1.1.1.1 Syslog logging should be configured - configuration | CIS Palo Alto Firewall 10 v1.1.0 L1 | Palo_Alto | AUDIT AND ACCOUNTABILITY |
1.1.1.1 Syslog logging should be configured - ip-tag | CIS Palo Alto Firewall 9 v1.1.0 L1 | Palo_Alto | AUDIT AND ACCOUNTABILITY |
1.1.1.1 Syslog logging should be configured - ip-tag | CIS Palo Alto Firewall 10 v1.1.0 L1 | Palo_Alto | AUDIT AND ACCOUNTABILITY |
1.1.1.1 Syslog logging should be configured - system | CIS Palo Alto Firewall 9 v1.1.0 L1 | Palo_Alto | AUDIT AND ACCOUNTABILITY |
1.1.1.1 Syslog logging should be configured - system | CIS Palo Alto Firewall 10 v1.1.0 L1 | Palo_Alto | AUDIT AND ACCOUNTABILITY |
1.1.1.2 SNMPv3 traps should be configured - hip match | CIS Palo Alto Firewall 9 v1.1.0 L2 | Palo_Alto | AUDIT AND ACCOUNTABILITY |
1.1.1.2 SNMPv3 traps should be configured - host | CIS Palo Alto Firewall 9 v1.1.0 L2 | Palo_Alto | AUDIT AND ACCOUNTABILITY |
1.1.1.2 SNMPv3 traps should be configured - host | CIS Palo Alto Firewall 10 v1.1.0 L2 | Palo_Alto | AUDIT AND ACCOUNTABILITY |
1.1.1.2 SNMPv3 traps should be configured - user-id | CIS Palo Alto Firewall 9 v1.1.0 L2 | Palo_Alto | AUDIT AND ACCOUNTABILITY |
1.1.1.2 SNMPv3 traps should be configured - user-id | CIS Palo Alto Firewall 10 v1.1.0 L2 | Palo_Alto | AUDIT AND ACCOUNTABILITY |
1.1.3 Ensure 'Enable Log on High DP Load' is enabled | CIS Palo Alto Firewall 10 v1.1.0 L1 | Palo_Alto | AUDIT AND ACCOUNTABILITY |
1.10.1 Ensure 'logging' is enabled | CIS Cisco Firewall ASA 9 L1 v4.1.0 | Cisco | AUDIT AND ACCOUNTABILITY |
1.10.1 Ensure 'logging' is enabled | CIS Cisco ASA 9.x Firewall L1 v1.0.0 | Cisco | AUDIT AND ACCOUNTABILITY |
1.10.5 Ensure 'logging with the device ID' is configured correctly | CIS Cisco ASA 9.x Firewall L1 v1.0.0 | Cisco | AUDIT AND ACCOUNTABILITY |
3.2.4 Ensure suspicious packets are logged - sysctl net.ipv4.conf.default.log_martians | CIS Aliyun Linux 2 L1 v1.0.0 | Unix | AUDIT AND ACCOUNTABILITY |
3.2.4 Ensure suspicious packets are logged - sysctl.conf sysctl.d net.ipv4.conf.default.log_martians | CIS Aliyun Linux 2 L1 v1.0.0 | Unix | AUDIT AND ACCOUNTABILITY |
4.1.1.2 Ensure augenrules is enabled | CIS CentOS 6 Workstation L2 v3.0.0 | Unix | AUDIT AND ACCOUNTABILITY |
4.1.1.2 Ensure augenrules is enabled | CIS Red Hat 6 Workstation L2 v3.0.0 | Unix | AUDIT AND ACCOUNTABILITY |
4.1.1.3 Ensure audit logs are not automatically deleted | CIS SUSE Linux Enterprise Workstation 11 L2 v2.1.1 | Unix | AUDIT AND ACCOUNTABILITY |
4.1.1.3 Ensure audit logs are not automatically deleted | CIS SUSE Linux Enterprise Server 11 L2 v2.1.1 | Unix | AUDIT AND ACCOUNTABILITY |
4.1.2.2 Ensure audit logs are not automatically deleted | CIS Red Hat Enterprise Linux 7 STIG v2.0.0 L2 Server | Unix | AUDIT AND ACCOUNTABILITY |
4.1.2.2 Ensure audit logs are not automatically deleted | CIS SUSE Linux Enterprise 15 Server L2 v1.1.1 | Unix | AUDIT AND ACCOUNTABILITY |
4.1.2.2 Ensure audit logs are not automatically deleted | CIS SUSE Linux Enterprise Workstation 12 L2 v3.1.0 | Unix | AUDIT AND ACCOUNTABILITY |
4.1.2.2 Ensure audit logs are not automatically deleted | CIS SUSE Linux Enterprise 15 Workstation L2 v1.1.1 | Unix | AUDIT AND ACCOUNTABILITY |
4.1.2.2 Ensure audit logs are not automatically deleted | CIS SUSE Linux Enterprise Server 12 L2 v3.1.0 | Unix | AUDIT AND ACCOUNTABILITY |
4.1.2.2 Ensure audit logs are not automatically deleted | CIS Red Hat Enterprise Linux 7 STIG v2.0.0 L2 Workstation | Unix | AUDIT AND ACCOUNTABILITY |
4.1.11 Ensure use of privileged commands is collected | CIS CentOS 6 Workstation L2 v3.0.0 | Unix | AUDIT AND ACCOUNTABILITY |
4.1.11 Ensure use of privileged commands is collected | CIS Fedora 19 Family Linux Server L2 v1.0.0 | Unix | AUDIT AND ACCOUNTABILITY |
4.1.12 Ensure successful file system mounts are collected - auditctl 32-bit | CIS CentOS 6 Server L2 v3.0.0 | Unix | AUDIT AND ACCOUNTABILITY |
4.1.12 Ensure successful file system mounts are collected - auditctl 32-bit | CIS Oracle Linux 6 Workstation L2 v2.0.0 | Unix | AUDIT AND ACCOUNTABILITY |
4.1.12 Ensure successful file system mounts are collected - auditctl 64-bit | CIS Oracle Linux 6 Server L2 v2.0.0 | Unix | AUDIT AND ACCOUNTABILITY |
4.1.12 Ensure successful file system mounts are collected - auditctl 64-bit | CIS Red Hat 6 Workstation L2 v3.0.0 | Unix | AUDIT AND ACCOUNTABILITY |
4.1.12 Ensure successful file system mounts are collected - b64 | CIS Fedora 19 Family Linux Server L2 v1.0.0 | Unix | AUDIT AND ACCOUNTABILITY |
4.1.12 Ensure successful file system mounts are collected - rules.d 32-bit | CIS CentOS 6 Workstation L2 v3.0.0 | Unix | AUDIT AND ACCOUNTABILITY |
4.1.12 Ensure successful file system mounts are collected - rules.d 32-bit | CIS Red Hat 6 Workstation L2 v3.0.0 | Unix | AUDIT AND ACCOUNTABILITY |
4.1.12 Ensure successful file system mounts are collected - rules.d 32-bit | CIS Oracle Linux 6 Workstation L2 v2.0.0 | Unix | AUDIT AND ACCOUNTABILITY |
4.1.12 Ensure successful file system mounts are collected - rules.d 32-bit | CIS Red Hat 6 Server L2 v3.0.0 | Unix | AUDIT AND ACCOUNTABILITY |
4.1.12 Ensure successful file system mounts are collected - rules.d 64-bit | CIS CentOS 6 Server L2 v3.0.0 | Unix | AUDIT AND ACCOUNTABILITY |
4.1.12 Ensure successful file system mounts are collected - rules.d 64-bit | CIS Oracle Linux 6 Workstation L2 v2.0.0 | Unix | AUDIT AND ACCOUNTABILITY |
4.1.12 Ensure successful file system mounts are collected - rules.d 64-bit | CIS Red Hat 6 Server L2 v3.0.0 | Unix | AUDIT AND ACCOUNTABILITY |
5.3.14 Collect Successful File System Mounts - arch=b32 | CIS Red Hat Enterprise Linux 5 L2 v2.2.1 | Unix | AUDIT AND ACCOUNTABILITY |
5.3.14 Collect Successful File System Mounts - arch=b64 | CIS Red Hat Enterprise Linux 5 L2 v2.2.1 | Unix | AUDIT AND ACCOUNTABILITY |
5.3.15 Collect File Deletion Events by User - arch=b32 | CIS Red Hat Enterprise Linux 5 L2 v2.2.1 | Unix | AUDIT AND ACCOUNTABILITY |
5.3.15 Collect File Deletion Events by User - arch=b64 | CIS Red Hat Enterprise Linux 5 L2 v2.2.1 | Unix | AUDIT AND ACCOUNTABILITY |
5.4 Ensure all WildFire session information settings are enabled | CIS Palo Alto Firewall 11 v1.0.0 L1 | Palo_Alto | SYSTEM AND INFORMATION INTEGRITY |
5.5 Ensure all WildFire session information settings are enabled | CIS Palo Alto Firewall 10 v1.1.0 L1 | Palo_Alto | SYSTEM AND INFORMATION INTEGRITY |
5.5 Ensure all WildFire session information settings are enabled | CIS Palo Alto Firewall 9 v1.1.0 L1 | Palo_Alto | SYSTEM AND INFORMATION INTEGRITY |
6.12.3 Ensure Local Logging is Set for Firewall Events | CIS Juniper OS Benchmark v2.1.0 L1 | Juniper | AUDIT AND ACCOUNTABILITY |
6.12.4 Ensure Local Logging is Set for Authentication and Authorization Events | CIS Juniper OS Benchmark v2.1.0 L1 | Juniper | AUDIT AND ACCOUNTABILITY |
CIS Control 6 (6.2(a)) Activate Audit Logging | CAS Implementation Group 1 Audit File | Unix | AUDIT AND ACCOUNTABILITY |