This report was completely re-worked and streamlined, and now includes New_User_Source events in two different formats. A new section resides under Chapter 2, titled 'New User Source Summary', and contains a New User Source User Summary and a New User Source Event List, as shown below.
This report displays details on all warnings and errors identified in the environment.
The report has two main customizable sections.
The error section contains tables that present the reviewer with all errors found. By default, it is set up for display of the top 10 errors by count, and/or the last 24 hours by time. This can be easily modified to extend timeframe or display parameters. This section presents detected errors using five different methods.
This report presents a detailed vulnerability summary on files that may contain copyrighted materials, such as commercial movies or music files, that are being shared without the owner's permission. If any of these files actually contain copyrighted material, and if they are freely swapped around, your organization might be held liable for copyright infringement by associations such as the RIAA or the MPAA.
The associated component can be found here: Copyright Indicator
This template reports programs and commands observed running for the first time.
LCE collects and correlates data from many IDS/IPS systems on the market. This report focuses on events generated by Snort, and presents a high-level overview of the current trends and threats reported by this popular intrusion detection and prevention software.
This template produces daily summaries of commands and users for the past seven days. It also reports on installed software.