tencent cloud

Cloud Security Center

Product Introduction
Product Overview
Purchase Guide
Billing Overview
Purchase Methods
Renewal Policies
Overdue Payment ‍Policies
Refund Policies
Getting Started
Operation Guide
Access Permissions Management
Multi-Cloud Multi-Account Management
Vulnerability and Risk Center
Alarm Center
Log Shipping
Managing Assets
Health Checks
Cloud API Exception Monitoring
User Behavior Analytics (UEBA)
Report Download
API Documentation
History
Introduction
API Category
Making API Requests
Multi-account management related APIs
Scan Task APIs
Risk Center APIs
Asset Center APIs
Cloud Boundary Analysis APIs
Cloud API Anomaly Detection APIs
Report Download APIs
Solid Protection APIs
Cloud Security Center Overview APIs
Data Types
Error Codes
Related Protocol,
Service Level Agreement
Terms Of Service
FAQs
Glossary
문서Cloud Security CenterOperation GuideVulnerability and Risk Center

Vulnerability and Risk Center

PDF
포커스 모드
폰트 크기
마지막 업데이트 시간: 2025-09-18 14:36:02
Vulnerability and Risk Center feature demonstrates risk data of existing assets, supporting detection of RiskTypes including vulnerability risk, port risk, weak password risk, risk service exposure, cloud resource configuration risk, host & container baseline risk. It provides statistics on the current risk overview, helping quick location of specific risks for risk handling.


View Risk Overview

1. Log in to the CSC console, click Vulnerability and Risk Center in the left navigation.
2. On the Vulnerability and Risk Center webpage, view the risk overview, filter based on asset and scan task.
3. Select the risk type, click the number, and the corresponding RiskType description will switch at the bottom of the page. Click the high-risk number, and the corresponding high-risk type details will switch at the bottom of the page.

4. In the risk trend, you can view the number of risks in different time periods. Hover over the digits in the figure to display the scan time and risk quantity.


Viewing Different Types of Risk Details

On the Vulnerability and Risk Center webpage, click ①RiskType to view various types of risk details. Unprocessed risks are displayed by default. Click ②Conditional filtering box to reset filter conditions and show all risk content.

Note:
Taking vulnerability risk as an example.

Vulnerabilities Affecting Me

On the Vulnerabilities Affecting Me tab, view vulnerability risks of scanned assets, including vulnerability name, affected assets, risk level, port group, vulnerability type, CVE No., scan time, and processing status.
① Click the search bar to filter and locate risks by keyword.
② Click

next to the vulnerability name to view vulnerability details.
③Support switching the viewing angle.
Asset perspective: Display vulnerability risk per asset.
By vulnerabilities: Display the number of affected assets and ports per vulnerability. Click the number in the affected assets column to go to the asset perspective showing asset information impacted by this vulnerability risk.



Network-Wide Vulnerabilities

On the Network-Wide Vulnerabilities tab, view support for ALL recorded vulnerability information, including detected and not detected vulnerabilities.
If a security product that supports detection exists, you can launch detection with one click.

If no security product supports detection, you can view vulnerability details and troubleshoot and fix issues autonomously.


Risk Management

Filtering Risk

On the Vulnerability and Risk Center page, click the search bar to filter and locate risks by keyword.


Tag Status

Mark As Processed

We recommend using CWP and CFW to block security risks with defensive measures. Risks after defense handling can be marked as processed, and the processing status changes to processed. If the risk is still detected in the next scan task, the processing status reverts to unprocessed.
1. On the Vulnerability and Risk Center webpage, you can mark the risk status as processed individually or in batch.
Select the target risk and click Mark as handled in the Action column.

Batch: Select one or more risks, click Handle Vulnerabilities > Mark as handled in the upper left corner.

2. In the confirmation window, click OK to mark the target risk as processed.

Mark As Ignored

When a scan generates a false positive risk or the risk is considered to require no action, you can ignore the risk. In subsequent scan tasks, the risk will be filtered.
1. On the Vulnerability and Risk Center webpage, you can change the risk status to ignored individually or in batch.
Select the target risk, click More in the Action column, then Ignore.

Batch: Select one or more risks, click Handle Vulnerabilities > Ignore in the upper left corner.

2. In the confirmation window, click OK to change the target risk status to ignored.

Unmark

When an Alarm requires re-analysis, the processing status will restore to unprocessed after unmarking.
When risks are processed or ignored, on the Vulnerability and Risk Center page, select the target risk, then click Unmark Disposal or Unmark Ignored in the Action column to cancel.


Downloading Data

On the Vulnerability and Risk Center page, click

in the upper right corner, select the rows and column content to be exported, then click Export to save the data to local directory.



도움말 및 지원

문제 해결에 도움이 되었나요?

피드백