1.9.4 Ensure directory in context.xml is a secure location - configuration | CIS Apache Tomcat5.5/6.0 L1 v1.0 | Unix | AUDIT AND ACCOUNTABILITY |
1.9.6 Ensure directory in logging.properties is a secure location (check prefix application name) | CIS Apache Tomcat5.5/6.0 L1 v1.0 | Unix | AUDIT AND ACCOUNTABILITY |
2.1.1 - Configuring syslog - local logging - '*.info;auth.none entry exists in /etc/syslog.conf' | CIS AIX 5.3/6.1 L2 v1.1.0 | Unix | AUDIT AND ACCOUNTABILITY |
2.1.1 - Configuring syslog - local logging - 'auth.info entry exists in /etc/syslog.conf' | CIS AIX 5.3/6.1 L2 v1.1.0 | Unix | AUDIT AND ACCOUNTABILITY |
2.8 Create Separate Partition for /var/log/audit | CIS Ubuntu 12.04 LTS Benchmark L1 v1.0.0 | Unix | AUDIT AND ACCOUNTABILITY |
3.1.6 Secure permissions for default database file path | CIS IBM DB2 9 Benchmark v3.0.1 Level 1 OS Linux | Unix | AUDIT AND ACCOUNTABILITY |
3.1.8 Secure all diagnostic logs | CIS IBM DB2 9 Benchmark v3.0.1 Level 2 OS Linux | Unix | AUDIT AND ACCOUNTABILITY |
3.1.17 Secure permissions for the primary archive log location - LOGARCHMETH1 Setting | CIS IBM DB2 v10 v1.1.0 Linux OS Level 2 | Unix | AUDIT AND ACCOUNTABILITY |
3.1.17 Secure permissions for the primary archive log location - LOGARCHMETH1 Setting | CIS IBM DB2 v10 v1.1.0 Windows OS Level 2 | Windows | AUDIT AND ACCOUNTABILITY |
3.1.18 Secure permissions for the secondary archive log location - LOGARCHMETH2 Setting | CIS IBM DB2 v10 v1.1.0 Windows OS Level 1 | Windows | AUDIT AND ACCOUNTABILITY |
3.1.18 Secure permissions for the secondary archive log location - LOGARCHMETH2 Setting | CIS IBM DB2 v10 v1.1.0 Windows OS Level 2 | Windows | AUDIT AND ACCOUNTABILITY |
3.1.18 Secure permissions for the secondary archive log location - LOGARCHMETH2 Setting | CIS IBM DB2 v10 v1.1.0 Linux OS Level 2 | Unix | AUDIT AND ACCOUNTABILITY |
3.1.19 Secure permissions for the tertiary archive log location - FAILARCHPATH Setting | CIS IBM DB2 v10 v1.1.0 Windows OS Level 2 | Windows | AUDIT AND ACCOUNTABILITY |
3.1.19 Secure permissions for the tertiary archive log location - FAILARCHPATH Setting | CIS IBM DB2 v10 v1.1.0 Linux OS Level 1 | Unix | AUDIT AND ACCOUNTABILITY |
3.1.20 Secure permissions for the log mirror location - MIRRORLOGPATH Setting | CIS IBM DB2 v10 v1.1.0 Linux OS Level 1 | Unix | AUDIT AND ACCOUNTABILITY |
3.1.20 Secure permissions for the log mirror location - MIRRORLOGPATH Setting | CIS IBM DB2 v10 v1.1.0 Windows OS Level 2 | Windows | AUDIT AND ACCOUNTABILITY |
3.1.20 Secure permissions for the log mirror location - MIRRORLOGPATH Setting | CIS IBM DB2 v10 v1.1.0 Windows OS Level 1 | Windows | AUDIT AND ACCOUNTABILITY |
3.2.4 Secure permissions for the primary archive log location | CIS IBM DB2 9 Benchmark v3.0.1 Level 1 OS Windows | Windows | AUDIT AND ACCOUNTABILITY |
3.3 Configure remote logging for ESXi hosts | CIS VMware ESXi 5.5 v1.2.0 Level 1 | VMware | AUDIT AND ACCOUNTABILITY |
4.2.1.4 Ensure rsyslog is configured to send logs to a remote log host | CIS SUSE Linux Enterprise Workstation 11 L1 v2.0.0 | Unix | AUDIT AND ACCOUNTABILITY |
4.2.1.4 Ensure rsyslog is configured to send logs to a remote log host | CIS Ubuntu Linux 14.04 LTS Server L1 v2.0.0 | Unix | AUDIT AND ACCOUNTABILITY |
4.2.2.3 Ensure journald is configured to write logfiles to persistent disk | CIS Oracle Linux 7 Workstation L1 v3.0.0 | Unix | AUDIT AND ACCOUNTABILITY |
4.2.2.3 Ensure journald is configured to write logfiles to persistent disk | CIS Ubuntu Linux 18.04 LTS Server L1 v2.0.1 | Unix | AUDIT AND ACCOUNTABILITY |
4.2.2.5 Ensure remote syslog-ng messages are only accepted on designated log hosts | CIS SUSE Linux Enterprise Workstation 11 L1 v2.0.0 | Unix | AUDIT AND ACCOUNTABILITY |
5 - Granular Log Levels | TNS Best Practice JBoss 7 Linux | Unix | AUDIT AND ACCOUNTABILITY |
5.5 Configure newsyslog for secure file permissions (/var/log/daily.log) | CIS FreeBSD v1.0.5 | Unix | AUDIT AND ACCOUNTABILITY |
5.5 Configure newsyslog for secure file permissions (/var/log/messages) | CIS FreeBSD v1.0.5 | Unix | AUDIT AND ACCOUNTABILITY |
8.1.1 Configuring syslog - local logging | CIS IBM AIX 7.2 L1 v1.1.0 | Unix | AUDIT AND ACCOUNTABILITY |
8.2.3 Configure /etc/rsyslog.conf - '*.=warning;*.=err -/var/log/warn' | CIS Debian Linux 7 L1 v1.0.0 | Unix | AUDIT AND ACCOUNTABILITY |
8.2.3 Configure /etc/rsyslog.conf - '*.emerg :omusrmsg:*' | CIS Debian Linux 7 L1 v1.0.0 | Unix | AUDIT AND ACCOUNTABILITY |
8.2.3 Configure /etc/rsyslog.conf - *.*;mail.none;news.none -/var/log/messages | CIS Ubuntu 12.04 LTS Benchmark L1 v1.1.0 | Unix | AUDIT AND ACCOUNTABILITY |
8.2.3 Configure /etc/rsyslog.conf - local0,local1.* -/var/log/localmessages | CIS Ubuntu 12.04 LTS Benchmark L1 v1.1.0 | Unix | AUDIT AND ACCOUNTABILITY |
8.2.3 Configure /etc/rsyslog.conf - local2,local3.* -/var/log/localmessages | CIS Ubuntu 12.04 LTS Benchmark L1 v1.1.0 | Unix | AUDIT AND ACCOUNTABILITY |
8.2.3 Configure /etc/rsyslog.conf - local4,local5.* -/var/log/localmessages | CIS Ubuntu 12.04 LTS Benchmark L1 v1.1.0 | Unix | AUDIT AND ACCOUNTABILITY |
8.2.6 Accept Remote rsyslog Messages Only on Designated Log Hosts | CIS Debian Linux 7 L1 v1.0.0 | Unix | AUDIT AND ACCOUNTABILITY |
Brocade : 'Forward all error logs to syslog daemon' | TNS Brocade FabricOS Best Practices | Brocade | AUDIT AND ACCOUNTABILITY |
Enable remote syslog | TNS Citrix Hypervisor | Unix | AUDIT AND ACCOUNTABILITY |
Ensure 'snmp-server group' is set to 'v3 priv' | Tenable Cisco Firepower Threat Defense Best Practices Audit | Cisco_Firepower | AUDIT AND ACCOUNTABILITY |
ESXi : config-persistent-logs | VMWare vSphere 6.0 Hardening Guide | VMware | AUDIT AND ACCOUNTABILITY |
ESXi : enable-remote-syslog | VMWare vSphere 6.5 Hardening Guide | VMware | AUDIT AND ACCOUNTABILITY |
ESXi: enable-remote-syslog | TNS VMWare vSphere Best Practices | VMware | AUDIT AND ACCOUNTABILITY |
FireEye - Remote syslog logging level includes all errors and warnings | TNS FireEye | FireEye | AUDIT AND ACCOUNTABILITY |
Logging Directives should be restricted to authorized users. - 'CustomLog logs/access_log combined' | TNS IBM HTTP Server Best Practice | Unix | AUDIT AND ACCOUNTABILITY |
Logging Directives should be restricted to authorized users. - 'LogLevel notice' | TNS IBM HTTP Server Best Practice | Windows | AUDIT AND ACCOUNTABILITY |
Management Services Security - Allow SNMP queries and/or send traps to more than one trusted server | Juniper Hardening JunOS 12 Devices Checklist | Juniper | AUDIT AND ACCOUNTABILITY |
Management Services Security - Allow SNMP queries and/or send traps to more than one trusted server - community trap | Juniper Hardening JunOS 12 Devices Checklist | Juniper | AUDIT AND ACCOUNTABILITY |
Management Services Security - Send Syslog messages to more than one trusted server with enhanced timestamps | Juniper Hardening JunOS 12 Devices Checklist | Juniper | AUDIT AND ACCOUNTABILITY |
NET0898 - Syslog traffic is not using loopback address - 'logging host IP' | DISA STIG Cisco Perimeter Router v8r8 | Cisco | AUDIT AND ACCOUNTABILITY |
NET1021 - Device must log severity levels 0 through 6 - 'Logging LOGGING_HOST_IP' | DISA STIG Cisco Perimeter Router v8r8 | Cisco | AUDIT AND ACCOUNTABILITY |
ScreenOS:Syslog Server - Primary IP | TNS Juniper ScreenOS Best Practices Audit | Juniper | AUDIT AND ACCOUNTABILITY |