Updated on 2024-03-07 GMT+08:00

Asset Security Screen

There are always such scenarios as presentation, reporting, or real-time monitoring where you need to present the analysis results of SecMaster on big screens to achieve better demonstration effect. It is not ideal to just zoom in the console. Now, SecMaster Large Screen is a good choice for you to display the service console on bigger screens for a better visual effect.

By default, SecMaster provides an asset screen for you. With this screen, you will learn about overall information about your assets at a glance, including how many assets you have, how many of them have been attacked, and how many of them are unprotected.

Prerequisites

You have enabled Large Screen. For details, see Purchasing Value-Added Packages.

Procedure

  1. Log in to the management console.
  2. Click in the upper left corner of the page and choose Security & Compliance > SecMaster.
  3. In the navigation pane on the left, choose Workspaces > Management. In the workspace list, click the name of the target workspace.

    Figure 1 Workspace management page

  4. In the navigation pane on the left, choose Security Situation > Large Screen.

    Figure 2 Large Screen

  5. Click the Asset Security image to go to the large screen for assets.

    This screen includes many graphs.
    Figure 3 Asset Security Screen

Asset Security Screen Overview

On this screen, you can view the total numbers of assets, attacked assets, unprotected assets, vulnerabilities, and assets with unsafe settings in the current workspace.

Table 1 Asset Security Screen

Parameter

Statistical Period

Update Frequency

Description

Assets

Real-time

Hourly

Total number of assets managed in Resource Manager.

Attacked Assets

Last 7 days

Hourly

Number of assets affected by alerts aggregated in Alerts under Threat Operations in the current workspace.

Unprotected Assets

Real-time

Hourly

Number of assets for which security protection is not enabled, for example, ECSs for which HSS is not enabled and EIPs for which DDoS is not enabled.

Unprotected assets include the assets managed on the Resource Manager page and with no corresponding security controls enabled.

Assets with Vulnerabilities or Unsafe Settings

Real-time

Hourly

These assets include assets affected by vulnerabilities and assets have unsafe settings discovered during baseline inspection. The duplicated assets are counted only once.

The vulnerability data comes from Risk Prevention > Vulnerabilities, and the baseline inspection data comes from Risk Prevention > Baseline Inspection > Resources to Check.

Figure 4 Asset Security Screen

Asset Distribution

In this area, you can view assets by type, asset protection rate, asset change trend, and distribution of the five assets attacked most.

Table 2 Asset Distribution

Parameter

Statistical Period

Update Frequency

Description

Assets by Type

Real-time

Hourly

Number of different types of assets in Resource Manager.

Protection by Asset Type (%)

Real-time

Hourly

Percentage of protection for different types of assets.

Protection rate of a certain type of assets = Protected assets/Total number of assets of this type.

Asset Changes

Last 7 days

Hourly

Statistics on the total number of assets, and the number of assets with vulnerabilities and unsafe settings in the last seven days.

Top 5 Attacked Assets

Last 7 days

Hourly

Top 5 attacked assets in the last seven days and the number of attacks.

The data comes from Threat Operations > Alerts. You can view details on this page.

Figure 5 Asset Distribution

Top 5 Assets with the Most Vulnerabilities and Top 5 Departments with the Highest Protection Rate

In this area, you will see the five assets with the most vulnerabilities and the five departments with the highest protection rate.

Table 3 Top 5 Assets with the Most Vulnerabilities and Top 5 Departments with the Highest Protection Rate

Parameter

Statistical Period

Update Frequency

Description

Top 5 Assets with the Most Vulnerabilities

Real-time

Hourly

Top 5 assets with the most vulnerabilities in different departments.

This data is generated based on the assets affected by vulnerabilities in Risk Prevention > Vulnerabilities. Note that the assets must have department details provided, or the affected assets may fail to be counted toward this data.

Top 5 Departments with the Highest Protection Rate

Real-time

Hourly

This graphs list the 5 departments that have the highest protection rate, in descending order.

Note that the assets on Resource Manager must have department details provided, or the assets cannot be counted toward this rate.

Figure 6 Top 5 Assets with the Most Vulnerabilities and Top 5 Departments with the Highest Protection Rate