, top access destination IP addresses, and top access ports
- Outbound traffic: top access source IP addresses, top access domain names, and top open ports
- VPC border firewall: VPC protection, number of rules, and inter-VPC traffic analysis
- Access control policies, asset management, threat events, and traffic peak
- Inter-VPC protection statistics and traffic trend
- Information about the VPC assets managed by CFW, access control policies, threat events, and traffic peaks in the statistical period
- Top destination IP addresses, top source IP addresses, and top applications
- Report generation time:
- Daily
Statistical period: 00:00:00 to 24:00:00 every day
A report will be sent to the recipients the day after it is generated.
- Weekly
Statistical period: 00:00:00 on Monday to 24:00:00 on Sunday
A report will be sent to the recipients at the specified time after it is generated.
- Custom: Customize a time range.
Statistical Period: Configure a statistical period for your report.
A report will be sent to the specified recipients after it is generated.
- Daily
You can create a security report as needed. For details, see Creating a Security Report.
You can check security reports. For details, see Viewing/Downloading a Security Report.
Feedback
Was this page helpful?
Provide feedbackThank you very much for your feedback. We will continue working to improve the documentation.See the reply and handling status in My Cloud VOC.
For any further questions, feel free to contact us through the chatbot.
Chatbot