Item Search

NameAudit NamePluginCategory
3.1.6 Secure permissions for default database file pathCIS IBM DB2 9 Benchmark v3.0.1 Level 2 OS LinuxUnix

AUDIT AND ACCOUNTABILITY

3.1.8 Secure all diagnostic logsCIS IBM DB2 9 Benchmark v3.0.1 Level 2 OS LinuxUnix

AUDIT AND ACCOUNTABILITY

3.1.18 Secure permissions for the secondary archive log location - LOGARCHMETH2 SettingCIS IBM DB2 v10 v1.1.0 Linux OS Level 1Unix

AUDIT AND ACCOUNTABILITY

3.1.19 Secure permissions for the tertiary archive log location - FAILARCHPATH SettingCIS IBM DB2 v10 v1.1.0 Windows OS Level 1Windows

AUDIT AND ACCOUNTABILITY

3.1.19 Secure permissions for the tertiary archive log location - FAILARCHPATH SettingCIS IBM DB2 v10 v1.1.0 Windows OS Level 2Windows

AUDIT AND ACCOUNTABILITY

3.1.20 Secure permissions for the log mirror location - MIRRORLOGPATH SettingCIS IBM DB2 v10 v1.1.0 Linux OS Level 1Unix

AUDIT AND ACCOUNTABILITY

3.1.20 Secure permissions for the log mirror location - MIRRORLOGPATH SettingCIS IBM DB2 v10 v1.1.0 Windows OS Level 1Windows

AUDIT AND ACCOUNTABILITY

3.2.5 Secure permissions for the secondary archive log locationCIS IBM DB2 9 Benchmark v3.0.1 Level 1 OS LinuxUnix

AUDIT AND ACCOUNTABILITY

3.2.7 Secure permissions for the log mirror locationCIS IBM DB2 9 Benchmark v3.0.1 Level 1 OS WindowsWindows

AUDIT AND ACCOUNTABILITY

3.4 Configure remote logging for ESXi hostsCIS VMware ESXi 5.1 v1.0.1 Level 1VMware

AUDIT AND ACCOUNTABILITY

4.6 Ensure that a log metric filter for the Cloudwatch group assigned to the "VPC Flow Logs" is createdCIS Amazon Web Services Three-tier Web Architecture L1 1.0.0amazon_aws

AUDIT AND ACCOUNTABILITY

5 - Granular Log LevelsTNS Best Practice JBoss 7 LinuxUnix

AUDIT AND ACCOUNTABILITY

5.7 Ensure Cloudwatch Log Group for App Tier has a retention periodCIS Amazon Web Services Three-tier Web Architecture L1 1.0.0amazon_aws

AUDIT AND ACCOUNTABILITY

7.2.3 Ensure syslog is not configured to receive logs from a remote clientCIS IBM AIX 7 v1.0.0 L2Unix

AUDIT AND ACCOUNTABILITY

7.4 Ensure directory in context.xml is a secure location - configurationCIS Apache Tomcat 7 L1 v1.1.0Unix

AUDIT AND ACCOUNTABILITY

7.6 Ensure directory in logging.properties is a secure location (check log directory location)CIS Apache Tomcat 7 L1 v1.1.0Unix

AUDIT AND ACCOUNTABILITY

8.2.3 Configure /etc/rsyslog.conf - '*.=warning;*.=err -/var/log/warn'CIS Debian Linux 7 L1 v1.0.0Unix

AUDIT AND ACCOUNTABILITY

8.2.3 Configure /etc/rsyslog.conf - '*.crit /var/log/warn'CIS Debian Linux 7 L1 v1.0.0Unix

AUDIT AND ACCOUNTABILITY

8.2.3 Configure /etc/rsyslog.conf - 'local0,local1.* -/var/log/localmessages'CIS Debian Linux 7 L1 v1.0.0Unix

AUDIT AND ACCOUNTABILITY

8.2.3 Configure /etc/rsyslog.conf - 'local6,local7.* -/var/log/localmessages'CIS Debian Linux 7 L1 v1.0.0Unix

AUDIT AND ACCOUNTABILITY

8.2.3 Configure /etc/rsyslog.conf - 'mail.err /var/log/mail.err'CIS Debian Linux 7 L1 v1.0.0Unix

AUDIT AND ACCOUNTABILITY

8.2.3 Configure /etc/rsyslog.conf - 'mail.info -/var/log/mail.info'CIS Debian Linux 7 L1 v1.0.0Unix

AUDIT AND ACCOUNTABILITY

8.2.3 Configure /etc/rsyslog.conf - 'mail.warning -/var/log/mail.warn'CIS Debian Linux 7 L1 v1.0.0Unix

AUDIT AND ACCOUNTABILITY

8.2.3 Configure /etc/rsyslog.conf - 'news.notice -/var/log/news/news.notice'CIS Debian Linux 7 L1 v1.0.0Unix

AUDIT AND ACCOUNTABILITY

8.2.3 Configure /etc/rsyslog.conf - *.=warning;*.=err -/var/log/warnCIS Ubuntu 12.04 LTS Benchmark L1 v1.1.0Unix

AUDIT AND ACCOUNTABILITY

8.2.3 Configure /etc/rsyslog.conf - *.crit /var/log/warnCIS Ubuntu 12.04 LTS Benchmark L1 v1.1.0Unix

AUDIT AND ACCOUNTABILITY

8.2.3 Configure /etc/rsyslog.conf - mail.* -/var/log/mailCIS Ubuntu 12.04 LTS Benchmark L1 v1.1.0Unix

AUDIT AND ACCOUNTABILITY

8.2.4 Create and Set Permissions on rsyslog Log Files - permissionsCIS Debian Linux 7 L1 v1.0.0Unix

AUDIT AND ACCOUNTABILITY

20.48 Ensure 'Permissions for the Application Event Log must prevent access by non-privileged accounts'CIS Microsoft Windows Server 2016 STIG v3.0.0 STIG DCWindows

AUDIT AND ACCOUNTABILITY

20.48 Ensure 'Permissions for the Application Event Log must prevent access by non-privileged accounts'CIS Microsoft Windows Server 2016 STIG v3.0.0 STIG MSWindows

AUDIT AND ACCOUNTABILITY

20.48 Ensure 'Permissions for the Application Event Log must prevent access by non-privileged accounts' (STIG only)CIS Microsoft Windows Server 2022 STIG v2.0.0 STIG MSWindows

AUDIT AND ACCOUNTABILITY

20.49 Ensure 'Permissions for the Security Event Log must prevent access by non-privileged accounts'CIS Microsoft Windows Server 2019 STIG v3.0.0 STIG MSWindows

AUDIT AND ACCOUNTABILITY

20.49 Ensure 'Permissions for the Security Event Log must prevent access by non-privileged accounts'CIS Microsoft Windows Server 2016 STIG v3.0.0 STIG MSWindows

AUDIT AND ACCOUNTABILITY

20.49 Ensure 'Permissions for the Security Event Log must prevent access by non-privileged accounts' (STIG only)CIS Microsoft Windows Server 2022 STIG v2.0.0 STIG DCWindows

AUDIT AND ACCOUNTABILITY

20.50 Ensure 'Permissions for the System Event Log must prevent access by non-privileged accounts'CIS Microsoft Windows Server 2016 STIG v3.0.0 STIG MSWindows

AUDIT AND ACCOUNTABILITY

Adtran : Ensure the log level is set at an appropriate settingTNS Adtran AOS Best Practice AuditAdtran

AUDIT AND ACCOUNTABILITY

Brocade - Enable the track changes feature for SNMP trapsTenable Best Practices Brocade FabricOSBrocade

AUDIT AND ACCOUNTABILITY

Enable remote syslogTNS Citrix HypervisorUnix

AUDIT AND ACCOUNTABILITY

ESXi : enable-remote-syslogVMWare vSphere 6.5 Hardening GuideVMware

AUDIT AND ACCOUNTABILITY

Extreme : Configure Remote SyslogTNS Extreme ExtremeXOS Best Practice AuditExtreme_ExtremeXOS

AUDIT AND ACCOUNTABILITY

FireEye - Remote syslog logging level includes all errors and warningsTNS FireEyeFireEye

AUDIT AND ACCOUNTABILITY

Fortigate - Syslog3 Logging - severity 'information'TNS Fortigate FortiOS Best Practices v2.0.0FortiGate

AUDIT AND ACCOUNTABILITY

Huawei: External Syslog server is configuredTNS Huawei VRP Best Practice AuditHuawei

AUDIT AND ACCOUNTABILITY

Huawei: SNMP appropriate trap hostTNS Huawei VRP Best Practice AuditHuawei

AUDIT AND ACCOUNTABILITY

Logging Directives should be restricted to authorized users. - 'LogFormat'TNS IBM HTTP Server Best PracticeWindows

AUDIT AND ACCOUNTABILITY

Logging Directives should be restricted to authorized users. - 'LogLevel notice'TNS IBM HTTP Server Best PracticeWindows

AUDIT AND ACCOUNTABILITY

Management Services Security - Allow SNMP queries and/or send traps to more than one trusted serverJuniper Hardening JunOS 12 Devices ChecklistJuniper

AUDIT AND ACCOUNTABILITY

Management Services Security - Allow SNMP queries and/or send traps to more than one trusted server - community trapJuniper Hardening JunOS 12 Devices ChecklistJuniper

AUDIT AND ACCOUNTABILITY

Management Services Security - Send Syslog messages to more than one trusted server with enhanced timestampsJuniper Hardening JunOS 12 Devices ChecklistJuniper

AUDIT AND ACCOUNTABILITY

SNMP Destination - HostTenable Cisco ACICisco_ACI

AUDIT AND ACCOUNTABILITY