tencent cloud

Cloud Workload Protection Platform

Release Notes and Announcements
Release Notes
Announcements
Getting Started
Product Introduction
Overview
Advantages
Basic Concepts
Scenarios
Associated Products
Features in Different Editions
Purchase Guide
Purchase Security Protection Licenses
Purchasing Log Analysis Service
Quick Start
Operation Guide
Security Dashboard
Asset Overview
Server List
Asset Fingerprint
Vulnerability Management
Baseline Management
Malicious File Scan
Unusual Login
Password Cracking
Malicious Requests
High-risk Commands
Local Privilege Escalation
Reverse Shell
Java Webshell
Critical File Monitor
Network Attack
A Ransomware Defense
Log Analysis
License Management
Alarm Setting
Cloud Access Management
Hybrid Cloud Installation Guide
FAQs for Beginners
Cloud Workload Protection Description
Feature Description
Agent Process Description
A Security Baseline Detection List
Parsing of JSON Format Alarm Data
Log Field Data Parsing
Agent Installation Guide
Security Score Overview
Practical Tutorial
Auto Fix of Vulnerabilities
Malicious File Processing
Troubleshooting
Intrusions on Linux
Intrusions on Windows
Offline Agent on Linux
Offline Agent on Windows
An Abnormal Log-in Notification
API Documentation
History
Introduction
API Category
Asset Management APIs
Virus Scanning APIs
Abnormal Log-in APIs
Password Cracking APIs
Malicious Request APIs
High-Risk Command APIs
Local Privilege Escalation APIs
Reverse Shell APIs
Vulnerability Management APIs
New Baseline Management APIs
Baseline Management APIs
Advanced Defense APIs
Security Operation APIs
Expert Service APIs
Other APIs
Overview Statistics APIs
Settings Center APIs
Making API Requests
Intrusion Detection APIs
Data Types
Error Codes
FAQs
Agreements
Terms of Service
Service Level Agreement
Data Processing And Security Agreement
Contact Us
Glossary

Malicious Requests

PDF
Focus Mode
Font Size
Last updated: 2025-11-20 14:47:33
This document will introduce how to view and manage the alarm list and policy configuration of malicious requests.

Overview

The malicious request feature provides the capability to monitor and handle external request behaviors in real-time, effectively identifying malicious request behaviors. If a host initiates requests to malicious domains, the behavior will be identified and recorded. Upon detecting such malicious request behaviors, the system will provide you real-time alarms.

Restrictions

Malicious request monitoring supports Pro Edition or Ultimate Edition hosts.
Malicious request interception is supported only for hosts of Ultimate Edition running Linux systems. It is limited to intercepting DNS queries made by the server. It does not support the interception of forwarded traffic.

Alert List

1. Log in to the CWPP console. In the left sidebar, choose Intrusion Detection > Malicious Requests.
2. On the malicious requests page, you can view the alarm list of malicious requests and perform related operations.

Filters: You can filter by policy type hit, status, last requested, entering the host name in the search box, instance ID, IP address, or malicious request domain name.
Custom display columns: Click

to set the fields displayed in the alarm list.
Export: Click

to export detailed information from the alarm list.
Field Description:
Server Name/Instance ID: The host name and instance ID initiating the request to the malicious domain.
IP Addresses: The host IP initiating the request to the malicious domain.
Policy Type Hit:
Preset Policy: The preset policy is a rule configuration that has been developed by Tencent's CWPP operation experts and algorithm experts through the accumulation of multiple models, and it is applicable for detecting most malicious requests.
User-defined Policies: Users set alarm/intercept/allow actions for relevant domains based on their business needs.
Hit Policy: The name of the policy hit when the host requests a malicious domain.
Malicious Request Domain Name: Domains or IP addresses.
Requests: Number of times the host has made requests.
Hazard Description: Potential hazard that may result from requesting the malicious domain.
Last Requested: The last time the malicious domain was requested.
Status: Pending, allowlisted, processed, ignored, and intercepted.
Details: View detailed information on the malicious request event, including risk host information, malicious request details, hazard description, and fix suggestions.

Processing: Mark as processed, add to allowlist, create custom interception policy, ignore, and delete log.


Policy Configuration

Managing a Policy

On the top of the malicious request page, select Policy configuration to enter the policy configuration page.

Filtering: You can filter by policy type, recommended action, effective status, and keywords.
Custom display columns: Click

to set the fields displayed in the policy list.
Export: Click

to export detailed information from the policy list.
Field Description:
Policy Name: Fixed preset policy names, including system rules (critical protection) and system rules (standard). For user-defined policies, the name will be as specified by the user.
Policy Type: Preset policy, and user-defined policy.
Blocklist/Allowlist: This policy belongs to the allowlist/blocklist.
Domain Details: IP/domain name or wildcard domain.
Effective Hosts: The range of hosts where the policy is effective.
Update Time: The time when the policy was last updated.
Action: Actions automatically performed when the policy is hit by the domain request (allow/alarm/intercept).
Implementation: Whether the policy is effective.
Edit: Edit the policy.
Delete: Delete the policy.
Create a Policy:
Blocklist: When the host requests a domain in the blocklist, an alarm/intercept action will be performed.
Allowlist: When the host requests a domain in the allowlist, an allow action will be performed.

Note:
Preset policies are built-in policies that do not support adding, editing, or deleting, and that only support Enable/Disable switching.
It is recommended to keep the preset policies (standard) enabled, and to make the preset policies (critical protection) enabled as needed during critical protection periods.
In user-defined policies, the interception policy is only effective for Ultimate Edition hosts.

System Auto-Interception Rules

The malicious request feature now includes system auto-interception rules. Once enabled, the system automatically intercepts detected malicious domains and IPs. However, some configurations still require your manual policy settings.
System blocklist domains and IPs: A list of domains and IPs refined by CWPP operation experts and algorithm experts. Domains and IPs on this list can be automatically intercepted.
Principles of Interception: Malicious requests refer to the termination of access requests to legitimate domains/IPs. It does not terminate the process but stops the access request.
Note:
If you find any false interceptions, you can create a user-defined policy for allowlist processing or contact us.
System auto-interception rules are available only to Ultimate Users.
1. Log in to the CWPP console. In the left sidebar, choose Intrusion Detection > Malicious Requests.
2. On the malicious request page, the following two methods are supported to enable system automatic interception rules.
On the policy configuration page, click the Implementation Switch next to the system automatic interception rules policy.

On the alarm list page, click to enable the Automatic Interception of Malicious Requests.



Help and Support

Was this page helpful?

Help us improve! Rate your documentation experience in 5 mins.

Feedback