Item Search

NameAudit NamePluginCategory
2.1.1 - Configuring syslog - local logging - '*.info;auth.none entry exists in /etc/syslog.conf'CIS AIX 5.3/6.1 L2 v1.1.0Unix

AUDIT AND ACCOUNTABILITY

3.1.5 Secure default database location - 'DFTDBPATH value'CIS IBM DB2 OS L2 v1.2.0Unix

AUDIT AND ACCOUNTABILITY

3.1.19 Secure permissions for the tertiary archive log location - FAILARCHPATH SettingCIS IBM DB2 v10 v1.1.0 Windows OS Level 2Windows

AUDIT AND ACCOUNTABILITY

3.2.4 Secure permissions for the primary archive log locationCIS IBM DB2 9 Benchmark v3.0.1 Level 1 OS WindowsWindows

AUDIT AND ACCOUNTABILITY

3.2.6 Secure permissions for the tertiary archive log locationCIS IBM DB2 9 Benchmark v3.0.1 Level 1 OS WindowsWindows

AUDIT AND ACCOUNTABILITY

3.2.7 Secure permissions for the log mirror locationCIS IBM DB2 9 Benchmark v3.0.1 Level 1 OS WindowsWindows

AUDIT AND ACCOUNTABILITY

4.1.1.4 Ensure audit logs are stored on a different system.CIS Amazon Linux 2 STIG v1.0.0 L3Unix

AUDIT AND ACCOUNTABILITY

4.2.1.3 Ensure rsyslog default file permissions configuredCIS Amazon Linux v2.1.0 L1Unix

AUDIT AND ACCOUNTABILITY

4.2.1.3 Ensure rsyslog default file permissions configured - rsyslog.conf/rsyslog.dCIS Ubuntu Linux 14.04 LTS Server L1 v2.1.0Unix

AUDIT AND ACCOUNTABILITY

4.2.1.3 Ensure rsyslog default file permissions configured - rsyslog.conf/rsyslog.dCIS Ubuntu Linux 14.04 LTS Workstation L1 v2.1.0Unix

AUDIT AND ACCOUNTABILITY

4.2.1.4 Ensure rsyslog default file permissions configuredCIS Ubuntu Linux 18.04 LTS Server L1 v2.1.0Unix

AUDIT AND ACCOUNTABILITY

4.2.1.4 Ensure rsyslog default file permissions configuredCIS Ubuntu Linux 18.04 LTS Workstation L1 v2.1.0Unix

AUDIT AND ACCOUNTABILITY

4.2.2.3 Ensure journald is configured to write logfiles to persistent diskCIS Ubuntu Linux 18.04 LTS Workstation L1 v2.1.0Unix

AUDIT AND ACCOUNTABILITY

4.2.2.3 Ensure journald is configured to write logfiles to persistent diskCIS Ubuntu Linux 18.04 LTS Server L1 v2.1.0Unix

AUDIT AND ACCOUNTABILITY

4.3 Ensure RDS event subscriptions are enabled for Instance level eventsCIS Amazon Web Services Three-tier Web Architecture L1 1.0.0amazon_aws

AUDIT AND ACCOUNTABILITY

4.3.1 Configure a syslog channel 'syslog daemon'CIS ISC BIND 9.0/9.5 v2.0.0Unix

AUDIT AND ACCOUNTABILITY

4.4 Ensure RDS event subscriptions are enabled for DB security groupsCIS Amazon Web Services Three-tier Web Architecture L1 1.0.0amazon_aws

AUDIT AND ACCOUNTABILITY

5.1 Ensure Default IIS web log location is movedCIS IIS 7 L1 v1.8.0Windows

AUDIT AND ACCOUNTABILITY

5.1 Ensure Default IIS web log location is movedCIS IIS 8.0 v1.5.0 Level 1Windows

AUDIT AND ACCOUNTABILITY

5.5 Configure newsyslog for secure file permissions (/var/log/amd.log)CIS FreeBSD v1.0.5Unix

AUDIT AND ACCOUNTABILITY

5.5 Configure newsyslog for secure file permissions (/var/log/daily.log)CIS FreeBSD v1.0.5Unix

AUDIT AND ACCOUNTABILITY

5.5 Configure newsyslog for secure file permissions (/var/log/lpd-errs)CIS FreeBSD v1.0.5Unix

AUDIT AND ACCOUNTABILITY

5.5 Configure newsyslog for secure file permissions (/var/log/maillog)CIS FreeBSD v1.0.5Unix

AUDIT AND ACCOUNTABILITY

7.5 Prevent Syslog from accepting messages from network. Check if 'LOG_FROM_REMOTE' is set to NO in file /etc/default/syslogdCIS Solaris 9 v1.3Unix

AUDIT AND ACCOUNTABILITY

Adtran : Forward logs to syslog serverTNS Adtran AOS Best Practice AuditAdtran

AUDIT AND ACCOUNTABILITY

Brocade - Forward all error logs to syslog daemonTenable Best Practices Brocade FabricOSBrocade

AUDIT AND ACCOUNTABILITY

BSI-100-2: S 4.106: Activation of system logging: /etc/rsyslog.conf - *.alert rootBSI-100-2 Red Hat Linux 2005Unix

AUDIT AND ACCOUNTABILITY

BSI-100-2: S 4.106: Activation of system logging: /etc/rsyslog.conf - *.alert;kern.err;daemon.errBSI-100-2 Red Hat Linux 2005Unix

AUDIT AND ACCOUNTABILITY

BSI-100-2: S 4.106: Activation of system logging: /etc/rsyslog.conf - *.emergBSI-100-2 Red Hat Linux 2005Unix

AUDIT AND ACCOUNTABILITY

BSI-100-2: S 4.106: Activation of system logging: /etc/rsyslog.conf - *.errBSI-100-2 Red Hat Linux 2005Unix

AUDIT AND ACCOUNTABILITY

BSI-100-2: S 4.106: Activation of system logging: /etc/rsyslog.conf - auth.infoBSI-100-2 Red Hat Linux 2005Unix

AUDIT AND ACCOUNTABILITY

BSI-100-2: S 4.106: Activation of system logging: /etc/rsyslog.conf - cron.infoBSI-100-2 Red Hat Linux 2005Unix

AUDIT AND ACCOUNTABILITY

BSI-100-2: S 4.106: Activation of system logging: /etc/rsyslog.conf - daemon.infoBSI-100-2 Red Hat Linux 2005Unix

AUDIT AND ACCOUNTABILITY

BSI-100-2: S 4.106: Activation of system logging: /etc/rsyslog.conf - local0,local1.infoBSI-100-2 Red Hat Linux 2005Unix

AUDIT AND ACCOUNTABILITY

BSI-100-2: S 4.106: Activation of system logging: /etc/rsyslog.conf - news,uucp.infoBSI-100-2 Red Hat Linux 2005Unix

AUDIT AND ACCOUNTABILITY

BSI-100-2: S 4.106: Activation of system logging: /etc/rsyslog.conf - user.infoBSI-100-2 Red Hat Linux 2005Unix

AUDIT AND ACCOUNTABILITY

Citrix ADM - Syslog - Configure serverTenable Best Practice Citrix ADM v1.0.0Citrix_Application_Delivery

AUDIT AND ACCOUNTABILITY

ESXi : config-persistent-logsVMWare vSphere 6.0 Hardening GuideVMware

AUDIT AND ACCOUNTABILITY

ESXi : config-persistent-logsVMWare vSphere 6.5 Hardening GuideVMware

AUDIT AND ACCOUNTABILITY

Extreme : Configure Remote SyslogTNS Extreme ExtremeXOS Best Practice AuditExtreme_ExtremeXOS

AUDIT AND ACCOUNTABILITY

Huawei: External Syslog server is configuredTNS Huawei VRP Best Practice AuditHuawei

AUDIT AND ACCOUNTABILITY

Huawei: SNMP is ConfiguredTNS Huawei VRP Best Practice AuditHuawei

AUDIT AND ACCOUNTABILITY

Logging Directives should be restricted to authorized users. - 'CustomLog logs/access_log combined'TNS IBM HTTP Server Best PracticeUnix

AUDIT AND ACCOUNTABILITY

Logging Directives should be restricted to authorized users. - 'CustomLog logs/access_log combined'TNS IBM HTTP Server Best Practice MiddlewareUnix

AUDIT AND ACCOUNTABILITY

Logging Directives should be restricted to authorized users. - 'ErrorLog logs/error_log'TNS IBM HTTP Server Best PracticeUnix

AUDIT AND ACCOUNTABILITY

Logging Directives should be restricted to authorized users. - 'ErrorLog logs/error_log'TNS IBM HTTP Server Best Practice MiddlewareUnix

AUDIT AND ACCOUNTABILITY

Logging Directives should be restricted to authorized users. - 'LogFormat'TNS IBM HTTP Server Best Practice MiddlewareUnix

AUDIT AND ACCOUNTABILITY

Logging Directives should be restricted to authorized users. - 'LogFormat'TNS IBM HTTP Server Best PracticeUnix

AUDIT AND ACCOUNTABILITY

WatchGuard : Logging - Remote Logging EnabledTNS Best Practice WatchGuard Audit 1.0.0WatchGuard

AUDIT AND ACCOUNTABILITY

WatchGuard : Logging - Review Remote Logging Server AddressTNS Best Practice WatchGuard Audit 1.0.0WatchGuard

AUDIT AND ACCOUNTABILITY