Alert Category | Alert Type | Alert Item | Alert Host Scope | Internal messages/SMS/Email, etc. | Robot notification |
| | | | Alert Time | Alert Time |
Asset Fingerprint | High-risk port exposure | The server has high-risk ports exposed to potential threats. | All Servers | 9:00 ~ 18:00 | Not supported currently |
Intrusion Detection | File killing - Malicious files | Fatal, High Risk, Medium Risk, Low Risk, Note | All Servers / Specified Servers | All Day / Custom Note: To reduce disturbance to users, Alarms have the following restrictions: At the start of the alarm time period, receive real-time notifications for the first 3 security alarms, followed by a summary notification every 2 hours. Alarms generated during the non-alarm time period will be summarized and notified at the start of the alarm time. | Real-time |
| File scanning - Abnormal processes | Detected abnormal processes running in memory. | | | |
| Unusual Login | High Risk, Suspicious | | | |
| Password Cracking | Sign-in password cracked | | | |
| Malicious Requests | The server requested a malicious domain name. | | | |
| High Risk Commands | High Risk, Medium Risk, Low Risk | | | |
| Local Privilege Escalation | A low-privileged user is trying to escalate their privilege level in the system | | | |
| Reverse Shell | A reverse shell is detected on the server | | | |
Vulnerability Management | Emergency Vulnerabilities | Fatal, High Risk, Medium Risk, Low Risk | | | |
| Linux Software Vulnerabilities | Fatal, High Risk, Medium Risk, Low Risk | | | |
| Windows System Vulnerabilities | Detect unfixed patches | | | |
| Web-CMS Vulnerabilities | Fatal, High Risk, Medium Risk, Low Risk | | | |
| Application Vulnerabilities | Fatal, High Risk, Medium Risk, Low Risk | | | |
Baseline Management | Security Baseline | Failed baseline check items (weak password, account-related items, or unauthorized access) exist | | | |
Advanced Defense | Network Attack | Attack successful, Attack attempts | | | |
| Ransomware Monitoring | Detected tampering of decoy files | | | |
| Application Protection - Vulnerability Defense | Alert only, Agent installed | | | |
| Application Protection - Java Webshell Scan | Memory Trojan detected in the Java Web service process. | | | |
| Application Protection - Java Webshell Injection | Alert only, Agent installed | | | |
| Critical file monitoring | High Risk, Medium Risk, Low Risk, None | | | |
Client related | The CWPP agent is offline. | The client is abnormally offline and has not come back online for a specified period. | | | |
| CWPP agent uninstalled | Client uninstallation detected | | | |
Log service | Log Analysis Storage - Custom | An alert is triggered when log storage reaches a custom threshold. | N/A | Real-time | |
| Log Analysis Storage - Total | Log storage alarm is triggered when log storage reaches 100% | N/A | Real-time | |
Security intelligence | Security intelligence | Security Notice, Version release, New features, Practical Tutorial, Honors and Awards | N/A | Real-time | Not supported currently |






フィードバック