CSCv7|7.6

Title

Log all URL requests

Description

Log all URL requests from each of the organization's systems, whether onsite or a mobile device, in order to identify potentially malicious activity and assist incident handlers with identifying potentially compromised systems.

Reference Item Details

Category: Email and Web Browser Protections

Audit Items

View all Reference Audit Items

NamePluginAudit Name
4.2 Ensure 'Applications and Threats Update Schedule' is set to download and install updates at daily or shorter intervalsPalo_AltoCIS Palo Alto Firewall 9 v1.1.0 L1
6.10 Ensure that access to every URL is loggedPalo_AltoCIS Palo Alto Firewall 10 v1.2.0 L1
6.10 Ensure that access to every URL is loggedPalo_AltoCIS Palo Alto Firewall 11 v1.1.0 L1
6.11 Ensure all HTTP Header Logging options are enabledPalo_AltoCIS Palo Alto Firewall 10 v1.2.0 L1
6.11 Ensure all HTTP Header Logging options are enabledPalo_AltoCIS Palo Alto Firewall 11 v1.1.0 L1
6.11 Ensure that access to every URL is loggedPalo_AltoCIS Palo Alto Firewall 9 v1.1.0 L1
6.11 Ensure that access to every URL is loggedPalo_AltoCIS Palo Alto Firewall 8 Benchmark L1 v1.0.0
6.12 Ensure all HTTP Header Logging options are enabled - Log Container PagePalo_AltoCIS Palo Alto Firewall 8 Benchmark L1 v1.0.0
6.12 Ensure all HTTP Header Logging options are enabled - Log Container PagePalo_AltoCIS Palo Alto Firewall 9 v1.1.0 L1
6.12 Ensure all HTTP Header Logging options are enabled - RefererPalo_AltoCIS Palo Alto Firewall 9 v1.1.0 L1
6.12 Ensure all HTTP Header Logging options are enabled - RefererPalo_AltoCIS Palo Alto Firewall 8 Benchmark L1 v1.0.0
6.12 Ensure all HTTP Header Logging options are enabled - User-AgentPalo_AltoCIS Palo Alto Firewall 8 Benchmark L1 v1.0.0
6.12 Ensure all HTTP Header Logging options are enabled - User-AgentPalo_AltoCIS Palo Alto Firewall 9 v1.1.0 L1
6.12 Ensure all HTTP Header Logging options are enabled - X-Forwarded-ForPalo_AltoCIS Palo Alto Firewall 9 v1.1.0 L1
6.12 Ensure all HTTP Header Logging options are enabled - X-Forwarded-ForPalo_AltoCIS Palo Alto Firewall 8 Benchmark L1 v1.0.0
7.1.1.6 Ensure that logging for Azure AppService 'HTTP logs' is enabledmicrosoft_azureCIS Microsoft Azure Foundations v4.0.0 L2
9.1.17 [LEGACY] Ensure That Microsoft Defender for DNS Is Set To 'On'microsoft_azureCIS Microsoft Azure Foundations v4.0.0 L2