CCI-000067
Employ automated mechanisms to monitor remote access methods.
If the BlackBerry Docs service is installed on the BlackBerry Enterprise Mobility Server (BEMS), it must be configured to enable audit logs.
2 rules found Severity: Medium

The audit log configuration level must be set to request in the Universal Control Plane (UCP) component of Docker Enterprise.
1 rule found Severity: Medium

The host operating systems auditing policies for the Docker Engine - Enterprise component of Docker Enterprise must be set.
1 rule found Severity: Medium

The FortiGate firewall must use organization-defined filtering rules that apply to the monitoring of remote access traffic for the traffic from the VPN access points.
1 rule found Severity: Medium

The MQ Appliance messaging server must provide access logging that ensures users who are granted a privileged role (or roles) have their privileged activity logged.
1 rule found Severity: Medium

The WebSphere Application Server automatic repository checkpoints must be enabled to track configuration changes.
1 rule found Severity: Medium

The WebSphere Application Server groups in the user registry mapped to WebSphere auditor roles must be configured in accordance with the security plan.
1 rule found Severity: Medium

The WebSphere Application Server users in the WebSphere auditor role must be configured in accordance with the System Security Plan.
1 rule found Severity: Medium

1 rule found Severity: Medium

1 rule found Severity: Medium

OHS must have the LoadModule log_config_module directive enabled to generate information to be used by external applications or entities to monitor and control remote access.
1 rule found Severity: Medium

OHS must have the OraLogMode set to Oracle Diagnostic Logging text mode to generate information to be used by external applications or entities to monitor and control remote access.
1 rule found Severity: Medium

OHS must have a log directory location defined to generate information for use by external applications or entities to monitor and control remote access.
1 rule found Severity: Medium

OHS must have the OraLogSeverity directive defined to generate adequate information to be used by external applications or entities to monitor and control remote access.
1 rule found Severity: Medium

OHS must have the log rotation parameter set to allow generated information to be used by external applications or entities to monitor and control remote access.
1 rule found Severity: Medium

OHS must have a log format defined to generate adequate information to be used by external applications or entities to monitor and control remote access.
1 rule found Severity: Medium

OHS must have a SSL log format defined to allow generated information to be used by external applications or entities to monitor and control remote access in accordance with the categorization of data hosted by the web server.
1 rule found Severity: Medium

OHS must have a log file defined for each site/virtual host to capture information to be used by external applications or entities to monitor and control remote access.
1 rule found Severity: Medium

Oracle WebLogic must employ automated mechanisms to facilitate the monitoring and control of remote access methods.
1 rule found Severity: Medium

Oracle WebLogic must ensure remote sessions for accessing security functions and security-relevant information are audited.
1 rule found Severity: Medium

The Riverbed Optimization System (RiOS) must be configured to ensure inbound and outbound traffic is forwarded to be inspected by the firewall and IDPS in compliance with remote access security policies.
1 rule found Severity: Medium

If Symantec ProxySG filters externally initiated traffic, reverse proxy services must be configured.
1 rule found Severity: Medium

Symantec ProxySG providing intermediary services for remote access communications traffic must ensure outbound traffic is monitored for compliance with remote access security policies.
1 rule found Severity: Medium

1 rule found Severity: Medium

The macOS system must monitor remote access methods and generate audit records when successful/unsuccessful attempts to access/modify privileges occur.
2 rules found Severity: Medium

Inbound exceptions to the firewall on domain workstations must only allow authorized remote management hosts.
1 rule found Severity: Medium

The BIG-IP Core implementation must be configured to monitor inbound traffic for remote access policy compliance when accepting connections to virtual servers.
1 rule found Severity: Medium

The Cisco ASA must be configured to restrict VPN traffic according to organization-defined filtering rules.
1 rule found Severity: Medium

The F5 BIG-IP appliance providing intermediary services for remote access communications traffic must ensure inbound and outbound traffic is monitored for compliance with remote access security policies.
1 rule found Severity: Medium

The F5 BIG-IP appliance that filters traffic from the VPN access points must be configured with organization-defined filtering rules that apply to the monitoring of remote access traffic.
1 rule found Severity: Medium

SSMC web server must generate information to be used by external applications or entities to monitor and control remote access.
3 rules found Severity: Medium

1 rule found Severity: Medium

2 rules found Severity: Medium

1 rule found Severity: Medium

1 rule found Severity: Medium

1 rule found Severity: Medium

The web server must generate information to be used by external applications or entities to monitor and control remote access.
1 rule found Severity: Medium

If a VPN is used in the AD implementation, the traffic must be inspected by the network Intrusion detection system (IDS).
1 rule found Severity: Medium

Apple iOS/iPadOS 18 must implement the management setting: require the user to enter a password when connecting to an AirPlay-enabled device.
1 rule found Severity: Low

Apple iOS/iPadOS 18 must implement the management setting: require passcode for incoming Airplay connection requests.
1 rule found Severity: Low

1 rule found Severity: Medium

1 rule found Severity: Medium

The ALG providing intermediary services for remote access communications traffic must ensure inbound and outbound traffic is monitored for compliance with remote access security policies.
1 rule found Severity: Medium

The application server must ensure remote sessions for accessing security functions and security-relevant information are logged.
1 rule found Severity: Medium

1 rule found Severity: Medium

The firewall that filters traffic from the VPN access points must be configured with organization-defined filtering rules that apply to the monitoring of remote access traffic.
1 rule found Severity: Medium

IBM z/OS SMF recording options for the FTP Server must be configured to write SMF records for all eligible events.
2 rules found Severity: Medium

IBM z/OS SMF recording options for the SSH daemon must be configured to write SMF records for all eligible events.
3 rules found Severity: Medium

2 rules found Severity: Medium

2 rules found Severity: Medium

3 rules found Severity: Medium

IBM z/OS SMF recording options for the FTP server must be configured to write SMF records for all eligible events.
1 rule found Severity: Medium

1 rule found Severity: Medium

1 rule found Severity: Medium

The Juniper SRX Services Gateway VPN device also fulfills the role of IDPS in the architecture, the device must inspect the VPN traffic in compliance with DoD IDPS requirements.
1 rule found Severity: Medium

SharePoint must ensure remote sessions for accessing security functions and security-relevant information are audited.
1 rule found Severity: Medium

1 rule found Severity: Medium

The Palo Alto Networks security platform, if used to provide intermediary services for remote access communications traffic (TLS or SSL decryption), must ensure inbound and outbound traffic is monitored for compliance with remote access security policies.
1 rule found Severity: Medium

2 rules found Severity: Medium

2 rules found Severity: Low

1 rule found Severity: Medium

1 rule found Severity: Medium

1 rule found Severity: Medium

1 rule found Severity: Medium

1 rule found Severity: Medium

1 rule found Severity: Medium

The vCenter ESX Agent Manager service must produce log records containing sufficient information regarding event details.
2 rules found Severity: Medium

1 rule found Severity: Medium

The Security Token Service must record user access in a format that enables monitoring of remote access.
1 rule found Severity: Medium

The vCenter Lookup service must produce log records containing sufficient information regarding event details.
2 rules found Severity: Medium

The vCenter Perfcharts service must produce log records containing sufficient information regarding event details.
2 rules found Severity: Medium

2 rules found Severity: Medium

2 rules found Severity: Medium

The vCenter STS service must produce log records containing sufficient information regarding event details.
2 rules found Severity: Medium

The vCenter UI service must produce log records containing sufficient information regarding event details.
2 rules found Severity: Medium

2 rules found Severity: Medium
