Security control policies are used to associate attack alarms with security actions. Upon receiving attack alarms, SCC can take actions according to the matched policies.
A security control policy can include multiple actions, and an action can be used by multiple security control policies.
Viewing the Security Control Policy Execution History: This function allows you to view the history attack alarms corresponding to a security control policy name. After you click the History icon, the Browse Attack Alarm page appears. The Correlated Policy field in the Attack Alarm Query area is set to the corresponding security control policy name and system starts querying the matched attack alarms. For more information, see Browse Attack Alarm.