1.1.1.1 Syslog logging should be configured - hip match | CIS Palo Alto Firewall 9 v1.1.0 L1 | Palo_Alto | AUDIT AND ACCOUNTABILITY |
1.1.1.1 Syslog logging should be configured - host | CIS Palo Alto Firewall 9 v1.1.0 L1 | Palo_Alto | AUDIT AND ACCOUNTABILITY |
1.1.1.1 Syslog logging should be configured - user-id | CIS Palo Alto Firewall 9 v1.1.0 L1 | Palo_Alto | AUDIT AND ACCOUNTABILITY |
1.1.1.2 SNMPv3 traps should be configured | CIS Palo Alto Firewall 10 v1.2.0 L2 | Palo_Alto | AUDIT AND ACCOUNTABILITY |
1.1.1.2 SNMPv3 traps should be configured - configuration | CIS Palo Alto Firewall 9 v1.1.0 L2 | Palo_Alto | AUDIT AND ACCOUNTABILITY |
1.1.1.2 SNMPv3 traps should be configured - hip match | CIS Palo Alto Firewall 9 v1.1.0 L2 | Palo_Alto | AUDIT AND ACCOUNTABILITY |
1.1.1.2 SNMPv3 traps should be configured - ip-tag | CIS Palo Alto Firewall 9 v1.1.0 L2 | Palo_Alto | AUDIT AND ACCOUNTABILITY |
1.1.1.2 SNMPv3 traps should be configured - user-id | CIS Palo Alto Firewall 9 v1.1.0 L2 | Palo_Alto | AUDIT AND ACCOUNTABILITY |
1.10.1 Ensure 'logging' is enabled | CIS Cisco Firewall ASA 9 L1 v4.1.0 | Cisco | AUDIT AND ACCOUNTABILITY |
1.10.5 Ensure 'logging with the device ID' is configured correctly | CIS Cisco Firewall ASA 9 L1 v4.1.0 | Cisco | AUDIT AND ACCOUNTABILITY |
3.2.4 Ensure suspicious packets are logged - /etc/sysctl.conf /etc/sysctl.d/* net.ipv4.conf.default.log_martians=1 | CIS Amazon Linux 2 STIG v1.0.0 L1 | Unix | AUDIT AND ACCOUNTABILITY |
3.2.4 Ensure suspicious packets are logged - sysctl net.ipv4.conf.all.log_martians | CIS Aliyun Linux 2 L1 v1.0.0 | Unix | AUDIT AND ACCOUNTABILITY |
3.2.4 Ensure suspicious packets are logged - sysctl.conf sysctl.d net.ipv4.conf.all.log_martians | CIS Aliyun Linux 2 L1 v1.0.0 | Unix | AUDIT AND ACCOUNTABILITY |
3.2.4 Ensure suspicious packets are logged - sysctl.conf sysctl.d net.ipv4.conf.default.log_martians | CIS Aliyun Linux 2 L1 v1.0.0 | Unix | AUDIT AND ACCOUNTABILITY |
4.1.1.2 Ensure augenrules is enabled | CIS Oracle Linux 6 Server L2 v2.0.0 | Unix | AUDIT AND ACCOUNTABILITY |
4.1.1.2 Ensure augenrules is enabled | CIS Red Hat 6 Server L2 v3.0.0 | Unix | AUDIT AND ACCOUNTABILITY |
4.1.1.2 Ensure augenrules is enabled | CIS Red Hat 6 Workstation L2 v3.0.0 | Unix | AUDIT AND ACCOUNTABILITY |
4.1.1.3 Ensure audit logs are not automatically deleted | CIS SUSE Linux Enterprise Workstation 11 L2 v2.1.1 | Unix | AUDIT AND ACCOUNTABILITY |
4.1.1.3 Ensure audit logs are not automatically deleted | CIS SUSE Linux Enterprise Server 11 L2 v2.1.1 | Unix | AUDIT AND ACCOUNTABILITY |
4.1.2.2 Ensure audit logs are not automatically deleted | CIS Red Hat Enterprise Linux 7 STIG v2.0.0 L2 Server | Unix | AUDIT AND ACCOUNTABILITY |
4.1.2.2 Ensure audit logs are not automatically deleted | CIS SUSE Linux Enterprise 12 v3.1.0 L2 Server | Unix | AUDIT AND ACCOUNTABILITY |
4.1.2.2 Ensure audit logs are not automatically deleted | CIS SUSE Linux Enterprise 15 Server L2 v1.1.1 | Unix | AUDIT AND ACCOUNTABILITY |
4.1.2.2 Ensure audit logs are not automatically deleted | CIS SUSE Linux Enterprise 12 v3.1.0 L2 Workstation | Unix | AUDIT AND ACCOUNTABILITY |
4.1.2.2 Ensure audit logs are not automatically deleted | CIS Red Hat Enterprise Linux 7 STIG v2.0.0 L2 Workstation | Unix | AUDIT AND ACCOUNTABILITY |
4.1.2.2 Ensure audit logs are not automatically deleted | CIS SUSE Linux Enterprise 15 Workstation L2 v1.1.1 | Unix | AUDIT AND ACCOUNTABILITY |
4.1.11 Ensure use of privileged commands is collected | CIS Red Hat 6 Workstation L2 v3.0.0 | Unix | AUDIT AND ACCOUNTABILITY |
4.1.11 Ensure use of privileged commands is collected | CIS CentOS 6 Server L2 v3.0.0 | Unix | AUDIT AND ACCOUNTABILITY |
4.1.12 Ensure successful file system mounts are collected - auditctl 32-bit | CIS CentOS 6 Server L2 v3.0.0 | Unix | AUDIT AND ACCOUNTABILITY |
4.1.12 Ensure successful file system mounts are collected - auditctl 64-bit | CIS CentOS 6 Server L2 v3.0.0 | Unix | AUDIT AND ACCOUNTABILITY |
4.1.12 Ensure successful file system mounts are collected - auditctl 64-bit | CIS Oracle Linux 6 Server L2 v2.0.0 | Unix | AUDIT AND ACCOUNTABILITY |
4.1.12 Ensure successful file system mounts are collected - auditctl b64 | CIS Fedora 19 Family Linux Server L2 v1.0.0 | Unix | AUDIT AND ACCOUNTABILITY |
4.1.12 Ensure successful file system mounts are collected - b32 | CIS Fedora 19 Family Linux Server L2 v1.0.0 | Unix | AUDIT AND ACCOUNTABILITY |
4.1.12 Ensure successful file system mounts are collected - b64 | CIS Fedora 19 Family Linux Workstation L2 v1.0.0 | Unix | AUDIT AND ACCOUNTABILITY |
4.1.12 Ensure successful file system mounts are collected - rules.d 32-bit | CIS Red Hat 6 Workstation L2 v3.0.0 | Unix | AUDIT AND ACCOUNTABILITY |
4.1.12 Ensure successful file system mounts are collected - rules.d 64-bit | CIS Oracle Linux 6 Workstation L2 v2.0.0 | Unix | AUDIT AND ACCOUNTABILITY |
4.1.12 Ensure successful file system mounts are collected - rules.d 64-bit | CIS Red Hat 6 Server L2 v3.0.0 | Unix | AUDIT AND ACCOUNTABILITY |
4.1.12 Ensure successful file system mounts are collected - rules.d 64-bit | CIS Red Hat 6 Workstation L2 v3.0.0 | Unix | AUDIT AND ACCOUNTABILITY |
4.2 Ensure that auditing is enabled | CIS Apache Cassandra 3.11 L1 Unix Audit v1.0.0 | Unix | AUDIT AND ACCOUNTABILITY |
4.5 Ensure system notification is sent out when voume is 75% full | CIS Amazon Linux 2 STIG v1.0.0 L3 | Unix | AUDIT AND ACCOUNTABILITY |
5.3.14 Collect Successful File System Mounts - arch=b32 | CIS Red Hat Enterprise Linux 5 L2 v2.2.1 | Unix | AUDIT AND ACCOUNTABILITY |
5.3.14 Collect Successful File System Mounts - arch=b64 | CIS Red Hat Enterprise Linux 5 L2 v2.2.1 | Unix | AUDIT AND ACCOUNTABILITY |
5.3.15 Collect File Deletion Events by User - arch=b64 | CIS Red Hat Enterprise Linux 5 L2 v2.2.1 | Unix | AUDIT AND ACCOUNTABILITY |
5.4 Ensure all WildFire session information settings are enabled | CIS Palo Alto Firewall 10 v1.2.0 L1 | Palo_Alto | SYSTEM AND INFORMATION INTEGRITY |
5.4 Ensure all WildFire session information settings are enabled | CIS Palo Alto Firewall 11 v1.1.0 L1 | Palo_Alto | SYSTEM AND INFORMATION INTEGRITY |
5.5 Ensure all WildFire session information settings are enabled | CIS Palo Alto Firewall 9 v1.1.0 L1 | Palo_Alto | SYSTEM AND INFORMATION INTEGRITY |
6.3 Ensure to lockdown access logs to 'Administrator , Resource Administrator and Auditor ' roles only | CIS F5 Networks v1.0.0 L1 | F5 | AUDIT AND ACCOUNTABILITY |
6.12.3 Ensure Local Logging is Set for Firewall Events | CIS Juniper OS Benchmark v2.1.0 L1 | Juniper | AUDIT AND ACCOUNTABILITY |
6.12.4 Ensure Local Logging is Set for Authentication and Authorization Events | CIS Juniper OS Benchmark v2.1.0 L1 | Juniper | AUDIT AND ACCOUNTABILITY |
6.12.5 Ensure Local Logging is Set for Interactive-Commands | CIS Juniper OS Benchmark v2.1.0 L1 | Juniper | AUDIT AND ACCOUNTABILITY |
6.12.6 Ensure Local Logging is Set to Messages File | CIS Juniper OS Benchmark v2.1.0 L1 | Juniper | AUDIT AND ACCOUNTABILITY |