Item Search

NameAudit NamePluginCategory
1.10.4 Ensure 'syslog hosts' is configured correctlyCIS Cisco Firewall v8.x L1 v4.2.0Cisco

AUDIT AND ACCOUNTABILITY

2.12 Configure centralized and remote loggingCIS Docker 1.11.0 v1.0.0 L2 DockerUnix

AUDIT AND ACCOUNTABILITY

3.1.6 Secure permissions for default database file pathCIS IBM DB2 9 Benchmark v3.0.1 Level 1 OS LinuxUnix

AUDIT AND ACCOUNTABILITY

3.1.17 Secure permissions for the primary archive log location - LOGARCHMETH1 SettingCIS IBM DB2 v10 v1.1.0 Linux OS Level 1Unix

AUDIT AND ACCOUNTABILITY

3.1.17 Secure permissions for the primary archive log location - LOGARCHMETH1 SettingCIS IBM DB2 v10 v1.1.0 Linux OS Level 2Unix

AUDIT AND ACCOUNTABILITY

3.1.17 Secure permissions for the primary archive log location - LOGARCHMETH1 SettingCIS IBM DB2 v10 v1.1.0 Windows OS Level 2Windows

AUDIT AND ACCOUNTABILITY

3.1.19 Secure permissions for the tertiary archive log location - FAILARCHPATH SettingCIS IBM DB2 v10 v1.1.0 Linux OS Level 1Unix

AUDIT AND ACCOUNTABILITY

3.1.20 Secure permissions for the log mirror location - MIRRORLOGPATH SettingCIS IBM DB2 v10 v1.1.0 Windows OS Level 2Windows

AUDIT AND ACCOUNTABILITY

4.2.1.3 Ensure rsyslog default file permissions configuredCIS Amazon Linux v2.1.0 L1Unix

AUDIT AND ACCOUNTABILITY

4.3 Ensure RDS event subscriptions are enabled for Instance level eventsCIS Amazon Web Services Three-tier Web Architecture L1 1.0.0amazon_aws

AUDIT AND ACCOUNTABILITY

4.4 Ensure RDS event subscriptions are enabled for DB security groupsCIS Amazon Web Services Three-tier Web Architecture L1 1.0.0amazon_aws

AUDIT AND ACCOUNTABILITY

5.1 - Storage Administrative System Auditing - Log Forwarding enabledNetApp Security Hardening Guide for ONTAP 9 v1.7.0Netapp_API

AUDIT AND ACCOUNTABILITY

5.1 - Storage Administrative System Auditing - Log Forwarding protocol tcp-encryptedNetApp Security Hardening Guide for ONTAP 9 v1.7.0Netapp_API

AUDIT AND ACCOUNTABILITY

5.1 Ensure Default IIS web log location is movedCIS IIS 8.0 v1.5.1 Level 1Windows

AUDIT AND ACCOUNTABILITY

5.1 Ensure Default IIS web log location is movedCIS IIS 7 L1 v1.8.0Windows

AUDIT AND ACCOUNTABILITY

6.5 Use a centralized and remote log collection serviceCIS Docker 1.6 v1.0.0 L1 DockerUnix

AUDIT AND ACCOUNTABILITY

7.4 Ensure directory in context.xml is a secure location - configurationCIS Apache Tomcat 7 L1 v1.1.0 MiddlewareUnix

AUDIT AND ACCOUNTABILITY

7.6 Ensure directory in logging.properties is a secure location (check prefix application name)CIS Apache Tomcat 7 L1 v1.1.0Unix

AUDIT AND ACCOUNTABILITY

7.6 Ensure directory in logging.properties is a secure location (check prefix application name)CIS Apache Tomcat 7 L1 v1.1.0 MiddlewareUnix

AUDIT AND ACCOUNTABILITY

8.2.3 Configure /etc/rsyslog.conf - '*.*;mail.none;news.none -/var/log/messages'CIS Debian Linux 7 L1 v1.0.0Unix

AUDIT AND ACCOUNTABILITY

8.2.3 Configure /etc/rsyslog.conf - 'local2,local3.* -/var/log/localmessages'CIS Debian Linux 7 L1 v1.0.0Unix

AUDIT AND ACCOUNTABILITY

8.2.3 Configure /etc/rsyslog.conf - mail.err /var/log/mail.errCIS Ubuntu 12.04 LTS Benchmark L1 v1.1.0Unix

AUDIT AND ACCOUNTABILITY

8.2.3 Configure /etc/rsyslog.conf - mail.info -/var/log/mail.infoCIS Ubuntu 12.04 LTS Benchmark L1 v1.1.0Unix

AUDIT AND ACCOUNTABILITY

8.2.3 Configure /etc/rsyslog.conf - mail.warning -/var/log/mail.warnCIS Ubuntu 12.04 LTS Benchmark L1 v1.1.0Unix

AUDIT AND ACCOUNTABILITY

8.2.3 Configure /etc/rsyslog.conf - news.err -/var/log/news/news.errCIS Ubuntu 12.04 LTS Benchmark L1 v1.1.0Unix

AUDIT AND ACCOUNTABILITY

8.2.5 Configure rsyslog to Send Logs to a Remote Log HostCIS Ubuntu 12.04 LTS Benchmark L1 v1.1.0Unix

AUDIT AND ACCOUNTABILITY

8.2.6 Accept Remote rsyslog Messages Only on Designated Log HostsCIS Debian Linux 7 L1 v1.0.0Unix

AUDIT AND ACCOUNTABILITY

20.27 Ensure 'Event Viewer must be protected from unauthorized modification and deletion'CIS Microsoft Windows Server 2016 STIG v3.0.0 STIG MSWindows

AUDIT AND ACCOUNTABILITY

20.27 Ensure 'Event Viewer must be protected from unauthorized modification and deletion'CIS Microsoft Windows Server 2016 STIG v3.0.0 STIG DCWindows

AUDIT AND ACCOUNTABILITY

20.27 Ensure 'Event Viewer must be protected from unauthorized modification and deletion' (STIG only)CIS Microsoft Windows Server 2022 STIG v2.0.0 STIG MSWindows

AUDIT AND ACCOUNTABILITY

20.27 Ensure 'Event Viewer must be protected from unauthorized modification and deletion' (STIG only)CIS Microsoft Windows Server 2022 STIG v2.0.0 STIG DCWindows

AUDIT AND ACCOUNTABILITY

20.48 Ensure 'Permissions for the Application Event Log must prevent access by non-privileged accounts' (STIG only)CIS Microsoft Windows Server 2022 STIG v2.0.0 STIG DCWindows

AUDIT AND ACCOUNTABILITY

20.49 Ensure 'Permissions for the Security Event Log must prevent access by non-privileged accounts'CIS Microsoft Windows Server 2016 STIG v3.0.0 STIG DCWindows

AUDIT AND ACCOUNTABILITY

20.49 Ensure 'Permissions for the Security Event Log must prevent access by non-privileged accounts' (STIG only)CIS Microsoft Windows Server 2022 STIG v2.0.0 STIG MSWindows

AUDIT AND ACCOUNTABILITY

20.50 Ensure 'Permissions for the System Event Log must prevent access by non-privileged accounts'CIS Microsoft Windows Server 2016 STIG v3.0.0 STIG DCWindows

AUDIT AND ACCOUNTABILITY

Brocade - Forward all error logs to syslog daemonTenable Best Practices Brocade FabricOSBrocade

AUDIT AND ACCOUNTABILITY

Brocade - SNMPv3 trap targets are configured properlyTenable Best Practices Brocade FabricOSBrocade

AUDIT AND ACCOUNTABILITY

Ensure 'syslog hosts' is configured correctlyTenable Cisco Firepower Best Practices AuditCisco

AUDIT AND ACCOUNTABILITY

ESXi : config-persistent-logsVMWare vSphere 6.5 Hardening GuideVMware

AUDIT AND ACCOUNTABILITY

ESXi : config-persistent-logsVMWare vSphere 6.0 Hardening GuideVMware

AUDIT AND ACCOUNTABILITY

Fortigate - External Logging - 'fortianalyzer2'TNS Fortigate FortiOS Best Practices v2.0.0FortiGate

AUDIT AND ACCOUNTABILITY

Fortigate - Syslog2 Logging - severity 'information'TNS Fortigate FortiOS Best Practices v2.0.0FortiGate

AUDIT AND ACCOUNTABILITY

Fortigate - Syslogd Logging - severity 'information'TNS Fortigate FortiOS Best Practices v2.0.0FortiGate

AUDIT AND ACCOUNTABILITY

Logging Directives should be restricted to authorized users. - 'CustomLog logs/access_log combined'TNS IBM HTTP Server Best PracticeUnix

AUDIT AND ACCOUNTABILITY

Logging Directives should be restricted to authorized users. - 'CustomLog logs/access_log combined'TNS IBM HTTP Server Best Practice MiddlewareUnix

AUDIT AND ACCOUNTABILITY

Logging Directives should be restricted to authorized users. - 'ErrorLog logs/error_log'TNS IBM HTTP Server Best Practice MiddlewareUnix

AUDIT AND ACCOUNTABILITY

Logging Directives should be restricted to authorized users. - 'ErrorLog logs/error_log'TNS IBM HTTP Server Best PracticeUnix

AUDIT AND ACCOUNTABILITY

Logging Directives should be restricted to authorized users. - 'LogFormat'TNS IBM HTTP Server Best PracticeUnix

AUDIT AND ACCOUNTABILITY

Logging Directives should be restricted to authorized users. - 'LogFormat'TNS IBM HTTP Server Best Practice MiddlewareUnix

AUDIT AND ACCOUNTABILITY

XenServer - Enable remote syslogTNS Citrix XenServerUnix

AUDIT AND ACCOUNTABILITY