Security Inspection

Through the system built-in rules, the resources with lower security that match the rules are scanned out and processed according to the recommendations, thus improving the system security purpose.

Suggestions

Suggestions list displays a list of all resources that match the optimization suggestion rules, and the user can process the resources according to the suggestions.

Ignores

The Ignores list shows resources or a class of rule suggestions that do not need to be processed.

Rules

Rules that is, according to the conditions affecting the security of the resources in the system set the corresponding rules, such as the rules of the security group settings, etc. when the resources match the rules means that the security of the resources is low, the need for users to deal with, etc.