Google Cloud 提供多种支持套餐以满足不同的需要,例如全天候支持、电话支持以及技术支持经理对接。如需了解详情,请参阅 Cloud Customer Care。
Security Command Center 通过基于 Web 的界面和 API 检测并报告漏洞。Security Command Center 的发现结果只是识别和修复漏洞和威胁的第一步。每个组织都有独特的风险。您需要自行了解和评估组织的攻击面,正确配置 Security Command Center 可保护您的资源,并确定是否应将修补程序应用于 Security Command Center 检测到的漏洞和威胁。
[[["易于理解","easyToUnderstand","thumb-up"],["解决了我的问题","solvedMyProblem","thumb-up"],["其他","otherUp","thumb-up"]],[["很难理解","hardToUnderstand","thumb-down"],["信息或示例代码不正确","incorrectInformationOrSampleCode","thumb-down"],["没有我需要的信息/示例","missingTheInformationSamplesINeed","thumb-down"],["翻译问题","translationIssue","thumb-down"],["其他","otherDown","thumb-down"]],["最后更新时间 (UTC):2025-09-05。"],[],[],null,["| Standard, Premium, and Enterprise [service tiers](/security-command-center/docs/service-tiers)\n\nGet a Google support package\n\nGoogle Cloud offers different support packages to meet different needs, such as\n24/7 coverage, phone support, and access to a technical support manager. For\nmore information, see [Cloud Customer Care](/support).\n| **Note:** Cloud Support staff can't see your Security Command Center pages in the [Google Cloud console](/security-command-center/docs/how-to-use-security-command-center#console_access). Consequently, they can't help debug or remediate specific threats, vulnerabilities, or compliance findings. They also can't view your assets.\n\nSecurity Command Center detects and reports vulnerabilities through a web-based interface\nand API. The findings in Security Command Center are only a first step in identifying and\nremediating vulnerabilities and threats. Every organization has unique risks.\nIt's up to you to understand and evaluate the attack surface of your\norganization, properly configure Security Command Center to protect your resources,\nand determine whether fixes should be applied to vulnerabilities and threats\ndetected by Security Command Center.\n\nSecurity Command Center's user interface provides suggestions for remediating common\nvulnerabilities. Security Command Center product documentation also provides guidance\non remediating common findings for\n[Security Health Analytics](/security-command-center/docs/how-to-remediate-security-health-analytics-findings)\nand\n[Web Security Scanner](/security-command-center/docs/how-to-remediate-web-security-scanner-findings).\n\nDiscuss Security Command Center\n\nYou can visit the Google Cloud\n[Slack community](https://googlecloud-community.slack.com/) to discuss\nSecurity Command Center and other Google Cloud products. If you haven't\nalready joined,\n[use this form to sign up](https://join.slack.com/t/googlecloud-community/shared_invite/zt-2mz6i6j8l-qMC13DEg6FAtGMH4wVytTA).\n\n\nFile feature requests and bug reports\n\nIf you want to request a new feature for Security Command Center, or if you\nencounter a reproducible bug, you can report it through the\n[issue tracker](/support/docs/issue-trackers). You can\n[review the open issues](https://issuetracker.google.com/savedsearches/6123493)\nto see if your bug or request has already been reported, and\n[star](https://developers.google.com/issue-tracker/guides/subscribe#subscribing_by_starring_an_issue)\nan existing thread to subscribe to updates. If there are no existing threads, you can\n[request a new feature](https://issuetracker.google.com/issues/new?component=709980&template=1322893)\nor [report a new bug](https://issuetracker.google.com/issues/new?component=709980&template=1322867).\n\nEvent Threat Detection\n\nVisit the Google Cloud\n[Slack community](https://googlecloud-community.slack.com/) to discuss\nEvent Threat Detection and other Google Cloud products. If you haven't\nalready joined,\n[use this form to sign up](https://join.slack.com/t/googlecloud-community/shared_invite/zt-2mz6i6j8l-qMC13DEg6FAtGMH4wVytTA).\n\nAnomaly Detection\n\nAnomaly Detection identifies security anomalies for your projects and Virtual\nMachine (VM) instances, including compromised credentials and abuse of\nresources. We are unable to provide full details on the methods or logic used to\ndetect resource abuses because they are proprietary.\n\nWeb Security Scanner\n\nTo file bugs or a feature request, use the [Google Issue Tracker](https://issuetracker.google.com/issues/new?component=187215) for the\nWeb Security Scanner component.\n\nWe value your feedback about Web Security Scanner. Example feedback topics\nare:\n\n- **Noise:** Finding false positives? Let us know. We have a goal for zero false positives.\n- **Coverage:** Is our crawling system having problems navigating your site?\n- **Effectiveness:** Did we miss a bug you think we should have caught?\n- **Authentication:** Are you having problems with our custom login support?\n- **Usability:** We want an easy to use scanner, how can we make it more intuitive?\n- **General:** Do you love it? Do you hate it? Was it worth your time to set up and use?\n\nTo send feedback about a specific scan:\n\n1. Sign in to the test account that you used to create the scan.\n2. Go to the [Web Security Scanner](https://console.cloud.google.com/projectselector2/security/web-scanner/) page in the Google Cloud console. \n [Go to the Web Security Scanner page](https://console.cloud.google.com/projectselector2/security/web-scanner/)\n3. Click **Select**, and then select the project that contains the scan that you want to edit.\n4. Under **Scan configs**, click the name of the scan that you want to edit.\n5. On the scan details page that appears, click **Send feedback**.\n6. Click **Send feedback** and enter the feedback you want to share.\n7. When you're finished entering feedback, click **Send**."]]