To ensure the security of your assets, we recommend that you view the alerts that are generated by Security Center on your assets and handle the alerts at the earliest opportunity. This topic describes how to view and handle alerts.
View alerts
Log on to the Security Center console. In the top navigation bar, select the region of the asset that you want to manage. You can select China or Outside China.
In the left-side navigation pane, choose .
On the Alerts page, view alerts.
NoteIf Blocked is displayed in the Alert Name column, Security Center terminated the malicious process of a virus file. The file can no longer threaten your services. We recommend that you quarantine the file at the earliest opportunity.
If Strict Mode is displayed in the Alert Name column, the alert detection mode of a server is the strict mode. In Strict Mode, Security Center detects more suspicious behavior and generates alerts. However, the false positive rate is higher in this mode. For more information, see Enable features on the Host Protection Settings tab.
Handle alerts
Log on to the Security Center console. In the top navigation bar, select the region of the asset that you want to manage. You can select China or Outside China.
In the left-side navigation pane, choose .
On the Alerts page, find the alert that you want to manage and click Handle in the Actions column. In the dialog box that appears, select a processing method to handle the alert and click Process Now.
NoteDifferent types of alerts support different processing methods. The processing methods displayed in the Security Center console shall prevail.
You can add a note based on your business requirements. For example, you can enter the reason for handling the alert and the user who handles the alert. This helps manage alerts that are handled.
Method
Description
Virus Detection and Removal
If you select Virus Detection and Removal, you can terminate the malicious process for which the alert is generated and quarantine the source file of the malicious process. The quarantined file can no longer threaten your services.
If you confirm that the alert is a positive, you can use one of the following methods to manually handle the alert:
Terminate Process: terminates the malicious process.
Terminate Process and Quarantine Source File: quarantines the virus file. After the virus file is quarantined, the file can no longer threaten your servers. For more information, see View and restore quarantined files.
WarningIf malicious code snippets are written to a business-related file, your business may fail to run as expected after you quarantine the file. Before you quarantine a file, make sure that the impact on your business is controllable.
A quarantined file can be restored within 30 days. After the restoration, the alert generated for the file is displayed in the alert list, and the file is monitored by Security Center. Security Center automatically deletes a file 30 days after it is quarantined.
Add to Whitelist
If the alert is a false positive, you can add the alert to the whitelist. You can also specify a whitelist rule to add alerts that meet the condition in the rule to the whitelist. For example, you select Add To Whitelist for the Exploit Kit Behavior alert and specify a rule to add the alerts generated for commands that contain aa to the whitelist. After the configuration, the status of the alert changes to Handled. Security Center no longer generates alerts for the commands that contain aa. In the handled alert list, you can remove the alert from the whitelist.
NoteIf you select this method, the alert that you select is added to the whitelist. You can also specify a whitelist rule. After you specify a whitelist rule, Security Center no longer generates the same alert as the selected alert if the condition in the rule is met. For more information about the alerts that can be added to the whitelist of Security Center, see What alerts can I add to the whitelist?
If Security Center generates an alert on a normal process, the alert is considered a false positive. Common false positives include an alert generated for Unusual TCP Packets. This alert notifies you that your server initiated suspicious scans on other devices.
Ignore
If you select Ignore, the status of the alert changes to Ignored. Security Center still generates this alert in the subsequent detection.
NoteIf one or more alerts can be ignored or are false positives, you can select the alerts and click Ignore Once or Add to Whitelist below the alert list of the Alerts page.
In-depth Cleanup
After the security experts of Security Center conduct tests and analysis on persistent viruses, the experts develop the In-depth Cleanup method based on the test and analysis results to detect and remove persistent viruses. If you use this method, risks may occur. You can click Details to view the information about the viruses that you want to remove. This method supports snapshots. You can create snapshots to restore data that is deleted during deep cleanup.
Quarantine
If you select Quarantine, Security Center quarantines webshell files. The quarantined files can no longer threaten your services.
WarningIf malicious code snippets are written to a business-related file, your business may fail to run as expected after you quarantine the file. Before you quarantine a file, make sure that the impact on your business is controllable.
A quarantined file can be restored within 30 days. After the restoration, the alert generated for the file is displayed in the alert list, and the file is monitored by Security Center. Security Center automatically deletes a file 30 days after it is quarantined.
Block
If you select Block, Security Center generates security group rules to defend against attacks. You must specify the validity period for the rules. This way, Security Center blocks access requests from malicious IP addresses within the specified period.
End Process
If you select End Process, Security Center terminates the process for which the alert is generated.
Troubleshooting
If you select Troubleshooting, the diagnostic program of Security Center collects information about the Security Center agent that is installed on your server and reports the information to Security Center for analysis. The information includes the network status, the processes of the Security Center agent, and logs. During the diagnosis, CPU and memory resources are consumed.
You can select one of the following modes for troubleshooting:
Standard
In Standard mode, logs of the Security Center agent are collected and then reported to Security Center for analysis.
Strict
In Strict mode, the information about the Security Center agent is collected and then reported to Security Center for analysis. The information includes network status, processes, and logs.
Manually Handled
If you select this method, it indicates that you have handled the risks for which the alert is generated.
Handle Same Type of Alerts
If you select this method, you can select multiple alerts to handle at a time. Before you handle multiple alerts at a time, we recommend that you view the details of the alerts.
Do Not Intercept Rule
If you do not want Security Center to block requests whose URI matches blocking rules, select Do Not Intercept Rule. After you select Do Not Intercept Rule, Security Center no longer blocks requests that use the URI or generates alerts.
Defense Without Notification
If you select this method, the same alerts are automatically added to the handled alert list. Security Center no longer notifies you of the alerts. Proceed with caution.
Disable Alerting Defense Rule
If you select this method, the system disables the automatic defense rule. Proceed with caution.
After you handle the alert, the status of the alert changes from Unhandled to Handled.
View statistics about alerts
Security Center provides statistics based on the alert types that are enabled. This allows you to obtain up-to-date information about the alerts on your assets and on the enabled and disabled alert types. You can view the statistics about alerts and the enabled alert types.
Log on to the Security Center console. In the top navigation bar, select the region of the asset that you want to manage. You can select China or Outside China.
In the left-side navigation pane, choose .
In the upper part of the Alerts page, view the statistics about alerts.
Parameter
Description
Operation
Alerting Servers
The number of servers on which alerts are generated.
Click the number below Alerting Servers to go to the Server tab of the Host page. On the Server tab, view the details of servers on which alerts are generated.
Urgent Alerts
The number of unhandled Urgent alerts.
Click the number below Urgent Alerts. The system displays the urgent alerts on the Alerts page. You can view and handle the Urgent alerts.
NoteWe recommend that you handle the Urgent alerts at the earliest opportunity.
Unhandled Alerts
The total number of unhandled alerts.
View the details of all unhandled alerts on the Alerts page. For more information, see View and handle alerts.
Precise Defense
The number of viruses that are automatically quarantined by the Malicious Host Behavior Prevention feature.
Click the number below Precise Defense. The system displays the related alerts on the Alerts page. You can view all viruses that are automatically quarantined by the malicious host behavior prevention feature.Malicious Host Behavior Prevention
NoteYou can ignore the viruses that are quarantined by Security Center.
Enabled IP Address Blocking Policies/All Policies
Enabled IP Address Blocking Policies: the number of IP addresses blocked by the defense policies against brute-force attacks that are enabled
All Policies: the number of IP addresses blocked by all defense policies against brute-force attacks that are created
Click a number below Enabled IP Address Blocking Policies/All Policies. In the IP Policy Library panel, you can view the IP address blocking policies that are enabled or all IP address blocking policies that are created. For more information about IP address blocking policies, see Configure alert settings.
Quarantined Files
The number of files that are quarantined by Security Center based on handled alerts.
Click the number below Quarantined Files. In the Quarantined Files panel, you can view the details of quarantined files. The quarantined files cannot affect your servers. For more information, see View and restore quarantined files.
View the statistics about archived alerts
If more than 100 alerts exist, Security Center automatically archives only the alerts that are handled prior to 30 days ago. Archived alerts are no longer displayed in the Security Center console. If you want to view the statistics about archived alerts, you can download the file of archived alerts to your computer.
Log on to the Security Center console. In the top navigation bar, select the region of the asset that you want to manage. You can select China or Outside China.
In the left-side navigation pane, choose .
In the upper-right corner of the Alerts page, click Archive data.
In the Archive data dialog box, view the file of archived alerts.
Click Download in the Download Link column to download the file of archived alerts to your computer.
The file of archived alerts is in the XLSX format. It takes 2 to 5 minutes to download a file of archived alerts. The time required by a download operation varies based on the network bandwidth and the file size.
After you download the file, you can view the information about alerts in the file. The information includes the alert IDs, alert names, alert details, risk levels, and status of alerts. You can also view information about affected assets, names of the affected assets, suggestions for handling the alerts, and points in time at which alerts were generated.
NoteIf an alert is in the Expired state, the alert has been generated within the last 30 days but you have not handled the alert. We recommend that you handle the alerts generated by Security Center at the earliest opportunity.
View and restore quarantined files
Security Center can quarantine malicious files. Quarantined files are listed in the Quarantine panel of the Alerts page. The system automatically deletes a quarantined file 30 days after the file is quarantined. If you confirm that the quarantined file is not exposed to security risks, you can restore the quarantined file with a few clicks within 30 days after the file is quarantined.
Log on to the Security Center console. In the top navigation bar, select the region of the asset that you want to manage. You can select China or Outside China.
In the left-side navigation pane, choose .
In the upper-right corner of the Alerts page, click Quarantined Files.
In the Quarantined Files panel, view information about quarantined files or restore the quarantined files.
You can view information about quarantined files. The information includes server IP addresses, directories that store the files, file status, and time of the last modification.
You can also restore a quarantined file: Find the file and click Restore in the Actions column. The alert generated for the file is displayed in the alert list again.
What to do next
You can enable features such as malicious host behavior defense and webshell prevention. After you enable the features, the system automatically blocks viruses on servers. For more information, see Enable features on the Host Protection Settings tab.
You can enable the Kubernetes threat detection and container escape prevention features. After you enable the features, the system generates alerts of the K8s Abnormal Behavior and Container Escape Prevention types. For more information, see Enable features on the Container Protection Settings tab.
You can manage web directories on your assets and configure whitelist rules for alerts. For more information, see Configure alert settings.