tencent cloud

Tencent Cloud Firewall

Release Notes and Announcements
Release Notes
Engine Release Notes
Product Announcement
Getting Started
Product Introduction
Overview
Advantages
Scenarios
Key Concepts
Supported Region
CFW High Availability Specification
Purchase Guide
Billing Overview
Purchase Instructions
Billing Modes
Renewal Instructions
Resource deletion upon expiration
Refund Instructions
Operation Guide
Firewall Toggle
Asset Center
Alert Management
Traffic Monitoring
Access Control
Intrusion Defense
Network Detection and Response
Honeypot
Log Audit
Log Analysis
Log Shipping
Log Fields
Notifications and Settings
Common Tools
Practical Tutorial
Use Cloud Firewall with Other Products
DNS Firewall Practical Tutorial
Practical Tutorial for Protecting Against Mining Attacks
Inter-VPC Firewall Practice Tutorial
Troubleshooting
Solution for False Alarms and False Positives
API Documentation
History
Introduction
API Category
Making API Requests
Intrusion Defense APIs
Access Control APIs
Other APIs
Enterprise Security Group APIs
Firewall Status APIs
Data Types
Error Codes
FAQs
Basic Introduction
Bandwidth
Firewall
Feature
Log
Account
Billing
Others
Service Level Agreement
CFW Policy
Privacy Policy
Data Processing And Security Agreement

Overview

PDF
Focus Mode
Font Size
Last updated: 2025-12-24 09:49:18
The Alarm Center collects network attacks and risk events detected by the Intrusion Defense module and Network Honeypot module, enabling users to understand firewall protection status for timely alerts. It supports blocking malicious access sources. Based on firewall actions, events are categorized into attack alarm summaries, attack intercepted statistics, and attack deception events.
Attack alarm summaries: includes all detected network attacks and risk events of the observed type (requiring manual blocking/allowing/quarantining/ignoring of attack IP addresses by users).
Attack intercepted statistics: includes all network attacks and risk events that are detected as threats and automatically blocked (used for subsequent audit and troubleshooting).
Attack deception events: includes all detected network attacks and risk events on exposed probes and honeypots (can be manually set to block or allow).

Information of Version Support

CFW supports the Alarm Center feature in all editions. For billing details, see Billing Overview.

References

For the legacy Alarm Center, see the following documents:
For the new version of Alarm Center, see the document: Viewing and Handling of Attack Alarm Events.

Help and Support

Was this page helpful?

Help us improve! Rate your documentation experience in 5 mins.

Feedback