The content of this page has been automatically translated by AI. If you encounter any problems while reading, you can view the corresponding content in Chinese.

Alarm Settings

Last updated: 2025-02-21 14:29:02

This document aims to guide users on how to set up alarms to receive timely Cloud Workload Protection Platform (CWPP) alarms, log capacity warnings, client operation status, security broadcasts, and other messages.

Alarm Directory

The current alarm rule configuration supports Message Center/SMS/email and robot notifications methods. The former must be used with the Message Center.
Alarm Category
Alarm Type
Warnings
Alarm Host Range
Message Center/SMS/Email, Etc
Robot Notification
Alarm Time
Alarm Time
Intrusion Detection
Malicious File Scan - Malicious File
Critical, High, Medium, Low, Note.
All/Custom
All/Custom
Note:
To minimize user disturbance, the alarm has been limited as follows:
At the start of the alarm period, the first 3 security alarms are notified in real-time, and subsequent alarms are summarized every 2 hours.
Alarms generated during non-alarm periods will be summarized and notified at the start of the alarm period.
Real-time
Malicious File Scan - Unhealthy Process
Detected an unhealthy process running in memory.
Abnormal Login
High, Suspicious.
Password Cracking
The login password has been successfully cracked.
Malicious Requests
The server requested a malicious domain name.
High-risk Commands
High, Medium, Low.
Local privilege escalation
A low privilege attempt to gain higher permission appeared in the system.
Reverse shell
A shell reverse connection appeared on the server.
Vulnerability Management
Urgent Vulnerability
Critical, High, Medium, Low.
Linux Software Vulnerability
Critical, High, Medium, Low.
Windows System Vulnerability
Critical, High, Medium, Low.
Web-CMS Vulnerability
Critical, High, Medium, Low.
Application Vulnerability
Critical, High, Medium, Low.
Exploit Prevention
Successfully defended vulnerability type attack events.
Baseline management
Security baseline
There are baseline items that failed detection (account-related, weak password, unauthorized baseline).
Advanced Defense
Network Attack
Successful attack, attempted attack.
Java Memory Horse
Detected a memory webshell in the JavaWeb service process.
Core File Monitoring
High, Medium, Low, None.
Client
Client Offline
Detected client exception offline, and not back online within a certain time.
Uninstalling Client
Detected client uninstalled.
Log Analysis
Log analysis storage
When the log storage reaches a certain percentage, a log storage alarm will be triggered.
Not involved
Real-time
Information Related
Security Broadcast
Security announcements, version releases, feature updates, practical practices, industry honors.

Message Center/SMS/Email, Etc

1. Before configuring alarm rules, make sure to turn off the Notification Muting switch for CWPP in Message Center > Subscription Management and set the receiving channel and recipient.
Receiving channels: Host Security supports receiving via Message Center, mail, SMS, WeChat, and WeCom. Voice receiving is not supported (selection is ineffective).
Message Recipient: Supports users, user groups, IM applications, and robots.

2. In the CWPP Console Settings Center > Alarm Settings, select Message Center/SMS/Email, etc. to configure alarm rules.


Robot Notification

By using robots as Message Recipients, messages can be notified to IM groups. This method also supports robot notifications but can only notify based on alarm rules configured for Message Center/SMS/email. If you want to configure different alarm rules for different robots, you can use this method.
Note:
Before configuring robot notifications, please create a group bot in an IM group (such as a WeCom group) and obtain its Webhook address. For details, see Enterprise WeChat Robot Creation Guide.
1. Log in to the CWPP Console, and on the left sidebar, select Settings Center > Alarm Settings.
2. On the alarm settings page, select Bot Notification > Receive Bot Management.

3. Click create robot, enter the bot name and Webhook URL, and click Save.

4. Select Alarm Policy Configuration, click Create Alarm Policy, configure the policy name, enable status, alarm scope, and other information, and associate the newly created receiving robot.

5. Click Save, and the host security will notify you according to the configured policy.