Hyper Converged Infrastructure (HCI/aSV)

Sangfor HCI and aSV provide a unified infrastructure combining compute, storage, networking, and built-in security to simplify deployment, operations, and services.
{{ $t('productDocDetail.guideClickSwitch') }}
{{ $t('productDocDetail.know') }}
{{ $t('productDocDetail.dontRemind') }}
6.11.1R1
{{sendMatomoQuery("Hyper Converged Infrastructure (HCI/aSV)","Security Logs")}}

Security Logs

{{ $t('productDocDetail.updateTime') }}: 2026-01-05

Description

This feature allows you to query security logs, including virus scan logs, brute-force attack logs, cyber attack logs, and vulnerability scan logs, to facilitate security event analysis and processing.

Prerequisites

N/A

Precautions

N/A

Steps

Go to aSecurity > Security Logs and query logs. For cyber attack logs, you can add a detection rule to the whitelist to allow the cyber attack event. To modify the rule subsequently, go to Security Settings > Blacklist and Whitelist Management. For details, see section 9.5.3 "Blacklist and Whitelist Management."