Audits
Settings
Links
Tenable Cloud
Tenable Community & Support
Tenable University
Theme
Light
Dark
Auto
Help
Plugins
Overview
Plugins Pipeline
Newest
Updated
Search
Nessus Families
WAS Families
NNM Families
LCE Families
Tenable OT Security Families
About Plugin Families
Release Notes
Audits
Overview
Newest
Updated
Search Audit Files
Search Items
References
Authorities
Documentation
Download All Audit Files
Indicators
Overview
Search
Indicators of Attack
Indicators of Exposure
CVEs
Overview
Newest
Updated
Search
Attack Path Techniques
Overview
Search
Links
Tenable Cloud
Tenable Community & Support
Tenable University
Settings
Theme
Light
Dark
Auto
Detections
Plugins
Overview
Plugins Pipeline
Release Notes
Newest
Updated
Search
Nessus Families
WAS Families
NNM Families
LCE Families
Tenable OT Security Families
About Plugin Families
Audits
Overview
Newest
Updated
Search Audit Files
Search Items
References
Authorities
Documentation
Download All Audit Files
Indicators
Overview
Search
Indicators of Attack
Indicators of Exposure
Analytics
CVEs
Overview
Newest
Updated
Search
Attack Path Techniques
Overview
Search
Audits
References
CCI
CCI-000172
CCI
CCI|CCI-000172
Title
Generate audit records for the event types defined in AU-2 c that include the audit record content defined in AU-3.
Reference Item Details
Reference:
CCI - DISA Control Correlation Identifier
Category:
2024
Audit Items
View all Reference Audit Items
Name
Plugin
Audit Name
4.1.3.10 Ensure use of privileged commands is collected
Unix
CIS Red Hat Enterprise Linux 7 STIG v2.0.0 STIG
4.1.3.11 Ensure unsuccessful unauthorized file access attempts are collected - creat EACCES 32 bit
Unix
CIS Red Hat Enterprise Linux 7 STIG v2.0.0 STIG
4.1.3.11 Ensure unsuccessful unauthorized file access attempts are collected - creat EACCES 64 bit
Unix
CIS Red Hat Enterprise Linux 7 STIG v2.0.0 STIG
4.1.3.11 Ensure unsuccessful unauthorized file access attempts are collected - creat EPERM 32 bit
Unix
CIS Red Hat Enterprise Linux 7 STIG v2.0.0 STIG
4.1.3.11 Ensure unsuccessful unauthorized file access attempts are collected - creat EPERM 64 bit
Unix
CIS Red Hat Enterprise Linux 7 STIG v2.0.0 STIG
4.1.3.11 Ensure unsuccessful unauthorized file access attempts are collected - ftruncate EACCES 32 bit
Unix
CIS Red Hat Enterprise Linux 7 STIG v2.0.0 STIG
4.1.3.11 Ensure unsuccessful unauthorized file access attempts are collected - ftruncate EACCES 64 bit
Unix
CIS Red Hat Enterprise Linux 7 STIG v2.0.0 STIG
4.1.3.11 Ensure unsuccessful unauthorized file access attempts are collected - ftruncate EPERM 32 bit
Unix
CIS Red Hat Enterprise Linux 7 STIG v2.0.0 STIG
4.1.3.11 Ensure unsuccessful unauthorized file access attempts are collected - ftruncate EPERM 64 bit
Unix
CIS Red Hat Enterprise Linux 7 STIG v2.0.0 STIG
4.1.3.11 Ensure unsuccessful unauthorized file access attempts are collected - open EACCES 32 bit
Unix
CIS Red Hat Enterprise Linux 7 STIG v2.0.0 STIG
4.1.3.11 Ensure unsuccessful unauthorized file access attempts are collected - open EACCES 64 bit
Unix
CIS Red Hat Enterprise Linux 7 STIG v2.0.0 STIG
4.1.3.11 Ensure unsuccessful unauthorized file access attempts are collected - open EPERM 32 bit
Unix
CIS Red Hat Enterprise Linux 7 STIG v2.0.0 STIG
4.1.3.11 Ensure unsuccessful unauthorized file access attempts are collected - open EPERM 64 bit
Unix
CIS Red Hat Enterprise Linux 7 STIG v2.0.0 STIG
4.1.3.11 Ensure unsuccessful unauthorized file access attempts are collected - openat EACCES 32 bit
Unix
CIS Red Hat Enterprise Linux 7 STIG v2.0.0 STIG
4.1.3.11 Ensure unsuccessful unauthorized file access attempts are collected - openat EACCES 64 bit
Unix
CIS Red Hat Enterprise Linux 7 STIG v2.0.0 STIG
4.1.3.11 Ensure unsuccessful unauthorized file access attempts are collected - openat EPERM 32 bit
Unix
CIS Red Hat Enterprise Linux 7 STIG v2.0.0 STIG
4.1.3.11 Ensure unsuccessful unauthorized file access attempts are collected - openat EPERM 64 bit
Unix
CIS Red Hat Enterprise Linux 7 STIG v2.0.0 STIG
4.1.3.11 Ensure unsuccessful unauthorized file access attempts are collected - truncate EACCES 32 bit
Unix
CIS Red Hat Enterprise Linux 7 STIG v2.0.0 STIG
4.1.3.11 Ensure unsuccessful unauthorized file access attempts are collected - truncate EACCES 64 bit
Unix
CIS Red Hat Enterprise Linux 7 STIG v2.0.0 STIG
4.1.3.11 Ensure unsuccessful unauthorized file access attempts are collected - truncate EPERM 32 bit
Unix
CIS Red Hat Enterprise Linux 7 STIG v2.0.0 STIG
4.1.3.11 Ensure unsuccessful unauthorized file access attempts are collected - truncate EPERM 64 bit
Unix
CIS Red Hat Enterprise Linux 7 STIG v2.0.0 STIG
4.1.3.12 Ensure discretionary access control permission modification events are collected - chmod 32 bit
Unix
CIS Red Hat Enterprise Linux 7 STIG v2.0.0 STIG
4.1.3.12 Ensure discretionary access control permission modification events are collected - chmod 64 bit
Unix
CIS Red Hat Enterprise Linux 7 STIG v2.0.0 STIG
4.1.3.12 Ensure discretionary access control permission modification events are collected - chown 32 bit
Unix
CIS Red Hat Enterprise Linux 7 STIG v2.0.0 STIG
4.1.3.12 Ensure discretionary access control permission modification events are collected - chown 64 bit
Unix
CIS Red Hat Enterprise Linux 7 STIG v2.0.0 STIG
4.1.3.12 Ensure discretionary access control permission modification events are collected - fchmod 32 bit
Unix
CIS Red Hat Enterprise Linux 7 STIG v2.0.0 STIG
4.1.3.12 Ensure discretionary access control permission modification events are collected - fchmod 64 bit
Unix
CIS Red Hat Enterprise Linux 7 STIG v2.0.0 STIG
4.1.3.12 Ensure discretionary access control permission modification events are collected - fchmodat 32 bit
Unix
CIS Red Hat Enterprise Linux 7 STIG v2.0.0 STIG
4.1.3.12 Ensure discretionary access control permission modification events are collected - fchmodat 64 bit
Unix
CIS Red Hat Enterprise Linux 7 STIG v2.0.0 STIG
4.1.3.12 Ensure discretionary access control permission modification events are collected - fchown 32 bit
Unix
CIS Red Hat Enterprise Linux 7 STIG v2.0.0 STIG
4.1.3.12 Ensure discretionary access control permission modification events are collected - fchown 64 bit
Unix
CIS Red Hat Enterprise Linux 7 STIG v2.0.0 STIG
4.1.3.12 Ensure discretionary access control permission modification events are collected - fchownat 4 bit
Unix
CIS Red Hat Enterprise Linux 7 STIG v2.0.0 STIG
4.1.3.12 Ensure discretionary access control permission modification events are collected - fchownat 32 bit
Unix
CIS Red Hat Enterprise Linux 7 STIG v2.0.0 STIG
4.1.3.12 Ensure discretionary access control permission modification events are collected - fchownat 64 bit
Unix
CIS Red Hat Enterprise Linux 7 STIG v2.0.0 STIG
4.008 - Auditing must be configured as required. - 'Account Logon -> Credential Validation'
Windows
DISA Windows Vista STIG v6r41
4.008 - Auditing must be configured as required. - 'Account Management -> Computer Account Management'
Windows
DISA Windows Vista STIG v6r41
4.008 - Auditing must be configured as required. - 'Account Management -> Other Account Management Events'
Windows
DISA Windows Vista STIG v6r41
4.008 - Auditing must be configured as required. - 'Account Management -> Security Group Management'
Windows
DISA Windows Vista STIG v6r41
4.008 - Auditing must be configured as required. - 'Account Management -> User Account Management'
Windows
DISA Windows Vista STIG v6r41
4.008 - Auditing must be configured as required. - 'Detailed Tracking -> Process Creation' successes.
Windows
DISA Windows Vista STIG v6r41
4.008 - Auditing must be configured as required. - 'Logon/Logoff -> Logoff' successes.
Windows
DISA Windows Vista STIG v6r41
4.008 - Auditing must be configured as required. - 'Logon/Logoff -> Logon'
Windows
DISA Windows Vista STIG v6r41
4.008 - Auditing must be configured as required. - 'Logon/Logoff -> Special Logon' successes.
Windows
DISA Windows Vista STIG v6r41
4.008 - Auditing must be configured as required. - 'Policy Change -> Audit Policy Change'
Windows
DISA Windows Vista STIG v6r41
4.008 - Auditing must be configured as required. - 'Policy Change -> Authentication Policy Change' successes.
Windows
DISA Windows Vista STIG v6r41
4.008 - Auditing must be configured as required. - 'Privilege Use -> Sensitive Privilege Use'
Windows
DISA Windows Vista STIG v6r41
4.008 - Auditing must be configured as required. - System -> IPSec Driver'
Windows
DISA Windows Vista STIG v6r41
4.008 - Auditing must be configured as required. - System -> Security State Change'
Windows
DISA Windows Vista STIG v6r41
4.008 - Auditing must be configured as required. - System -> Security System Extension'
Windows
DISA Windows Vista STIG v6r41
4.008 - Auditing must be configured as required. - System -> System Integrity'
Windows
DISA Windows Vista STIG v6r41