Alarms
|
Alarm Report
|
|
Malware Alarms
|
Asset
|
Asset Compliance Report
|
|
Asset Report
|
|
Availability Report
|
|
Vulnerabilities Report
|
Compliance |
Application Exploits
|
|
Business and Compliance
|
|
DFARS Default Account Usage |
|
DFARS Remote Access Report |
|
DFARS Unencrypted Traffic |
|
FERPA Default Account Usage |
|
FERPA Remote Access Report |
|
FERPA Unencrypted Traffic |
|
FISMA Report
|
|
GLBA: File Adds or Deletes |
|
GLBA: File Changes |
|
GLBA: Firewall User Changes |
|
GLBA: Group Changes |
|
GLBA: MAC Address Changes |
|
GLBA: Policy and Configuration Changes |
|
GLBA: Registry Changes |
|
GLBA: System Failed Logins |
|
GLBA: System Successful Logons |
|
GLBA: System Time Changes |
|
GLBA: User Account Changes |
|
GLBA: User Activity |
|
HIPAA Report
|
|
HIPAA: Account Lockouts
|
|
HIPAA: Account Unlock Report
|
|
HIPAA: Authentication Failed Logins
|
|
HIPAA: Database Failed Logons
|
|
HIPAA: Database Successful Logons
|
|
HIPAA: Failed Logins
|
|
HIPAA: Failed Logon to Firewall
|
|
HIPAA: FTP Failed Logons
|
|
HIPAA: FTP Successful Logons
|
|
HIPAA: List of identified ePHI assets
|
|
HIPAA: List of identified ePHI assets with Services
|
|
HIPAA: Password Change Status
|
|
HIPAA: Successful Logon to Firewall
|
|
HIPAA: System Failed Logins
|
|
HIPAA: System Successful Logons
|
|
ISO 27002: Accounts Locked Out |
|
ISO 27002: Accounts Unlocked |
|
ISO 27002: Active Directory Group Additions |
|
ISO 27002: Active Directory Group Removals |
|
ISO 27002: Administrative Logon |
|
ISO 27002: Antivirus Disabled |
|
ISO 27002: Antivirus Events Detected |
|
ISO 27002: Assets with Vulnerabilities |
|
ISO 27002: Database Failed Logons |
|
ISO 27002: Database Successful Logons |
|
ISO 27002: Failed Logon to Firewall |
|
ISO 27002: FTP Failed Logons |
|
ISO 27002: FTP Successful Logons |
|
ISO 27002: Identified Services on a Group of Systems |
|
ISO 27002: List of Identified Assets |
|
ISO 27002: Successful Logon to Firewall |
|
ISO 27002: System Failed Logons |
|
ISO 27002: System Successful Logons |
|
NERC CIP: IPv6 Detection
|
|
NERC CIPv5: Antivirus Details |
|
NERC CIPv5: Antivirus Disabled |
|
NERC CIPv5: Current Vulnerabilities Report |
|
NERC CIPv5: Database Failed Logons |
|
NERC CIPv5: Database Successful Logons |
|
NERC CIPv5: Failed Logon to Firewall |
|
NERC CIPv5: File Adds or Deletes |
|
NERC CIPv5: File Changes |
|
NERC CIPv5: FTP Failed Logons |
|
NERC CIPv5: FTP Successful Logons |
|
NERC CIPv5: List of identified BES Cyber Assets |
|
NERC CIPv5: List of identified BES Cyber Assets with Services |
|
NERC CIPv5: MAC Address Changes |
|
NERC CIPv5: New Software Installed |
|
NERC CIPv5: Password Change Status |
|
NERC CIPv5: Registry Adds or Deletes |
|
NERC CIPv5: Registry Changes |
|
NERC CIPv5: System Failed Logins |
|
NERC CIPv5: System Successful Logons |
|
NERC CIPv5: USM Appliance User Activity |
|
NIST 800-171 Default Account Usage |
|
NIST 800-171 Remote Access Report |
|
NIST 800-171 Unencrypted Traffic |
|
PCI 2.0 Report
|
|
PCI 3.0 Report
|
|
PCI DSS 3.2: All Antivirus Security Risk Events |
|
PCI DSS 3.2: All Virus Events |
|
PCI DSS 3.2: Encrypted Networks Having Unencrypted APs |
|
PCI DSS 3.2: Access Control Device Denied
|
|
PCI DSS 3.2: Account Lockouts
|
|
PCI DSS 3.2: Account Unlock Report
|
|
PCI DSS 3.2: Admin Access to Systems
|
|
PCI DSS 3.2: Antivirus Definition Updates
|
|
PCI DSS 3.2: Antivirus Disabled
|
|
PCI DSS 3.2: Antivirus Failed Updates
|
|
PCI DSS 3.2: Authentications with Default Credentials
|
|
PCI DSS 3.2: Cloaked Wireless Networks with Uncloaked APs |
|
PCI DSS 3.2: Database Configuration Changes
|
|
PCI DSS 3.2: Database Errors
|
|
PCI DSS 3.2: Database Failed Logins
|
|
PCI DSS 3.2: Database Successful Logins
|
|
PCI DSS 3.2: Database Users Added
|
|
PCI DSS 3.2: Database Users Removed
|
|
PCI DSS 3.2: Dropped or Denied Connections
|
|
PCI DSS 3.2: Encrypted HTTPS Connections
|
|
PCI DSS 3.2: Encrypted VPN Client Connections Accepted |
|
PCI DSS 3.2: Encrypted VPN Client Connections Failed
|
|
PCI DSS 3.2: Environment User Activity
|
|
PCI DSS 3.2: Failed Logins
|
|
PCI DSS 3.2: Firewall Configuration Changes
|
|
PCI DSS 3.2: Firewall Failed Authentication
|
|
PCI DSS 3.2: Firewall Intrusion Detection
|
|
PCI DSS 3.2: Firewall Successful Authentication
|
|
PCI DSS 3.2: Firewall User Changes
|
|
PCI DSS 3.2: Group Changes
|
|
PCI DSS 3.2: Infected Computers
|
|
PCI DSS 3.2: Information Security Policy Compliance Checks
|
|
PCI DSS 3.2: Information Security Policy Compliance Failed
|
|
PCI DSS 3.2: Intrusion Detection Events
|
|
PCI DSS 3.2: Security Device Policy Modifications
|
|
PCI DSS 3.2: Successful Logins
|
|
PCI DSS 3.2: Suspicious Clients on Wireless Networks
|
|
PCI DSS 3.2: Suspicious Database Events
|
|
PCI DSS 3.2: System Time Changes
|
|
PCI DSS 3.2: User Management Activity
|
|
PCI DSS 3.2: Vulnerability Details
|
|
PCI DSS 3.2: Wireless Networks
|
|
PCI DSS 3.2: Wireless Networks Using Weak Encryption
|
|
PCI: File Integrity Changes |
|
PCI: User Management Activity |
|
SOX Report
|
Raw Logs
|
Raw Logs
|
|
Raw Logs: Access
|
|
Raw Logs: Alarm
|
|
Raw Logs: Alert
|
|
Raw Logs: Anomaly Detection
|
|
Raw Logs: Antivirus
|
|
Raw Logs: Application
|
|
Raw Logs: Application Firewall
|
|
Raw Logs: Applications
|
|
Raw Logs: Authentication
|
|
Raw Logs: Authentication and DHCP
|
|
Raw Logs: Availability
|
|
Raw Logs: Data Protection
|
|
Raw Logs: Database
|
|
Raw Logs: Denial of Service
|
|
Raw Logs: Exploit
|
|
Raw Logs: Firewall
|
|
Raw Logs: Honeypot
|
|
Raw Logs: Info
|
|
Raw Logs: Infrastructure Monitoring
|
|
Raw Logs: Intrusion Detection
|
|
Raw Logs: Intrusion Prevention
|
|
Raw Logs: Inventory
|
|
Raw Logs: Mail Security
|
|
Raw Logs: Mail Server
|
|
Raw Logs: Malware
|
|
Raw Logs: Management Platform
|
|
Raw Logs: Network
|
|
Raw Logs: Network Discovery
|
|
Raw Logs: Operating System
|
|
Raw Logs: Other Devices
|
|
Raw Logs: Policy
|
|
Raw Logs: Proxy
|
|
Raw Logs: Reconnaissance
|
|
Raw Logs: Router/Switch
|
|
Raw Logs: Server
|
|
Raw Logs: Suspicious
|
|
Raw Logs: System
|
|
Raw Logs: Unified threat management
|
|
Raw Logs: Voip
|
|
Raw Logs: VPN
|
|
Raw Logs: Vulnerability Scanner
|
|
Raw Logs: Web Server
|
|
Raw Logs: Wireless
|
|
Raw Logs: Wireless Security/Management
|
Security Events
|
Activity from OTX Pulses
|
|
Activity with OTX IP Reputation Information
|
|
Database Activity
|
|
Events by Data Source
|
|
Events by Product Type
|
|
Events by Source Category
|
|
Geographic Report
|
|
Security Events: Access
|
|
Security Events: Account Changes
|
|
Security Events: Admin Access
|
|
Security Events: Alarm
|
|
Security Events: Alert
|
|
Security Events: Anomaly Detection
|
|
Security Events: Antivirus
|
|
Security Events: Application
|
|
Security Events: Application Firewall
|
|
Security Events: Applications
|
|
Security Events: Authentication
|
|
Security Events: Authentication and DHCP
|
|
Security Events: Availability
|
|
Security Events: Data Protection
|
|
Security Events: Database
|
|
Security Events: Denial of Service
|
|
Security Events: Exploit
|
|
Security Events: Firewall
|
|
Security Events: Honeypot
|
|
Security Events: Impacts
|
|
Security Events: Info
|
|
Security Events: Infrastructure Monitoring
|
|
Security Events: Intrusion Detection
|
|
Security Events: Intrusion Prevention
|
|
Security Events: Inventory
|
|
Security Events: Mail Security
|
|
Security Events: Mail Server
|
|
Security Events: Malware
|
|
Security Events: Management Platform
|
|
Security Events: Network
|
|
Security Events: Network Discovery
|
|
Security Events: Operating System
|
|
Security Events: Other Devices
|
|
Security Events: Policy
|
|
Security Events: Proxy
|
|
Security Events: Reconnaissance
|
|
Security Events: Report
|
|
Security Events: Router/Switch
|
|
Security Events: Server
|
|
Security Events: Suspicious
|
|
Security Events: System
|
|
Security Events: Unified threat management
|
|
Security Events: User Activity
|
|
Security Events: VoIP |
|
Security Events: VPN
|
|
Security Events: Vulnerability Scanner
|
|
Security Events: Web Server
|
|
Security Events: Wireless
|
|
Security Events: Wireless Security/Management
|
|
Unique Signatures by Data Source
|
|
Unique Signatures by Product Type
|
|
Unique Signatures by Source Category
|
|
Honeypot Activity
|
|
Policy and Configuration Changes
|
|
Security Operations Report
|
Tickets
|
Ticket Report
|
|
Ticket Status
|
User Activity
|
User Activity
|