El contenido no se encuentra disponible en el idioma seleccionado. Estamos trabajando continuamente para agregar más idiomas. Gracias por su apoyo.
- What's New
- Function Overview
- Service Overview
-
Billing
- Billing Overview
- Billing Modes
- Billing Items
- Billing Examples
- Changing the Billing Mode
- Renewing Your Subscription
- Bills
- About Arrears
- Billing Termination
- Cost Management
-
Billing FAQs
- How Is SecMaster Billed?
- Can I Use SecMaster for Free?
- How Do I Change or Disable Auto Renewal for SecMaster?
- Will SecMaster Be Billed After It Expires?
- How Do I Renew SecMaster?
- Where Can I Unsubscribe from SecMaster?
- Where Can I View the Remaining Quotas of Security Data Collection and Security Data Packages?
- Can I Change the Billing Mode for SecMaster?
- Getting Started
-
User Guide
- Buying SecMaster
- Authorizing SecMaster
- Checking Security Overview
- Workspaces
- Viewing Purchased Resources
-
Security Governance
- Security Governance Overview
- Security Compliance Pack Description
- Authorizing SecMaster to Access Cloud Service Resources
- Subscribing to or Unsubscribing from a Compliance Pack
- Starting a Self-Assessment
- Viewing Security Compliance Overview
- Viewing Evaluation Results
- Viewing Policy Scanning Results
- Downloading a Compliance Report
- Security Situation
- Resource Manager
- Risk Prevention
- Threats
- Security Orchestration
-
Playbook Overview
- Ransomware Incident Response Solution
- Attack Link Analysis Alert Notification
- HSS Isolation and Killing of Malware
- Automatic Renaming of Alert Names
- Auto High-Risk Vulnerability Notification
- Automatic Notification of High-Risk Alerts
- Auto Blocking for High-risk Alerts
- Real-time Notification of Critical Organization and Management Operations
-
Settings
- Data Integration
-
Log Data Collection
- Data Collection Overview
- Data Collection Process
- Adding a Node
- Configuring a Component
- Adding a Connection
- Creating and Editing a Parser
- Adding and Editing a Collection Channel
- Verifying Log Collection
- Managing Connections
- Managing Parsers
- Managing Collection Channels
- Viewing Collection Nodes
- Managing Nodes and Components
- Partitioning a Disk
- Logstash Configuration Description
- Connector Rules
- Parser Rules
- Upgrading the Component Controller
- Customizing Directories
- Permissions Management
- Key Operations Recorded by CTS
-
Best Practices
-
Log Access and Transfer Operation Guide
- Solution Overview
- Resource Planning
- Process Flow
-
Procedure
- (Optional) Step 1: Buy an ECS
- (Optional) Step 2: Buy a Data Disk
- (Optional) Step 3: Attach a Data Disk
- Step 4: Create a Non-administrator IAM User
- Step 5: Configure Network Connection
- Step 6: Install the Component Controller (isap-agent)
- Step 7: Install the Log Collection Component (Logstash)
- (Optional) Step 8: Creating a Log Storage Pipeline
- Step 9: Configure a Connector
- (Optional) Step 10: Configure a Log Parser
- Step 11: Configure a Log Collection Channel
- Step 12: Verify Log Access and Transfer
- Credential Leakage Response Solution
-
Log Access and Transfer Operation Guide
-
API Reference
- Before You Start
- API Overview
- Calling APIs
-
API
- Alert Management
- Incident Management
- Indicator Management
- Playbook Management
- Alert Rule Management
- Playbook Version Management
- Playbook Rule Management
- Playbook Instance Management
- Playbook Approval Management
- Playbook Action Management
- Incident Relationship Management
- Data Class Management
- Workflow Management
- Data Space Management
- Pipelines
- Workspace Management
- Metering and Billing
- Metric Query
- Baseline Inspection
- Appendix
- FAQs
-
More Documents
-
User Guide (ME-Abu Dhabi Region)
- Service Overview
- Buying SecMaster
- Authorizing SecMaster
- Viewing Security Overview
- Workspaces
- Viewing Purchased Resources
-
Security Governance
- Security Governance Overview
- Security Compliance Pack Description
- Authorizing SecMaster to Access Cloud Service Resources
- Subscribing to or Unsubscribing from a Compliance Pack
- Starting a Self-Assessment
- Viewing Security Compliance Overview
- Viewing Evaluation Results
- Viewing Policy Scanning Results
- Downloading a Compliance Report
- Security Situation
- Resource Manager
- Risk Prevention
- Threat Operations
- Security Orchestration
-
Settings
- Data Integration
-
Log Data Collection
- Data Collection Overview
- Adding a Node
- Configuring a Component
- Adding a Connection
- Creating and Editing a Parser
- Adding and Editing a Collection Channel
- Managing Connections
- Managing Parsers
- Managing Collection Channels
- Viewing Collection Nodes
- Managing Nodes and Components
- Partitioning a Disk
- Logstash Configuration Description
- Connector Rules
- Parser Rules
- Upgrading the Component Controller
- Customizing Directories
- Permissions Management
- FAQs
- Change History
-
User Guide (Kuala Lumpur Region)
- Service Overview
- Authorizing SecMaster
- Security Overview
- Workspaces
- Viewing Purchased Resources
- Security Situation
- Resource Manager
-
Risk Prevention
-
Baseline Inspection
- Baseline Inspection Overview
- Creating a Custom Check Plan
- Starting an Immediate Baseline Check
- Viewing Check Results
- Handling Check Results
- Viewing Compliance Packs
- Creating a Custom Compliance Pack
- Importing and Exporting a Compliance Pack
- Viewing Check Items
- Creating a Custom Check Item
- Importing and Exporting Check Items
- Vulnerability Management
- Policy Management
-
Baseline Inspection
-
Threat Operations
- Incident Management
- Alert Management
- Indicator Management
- Intelligent Modeling
- Security Analysis
- Data Delivery
-
Security Orchestration
- Security Orchestration Overview
- Built-in Playbooks
- Security Orchestration Process
- (Optional) Configuring and Enabling a Workflow
- Configuring and Enabling a Playbook
- Operation Object Management
- Playbook Orchestration Management
- Layout Management
- Plug-in Management
- Settings
-
FAQs
-
Product Consulting
- Why Is There No Attack Data or Only A Small Amount of Attack Data?
- Where Does SecMaster Obtain Its Data From?
- What Are the Dependencies and Differences Between SecMaster and Other Security Services?
- What Are the Differences Between SecMaster and HSS?
- How Do I Update My Security Score?
- How Do I Handle a Brute-force Attack?
- Issues About Data Synchronization and Data Consistency
- About Data Collection Faults
-
Product Consulting
- Change History
-
User Guide (ME-Abu Dhabi Region)
- General Reference
Copied.
Creating and Copying a Security Report
Scenario
SecMaster provides you with security reports. You can create a security report template so that you can learn of your resource security status in a timely manner.
This section describes how to create a security report and how to quickly create a security report by copying an existing template.
Limitations and Constraints
A maximum of 10 security reports (including daily, weekly, and monthly reports) can be created in a workspace of an account.
Prerequisites
You have purchased the SecMaster professional edition and the edition is within the validity period.
Creating a Report
- Log in to the management console.
- Click
in the upper left corner of the management console and select a region or project.
- Click
in the upper left corner of the page and choose Security & Compliance > SecMaster.
- In the navigation pane on the left, choose Workspaces > Management. In the workspace list, click the name of the target workspace.
Figure 1 Workspace management page
- In the navigation pane on the left, choose Security Situation > Security Reports.
Figure 2 Security Reports
- On the Reports page, click
to go to the basic configuration page.
- Configure basic information of the report.
Table 1 Report parameters Parameter
Description
Report Name
Name of the report you want to create.
Schedule
Select a report type.
- Daily: SecMaster collects security information from 00:00:00 to 23:59:59 of the previous day by default.
- Weekly: SecMaster collects statistics on security information from 00:00:00 on Monday to 23:59:59 on Sunday of the previous week.
- Monthly: SecMaster collects statistics on security information from 00:00:00 on the first day to 23:59:59 on the last day of the previous month.
- Custom: Customize a time range.
Data Scope
This field displays the data scope based on Schedule you specified.
If you select Daily, Weekly, or Monthly for Schedule, the system displays the report data scope accordingly.
Schedule
If you select Daily, Weekly, or Monthly for Schedule, you still need to set when you want SecMaster to send reports.
- Daily: By default, SecMaster sends a report that includes security information generated from 00:00:00 to 23:59:59 on the previous day every day at the time you specify.
- Weekly: Set the time when the weekly report is sent. By default, the system sends a report for the data from 00:00:00 last Monday to 23:59:59 last Sunday.
- Monthly: By default, the system sends a report that includes the security information for the previous month on a monthly basis at the time you specify.
Send Interval
If you select Custom for Schedule, you need to set an interval to let SecMaster send reports.
Send Rule
If you select Custom for Schedule, you need to set when to send the report and the data scope.
You can set up to five rules for sending reports.
Report Format
Format of the security report. The options are HTML, JPG, WORD, and PDF.
Email Subject
Set the subject of the email for sending the report.
Recipient Email
Add the email address of each recipient.
- You can add up to 100 email addresses.
- Separate multiple email addresses with semicolons (;). Example: test01@example.com;test02@example.com
(Optional) Copy To
Add the email address of each recipient you want to copy the report to.
- You can add up to 100 email addresses.
- Separate multiple email addresses with semicolons (;). Example: test03@example.com;test04@example.com
(Optional) Remarks
Remarks for the security report.
- Click Next: Report Choose in the upper right corner.
- On the Report Selection page, select a report from the left. After selecting, you can preview the report layout in the right pane.
You need to select the corresponding report layout based on what you select for Schedule.
- To download a report, click
in the upper left corner of the report preview page. In the dialog box displayed, select a report format and click OK.
The system then automatically downloads the report for you.
- To view a report in full screen, click
in the upper left corner of the report preview page.
- To share a report, click
in the upper left corner of the report preview page when editing the report. In the dialog box displayed, click the copy button to share the report. Then, click OK to close the dialog box.
- To download a report, click
- Click Complete in the lower right corner. On the displayed Security Reports page, view the created report.
Copying a Report
- Log in to the management console.
- Click
in the upper left corner of the management console and select a region or project.
- Click
in the upper left corner of the page and choose Security & Compliance > SecMaster.
- In the navigation pane on the left, choose Workspaces > Management. In the workspace list, click the name of the target workspace.
Figure 3 Workspace management page
- In the navigation pane on the left, choose Security Situation > Security Reports.
Figure 4 Security Reports
- Select a report template and click Copy.
- Edit basic information of the report.
- Click Next: Report Choose. The report configuration page is displayed.
- To download a report, click
in the upper left corner of the report preview page. In the dialog box displayed, select a report format and click OK.
The system then automatically downloads the report for you.
- To view a report in full screen, click
in the upper left corner of the report preview page.
- To share a report, click
in the upper left corner of the report preview page when editing the report. In the dialog box displayed, click the copy button to share the report. Then, click OK to close the dialog box.
- To download a report, click
- Click Complete in the lower right corner. On the displayed Security Reports page, view the newly created report.
Feedback
Was this page helpful?
Provide feedbackThank you very much for your feedback. We will continue working to improve the documentation.See the reply and handling status in My Cloud VOC.
For any further questions, feel free to contact us through the chatbot.
Chatbot