3.1.6 Secure permissions for default database file path | CIS IBM DB2 9 Benchmark v3.0.1 Level 1 OS Linux | Unix | AUDIT AND ACCOUNTABILITY |
3.1.6 Secure permissions for default database file path | CIS IBM DB2 9 Benchmark v3.0.1 Level 2 OS Linux | Unix | AUDIT AND ACCOUNTABILITY |
3.1.8 Secure all diagnostic logs | CIS IBM DB2 9 Benchmark v3.0.1 Level 2 OS Linux | Unix | AUDIT AND ACCOUNTABILITY |
3.1.17 Secure permissions for the primary archive log location - LOGARCHMETH1 Setting | CIS IBM DB2 v10 v1.1.0 Linux OS Level 2 | Unix | AUDIT AND ACCOUNTABILITY |
3.1.17 Secure permissions for the primary archive log location - LOGARCHMETH1 Setting | CIS IBM DB2 v10 v1.1.0 Linux OS Level 1 | Unix | AUDIT AND ACCOUNTABILITY |
3.1.18 Secure permissions for the secondary archive log location - LOGARCHMETH2 Setting | CIS IBM DB2 v10 v1.1.0 Linux OS Level 2 | Unix | AUDIT AND ACCOUNTABILITY |
3.1.19 Secure permissions for the tertiary archive log location - FAILARCHPATH Setting | CIS IBM DB2 v10 v1.1.0 Windows OS Level 2 | Windows | AUDIT AND ACCOUNTABILITY |
3.2.4 Secure permissions for the primary archive log location | CIS IBM DB2 9 Benchmark v3.0.1 Level 1 OS Windows | Windows | AUDIT AND ACCOUNTABILITY |
3.2.5 Secure permissions for the secondary archive log location | CIS IBM DB2 9 Benchmark v3.0.1 Level 1 OS Linux | Unix | AUDIT AND ACCOUNTABILITY |
3.2.6 Secure permissions for the tertiary archive log location | CIS IBM DB2 9 Benchmark v3.0.1 Level 1 OS Windows | Windows | AUDIT AND ACCOUNTABILITY |
3.2.6 Secure permissions for the tertiary archive log location | CIS IBM DB2 9 Benchmark v3.0.1 Level 1 OS Linux | Unix | AUDIT AND ACCOUNTABILITY |
3.2.7 Secure permissions for the log mirror location | CIS IBM DB2 9 Benchmark v3.0.1 Level 1 OS Windows | Windows | AUDIT AND ACCOUNTABILITY |
3.3 Configure remote logging for ESXi hosts | CIS VMware ESXi 5.5 v1.2.0 Level 1 | VMware | AUDIT AND ACCOUNTABILITY |
3.4 Configure remote logging for ESXi hosts | CIS VMware ESXi 5.1 v1.0.1 Level 1 | VMware | AUDIT AND ACCOUNTABILITY |
4.2.1.3 Ensure rsyslog default file permissions configured | CIS Amazon Linux v2.1.0 L1 | Unix | AUDIT AND ACCOUNTABILITY |
4.2.2.3 Ensure journald is configured to write logfiles to persistent disk | CIS Ubuntu Linux 18.04 LTS Workstation L1 v2.1.0 | Unix | AUDIT AND ACCOUNTABILITY |
4.2.2.3 Ensure journald is configured to write logfiles to persistent disk | CIS Ubuntu Linux 18.04 LTS Server L1 v2.1.0 | Unix | AUDIT AND ACCOUNTABILITY |
4.3 Ensure RDS event subscriptions are enabled for Instance level events | CIS Amazon Web Services Three-tier Web Architecture L1 1.0.0 | amazon_aws | AUDIT AND ACCOUNTABILITY |
4.3.1 Configure a syslog channel 'syslog daemon' | CIS ISC BIND 9.0/9.5 v2.0.0 | Unix | AUDIT AND ACCOUNTABILITY |
4.4 Ensure RDS event subscriptions are enabled for DB security groups | CIS Amazon Web Services Three-tier Web Architecture L1 1.0.0 | amazon_aws | AUDIT AND ACCOUNTABILITY |
5.1 Ensure Default IIS web log location is moved | CIS IIS 7 L1 v1.8.0 | Windows | AUDIT AND ACCOUNTABILITY |
5.1 Ensure Default IIS web log location is moved | CIS IIS 8.0 v1.5.1 Level 1 | Windows | AUDIT AND ACCOUNTABILITY |
7.4 Ensure directory in context.xml is a secure location - configuration | CIS Apache Tomcat 7 L1 v1.1.0 | Unix | AUDIT AND ACCOUNTABILITY |
7.6 Ensure directory in logging.properties is a secure location (check log directory location) | CIS Apache Tomcat 7 L1 v1.1.0 | Unix | AUDIT AND ACCOUNTABILITY |
20.2 Ensure 'Event Logs are protected' | CIS Microsoft Windows 10 EMS Gateway v2.0.0 L1 | Windows | AUDIT AND ACCOUNTABILITY |
BSI-100-2: S 4.106: Activation of system logging: /etc/rsyslog.conf - *.alert root | BSI-100-2 Red Hat Linux 2005 | Unix | AUDIT AND ACCOUNTABILITY |
BSI-100-2: S 4.106: Activation of system logging: /etc/rsyslog.conf - *.alert;kern.err;daemon.err | BSI-100-2 Red Hat Linux 2005 | Unix | AUDIT AND ACCOUNTABILITY |
BSI-100-2: S 4.106: Activation of system logging: /etc/rsyslog.conf - *.emerg | BSI-100-2 Red Hat Linux 2005 | Unix | AUDIT AND ACCOUNTABILITY |
BSI-100-2: S 4.106: Activation of system logging: /etc/rsyslog.conf - *.err | BSI-100-2 Red Hat Linux 2005 | Unix | AUDIT AND ACCOUNTABILITY |
BSI-100-2: S 4.106: Activation of system logging: /etc/rsyslog.conf - auth.info | BSI-100-2 Red Hat Linux 2005 | Unix | AUDIT AND ACCOUNTABILITY |
BSI-100-2: S 4.106: Activation of system logging: /etc/rsyslog.conf - cron.info | BSI-100-2 Red Hat Linux 2005 | Unix | AUDIT AND ACCOUNTABILITY |
BSI-100-2: S 4.106: Activation of system logging: /etc/rsyslog.conf - daemon.info | BSI-100-2 Red Hat Linux 2005 | Unix | AUDIT AND ACCOUNTABILITY |
BSI-100-2: S 4.106: Activation of system logging: /etc/rsyslog.conf - local0,local1.info | BSI-100-2 Red Hat Linux 2005 | Unix | AUDIT AND ACCOUNTABILITY |
BSI-100-2: S 4.106: Activation of system logging: /etc/rsyslog.conf - news,uucp.info | BSI-100-2 Red Hat Linux 2005 | Unix | AUDIT AND ACCOUNTABILITY |
BSI-100-2: S 4.106: Activation of system logging: /etc/rsyslog.conf - user.info | BSI-100-2 Red Hat Linux 2005 | Unix | AUDIT AND ACCOUNTABILITY |
Ensure 'snmp-server group' is set to 'v3 priv' | Tenable Cisco Firepower Threat Defense Best Practices Audit | Cisco_Firepower | AUDIT AND ACCOUNTABILITY |
ESXi : config-persistent-logs | VMWare vSphere 6.0 Hardening Guide | VMware | AUDIT AND ACCOUNTABILITY |
ESXi : config-persistent-logs | VMWare vSphere 6.5 Hardening Guide | VMware | AUDIT AND ACCOUNTABILITY |
ESXi : enable-remote-syslog | VMWare vSphere 5.X Hardening Guide | VMware | AUDIT AND ACCOUNTABILITY |
ESXi : enable-remote-syslog | VMWare vSphere 6.5 Hardening Guide | VMware | AUDIT AND ACCOUNTABILITY |
Huawei: External Syslog server is configured | TNS Huawei VRP Best Practice Audit | Huawei | AUDIT AND ACCOUNTABILITY |
Huawei: SNMP appropriate trap host | TNS Huawei VRP Best Practice Audit | Huawei | AUDIT AND ACCOUNTABILITY |
Huawei: SNMP is Configured | TNS Huawei VRP Best Practice Audit | Huawei | AUDIT AND ACCOUNTABILITY |
Logging Directives should be restricted to authorized users. - 'CustomLog logs/access_log combined' | TNS IBM HTTP Server Best Practice | Unix | AUDIT AND ACCOUNTABILITY |
Logging Directives should be restricted to authorized users. - 'CustomLog logs/access_log combined' | TNS IBM HTTP Server Best Practice Middleware | Unix | AUDIT AND ACCOUNTABILITY |
Logging Directives should be restricted to authorized users. - 'ErrorLog logs/error_log' | TNS IBM HTTP Server Best Practice Middleware | Unix | AUDIT AND ACCOUNTABILITY |
Logging Directives should be restricted to authorized users. - 'ErrorLog logs/error_log' | TNS IBM HTTP Server Best Practice | Unix | AUDIT AND ACCOUNTABILITY |
Logging Directives should be restricted to authorized users. - 'LogFormat' | TNS IBM HTTP Server Best Practice | Unix | AUDIT AND ACCOUNTABILITY |
Logging Directives should be restricted to authorized users. - 'LogFormat' | TNS IBM HTTP Server Best Practice Middleware | Unix | AUDIT AND ACCOUNTABILITY |
PCI 10.5.3 Promptly back up audit trail files to a centralized log server - configure remote logging. | PCI DSS 2.0/3.0 - Red Hat Linux | Unix | AUDIT AND ACCOUNTABILITY |