หน้านี้ยังไม่พร้อมใช้งานในภาษาท้องถิ่นของคุณ เรากำลังพยายามอย่างหนักเพื่อเพิ่มเวอร์ชันภาษาอื่น ๆ เพิ่มเติม ขอบคุณสำหรับการสนับสนุนเสมอมา
- What's New
- Function Overview
- Service Overview
-
Billing
- Billing Overview
- Billing Modes
- Billing Items
- Billing Examples
- Changing the Billing Mode
- Renewing Your Subscription
- Bills
- About Arrears
- Billing Termination
- Cost Management
-
Billing FAQs
- How Is SecMaster Billed?
- Can I Use SecMaster for Free?
- How Do I Change or Disable Auto Renewal for SecMaster?
- Will SecMaster Be Billed After It Expires?
- How Do I Renew SecMaster?
- Where Can I Unsubscribe from SecMaster?
- Where Can I View the Remaining Quotas of Security Data Collection and Security Data Packages?
- Can I Change the Billing Mode for SecMaster?
- Getting Started
-
User Guide
- Buying SecMaster
- Authorizing SecMaster
- Checking Security Overview
- Workspaces
- Viewing Purchased Resources
-
Security Governance
- Security Governance Overview
- Security Compliance Pack Description
- Authorizing SecMaster to Access Cloud Service Resources
- Subscribing to or Unsubscribing from a Compliance Pack
- Starting a Self-Assessment
- Viewing Security Compliance Overview
- Viewing Evaluation Results
- Viewing Policy Scanning Results
- Downloading a Compliance Report
- Security Situation
- Resource Manager
- Risk Prevention
- Threats
- Security Orchestration
-
Playbook Overview
- Ransomware Incident Response Solution
- Attack Link Analysis Alert Notification
- HSS Isolation and Killing of Malware
- Automatic Renaming of Alert Names
- Auto High-Risk Vulnerability Notification
- Automatic Notification of High-Risk Alerts
- Auto Blocking for High-risk Alerts
- Real-time Notification of Critical Organization and Management Operations
-
Settings
- Data Integration
-
Log Data Collection
- Data Collection Overview
- Data Collection Process
- Adding a Node
- Configuring a Component
- Adding a Connection
- Creating and Editing a Parser
- Adding and Editing a Collection Channel
- Verifying Log Collection
- Managing Connections
- Managing Parsers
- Managing Collection Channels
- Viewing Collection Nodes
- Managing Nodes and Components
- Partitioning a Disk
- Logstash Configuration Description
- Connector Rules
- Parser Rules
- Upgrading the Component Controller
- Customizing Directories
- Permissions Management
- Key Operations Recorded by CTS
-
Best Practices
-
Log Access and Transfer Operation Guide
- Solution Overview
- Resource Planning
- Process Flow
-
Procedure
- (Optional) Step 1: Buy an ECS
- (Optional) Step 2: Buy a Data Disk
- (Optional) Step 3: Attach a Data Disk
- Step 4: Create a Non-administrator IAM User
- Step 5: Configure Network Connection
- Step 6: Install the Component Controller (isap-agent)
- Step 7: Install the Log Collection Component (Logstash)
- (Optional) Step 8: Creating a Log Storage Pipeline
- Step 9: Configure a Connector
- (Optional) Step 10: Configure a Log Parser
- Step 11: Configure a Log Collection Channel
- Step 12: Verify Log Access and Transfer
- Credential Leakage Response Solution
-
Log Access and Transfer Operation Guide
-
API Reference
- Before You Start
- API Overview
- Calling APIs
-
API
- Alert Management
- Incident Management
- Indicator Management
- Playbook Management
- Alert Rule Management
- Playbook Version Management
- Playbook Rule Management
- Playbook Instance Management
- Playbook Approval Management
- Playbook Action Management
- Incident Relationship Management
- Data Class Management
- Workflow Management
- Data Space Management
- Pipelines
- Workspace Management
- Metering and Billing
- Metric Query
- Baseline Inspection
- Appendix
- FAQs
-
More Documents
-
User Guide (ME-Abu Dhabi Region)
- Service Overview
- Buying SecMaster
- Authorizing SecMaster
- Viewing Security Overview
- Workspaces
- Viewing Purchased Resources
-
Security Governance
- Security Governance Overview
- Security Compliance Pack Description
- Authorizing SecMaster to Access Cloud Service Resources
- Subscribing to or Unsubscribing from a Compliance Pack
- Starting a Self-Assessment
- Viewing Security Compliance Overview
- Viewing Evaluation Results
- Viewing Policy Scanning Results
- Downloading a Compliance Report
- Security Situation
- Resource Manager
- Risk Prevention
- Threat Operations
- Security Orchestration
-
Settings
- Data Integration
-
Log Data Collection
- Data Collection Overview
- Adding a Node
- Configuring a Component
- Adding a Connection
- Creating and Editing a Parser
- Adding and Editing a Collection Channel
- Managing Connections
- Managing Parsers
- Managing Collection Channels
- Viewing Collection Nodes
- Managing Nodes and Components
- Partitioning a Disk
- Logstash Configuration Description
- Connector Rules
- Parser Rules
- Upgrading the Component Controller
- Customizing Directories
- Permissions Management
- FAQs
- Change History
-
User Guide (Kuala Lumpur Region)
- Service Overview
- Authorizing SecMaster
- Security Overview
- Workspaces
- Viewing Purchased Resources
- Security Situation
- Resource Manager
-
Risk Prevention
-
Baseline Inspection
- Baseline Inspection Overview
- Creating a Custom Check Plan
- Starting an Immediate Baseline Check
- Viewing Check Results
- Handling Check Results
- Viewing Compliance Packs
- Creating a Custom Compliance Pack
- Importing and Exporting a Compliance Pack
- Viewing Check Items
- Creating a Custom Check Item
- Importing and Exporting Check Items
- Vulnerability Management
- Policy Management
-
Baseline Inspection
-
Threat Operations
- Incident Management
- Alert Management
- Indicator Management
- Intelligent Modeling
- Security Analysis
- Data Delivery
-
Security Orchestration
- Security Orchestration Overview
- Built-in Playbooks
- Security Orchestration Process
- (Optional) Configuring and Enabling a Workflow
- Configuring and Enabling a Playbook
- Operation Object Management
- Playbook Orchestration Management
- Layout Management
- Plug-in Management
- Settings
-
FAQs
-
Product Consulting
- Why Is There No Attack Data or Only A Small Amount of Attack Data?
- Where Does SecMaster Obtain Its Data From?
- What Are the Dependencies and Differences Between SecMaster and Other Security Services?
- What Are the Differences Between SecMaster and HSS?
- How Do I Update My Security Score?
- How Do I Handle a Brute-force Attack?
- Issues About Data Synchronization and Data Consistency
- About Data Collection Faults
-
Product Consulting
- Change History
-
User Guide (ME-Abu Dhabi Region)
- General Reference
Show all
Copied.
Preconfigured Playbooks
In security orchestration module, SecMaster provides preconfigured playbooks. You can use them without extra settings.
Preconfigured Playbooks
Security Layer |
Playbook Name |
Description |
Data Class |
---|---|---|---|
Server security |
HSS alert synchronization |
Automatically synchronizes HSS alerts generated for servers. |
Alert |
Auto High-Risk Vulnerability Notification |
Sends email or SMS notifications to specified recipients when vulnerabilities rated as high severity are discovered. |
Vulnerability |
|
Attack Link Analysis Alert Notification |
Analyzes attack links. If HSS generates an alert for a server, the system checks the website running on the server. If the website information and alert exist, the system sends an alert notification. |
Alert |
|
Server vulnerability notification |
Checks servers with EIPs bound on the resource manager page and notifies of discovered vulnerabilities. |
CommonContext |
|
HSS Isolation and Killing of Malware |
Automatically isolates and kills malware. |
Alert |
|
Mining host isolation |
Isolates the server for which an alert of mining program or software was generated. The playbook also adds the server into a security group that allows no inbound or outbound traffic. |
Alert |
|
Ransomware host isolation |
Isolates the server for which an alert of ransomware was generated. The playbook also adds the server into a security group that allows no inbound or outbound traffic. |
Alert |
|
Host Defense Alarms Are Associated With Historical Handling Information |
Associates new HSS alerts with HSS alerts handled earlier and adds historical handling details to the comment area for the corresponding HSS alerts. |
Alert |
|
Add host asset protection status notification |
Checks new servers and notifies you of servers unprotected by HSS. |
Resource |
|
HSS High-Risk Alarm Interception Notification |
Checks HSS high-risk alarms and generates to-do task notifications for source IP addresses that are not blocked by security groups. The to-do tasks will be reviewed manually. Once confirmed, the source IP addresses will be added to VPC block policy in SecMaster. |
Alert |
|
Automated handling of host Rootkit event attacks |
If a Rootkit alert is generated, this playbook automatically isolates the affected host by adding it to a security group that blocks all inbound and outbound traffic, and closes the alert. |
Alert |
|
Automated handling of host rebound Shell attacks |
If a reverse shell alert is generated, this playbook automatically isolates the affected host by adding it to a security group that blocks all inbound and outbound traffic, and closes the alert. |
Alert |
|
Application security |
SecMaster WAF Address Group Association Policy |
Associates SecMaster and WAF blacklist address groups for all enterprise projects. |
CommonContext |
WAF clear Non-domain Policy |
Checks WAF protection policies at 09:00 every Monday and deletes policies with no rules included. |
CommonContext |
|
Application Defense Alarms Are Associated With Historical Handling Information |
Associates new WAF alerts with WAF alerts handled earlier and adds historical handling details to the comment area for the new alerts. |
Alert |
|
Web login burst interception |
Checks IP addresses that establish brute-force login connections. If the IP addresses are not whitelisted, the workflow generates a to-do task. The do-to task will be reviewed manually. Once it is confirmed that the IP addresses should be blocked, the IP addresses will be added to a WAF block policy in SecMaster. |
Alert |
|
O&M security |
Real-time Notification of Critical Organization and Management Operations |
Sends real-time notifications for O&M alerts generated by models. Currently, SMN notifications can be sent for three key O&M operations: attaching NICs, creating VPC peering connections, and binding EIPs to resources. |
Alert |
Identity security |
Identity Defense Alarms Are Associated With Historical Handling Information |
Associates new IAM alerts with IAM alerts handled earlier and adds historical handling details to the comment area for the new alerts. |
Alert |
Network security |
Network Defense Alarms Are Associated With Historical Handling Information |
Associates new CFW alerts with CFW alerts handled earlier and adds historical handling details to the comment area for new alerts. |
Alert |
Others/General |
Automatic Notification of High-Risk Alerts |
Sends email or SMS notifications when there are alerts rated as High or Fatal. |
Alert |
Alert metric extraction |
Extracts IP addresses from alerts, checks the IP addresses against the intelligence system, sets alert indicators for confirmed malicious IP addresses, and associates the indicators with the source alerts. |
Alert |
|
Automatic Disabling of Repeated Alerts |
Closes the status of duplicate alerts when they are generated next time for the last 7 days and associates the alerts with the same name for the last 7 days. |
Alert |
|
Automatic renaming of alert names |
Generates custom alert names by combining specified key fields. |
Alert |
|
Alert IP metric labeling |
Adds attack source IP address and attacked IP address labels for alerts. |
Alert |
|
IP intelligence association |
Associates alerts with SecMaster intelligence (preferred) and ThreatBook intelligence. |
Alert |
|
Asset Protection Status Statistics Notification |
Collects statistics on asset protection status every week and sends notifications to customers by email or SMS. |
CommonContext |
|
Alert statistics Notify |
At 19:00 every day, collects statistics on alerts that are not cleared and sends notifications to customers by email or SMS. |
Alert |
|
Auto Blocking for High-risk Alerts |
If a source IP address launched more than three attacks, triggered high-risk or critical alerts, and hit the malicious label in ThreatBook, this playbook triggers the corresponding security policies in WAF, VPC, CFW, or IAM to block the IP address. |
Alert |
|
Automatic clearing of low-risk alerts |
This playbook automatically clear low-risk and informative alerts. |
Alert |
|
CFW Synchronizes Black IP Addresses to Intelligence |
This playbook synchronizes the IP address blacklist configured in CFW to the Indicators page in SecMaster. |
CommonContext |
|
WAF Synchronizes Black IP Addresses to Intelligence |
This playbook synchronizes the IP address blacklist configured in WAF to the Indicators page in SecMaster. |
CommonContext |
Feedback
Was this page helpful?
Provide feedbackThank you very much for your feedback. We will continue working to improve the documentation.See the reply and handling status in My Cloud VOC.
For any further questions, feel free to contact us through the chatbot.
Chatbot