Item Search

NameAudit NamePluginCategory
3.1.6 Secure permissions for default database file pathCIS IBM DB2 9 Benchmark v3.0.1 Level 1 OS LinuxUnix

AUDIT AND ACCOUNTABILITY

3.1.6 Secure permissions for default database file pathCIS IBM DB2 9 Benchmark v3.0.1 Level 2 OS LinuxUnix

AUDIT AND ACCOUNTABILITY

3.1.8 Secure all diagnostic logsCIS IBM DB2 9 Benchmark v3.0.1 Level 2 OS LinuxUnix

AUDIT AND ACCOUNTABILITY

3.1.17 Secure permissions for the primary archive log location - LOGARCHMETH1 SettingCIS IBM DB2 v10 v1.1.0 Linux OS Level 2Unix

AUDIT AND ACCOUNTABILITY

3.1.17 Secure permissions for the primary archive log location - LOGARCHMETH1 SettingCIS IBM DB2 v10 v1.1.0 Linux OS Level 1Unix

AUDIT AND ACCOUNTABILITY

3.1.18 Secure permissions for the secondary archive log location - LOGARCHMETH2 SettingCIS IBM DB2 v10 v1.1.0 Linux OS Level 2Unix

AUDIT AND ACCOUNTABILITY

3.1.19 Secure permissions for the tertiary archive log location - FAILARCHPATH SettingCIS IBM DB2 v10 v1.1.0 Windows OS Level 2Windows

AUDIT AND ACCOUNTABILITY

3.2.4 Secure permissions for the primary archive log locationCIS IBM DB2 9 Benchmark v3.0.1 Level 1 OS WindowsWindows

AUDIT AND ACCOUNTABILITY

3.2.5 Secure permissions for the secondary archive log locationCIS IBM DB2 9 Benchmark v3.0.1 Level 1 OS LinuxUnix

AUDIT AND ACCOUNTABILITY

3.2.6 Secure permissions for the tertiary archive log locationCIS IBM DB2 9 Benchmark v3.0.1 Level 1 OS WindowsWindows

AUDIT AND ACCOUNTABILITY

3.2.6 Secure permissions for the tertiary archive log locationCIS IBM DB2 9 Benchmark v3.0.1 Level 1 OS LinuxUnix

AUDIT AND ACCOUNTABILITY

3.2.7 Secure permissions for the log mirror locationCIS IBM DB2 9 Benchmark v3.0.1 Level 1 OS WindowsWindows

AUDIT AND ACCOUNTABILITY

3.3 Configure remote logging for ESXi hostsCIS VMware ESXi 5.5 v1.2.0 Level 1VMware

AUDIT AND ACCOUNTABILITY

3.4 Configure remote logging for ESXi hostsCIS VMware ESXi 5.1 v1.0.1 Level 1VMware

AUDIT AND ACCOUNTABILITY

4.2.1.3 Ensure rsyslog default file permissions configuredCIS Amazon Linux v2.1.0 L1Unix

AUDIT AND ACCOUNTABILITY

4.2.2.3 Ensure journald is configured to write logfiles to persistent diskCIS Ubuntu Linux 18.04 LTS Workstation L1 v2.1.0Unix

AUDIT AND ACCOUNTABILITY

4.2.2.3 Ensure journald is configured to write logfiles to persistent diskCIS Ubuntu Linux 18.04 LTS Server L1 v2.1.0Unix

AUDIT AND ACCOUNTABILITY

4.3 Ensure RDS event subscriptions are enabled for Instance level eventsCIS Amazon Web Services Three-tier Web Architecture L1 1.0.0amazon_aws

AUDIT AND ACCOUNTABILITY

4.3.1 Configure a syslog channel 'syslog daemon'CIS ISC BIND 9.0/9.5 v2.0.0Unix

AUDIT AND ACCOUNTABILITY

4.4 Ensure RDS event subscriptions are enabled for DB security groupsCIS Amazon Web Services Three-tier Web Architecture L1 1.0.0amazon_aws

AUDIT AND ACCOUNTABILITY

5.1 Ensure Default IIS web log location is movedCIS IIS 7 L1 v1.8.0Windows

AUDIT AND ACCOUNTABILITY

5.1 Ensure Default IIS web log location is movedCIS IIS 8.0 v1.5.1 Level 1Windows

AUDIT AND ACCOUNTABILITY

7.4 Ensure directory in context.xml is a secure location - configurationCIS Apache Tomcat 7 L1 v1.1.0Unix

AUDIT AND ACCOUNTABILITY

7.6 Ensure directory in logging.properties is a secure location (check log directory location)CIS Apache Tomcat 7 L1 v1.1.0Unix

AUDIT AND ACCOUNTABILITY

20.2 Ensure 'Event Logs are protected'CIS Microsoft Windows 10 EMS Gateway v2.0.0 L1Windows

AUDIT AND ACCOUNTABILITY

BSI-100-2: S 4.106: Activation of system logging: /etc/rsyslog.conf - *.alert rootBSI-100-2 Red Hat Linux 2005Unix

AUDIT AND ACCOUNTABILITY

BSI-100-2: S 4.106: Activation of system logging: /etc/rsyslog.conf - *.alert;kern.err;daemon.errBSI-100-2 Red Hat Linux 2005Unix

AUDIT AND ACCOUNTABILITY

BSI-100-2: S 4.106: Activation of system logging: /etc/rsyslog.conf - *.emergBSI-100-2 Red Hat Linux 2005Unix

AUDIT AND ACCOUNTABILITY

BSI-100-2: S 4.106: Activation of system logging: /etc/rsyslog.conf - *.errBSI-100-2 Red Hat Linux 2005Unix

AUDIT AND ACCOUNTABILITY

BSI-100-2: S 4.106: Activation of system logging: /etc/rsyslog.conf - auth.infoBSI-100-2 Red Hat Linux 2005Unix

AUDIT AND ACCOUNTABILITY

BSI-100-2: S 4.106: Activation of system logging: /etc/rsyslog.conf - cron.infoBSI-100-2 Red Hat Linux 2005Unix

AUDIT AND ACCOUNTABILITY

BSI-100-2: S 4.106: Activation of system logging: /etc/rsyslog.conf - daemon.infoBSI-100-2 Red Hat Linux 2005Unix

AUDIT AND ACCOUNTABILITY

BSI-100-2: S 4.106: Activation of system logging: /etc/rsyslog.conf - local0,local1.infoBSI-100-2 Red Hat Linux 2005Unix

AUDIT AND ACCOUNTABILITY

BSI-100-2: S 4.106: Activation of system logging: /etc/rsyslog.conf - news,uucp.infoBSI-100-2 Red Hat Linux 2005Unix

AUDIT AND ACCOUNTABILITY

BSI-100-2: S 4.106: Activation of system logging: /etc/rsyslog.conf - user.infoBSI-100-2 Red Hat Linux 2005Unix

AUDIT AND ACCOUNTABILITY

Ensure 'snmp-server group' is set to 'v3 priv'Tenable Cisco Firepower Threat Defense Best Practices AuditCisco_Firepower

AUDIT AND ACCOUNTABILITY

ESXi : config-persistent-logsVMWare vSphere 6.0 Hardening GuideVMware

AUDIT AND ACCOUNTABILITY

ESXi : config-persistent-logsVMWare vSphere 6.5 Hardening GuideVMware

AUDIT AND ACCOUNTABILITY

ESXi : enable-remote-syslogVMWare vSphere 5.X Hardening GuideVMware

AUDIT AND ACCOUNTABILITY

ESXi : enable-remote-syslogVMWare vSphere 6.5 Hardening GuideVMware

AUDIT AND ACCOUNTABILITY

Huawei: External Syslog server is configuredTNS Huawei VRP Best Practice AuditHuawei

AUDIT AND ACCOUNTABILITY

Huawei: SNMP appropriate trap hostTNS Huawei VRP Best Practice AuditHuawei

AUDIT AND ACCOUNTABILITY

Huawei: SNMP is ConfiguredTNS Huawei VRP Best Practice AuditHuawei

AUDIT AND ACCOUNTABILITY

Logging Directives should be restricted to authorized users. - 'CustomLog logs/access_log combined'TNS IBM HTTP Server Best PracticeUnix

AUDIT AND ACCOUNTABILITY

Logging Directives should be restricted to authorized users. - 'CustomLog logs/access_log combined'TNS IBM HTTP Server Best Practice MiddlewareUnix

AUDIT AND ACCOUNTABILITY

Logging Directives should be restricted to authorized users. - 'ErrorLog logs/error_log'TNS IBM HTTP Server Best Practice MiddlewareUnix

AUDIT AND ACCOUNTABILITY

Logging Directives should be restricted to authorized users. - 'ErrorLog logs/error_log'TNS IBM HTTP Server Best PracticeUnix

AUDIT AND ACCOUNTABILITY

Logging Directives should be restricted to authorized users. - 'LogFormat'TNS IBM HTTP Server Best PracticeUnix

AUDIT AND ACCOUNTABILITY

Logging Directives should be restricted to authorized users. - 'LogFormat'TNS IBM HTTP Server Best Practice MiddlewareUnix

AUDIT AND ACCOUNTABILITY

PCI 10.5.3 Promptly back up audit trail files to a centralized log server - configure remote logging.PCI DSS 2.0/3.0 - Red Hat LinuxUnix

AUDIT AND ACCOUNTABILITY