Module | Description | Interactive Feature |
Pending Events | Unhandled medium to high-risk observational alarms, reflecting the most urgent security risks currently. | Click number to filter related alarms; prioritize handling these. |
Host Compromise | Identifies and marks compromised assets, alerting to the risk of lateral movement within the private network. | Click number to filter related alarms; isolation operation is recommended. |
High-risk Alarms | Comprehensive assessment indicates significant risks to the business, requiring attention and prompt handling. | Click number to filter related alarms; promptly address the associated risks. |
Trend Chart of Attack Alarms | A line chart displays the trend of the number of alarms for "observe" and "intercept" actions over time. | Supports toggling the legend display with a click to assist in analyzing attack peak periods. |
Monitor TOP 10 Event IPs | TOP Statistics of Attacking IPs in Observed Events. | Click IP to quick copy. Click bar chart to enable quick filtering. |
TOP 10 Affected Assets | TOP Statistics of Affected Assets in All Attacks Except Those of the "Malicious IP address Attack" Type. | Click ID to quick copy. Click bar chart to enable quick filtering. |

Feature Category | | |
Filter and Search | Quick Filter | Supports quick filtering of alarms by disposition status and protection action. |
| Advanced Search | Supports combined search with multiple conditions such as IP address, instance ID, event severity, and attack phase. Multiple keywords are separated by a vertical bar "|". |
| Customize List Fields | Attack type, access source, and access destination are fixedly displayed, while other fields (such as time of first occurrence and firewall type) can be customized for display. |
| Custom List Export | Supports full export or export of alarm events within the currently selected time range based on search conditions. |
Disposition Action | Block | Add the specified external IP address to the Intrusion Defense-Blocklist to block all its access requests. |
| Quarantine | Automatically deploys Enterprise Security Group blocking rules to intercept network access in specified directions for designated assets. This may cause network disconnection and should be used with caution. |
| Allowlist | Add the IP address to the Intrusion Defense-allowlist policy list, and it will no longer be detected by Intrusion Defense. |
| Ignore | Mark the alarm as "Ignored". The same attack event on the same day will not trigger alarms again and will not be counted in the statistics of the attack alarm trend. |
View alarm events. | Alarm List | In the alarm list, you can view relevant information about alarm events, including Attack Type, Event Severity, Attack Phase, Source, Destination, Traffic Direction, Policy, Time of First Occurrence, Time of Recent Occurrence, Alarm Count, Detection Source, Firewall Type, Attack Result, Alarm Category, and Handling Status. |
| View details. | In the alarm list, click the details in the operation column to view the details of the alarm event. AI Analysis of Events Event Summary: Analyze attack methods and potential risks. Disposition Recommendations: Provide operational guidance. Basis for Inference: Explains the logic for determining event severity. Details Feature Module Basic Information: Displays attack type, event severity, first/recent occurrence time, and so on. payload Information: Displays details of the attack request. Source Perspective: Displays IP address of the attack source, asset type, region, and associated access destinations. Destination Perspective: Displays affected asset IDs, private IP addresses, and associated access sources. |
Feedback