Updated on 2024-10-29 GMT+08:00

Asset Security Screen

Scenarios

There are always such scenarios as presentation, reporting, or real-time monitoring where you need to present the analysis results of SecMaster on big screens to achieve better demonstration effect. It is not ideal to just zoom in the console. Now, SecMaster Large Screen is a good choice for you to display the service console on bigger screens for a better visual effect.

By default, SecMaster provides an asset screen for you. With this screen, you will learn about overall information about your assets at a glance, including how many assets you have, how many of them have been attacked, and how many of them are unprotected.

Procedure

  1. Log in to the management console.
  2. Click in the upper part of the page and choose Security > SecMaster.
  3. In the navigation pane on the left, choose Workspaces > Management. In the workspace list, click the name of the target workspace.
  4. In the navigation pane on the left, choose Security Situation > Large Screen.
  5. Click Play in the lower right corner of the Asset Security Situation screen to access the page.

    This screen includes many graphs. More details are provided below.

Asset Security Screen Overview

On this screen, you can view the total numbers of assets, attacked assets, unprotected assets, vulnerabilities, and assets with unsafe settings in the current workspace.

Table 1 Asset Security Screen

Parameter

Statistical Period

Update Frequency

Description

Assets

Real-time

Hourly

Total number of assets managed in Resource Manager.

Attacked Assets

Last 7 days

Hourly

Number of assets affected by alerts aggregated in Alerts under Threat Operations in the current workspace.

Unprotected Assets

Real-time

Hourly

Number of assets for which security protection is not enabled, for example, ECSs for which HSS is not enabled and EIPs for which DDoS is not enabled. You will learn of how many assets with Protection Status marked as Unprotected in Resource Manager.

In Resource Manager, the protection status for assets is as follows:

  • Protected: The security product required for an asset is enabled for the asset.
  • Unprotected: The security product required for an asset has not been purchased or enabled for the asset. If you want to protect target assets, purchase corresponding security products and enable protection. For example, if you want to protect ECSs, purchase HSS and enable HSS for each ECS.
  • --: The required security product is not supported in the current region.

Assets with Vulnerabilities or Unsafe Settings

Real-time

Hourly

These assets include assets affected by vulnerabilities and assets have unsafe settings discovered during baseline inspection. The duplicated assets are counted only once.

The vulnerability data comes from Risk Prevention > Vulnerabilities, and the baseline inspection data comes from Risk Prevention > Baseline Inspection > Resources to Check.

Asset Distribution

In this area, you can view assets by type, asset protection rate, asset change trend, and distribution of the five assets attacked most.

Table 2 Asset Distribution

Parameter

Statistical Period

Update Frequency

Description

Assets by Type

Real-time

Hourly

Number of different types of assets in Resource Manager.

Protection by Asset Type (%)

Real-time

Hourly

Percentage of protection for different types of assets.

Protection rate of a certain type of assets = Protected assets/Total number of assets of this type.

Asset Changes

Last 7 days

Hourly

Statistics on the total number of assets, and the number of assets with vulnerabilities and unsafe settings in the last seven days.

Top 5 Attacked Assets

Last 7 days

Hourly

Top 5 attacked assets in the last seven days and the number of attacks.

The data comes from Threat Operations > Alerts. You can view details on this page.

Top 5 Assets with the Most Vulnerabilities and Top 5 Departments with the Highest Protection Rate

In this area, you will see the five assets with the most vulnerabilities and the five departments with the highest protection rate.

Table 3 Top 5 Assets with the Most Vulnerabilities and Top 5 Departments with the Highest Protection Rate

Parameter

Statistical Period

Update Frequency

Description

Top 5 Assets with the Most Vulnerabilities

Real-time

Hourly

Top 5 assets with the most vulnerabilities in different departments.

This data is generated based on the assets affected by vulnerabilities in Risk Prevention > Vulnerabilities. Note that the assets must have department details provided, or the affected assets may fail to be counted toward this data.

Top 5 Departments with the Highest Protection Rate

Real-time

Hourly

This graphs list the 5 departments that have the highest protection rate, in descending order.

Note that the assets on Resource Manager must have department details provided, or the assets cannot be counted toward this rate.