CCI-000172
Generate audit records for the event types defined in AU-2 c that include the audit record content defined in AU-3.
34 rules found Severity: Medium

33 rules found Severity: Medium

33 rules found Severity: Medium

34 rules found Severity: Medium

33 rules found Severity: Medium

33 rules found Severity: Medium

33 rules found Severity: Medium

34 rules found Severity: Medium

33 rules found Severity: Medium

34 rules found Severity: Medium

33 rules found Severity: Medium

33 rules found Severity: Medium

33 rules found Severity: Medium

33 rules found Severity: Medium

31 rules found Severity: Medium

33 rules found Severity: Medium

25 rules found Severity: Medium

25 rules found Severity: Medium

27 rules found Severity: Medium

28 rules found Severity: Medium

26 rules found Severity: Medium

31 rules found Severity: Medium

31 rules found Severity: Medium

31 rules found Severity: Medium

31 rules found Severity: Medium

7 rules found Severity: Medium

26 rules found Severity: Medium

13 rules found Severity: Medium

13 rules found Severity: Medium

13 rules found Severity: Medium

13 rules found Severity: Medium

13 rules found Severity: Medium

13 rules found Severity: Medium

13 rules found Severity: Medium

11 rules found Severity: Medium

14 rules found Severity: Medium

20 rules found Severity: Medium

20 rules found Severity: Medium

20 rules found Severity: Medium

20 rules found Severity: Medium

13 rules found Severity: Medium

20 rules found Severity: Medium

13 rules found Severity: Medium

18 rules found Severity: Medium

13 rules found Severity: Medium

20 rules found Severity: Medium

13 rules found Severity: Medium

20 rules found Severity: Medium

20 rules found Severity: Medium

18 rules found Severity: Medium

18 rules found Severity: Medium

12 rules found Severity: Medium

13 rules found Severity: Medium

20 rules found Severity: Medium

20 rules found Severity: Medium

23 rules found Severity: Medium

19 rules found Severity: Medium

19 rules found Severity: Medium

20 rules found Severity: Medium

16 rules found Severity: Medium

12 rules found Severity: Medium

10 rules found Severity: Medium

10 rules found Severity: Medium

18 rules found Severity: Medium

2 rules found Severity: Medium

5 rules found Severity: Medium

2 rules found Severity: Medium

4 rules found Severity: Medium

4 rules found Severity: Medium

4 rules found Severity: Medium

3 rules found Severity: Medium

2 rules found Severity: Medium

1 rule found Severity: Medium

The Akamai Luna Portal must generate audit records when successful/unsuccessful attempts to access privileges occur.
1 rule found Severity: Low

The Arista Multilayer Switch must generate audit records when successful/unsuccessful attempts to access privileges occur.
1 rule found Severity: Low

The Arista Multilayer Switch must generate audit records for privileged activities or other system-level access.
1 rule found Severity: Medium

The Arista Multilayer Switch must generate audit records showing starting and ending time for administrator access to the system.
1 rule found Severity: Medium

The Arista Multilayer Switch must generate audit records when concurrent logons from different workstations occur.
1 rule found Severity: Medium

The Arista Multilayer Switch must generate audit records for all account creations, modifications, disabling, and termination events.
1 rule found Severity: Medium

1 rule found Severity: Medium

The CA API Gateway must generate audit records showing starting and ending time for administrator access to the system.
1 rule found Severity: Medium

The CA API Gateway must generate audit records when concurrent logons from different workstations occur.
1 rule found Severity: Medium

The CA API Gateway providing user access control intermediary services must generate audit records when successful/unsuccessful logon attempts occur.
1 rule found Severity: Medium

The CA API Gateway providing user access control intermediary services must generate audit records showing starting and ending time for user access to the system.
1 rule found Severity: Medium

1 rule found Severity: Medium

The DBN-6300 must generate audit records when successful/unsuccessful attempts to modify administrator privileges occur.
1 rule found Severity: Medium

The DBN-6300 must generate audit records when successful/unsuccessful attempts to delete administrator privileges occur.
1 rule found Severity: Medium

1 rule found Severity: Medium

1 rule found Severity: Medium

The DBN-6300 must generate audit records showing starting and ending time for administrator access to the system.
1 rule found Severity: Medium

1 rule found Severity: Medium

The DBN-6300 must generate audit records for all account creation, modification, disabling, and termination events.
1 rule found Severity: Medium

The audit log configuration level must be set to request in the Universal Control Plane (UCP) component of Docker Enterprise.
1 rule found Severity: Medium

The host operating systems auditing policies for the Docker Engine - Enterprise component of Docker Enterprise must be set.
1 rule found Severity: Medium

An appropriate Docker Engine - Enterprise log driver plugin must be configured to collect audit events from Universal Control Plane (UCP) and Docker Trusted Registry (DTR).
1 rule found Severity: Medium

The FortiGate device must generate audit records when successful/unsuccessful attempts to modify administrator privileges occur.
1 rule found Severity: Medium

The FortiGate device must generate audit records when successful/unsuccessful attempts to delete administrator privileges occur.
1 rule found Severity: Medium

1 rule found Severity: Medium

The FortiGate device must generate audit records for privileged activities or other system-level access.
1 rule found Severity: Medium

The FortiGate device must generate audit records showing starting and ending time for administrator access to the system.
1 rule found Severity: Medium

The FortiGate device must generate audit records when concurrent logons from different workstations occur.
1 rule found Severity: Medium

The FortiGate firewall must generate traffic log records when traffic is denied, restricted, or discarded.
1 rule found Severity: Medium

The FortiGate firewall must generate traffic log records when attempts are made to send packets between security zones that are not authorized to communicate.
1 rule found Severity: Medium

The HP FlexFabric Switch must generate audit records when successful/unsuccessful attempts to access privileges occur.
1 rule found Severity: Medium

The HP FlexFabric Switch must generate audit records when successful/unsuccessful attempts to modify administrator privileges occur.
1 rule found Severity: Medium

The HP FlexFabric Switch must generate audit records when successful/unsuccessful attempts to delete administrator privileges occur.
1 rule found Severity: Medium

The HP FlexFabric Switch must generate audit records when successful/unsuccessful logon attempts occur.
1 rule found Severity: Medium

The HP FlexFabric Switch must generate audit records for privileged activities or other system-level access.
1 rule found Severity: Medium

The HP FlexFabric Switch must generate audit records showing starting and ending time for administrator access to the system.
1 rule found Severity: Medium

The HP FlexFabric Switch must generate audit records when concurrent logons from different workstations occur.
1 rule found Severity: Medium

The HP FlexFabric Switch must generate audit records for all account creations, modifications, disabling, and termination events.
1 rule found Severity: Medium

The HYCU server must generate audit records when successful/unsuccessful attempts to access privileges occur.
1 rule found Severity: Medium

The HYCU server must generate audit records when successful/unsuccessful attempts to modify or delete administrator privileges occur.
1 rule found Severity: Medium

1 rule found Severity: Medium

1 rule found Severity: Medium

The HYCU server must initiate session auditing upon startup and produce audit log records containing sufficient information to establish what type of event occurred.
1 rule found Severity: Medium

1 rule found Severity: Medium

DB2 must generate audit records when unsuccessful attempts to retrieve privileges/permissions occur.
1 rule found Severity: Medium

1 rule found Severity: Medium

The MQ Appliance messaging server must provide access logging that ensures users who are granted a privileged role (or roles) have their privileged activity logged.
1 rule found Severity: Medium

1 rule found Severity: Medium

DB2 must generate audit records when categorized information (e.g., classification levels/security levels) are accessed.
1 rule found Severity: Medium

DB2 must generate audit records when unsuccessful attempts to access categorized information (e.g., classification levels/security levels) occur.
1 rule found Severity: Medium

1 rule found Severity: Medium

1 rule found Severity: Medium

1 rule found Severity: Medium

1 rule found Severity: Medium

1 rule found Severity: Medium

DB2 must generate audit records when categorized information (e.g., classification levels/security levels) is modified.
1 rule found Severity: Medium

DB2 must generate audit records when unsuccessful attempts to modify categorized information (e.g., classification levels/security levels) occur.
1 rule found Severity: Medium

1 rule found Severity: Medium

1 rule found Severity: Medium

1 rule found Severity: Medium

DB2 must generate audit records when categorized information (e.g., classification levels/security levels) is deleted.
1 rule found Severity: Medium

DB2 must generate audit records when unsuccessful attempts to delete categorized information (e.g., classification levels/security levels) occur.
1 rule found Severity: Medium

1 rule found Severity: Medium

1 rule found Severity: Medium

1 rule found Severity: Medium

DB2 must generate audit records when unsuccessful attempts to execute privileged activities or other system-level access occur.
1 rule found Severity: Medium

DB2 must generate audit records showing starting and ending time for user access to the database(s).
1 rule found Severity: Medium

DB2 must generate audit records when concurrent logons/connections by the same user from different workstations occur.
1 rule found Severity: Medium

1 rule found Severity: Medium

1 rule found Severity: Medium

1 rule found Severity: Medium

1 rule found Severity: Medium

The WebSphere Application Server must generate log records when successful/unsuccessful attempts to access subject privileges occur.
1 rule found Severity: Low

The MQ Appliance network device must generate audit records when concurrent logons from different workstations occur.
1 rule found Severity: Medium

The MQ Appliance network device must generate audit records for all account creations, modifications, disabling, and termination events.
1 rule found Severity: Medium

1 rule found Severity: Medium

Trace or Audit records must be generated when categorized information (e.g., classification levels/security levels) is accessed.
1 rule found Severity: Medium

Trace or Audit records must be generated when unsuccessful attempts to access categorized information (e.g., classification levels/security levels) occur.
1 rule found Severity: Medium

SQL Server must generate Trace or Audit records when privileges/permissions are modified via locally-defined security objects.
1 rule found Severity: Medium

SQL Server must generate Trace or Audit records when unsuccessful attempts to modify privileges/permissions via locally-defined security objects occur.
1 rule found Severity: Medium

1 rule found Severity: Medium

SQL Server must generate Trace or Audit records when unsuccessful accesses to designated objects occur.
1 rule found Severity: Medium

SQL Server must generate Trace or Audit records when successful accesses to designated objects occur.
1 rule found Severity: Medium

Trace or Audit records must be generated when unsuccessful attempts to delete categorized information (e.g., classification levels/security levels) occur.
1 rule found Severity: Medium

Trace or Audit records must be generated when categorized information (e.g., classification levels/security levels) is deleted.
1 rule found Severity: Medium

SQL Server must generate Trace or Audit records when unsuccessful attempts to drop locally-defined security objects occur.
1 rule found Severity: Medium

1 rule found Severity: Medium

SQL Server must generate Trace or Audit records when unsuccessful attempts to modify locally-defined security objects occur.
1 rule found Severity: Medium

Trace or Audit records must be generated when categorized information (e.g., classification levels/security levels) is created.
1 rule found Severity: Medium

Trace or Audit records must be generated when unsuccessful attempts to create categorized information (e.g., classification levels/security levels) occur.
1 rule found Severity: Medium

Trace or Audit records must be generated when categorized information (e.g., classification levels/security levels) is modified.
1 rule found Severity: Medium

Trace or Audit records must be generated when unsuccessful attempts to modify categorized information (e.g., classification levels/security levels) occur.
1 rule found Severity: Medium

Where SQL Server Audit is in use, SQL Server must generate audit records when privileges/permissions are retrieved.
1 rule found Severity: Medium

Where SQL Server Audit is in use, SQL Server must generate audit records when unsuccessful attempts to retrieve privileges/permissions occur.
1 rule found Severity: Medium

1 rule found Severity: Medium

SQL Server must produce Trace or Audit records when unsuccessful attempts to access security objects occur.
1 rule found Severity: Medium

1 rule found Severity: Medium

SQL Server must generate Trace or Audit records when unsuccessful attempts to add privileges/permissions occur.
1 rule found Severity: Medium

1 rule found Severity: Medium

SQL Server must generate Trace or Audit records when unsuccessful attempts to delete privileges/permissions occur.
1 rule found Severity: Medium

1 rule found Severity: Medium

SQL Server must generate Trace or Audit records when unsuccessful logons or connection attempts occur.
1 rule found Severity: Medium

SQL Server must generate Trace or Audit records for all privileged activities or other system-level access.
1 rule found Severity: Medium

SQL Server must generate Trace or Audit records when unsuccessful attempts to execute privileged activities or other system-level access occur.
1 rule found Severity: Medium

1 rule found Severity: Medium

SQL Server must generate Trace or Audit records when concurrent logons/connections by the same user from different workstations occur.
1 rule found Severity: Medium

Nutanix AOS must produce audit records containing the full-text recording of successful and unsuccessful uses and variations of the chown privileged commands.
1 rule found Severity: Medium

Nutanix AOS must produce audit records containing the full-text recording of successful and unsuccessful uses and variations of the creat privileged commands.
1 rule found Severity: Medium

Nutanix AOS must produce audit records containing the full-text recording of successful and unsuccessful uses and variations of the open-related privileged commands.
1 rule found Severity: Medium

Nutanix AOS must produce audit records containing the full-text recording of successful and unsuccessful uses and variations of the truncate-related privileged commands.
1 rule found Severity: Medium

1 rule found Severity: Medium

Nutanix AOS must generate audit records when successful/unsuccessful attempts to access categories of information (e.g., classification levels) occur.
1 rule found Severity: Medium

Nutanix AOS must generate audit records when successful/unsuccessful attempts to modify privileges occur.
1 rule found Severity: Medium

Nutanix AOS must generate audit records when successful/unsuccessful attempts to modify security objects occur.
1 rule found Severity: Medium

Nutanix AOS must generate audit records when successful/unsuccessful attempts to modify categories of information occur.
1 rule found Severity: Medium

1 rule found Severity: Medium

1 rule found Severity: Medium

1 rule found Severity: Medium

1 rule found Severity: Medium

Nutanix AOS must generate audit records when concurrent logons to the same account occur from different sources.
1 rule found Severity: Medium

1 rule found Severity: Medium

1 rule found Severity: Medium

Nutanix AOS must generate audit records for all account creations, modifications, disabling, and termination events.
1 rule found Severity: Medium

Oracle WebLogic must provide access logging that ensures users who are granted a privileged role (or roles) have their privileged activity logged.
1 rule found Severity: Medium

1 rule found Severity: Low

Symantec ProxySG providing user access control intermediary services must generate audit records when successful/unsuccessful logon attempts occur.
1 rule found Severity: Medium

Symantec ProxySG providing user access control intermediary services must generate audit records showing starting and ending time for user access to the system.
1 rule found Severity: Medium

Symantec ProxySG providing user access control intermediary services must generate audit records when successful/unsuccessful attempts to access web resources occur.
1 rule found Severity: Medium

The NSX-T Manager must generate audit records when successful/unsuccessful attempts to delete administrator privileges occur.
1 rule found Severity: Medium

The NSX-T Tier-1 Gateway Firewall must generate traffic log entries containing information to establish the details of the event.
1 rule found Severity: Low

The macOS system must generate audit records for all account creations, modifications, disabling, and termination events; privileged activities or other system-level access; all kernel module load, unload, and restart actions; all program initiations; and organizationally defined events for all non-local maintenance and diagnostic sessions.
1 rule found Severity: Medium

The macOS system must monitor remote access methods and generate audit records when successful/unsuccessful attempts to access/modify privileges occur.
2 rules found Severity: Medium

The macOS system must audit the enforcement actions used to restrict access associated with changes to the system.
2 rules found Severity: Medium

The macOS system must generate audit records for DoD-defined events such as successful/unsuccessful logon attempts, successful/unsuccessful direct access attempts, starting and ending time for user access, and concurrent logons to the same account from different sources.
1 rule found Severity: Medium

The Ubuntu operating system must generate audit records for the use and modification of the tallylog file.
2 rules found Severity: Medium

The Ubuntu operating system must generate audit records for the use and modification of faillog file.
2 rules found Severity: Medium

The Ubuntu operating system must generate audit records for the use and modification of the lastlog file.
2 rules found Severity: Medium

The Ubuntu operating system must generate audit records for privileged activities or other system-level access.
1 rule found Severity: Medium

2 rules found Severity: Medium

2 rules found Severity: Medium

2 rules found Severity: Medium

The Ubuntu operating system must generate audit records for all account creations, modifications, disabling, and termination events that affect /etc/passwd.
2 rules found Severity: Medium

The Ubuntu operating system must generate audit records for all account creations, modifications, disabling, and termination events that affect /etc/group.
2 rules found Severity: Medium

The Ubuntu operating system must generate audit records for all account creations, modifications, disabling, and termination events that affect /etc/gshadow.
2 rules found Severity: Medium

The Ubuntu operating system must generate audit records for all account creations, modifications, disabling, and termination events that affect /etc/shadow.
2 rules found Severity: Medium

The Ubuntu operating system must generate audit records for all account creations, modifications, disabling, and termination events that affect /etc/security/opasswd.
1 rule found Severity: Medium

The Ubuntu operating system must produce audit records and reports containing information to establish when, where, what type, the source, and the outcome for all DoD-defined auditable events and actions in near real time.
2 rules found Severity: Medium

The Ubuntu operating system must generate audit records for successful/unsuccessful uses of the su command.
2 rules found Severity: Medium

The Ubuntu operating system must generate audit records for successful/unsuccessful uses of the chfn command.
2 rules found Severity: Medium

The Ubuntu operating system must generate audit records for successful/unsuccessful uses of the mount command.
2 rules found Severity: Medium

The Ubuntu operating system must generate audit records for successful/unsuccessful uses of the umount command.
2 rules found Severity: Medium

The Ubuntu operating system must generate audit records for successful/unsuccessful uses of the ssh-agent command.
2 rules found Severity: Medium

The Ubuntu operating system must generate audit records for successful/unsuccessful uses of the ssh-keysign command.
2 rules found Severity: Medium

The Ubuntu operating system must generate audit records for any usage of the setxattr, fsetxattr, lsetxattr, removexattr, fremovexattr, and lremovexattr system calls.
1 rule found Severity: Medium

The Ubuntu operating system must generate audit records for successful/unsuccessful uses of the chown, fchown, fchownat, and lchown system calls.
2 rules found Severity: Medium

The Ubuntu operating system must generate audit records for successful/unsuccessful uses of the chmod, fchmod, and fchmodat system calls.
2 rules found Severity: Medium

The Ubuntu operating system must generate audit records for successful/unsuccessful uses of the creat, open, openat, open_by_handle_at, truncate, and ftruncate system calls.
2 rules found Severity: Medium

The Ubuntu operating system must generate audit records for successful/unsuccessful uses of the sudo command.
2 rules found Severity: Medium

The Ubuntu operating system must generate audit records for successful/unsuccessful uses of the sudoedit command.
2 rules found Severity: Medium

The Ubuntu operating system must generate audit records for successful/unsuccessful uses of the chsh command.
2 rules found Severity: Medium

The Ubuntu operating system must generate audit records for successful/unsuccessful uses of the newgrp command.
2 rules found Severity: Medium

The Ubuntu operating system must generate audit records for successful/unsuccessful uses of the chcon command.
2 rules found Severity: Medium

The Ubuntu operating system must generate audit records for successful/unsuccessful uses of the apparmor_parser command.
2 rules found Severity: Medium

The Ubuntu operating system must generate audit records for successful/unsuccessful uses of the setfacl command.
2 rules found Severity: Medium

The Ubuntu operating system must generate audit records for successful/unsuccessful uses of the chacl command.
2 rules found Severity: Medium

The Ubuntu operating system must generate audit records for successful/unsuccessful uses of the passwd command.
2 rules found Severity: Medium

The Ubuntu operating system must generate audit records for successful/unsuccessful uses of the unix_update command.
2 rules found Severity: Medium

The Ubuntu operating system must generate audit records for successful/unsuccessful uses of the gpasswd command.
2 rules found Severity: Medium

The Ubuntu operating system must generate audit records for successful/unsuccessful uses of the chage command.
2 rules found Severity: Medium

The Ubuntu operating system must generate audit records for successful/unsuccessful uses of the usermod command.
2 rules found Severity: Medium

The Ubuntu operating system must generate audit records for successful/unsuccessful uses of the crontab command.
2 rules found Severity: Medium

The Ubuntu operating system must generate audit records for successful/unsuccessful uses of the pam_timestamp_check command.
2 rules found Severity: Medium

The Ubuntu operating system must generate audit records upon successful/unsuccessful use of unlink, unlinkat, rename, renameat, and rmdir system calls.
1 rule found Severity: Medium

The Ubuntu operating system must generate records for successful/unsuccessful uses of init_module or finit_module syscalls.
1 rule found Severity: Medium

The Ubuntu operating system must generate records for successful/unsuccessful uses of delete_module syscall and when unloading dynamic kernel modules.
1 rule found Severity: Medium

The Ubuntu operating system must generate audit records when successful/unsuccessful attempts to use modprobe command.
2 rules found Severity: Medium

The Ubuntu operating system must generate audit records when successful/unsuccessful attempts to use the kmod command.
2 rules found Severity: Medium

The Ubuntu operating system must generate audit records when successful/unsuccessful attempts to use the fdisk command.
2 rules found Severity: Medium

MongoDB must provide audit record generation for DoD-defined auditable events within all DBMS/database components.
2 rules found Severity: Medium

5 rules found Severity: Medium

Windows Defender Firewall with Advanced Security must log dropped packets when connected to a domain.
1 rule found Severity: Low

Windows Defender Firewall with Advanced Security must log dropped packets when connected to a private network.
1 rule found Severity: Low

Windows Defender Firewall with Advanced Security must log dropped packets when connected to a public network.
1 rule found Severity: Low

The DBMS must generate audit records for the DoD-selected list of auditable events, to the extent such information is available.
2 rules found Severity: Medium

PostgreSQL must generate audit records when categorized information (e.g., classification levels/security levels) is accessed.
2 rules found Severity: Medium

3 rules found Severity: Medium

3 rules found Severity: Medium

PostgreSQL must generate audit records showing starting and ending time for user access to the database(s).
3 rules found Severity: Medium

3 rules found Severity: Medium

3 rules found Severity: Medium

PostgreSQL must generate audit records when unsuccessful attempts to delete categorized information (e.g., classification levels/security levels) occur.
2 rules found Severity: Medium

3 rules found Severity: Medium

3 rules found Severity: Medium

PostgreSQL must generate audit records when unsuccessful attempts to retrieve privileges/permissions occur.
3 rules found Severity: Medium

PostgreSQL must generate audit records when unsuccessful attempts to delete privileges/permissions occur.
3 rules found Severity: Medium

3 rules found Severity: Medium

PostgreSQL must generate audit records when unsuccessful attempts to modify categorized information (e.g., classification levels/security levels) occur.
2 rules found Severity: Medium

3 rules found Severity: Medium

3 rules found Severity: Medium

PostgreSQL must generate audit records when unsuccessful attempts to access categorized information (e.g., classification levels/security levels) occur.
2 rules found Severity: Medium

3 rules found Severity: Medium

3 rules found Severity: Medium

PostgreSQL must generate audit records when concurrent logons/connections by the same user from different workstations occur.
3 rules found Severity: Medium

3 rules found Severity: Medium

3 rules found Severity: Medium

PostgreSQL must generate audit records when unsuccessful attempts to execute privileged activities or other system-level access occur.
3 rules found Severity: Medium

3 rules found Severity: Medium

PostgreSQL must generate audit records when categorized information (e.g., classification levels/security levels) is modified.
1 rule found Severity: Medium

PostgreSQL must generate audit records when unsuccessful attempts to modify privileges/permissions occur.
3 rules found Severity: Medium

PostgreSQL must generate audit records when unsuccessful attempts to add privileges/permissions occur.
3 rules found Severity: Medium

Audit records must be generated when categorized information (e.g., classification levels/security levels) is deleted.
3 rules found Severity: Medium

2 rules found Severity: Medium

3 rules found Severity: Medium

The Red Hat Enterprise Linux operating system must audit all uses of the chown, fchown, fchownat, and lchown syscalls.
1 rule found Severity: Medium

The Red Hat Enterprise Linux operating system must audit all uses of the chmod, fchmod, and fchmodat syscalls.
1 rule found Severity: Medium

The Red Hat Enterprise Linux operating system must audit all uses of the setxattr, fsetxattr, lsetxattr, removexattr, fremovexattr, and lremovexattr syscalls.
1 rule found Severity: Medium

The Red Hat Enterprise Linux operating system must audit all uses of the creat, open, openat, open_by_handle_at, truncate, and ftruncate syscalls.
1 rule found Severity: Medium

1 rule found Severity: Medium

1 rule found Severity: Medium

1 rule found Severity: Medium

1 rule found Severity: Medium

The Red Hat Enterprise Linux operating system must generate audit records for all unsuccessful account access events.
1 rule found Severity: Medium

The Red Hat Enterprise Linux operating system must generate audit records for all successful account access events.
1 rule found Severity: Medium

1 rule found Severity: Medium

1 rule found Severity: Medium

1 rule found Severity: Medium

1 rule found Severity: Medium

1 rule found Severity: Medium

1 rule found Severity: Medium

1 rule found Severity: Medium

The Red Hat Enterprise Linux operating system must audit all uses of the sudoers file and all files in the /etc/sudoers.d/ directory.
1 rule found Severity: Medium

1 rule found Severity: Medium

1 rule found Severity: Medium

1 rule found Severity: Medium

1 rule found Severity: Medium

The Red Hat Enterprise Linux operating system must audit all uses of the pam_timestamp_check command.
1 rule found Severity: Medium

1 rule found Severity: Medium

The Red Hat Enterprise Linux operating system must audit all uses of the init_module and finit_module syscalls.
1 rule found Severity: Medium

1 rule found Severity: Medium

1 rule found Severity: Medium

The Red Hat Enterprise Linux operating system must generate audit records for all account creations, modifications, disabling, and termination events that affect /etc/passwd.
1 rule found Severity: Medium

The Red Hat Enterprise Linux operating system must generate audit records for all account creations, modifications, disabling, and termination events that affect /etc/group.
1 rule found Severity: Medium

The Red Hat Enterprise Linux operating system must generate audit records for all account creations, modifications, disabling, and termination events that affect /etc/gshadow.
1 rule found Severity: Medium

The Red Hat Enterprise Linux operating system must generate audit records for all account creations, modifications, disabling, and termination events that affect /etc/shadow.
1 rule found Severity: Medium

The Red Hat Enterprise Linux operating system must generate audit records for all account creations, modifications, disabling, and termination events that affect /etc/security/opasswd.
1 rule found Severity: Medium

The Red Hat Enterprise Linux operating system must audit all uses of the unlink, unlinkat, rename, renameat, and rmdir syscalls.
1 rule found Severity: Medium

1 rule found Severity: Medium

The EDB Postgres Advanced Server must generate audit records when successful/unsuccessful logons, connections, or connection attempts occur.
1 rule found Severity: Medium

The EDB Postgres Advanced Server must generate audit records showing starting and ending time for user access to the database(s) and concurrent logons/connections by the same user from different workstations.
1 rule found Severity: Medium

The EDB Postgres Advanced Server must generate audit records for all direct access to the database(s).
2 rules found Severity: Medium

The macOS system must generate audit records for all account creations, modifications, disabling, and termination events; privileged activities or other system-level access; all kernel module load, unload, and restart actions; all program initiations; and organizationally defined events for all nonlocal maintenance and diagnostic sessions.
1 rule found Severity: Medium

The macOS system must generate audit records for DOD-defined events such as successful/unsuccessful logon attempts, successful/unsuccessful direct access attempts, starting and ending time for user access, and concurrent logons to the same account from different sources.
1 rule found Severity: Medium

1 rule found Severity: Medium

1 rule found Severity: Medium

In the event of an error when validating the binding of other DNS servers identity to the BIND 9.x information, when anomalies in the operation of the signed zone transfers are discovered, for the success and failure of start and stop of the name server service or daemon, and for the success and failure of all name server events, a BIND 9.x server implementation must generate a log entry.
1 rule found Severity: Low

The Ubuntu operating system must generate audit records for all account creations, modifications, disabling, and termination events that affect /etc/opasswd.
1 rule found Severity: Medium

The Ubuntu operating system must generate audit records for any use of the setxattr, fsetxattr, lsetxattr, removexattr, fremovexattr, and lremovexattr system calls.
1 rule found Severity: Medium

The Ubuntu operating system must generate audit records for successful/unsuccessful uses of the init_module and finit_module syscalls.
1 rule found Severity: Medium

The Ubuntu operating system must generate audit records for successful/unsuccessful uses of the delete_module syscall.
1 rule found Severity: Medium

The Ubuntu operating system must generate audit records for privileged activities, nonlocal maintenance, diagnostic sessions and other system-level access.
1 rule found Severity: Medium

The Ubuntu operating system must generate audit records for any successful/unsuccessful use of unlink, unlinkat, rename, renameat, and rmdir system calls.
1 rule found Severity: Medium

PostgreSQL must generate audit records when categories of information (e.g., classification levels/security levels) is modified.
1 rule found Severity: Medium

PostgreSQL must generate audit records when categories of information (e.g., classification levels/security levels) are accessed.
1 rule found Severity: Medium

PostgreSQL must generate audit records when unsuccessful attempts to access categories of information (e.g., classification levels/security levels) occur.
1 rule found Severity: Medium

PostgreSQL must generate audit records when categories of information (e.g., classification levels/security levels) are modified.
1 rule found Severity: Medium

PostgreSQL must generate audit records when unsuccessful attempts to modify categories of information (e.g., classification levels/security levels) occur.
1 rule found Severity: Medium

PostgreSQL must generate audit records when categories of information (e.g., classification levels/security levels) are deleted.
1 rule found Severity: Medium

PostgreSQL must generate audit records when unsuccessful attempts to delete categories of information (e.g., classification levels/security levels) occur.
1 rule found Severity: Medium

1 rule found Severity: Medium

The Cisco ASA must be configured to generate audit records when successful/unsuccessful attempts to access privileges occur.
1 rule found Severity: Medium

The Cisco ASA must be configured to generate audit records when successful/unsuccessful attempts to modify administrator privileges occur.
1 rule found Severity: Medium

The Cisco ASA must be configured to generate audit records when successful/unsuccessful attempts to delete administrator privileges occur.
1 rule found Severity: Medium

The Cisco ASA must be configured to generate audit records when successful/unsuccessful logon attempts occur.
1 rule found Severity: Medium

The Cisco ASA must be configured to generate audit records for privileged activities or other system-level access.
1 rule found Severity: Medium

The Cisco ASA must be configured to generate audit records showing starting and ending time for administrator access to the system.
1 rule found Severity: Medium

The Cisco ASA must be configured to generate audit records when concurrent logons from different workstations occur.
1 rule found Severity: Medium

The Cisco ASA VPN remote access server must be configured to generate log records when successful and/or unsuccessful VPN connection attempts occur.
1 rule found Severity: Medium

4 rules found Severity: Medium

The Cisco switch must be configured to generate log records when administrator privileges are deleted.
3 rules found Severity: Medium

The Cisco switch must be configured to generate audit records when successful/unsuccessful logon attempts occur.
3 rules found Severity: Medium

3 rules found Severity: Medium

The Cisco router must be configured to generate audit records when successful/unsuccessful attempts to logon with access privileges occur.
1 rule found Severity: Medium

1 rule found Severity: Medium

The Cisco ISE must generate audit records when successful attempts to modify administrator privileges occur.
1 rule found Severity: Medium

The Cisco ISE must generate audit records when successful attempts to delete administrator privileges occur.
1 rule found Severity: Medium

1 rule found Severity: Medium

1 rule found Severity: Medium

1 rule found Severity: Medium

The Cisco ISE must generate a log record when an endpoint fails authentication. This is This is required for compliance with C2C Step 1.
1 rule found Severity: Medium

The Cisco ISE must generate a log record when the client machine fails posture assessment because required security software is missing or has been deleted. This is This is required for compliance with C2C Step 1.
1 rule found Severity: Medium

The Cisco ISE must send an alert to the system administrator, at a minimum, when endpoints fail the policy assessment checks for organization-defined infractions. This is required for compliance with C2C Step 3.
1 rule found Severity: Medium

The DNS implementation must generate audit records for the success and failure of start and stop of the name server service or daemon.
1 rule found Severity: Medium

The DNS implementation must generate audit records for the success and failure of all name server events.
1 rule found Severity: Medium

The EDB Postgres Advanced Server must generate audit records when privileges/permissions are retrieved.
1 rule found Severity: Medium

The EDB Postgres Advanced Server must generate audit records when unsuccessful attempts to retrieve privileges/permissions occur.
1 rule found Severity: Medium

The Enterprise Voice, Video, and Messaging Endpoint must generate audit records when successful/unsuccessful logon attempts occur.
1 rule found Severity: Medium

The Enterprise Voice, Video, and Messaging Endpoint must generate audit records for privileged activities or other system-level access.
1 rule found Severity: Medium

The Enterprise Voice, Video, and Messaging Endpoint must generate audit records showing starting and ending time for user access to the system.
1 rule found Severity: Medium

The F5 BIG-IP appliance must generate event log records that can be forwarded to the centralized events log.
1 rule found Severity: Medium

1 rule found Severity: Medium

The EDB Postgres Advanced Server must generate audit records when unsuccessful attempts to access security objects occur.
1 rule found Severity: Medium

The EDB Postgres Advanced Server must generate audit records when categories of information (e.g., classification levels/security levels) are accessed.
1 rule found Severity: Medium

Audit records must be generated when unsuccessful attempts to access categorized information (e.g., classification levels/security levels) occur.
1 rule found Severity: Medium

1 rule found Severity: Medium

The EDB Postgres Advanced Server must generate audit records when unsuccessful attempts to add privileges/permissions occur.
1 rule found Severity: Medium

The EDB Postgres Advanced Server must generate audit records when privileges/permissions are modified.
1 rule found Severity: Medium

The EDB Postgres Advanced Server must generate audit records when unsuccessful attempts to modify privileges/permissions occur.
1 rule found Severity: Medium

1 rule found Severity: Medium

The EDB Postgres Advanced Server must generate audit records when unsuccessful attempts to modify security objects occur.
1 rule found Severity: Medium

Audit records must be generated when categorized information (e.g., classification levels/security levels) is created.
1 rule found Severity: Medium

Audit records must be generated when categorized information (e.g., classification levels/security levels) is modified.
1 rule found Severity: Medium

Audit records must be generated when unsuccessful attempts to create categorized information (e.g., classification levels/security levels) occur.
1 rule found Severity: Medium

Audit records must be generated when unsuccessful attempts to modify categorized information (e.g., classification levels/security levels) occur.
1 rule found Severity: Medium

The EDB Postgres Advanced Server must generate audit records when privileges/permissions are deleted.
1 rule found Severity: Medium

The EDB Postgres Advanced Server must generate audit records when unsuccessful attempts to delete privileges/permissions occur.
1 rule found Severity: Medium

1 rule found Severity: Medium

The EDB Postgres Advanced Server must generate audit records when unsuccessful attempts to delete security objects occur.
1 rule found Severity: Medium

Audit records must be generated when unsuccessful attempts to delete categorized information (e.g., classification levels/security levels) occur.
1 rule found Severity: Medium

The EDB Postgres Advanced Server must generate audit records when successful logons or connections occur.
1 rule found Severity: Medium

The EDB Postgres Advanced Server must generate audit records when unsuccessful logons or connection attempts occur.
1 rule found Severity: Medium

The EDB Postgres Advanced Server must generate audit records for all privileged activities or other system-level access.
1 rule found Severity: Medium

The EDB Postgres Advanced Server must generate audit records when unsuccessful attempts to execute privileged activities or other system-level access occur.
1 rule found Severity: Medium

The EDB Postgres Advanced Server must generate audit records showing starting and ending time for user access to the database(s).
1 rule found Severity: Medium

The EDB Postgres Advanced Server must generate audit records when concurrent logons/connections by the same user from different workstations occur.
1 rule found Severity: Medium

The EDB Postgres Advanced Server must be able to generate audit records when successful accesses to objects occur.
1 rule found Severity: Medium

The EDB Postgres Advanced Server must generate audit records when unsuccessful accesses to objects occur.
1 rule found Severity: Medium

The Enterprise Voice, Video, and Messaging Session Manager must generate session (call) records when concurrent logons from multiple endpoints occur.
1 rule found Severity: Medium

When using locally stored user accounts, the Enterprise Voice, Video, and Messaging Session Manager must generate audit records for all account creations, modifications, disabling, and termination events.
1 rule found Severity: Medium

The F5 BIG-IP appliance must generate traffic log entries containing information to establish the details of the event, including success or failure of the application of the firewall rule.
1 rule found Severity: Medium

The F5 BIG-IP appliance must be configured to audit the execution of privileged functions such as accounts additions and changes.
1 rule found Severity: Medium

1 rule found Severity: Medium

1 rule found Severity: Medium

1 rule found Severity: Medium

The ICS must be configured to audit the execution of privileged functions such as accounts additions and changes.
1 rule found Severity: Medium

The ICS must be configured to generate audit records when successful/unsuccessful attempts to access privileges occur.
1 rule found Severity: Medium

The ICS must be configured to generate log records containing sufficient information about where, when, identity, source, or outcome of the events.
1 rule found Severity: Low

The Juniper EX switch must be configured to generate audit records when successful/unsuccessful logon attempts occur.
1 rule found Severity: Medium

The Juniper EX switch must be configured to generate audit records for privileged activities or other system-level access.
1 rule found Severity: Medium

The Juniper EX switch must be configured to generate audit records showing starting and ending time for administrator access to the system.
1 rule found Severity: Medium

The Juniper EX switch must be configured to generate audit records when concurrent logons from different workstations occur.
1 rule found Severity: Medium

JBoss must be configured to generate log records when successful/unsuccessful attempts to modify privileges occur.
1 rule found Severity: Medium

JBoss must be configured to generate log records when successful/unsuccessful attempts to delete privileges occur.
1 rule found Severity: Medium

1 rule found Severity: Medium

1 rule found Severity: Medium

JBoss must be configured to generate log records that show starting and ending times for access to the application server management interface.
1 rule found Severity: Medium

JBoss must be configured to generate log records when concurrent logons from different workstations occur to the application server management interface.
1 rule found Severity: Medium

JBoss must be configured to generate log records for all account creations, modifications, disabling, and termination events.
1 rule found Severity: Medium

Kubernetes API Server must generate audit records that identify what type of event has occurred, identify the source of the event, contain the event results, identify any users, and identify any containers associated with the event.
1 rule found Severity: Medium

1 rule found Severity: Medium

1 rule found Severity: Medium

MarkLogic Server must be able to generate audit records when unsuccessful attempts to retrieve privileges/permissions occur.
1 rule found Severity: Medium

1 rule found Severity: Medium

MarkLogic Server must generate audit records when unsuccessful attempts to access security objects occur.
1 rule found Severity: Medium

MarkLogic Server must generate audit records when categories of information (e.g., classification levels/security levels) are accessed.
1 rule found Severity: Medium

MarkLogic Server must generate audit records when unsuccessful attempts to access categories of information (e.g., classification levels/security levels) occur.
1 rule found Severity: Medium

1 rule found Severity: Medium

MarkLogic Server must generate audit records when unsuccessful attempts to add privileges/permissions occur.
1 rule found Severity: Medium

1 rule found Severity: Medium

MarkLogic Server must generate audit records when unsuccessful attempts to modify privileges/permissions occur.
1 rule found Severity: Medium

1 rule found Severity: Medium

MarkLogic Server must generate audit records when unsuccessful attempts to modify security objects occur.
1 rule found Severity: Medium

MarkLogic Server must generate audit records when categories of information (e.g., classification levels/security levels) are modified.
1 rule found Severity: Medium

MarkLogic Server must generate audit records when unsuccessful attempts to modify categories of information (e.g., classification levels/security levels) occur.
1 rule found Severity: Medium

1 rule found Severity: Medium

MarkLogic Server must generate audit records when unsuccessful attempts to delete privileges/permissions occur.
1 rule found Severity: Medium

1 rule found Severity: Medium

MarkLogic Server must generate audit records when unsuccessful attempts to delete security objects occur.
1 rule found Severity: Medium

MarkLogic Server must generate audit records when categories of information (e.g., classification levels/security levels) are deleted.
1 rule found Severity: Medium

MarkLogic Server must generate audit records when unsuccessful attempts to delete categories of information (e.g., classification levels/security levels) occur.
1 rule found Severity: Medium

1 rule found Severity: Medium

1 rule found Severity: Medium

MarkLogic Server must generate audit records for all privileged activities or other system-level access.
1 rule found Severity: Medium

MarkLogic Server must generate audit records when unsuccessful attempts to execute privileged activities or other system-level access occur.
1 rule found Severity: Medium

MarkLogic Server must generate audit records when concurrent logons/connections by the same user from different workstations occur.
1 rule found Severity: Medium

1 rule found Severity: Medium

MongoDB must provide audit record generation for DOD-defined auditable events within all DBMS/database components.
1 rule found Severity: Medium

The Azure SQL Database must be able to generate audit records when privileges/permissions are retrieved.
1 rule found Severity: Medium

The Azure SQL Database must be able to generate audit records when unsuccessful attempts to retrieve privileges/permissions occur.
1 rule found Severity: Medium

1 rule found Severity: Medium

Azure SQL DB must generate audit records when unsuccessful attempts to access security objects occur.
1 rule found Severity: Medium

Azure SQL DB must generate audit records when categorized information (e.g., classification levels/security levels) is accessed.
1 rule found Severity: Medium

Azure SQL DB must generate audit records when unsuccessful attempts to access categories of information (e.g., classification levels/security levels) occur.
1 rule found Severity: Medium

1 rule found Severity: Medium

Azure SQL DB must generate audit records when unsuccessful attempts to add privileges/permissions occur.
1 rule found Severity: Medium

1 rule found Severity: Medium

Azure SQL DB must generate audit records when unsuccessful attempts to modify privileges/permissions occur.
1 rule found Severity: Medium

1 rule found Severity: Medium

Azure SQL DB must generate audit records when unsuccessful attempts to modify security objects occur.
1 rule found Severity: Medium

Azure SQL Database must generate audit records when categorized information (e.g., classification levels/security levels) is modified.
1 rule found Severity: Medium

Azure SQL Database must generate audit records when unsuccessful attempts to modify categorized information (e.g., classification levels/security levels) occur.
1 rule found Severity: Medium

1 rule found Severity: Medium

Azure SQL Database must generate audit records when unsuccessful attempts to delete privileges/permissions occur.
1 rule found Severity: Medium

1 rule found Severity: Medium

Azure SQL Database must generate audit records when unsuccessful attempts to delete security objects occur.
1 rule found Severity: Medium

Azure SQL Database must generate audit records when categories of information (e.g., classification levels/security levels) are deleted.
1 rule found Severity: Medium

Azure SQL Database must generate audit records when unsuccessful attempts to delete categories of information (e.g., classification levels/security levels) occur.
1 rule found Severity: Medium

1 rule found Severity: Medium

Azure SQL Database must generate audit records when unsuccessful logons or connection attempts occur.
1 rule found Severity: Medium

Azure SQL Database must generate audit records for all privileged activities or other system-level access.
1 rule found Severity: Medium

Azure SQL Database must generate audit records for all unsuccessful attempts to execute privileged activities or other system-level access.
1 rule found Severity: Medium

Azure SQL Database must generate audit records when concurrent logons/connections by the same user from different workstations occur.
2 rules found Severity: Medium

Azure SQL Database must be able to generate audit records when successful accesses to objects occur.
1 rule found Severity: Medium

1 rule found Severity: Medium

1 rule found Severity: Medium

1 rule found Severity: Low

2 rules found Severity: Medium

2 rules found Severity: Medium

2 rules found Severity: Medium

2 rules found Severity: Medium

2 rules found Severity: Medium

2 rules found Severity: Medium

2 rules found Severity: Medium

2 rules found Severity: Medium

2 rules found Severity: Medium

1 rule found Severity: Medium

1 rule found Severity: Medium

1 rule found Severity: Medium

1 rule found Severity: Medium

2 rules found Severity: Medium

2 rules found Severity: Medium

2 rules found Severity: Medium

2 rules found Severity: Medium

2 rules found Severity: Medium

2 rules found Severity: Medium

1 rule found Severity: Medium

2 rules found Severity: Medium

2 rules found Severity: Medium

2 rules found Severity: Medium

2 rules found Severity: Medium

2 rules found Severity: Medium

2 rules found Severity: Medium

1 rule found Severity: Medium

1 rule found Severity: Medium

1 rule found Severity: Medium

Windows Server 2016 must be configured to audit Account Management - Other Account Management Events successes.
1 rule found Severity: Medium

Windows Server 2016 must be configured to audit Account Management - Security Group Management successes.
1 rule found Severity: Medium

Windows Server 2016 must be configured to audit Account Management - User Account Management successes.
1 rule found Severity: Medium

Windows Server 2016 must be configured to audit Account Management - User Account Management failures.
1 rule found Severity: Medium

1 rule found Severity: Medium

1 rule found Severity: Medium

1 rule found Severity: Medium

1 rule found Severity: Medium

1 rule found Severity: Medium

1 rule found Severity: Medium

1 rule found Severity: Medium

1 rule found Severity: Medium

1 rule found Severity: Medium

1 rule found Severity: Medium

1 rule found Severity: Medium

1 rule found Severity: Medium

1 rule found Severity: Medium

1 rule found Severity: Medium

Windows Server 2016 must be configured to audit Policy Change - Authentication Policy Change successes.
1 rule found Severity: Medium

Windows Server 2016 must be configured to audit Policy Change - Authorization Policy Change successes.
1 rule found Severity: Medium

1 rule found Severity: Medium

1 rule found Severity: Medium

1 rule found Severity: Medium

1 rule found Severity: Medium

1 rule found Severity: Medium

1 rule found Severity: Medium

1 rule found Severity: Medium

1 rule found Severity: Medium

1 rule found Severity: Medium

1 rule found Severity: Medium

1 rule found Severity: Medium

1 rule found Severity: Medium

1 rule found Severity: Medium

The Active Directory Domain Controllers Organizational Unit (OU) object must be configured with proper audit settings.
1 rule found Severity: Medium

1 rule found Severity: Medium

1 rule found Severity: Medium

Windows Server 2016 must be configured to audit Account Management - Computer Account Management successes.
1 rule found Severity: Medium

1 rule found Severity: Medium

1 rule found Severity: Medium

1 rule found Severity: Medium

The network device must generate audit records when successful/unsuccessful attempts to access privileges occur.
1 rule found Severity: Medium

The network device must generate audit records when successful/unsuccessful attempts to modify administrator privileges occur.
1 rule found Severity: Medium

The network device must generate audit records when successful/unsuccessful attempts to delete administrator privileges occur.
1 rule found Severity: Medium

The network device must generate audit records for privileged activities or other system-level access.
1 rule found Severity: Medium

The network device must generate audit records showing starting and ending time for administrator access to the system.
1 rule found Severity: Medium

The network device must generate audit records when concurrent logons from different workstations occur.
1 rule found Severity: Medium

The Oracle Linux operating system must audit all uses of the chown, fchown, fchownat, and lchown syscalls.
1 rule found Severity: Medium

1 rule found Severity: Medium

The Oracle Linux operating system must audit all uses of the setxattr, fsetxattr, lsetxattr, removexattr, fremovexattr, and lremovexattr syscalls.
1 rule found Severity: Medium

The Oracle Linux operating system must audit all uses of the creat, open, openat, open_by_handle_at, truncate, and ftruncate syscalls.
1 rule found Severity: Medium

1 rule found Severity: Medium

The Oracle Linux operating system must generate audit records for all unsuccessful account access events.
1 rule found Severity: Medium

The Oracle Linux operating system must generate audit records for all successful account access events.
1 rule found Severity: Medium

1 rule found Severity: Medium

1 rule found Severity: Medium

The Oracle Linux operating system must audit all uses of the sudoers file and all files in the /etc/sudoers.d/ directory.
1 rule found Severity: Medium

1 rule found Severity: Medium

1 rule found Severity: Medium

1 rule found Severity: Medium

1 rule found Severity: Medium

1 rule found Severity: Medium

1 rule found Severity: Medium

The Oracle Linux operating system must generate audit records for all account creations, modifications, disabling, and termination events that affect /etc/passwd.
1 rule found Severity: Medium

The Oracle Linux operating system must audit all uses of the unlink, unlinkat, rename, renameat, and rmdir syscalls.
1 rule found Severity: Medium

The MySQL Database Server 8.0 must be able to generate audit records when privileges/permissions are retrieved.
1 rule found Severity: Medium

The MySQL Database Server 8.0 must be able to generate audit records when unsuccessful attempts to retrieve privileges/permissions occur.
1 rule found Severity: Medium

The MySQL Database Server 8.0 must be able to generate audit records when security objects are accessed.
1 rule found Severity: Medium

The MySQL Database Server 8.0 must generate audit records when unsuccessful attempts to access security objects occur.
1 rule found Severity: Medium

The MySQL Database Server 8.0 must generate audit records when categories of information (e.g., classification levels/security levels) are accessed.
1 rule found Severity: Medium

The MySQL Database Server 8.0 must generate audit records when unsuccessful attempts to access categories of information (e.g., classification levels/security levels) occur.
1 rule found Severity: Medium

1 rule found Severity: Medium

The MySQL Database Server 8.0 must generate audit records when unsuccessful attempts to add privileges/permissions occur.
1 rule found Severity: Medium

1 rule found Severity: Medium

The MySQL Database Server 8.0 must generate audit records when unsuccessful attempts to modify privileges/permissions occur.
1 rule found Severity: Medium

1 rule found Severity: Medium

The MySQL Database Server 8.0 must generate audit records when unsuccessful attempts to modify security objects occur.
1 rule found Severity: Medium

The MySQL Database Server 8.0 must generate audit records when categories of information (e.g., classification levels/security levels) are modified.
1 rule found Severity: Medium

The MySQL Database Server 8.0 must generate audit records when unsuccessful attempts to modify categories of information (e.g., classification levels/security levels) occur.
1 rule found Severity: Medium

1 rule found Severity: Medium

The MySQL Database Server 8.0 must generate audit records when unsuccessful attempts to delete privileges/permissions occur.
1 rule found Severity: Medium

1 rule found Severity: Medium

The MySQL Database Server 8.0 must generate audit records when unsuccessful attempts to delete security objects occur.
1 rule found Severity: Medium

The MySQL Database Server 8.0 must generate audit records when categories of information (e.g., classification levels/security levels) are deleted.
1 rule found Severity: Medium

The MySQL Database Server 8.0 must generate audit records when unsuccessful attempts to delete categories of information (e.g., classification levels/security levels) occur.
1 rule found Severity: Medium

The MySQL Database Server 8.0 must generate audit records when successful logons or connections occur.
1 rule found Severity: Medium

The MySQL Database Server 8.0 must generate audit records when unsuccessful logons or connection attempts occur.
1 rule found Severity: Medium

The MySQL Database Server 8.0 must generate audit records for all privileged activities or other system-level access.
1 rule found Severity: Medium

The MySQL Database Server 8.0 must generate audit records when unsuccessful attempts to execute privileged activities or other system-level access occur.
1 rule found Severity: Medium

The MySQL Database Server 8.0 must generate audit records showing starting and ending time for user access to the database(s).
1 rule found Severity: Medium

The MySQL Database Server 8.0 must generate audit records when concurrent logons/connections by the same user from different workstations.
1 rule found Severity: Medium

The MySQL Database Server 8.0 must be able to generate audit records when successful accesses to objects occur.
1 rule found Severity: Medium

The MySQL Database Server 8.0 must generate audit records when unsuccessful accesses to objects occur.
1 rule found Severity: Medium

1 rule found Severity: Medium

The Riverbed NetProfiler must be configured to automatically generate DOD-required audit records with sufficient information to support incident reporting to a central log server.
1 rule found Severity: High

1 rule found Severity: Medium

Rancher MCM must generate audit records for all DoD-defined auditable events within all components in the platform.
1 rule found Severity: Medium

Rancher MCM must allocate audit record storage and generate audit records associated with events, users, and groups.
1 rule found Severity: Medium

Automation Controller must use external log providers that can collect user activity logs in independent, protected repositories to prevent modification or repudiation.
1 rule found Severity: Medium

1 rule found Severity: Medium

1 rule found Severity: Medium

1 rule found Severity: Medium

1 rule found Severity: Medium

1 rule found Severity: Medium

1 rule found Severity: Medium

1 rule found Severity: Medium

1 rule found Severity: Medium

1 rule found Severity: Medium

1 rule found Severity: Medium

1 rule found Severity: Medium

1 rule found Severity: Medium

1 rule found Severity: Medium

1 rule found Severity: Medium

1 rule found Severity: Medium

1 rule found Severity: Medium

1 rule found Severity: Medium

1 rule found Severity: Medium

1 rule found Severity: Medium

SLEM 5 must generate audit records for all account creations, modifications, disabling, and termination events that affect /etc/group.
1 rule found Severity: Medium

SLEM 5 must generate audit records for all account creations, modifications, disabling, and termination events that affect /etc/security/opasswd.
1 rule found Severity: Medium

SLEM 5 must generate audit records for all account creations, modifications, disabling, and termination events that affect /etc/passwd.
1 rule found Severity: Medium

SLEM 5 must generate audit records for all account creations, modifications, disabling, and termination events that affect /etc/shadow.
1 rule found Severity: Medium

SLEM 5 must generate audit records for all uses of the "chmod", "fchmod" and "fchmodat" system calls.
1 rule found Severity: Medium

SLEM 5 must generate audit records for all uses of the "chown", "fchown", "fchownat", and "lchown" system calls.
1 rule found Severity: Medium

SLEM 5 must generate audit records for all uses of the "creat", "open", "openat", "open_by_handle_at", "truncate", and "ftruncate" system calls.
1 rule found Severity: Medium

1 rule found Severity: Medium

SLEM 5 must generate audit records for all uses of the "init_module" and "finit_module" system calls.
1 rule found Severity: Medium

1 rule found Severity: Medium

SLEM 5 must generate audit records for all uses of the "setxattr", "fsetxattr", "lsetxattr", "removexattr", "fremovexattr", and "lremovexattr" system calls.
1 rule found Severity: Medium

1 rule found Severity: Medium

SLEM 5 must generate audit records for all uses of the "unlink", "unlinkat", "rename", "renameat", and "rmdir" system calls.
1 rule found Severity: Medium

1 rule found Severity: Medium

SLEM 5 must generate audit records for all modifications to the "tallylog" file must generate an audit record.
1 rule found Severity: Medium

1 rule found Severity: Medium

1 rule found Severity: Medium

1 rule found Severity: Low

The TippingPoint SMS must be configured to send log data to at least two central log servers for the purpose of forwarding alerts to the administrators and the information system security officer (ISSO).
1 rule found Severity: High

TOSS must generate audit records for all account creations, modifications, disabling, and termination events that affect /etc/shadow.
1 rule found Severity: Medium

TOSS audit records must contain information to establish what type of events occurred, when the events occurred, the source of events, where events occurred, and the outcome of events.
1 rule found Severity: Medium

1 rule found Severity: Medium

1 rule found Severity: Medium

1 rule found Severity: Medium

1 rule found Severity: Medium

1 rule found Severity: Medium

1 rule found Severity: Medium

1 rule found Severity: Medium

1 rule found Severity: Medium

1 rule found Severity: Medium

Successful/unsuccessful uses of the "pam_timestamp_check" command in TOSS must generate an audit record.
1 rule found Severity: Medium

1 rule found Severity: Medium

1 rule found Severity: Medium

1 rule found Severity: Medium

1 rule found Severity: Medium

1 rule found Severity: Medium

1 rule found Severity: Medium

1 rule found Severity: Medium

1 rule found Severity: Medium

1 rule found Severity: Medium

1 rule found Severity: Medium

1 rule found Severity: Medium

1 rule found Severity: Medium

1 rule found Severity: Medium

1 rule found Severity: Medium

1 rule found Severity: Medium

1 rule found Severity: Medium

1 rule found Severity: Medium

1 rule found Severity: Medium

1 rule found Severity: Medium

1 rule found Severity: Medium

Successful/unsuccessful uses of the ftruncate system call system call in TOSS must generate an audit record.
1 rule found Severity: Medium

1 rule found Severity: Medium

1 rule found Severity: Medium

Successful/unsuccessful uses of the open_by_handle_at system call system call in TOSS must generate an audit record.
1 rule found Severity: Medium

1 rule found Severity: Medium

1 rule found Severity: Medium

1 rule found Severity: Medium

1 rule found Severity: Medium

1 rule found Severity: Medium

Successful/unsuccessful uses of the "lremovexattr" system call in TOSS must generate an audit record.
1 rule found Severity: Medium

Successful/unsuccessful uses of the "removexattr" system call in TOSS must generate an audit record.
1 rule found Severity: Medium

1 rule found Severity: Medium

1 rule found Severity: Medium

1 rule found Severity: Medium

1 rule found Severity: Medium

1 rule found Severity: Medium

1 rule found Severity: Medium

1 rule found Severity: Medium

1 rule found Severity: Medium

1 rule found Severity: Medium

1 rule found Severity: Medium

1 rule found Severity: Medium

1 rule found Severity: Medium

NixOS must enforce the limit of three consecutive invalid login attempts by a user during a 15-minute time period.
1 rule found Severity: Medium

1 rule found Severity: Medium

Successful/unsuccessful uses of the init_module, finit_module, and delete_module system calls in NixOS must generate an audit record.
1 rule found Severity: Medium

NixOS must generate an audit record for successful/unsuccessful uses of the truncate, ftruncate, creat, open, openat, and open_by_handle_at system calls.
1 rule found Severity: Medium

Successful/unsuccessful uses of the chmod, fchmod, and fchmodat system calls in NixOS must generate an audit record.
1 rule found Severity: Medium

NixOS must generate audit records when successful/unsuccessful attempts to modify security objects occur.
1 rule found Severity: Medium

1 rule found Severity: Medium

NixOS must generate audit records when successful/unsuccessful attempts to delete security objects occur.
1 rule found Severity: Medium

NixOS must generate audit records when concurrent logins to the same account occur from different sources.
1 rule found Severity: Medium

NixOS must generate audit records for all account creations, modifications, disabling, and termination events.
1 rule found Severity: Medium

2 rules found Severity: Medium

1 rule found Severity: Medium

2 rules found Severity: Medium

2 rules found Severity: Medium

2 rules found Severity: Medium

2 rules found Severity: Medium

2 rules found Severity: Medium

1 rule found Severity: Medium

1 rule found Severity: Medium

1 rule found Severity: Medium

The application server must generate log records when successful/unsuccessful attempts to access subject privileges occur.
1 rule found Severity: Medium

The application server must generate log records when successful/unsuccessful attempts to modify privileges occur.
1 rule found Severity: Medium

The application server must generate log records when successful/unsuccessful attempts to delete privileges occur.
1 rule found Severity: Medium

1 rule found Severity: Medium

1 rule found Severity: Medium

The application must generate log records showing starting and ending times for user access to the application server management interface.
1 rule found Severity: Medium

The application server must generate log records when concurrent logons from different workstations occur to the application server management interface.
1 rule found Severity: Medium

The application server must generate log records for all account creations, modifications, disabling, and termination events.
1 rule found Severity: Medium

The ALG must generate audit records when successful/unsuccessful attempts to access security objects occur.
1 rule found Severity: Medium

The ALG that is part of a CDS must generate audit records when successful/unsuccessful attempts to access security levels occur.
1 rule found Severity: Medium

The ALG must generate audit records when successful/unsuccessful attempts to access categories of information (e.g., classification levels) occur.
1 rule found Severity: Medium

The ALG providing user access control intermediary services must generate audit records when successful/unsuccessful attempts to modify privileges occur.
1 rule found Severity: Medium

The ALG must generate audit records when successful/unsuccessful attempts to modify security objects occur.
1 rule found Severity: Medium

The ALG must generate audit records when successful/unsuccessful attempts to modify security levels occur.
1 rule found Severity: Medium

The ALG must generate audit records when successful/unsuccessful attempts to modify categories of information (e.g., classification levels) occur.
1 rule found Severity: Medium

The ALG providing user access control intermediary services must generate audit records when successful/unsuccessful attempts to delete privileges occur.
1 rule found Severity: Medium

The ALG must generate audit records when successful/unsuccessful attempts to delete security levels occur.
1 rule found Severity: Medium

The ALG must generate audit records when successful/unsuccessful attempts to delete security objects occur.
1 rule found Severity: Medium

The ALG must generate audit records when successful/unsuccessful attempts to delete categories of information (e.g., classification levels) occur.
1 rule found Severity: Medium

The ALG providing user access control intermediary services must generate audit records when successful/unsuccessful logon attempts occur.
1 rule found Severity: Medium

The ALG providing user access control intermediary services must generate audit records showing starting and ending time for user access to the system.
1 rule found Severity: Medium

The ALG providing user access control intermediary services must generate audit records when successful/unsuccessful attempts to access privileges occur.
1 rule found Severity: Medium

The application must generate audit records when successful/unsuccessful attempts to grant privileges occur.
1 rule found Severity: Medium

The application must generate audit records when successful/unsuccessful attempts to access security objects occur.
1 rule found Severity: Medium

The application must generate audit records when successful/unsuccessful attempts to access security levels occur.
1 rule found Severity: Medium

The application must generate audit records when successful/unsuccessful attempts to access categories of information (e.g., classification levels) occur.
1 rule found Severity: Medium

The application must generate audit records when successful/unsuccessful attempts to modify privileges occur.
1 rule found Severity: Medium

The application must generate audit records when successful/unsuccessful attempts to modify security objects occur.
1 rule found Severity: Medium

The application must generate audit records when successful/unsuccessful attempts to modify security levels occur.
1 rule found Severity: Medium

The application must generate audit records when successful/unsuccessful attempts to modify categories of information (e.g., classification levels) occur.
1 rule found Severity: Medium

The application must generate audit records when successful/unsuccessful attempts to delete privileges occur.
1 rule found Severity: Medium

The application must generate audit records when successful/unsuccessful attempts to delete security levels occur.
1 rule found Severity: Medium

The application must generate audit records when successful/unsuccessful attempts to delete application database security objects occur.
1 rule found Severity: Medium

The application must generate audit records when successful/unsuccessful attempts to delete categories of information (e.g., classification levels) occur.
1 rule found Severity: Medium

1 rule found Severity: Medium

1 rule found Severity: Medium

The application must generate audit records showing starting and ending time for user access to the system.
1 rule found Severity: Medium

1 rule found Severity: Medium

1 rule found Severity: Medium

The application must generate audit records for all account creations, modifications, disabling, and termination events.
1 rule found Severity: Medium

Ubuntu 22.04 LTS must produce audit records and reports containing information to establish when, where, what type, the source, and the outcome for all DOD-defined auditable events and actions in near real time.
1 rule found Severity: Medium

Ubuntu 22.04 LTS must generate audit records for successful/unsuccessful uses of the apparmor_parser command.
1 rule found Severity: Medium

1 rule found Severity: Medium

1 rule found Severity: Medium

1 rule found Severity: Medium

1 rule found Severity: Medium

1 rule found Severity: Medium

Ubuntu 22.04 LTS must generate audit records for successful/unsuccessful uses of the crontab command.
1 rule found Severity: Medium

Ubuntu 22.04 LTS must generate audit records for successful/unsuccessful attempts to use the fdisk command.
1 rule found Severity: Medium

Ubuntu 22.04 LTS must generate audit records for successful/unsuccessful uses of the gpasswd command.
1 rule found Severity: Medium

Ubuntu 22.04 LTS must generate audit records for successful/unsuccessful attempts to use the kmod command.
1 rule found Severity: Medium

Ubuntu 22.04 LTS must generate audit records for successful/unsuccessful attempts to use modprobe command.
1 rule found Severity: Medium

1 rule found Severity: Medium

Ubuntu 22.04 LTS must generate audit records for successful/unsuccessful uses of the newgrp command.
1 rule found Severity: Medium

Ubuntu 22.04 LTS must generate audit records for successful/unsuccessful uses of the pam_timestamp_check command.
1 rule found Severity: Medium

Ubuntu 22.04 LTS must generate audit records for successful/unsuccessful uses of the passwd command.
1 rule found Severity: Medium

Ubuntu 22.04 LTS must generate audit records for successful/unsuccessful uses of the setfacl command.
1 rule found Severity: Medium

Ubuntu 22.04 LTS must generate audit records for successful/unsuccessful uses of the ssh-agent command.
1 rule found Severity: Medium

Ubuntu 22.04 LTS must generate audit records for successful/unsuccessful uses of the ssh-keysign command.
1 rule found Severity: Medium

1 rule found Severity: Medium

The application must generate audit records when concurrent logons from different workstations occur.
1 rule found Severity: Low

The Cisco router must be configured to generate log records when administrator privileges are deleted.
2 rules found Severity: Medium

The Cisco router must be configured to generate audit records when successful/unsuccessful logon attempts occur.
2 rules found Severity: Medium

2 rules found Severity: Medium

1 rule found Severity: Medium

Ubuntu 22.04 LTS must generate audit records for successful/unsuccessful uses of the sudoedit command.
1 rule found Severity: Medium

Ubuntu 22.04 LTS must generate audit records for successful/unsuccessful uses of the umount command.
1 rule found Severity: Medium

Ubuntu 22.04 LTS must generate audit records for successful/unsuccessful uses of the unix_update command.
1 rule found Severity: Medium

Ubuntu 22.04 LTS must generate audit records for successful/unsuccessful uses of the usermod command.
1 rule found Severity: Medium

Ubuntu 22.04 LTS must generate audit records for all account creations, modifications, disabling, and termination events that affect /etc/group.
1 rule found Severity: Medium

Ubuntu 22.04 LTS must generate audit records for all account creations, modifications, disabling, and termination events that affect /etc/gshadow.
1 rule found Severity: Medium

Ubuntu 22.04 LTS must generate audit records for all account creations, modifications, disabling, and termination events that affect /etc/opasswd.
1 rule found Severity: Medium

Ubuntu 22.04 LTS must generate audit records for all account creations, modifications, disabling, and termination events that affect /etc/passwd.
1 rule found Severity: Medium

Ubuntu 22.04 LTS must generate audit records for all account creations, modifications, disabling, and termination events that affect /etc/shadow.
1 rule found Severity: Medium

Ubuntu 22.04 LTS must generate audit records for successful/unsuccessful uses of the chmod, fchmod, and fchmodat system calls.
1 rule found Severity: Medium

Ubuntu 22.04 LTS must generate audit records for successful/unsuccessful uses of the chown, fchown, fchownat, and lchown system calls.
1 rule found Severity: Medium

Ubuntu 22.04 LTS must generate audit records for successful/unsuccessful uses of the creat, open, openat, open_by_handle_at, truncate, and ftruncate system calls.
1 rule found Severity: Medium

Ubuntu 22.04 LTS must generate audit records for successful/unsuccessful uses of the delete_module system call.
1 rule found Severity: Medium

Ubuntu 22.04 LTS must generate audit records for successful/unsuccessful uses of the init_module and finit_module system calls.
1 rule found Severity: Medium

Ubuntu 22.04 LTS must generate audit records for any use of the setxattr, fsetxattr, lsetxattr, removexattr, fremovexattr, and lremovexattr system calls.
1 rule found Severity: Medium

Ubuntu 22.04 LTS must generate audit records for any successful/unsuccessful use of unlink, unlinkat, rename, renameat, and rmdir system calls.
1 rule found Severity: Medium

1 rule found Severity: Medium

1 rule found Severity: Medium

1 rule found Severity: Medium

1 rule found Severity: Medium

1 rule found Severity: Medium

Ubuntu 22.04 LTS must generate audit records when successful/unsuccessful attempts to modify the /etc/sudoers file occur.
1 rule found Severity: Medium

Ubuntu 22.04 LTS must generate audit records when successful/unsuccessful attempts to modify the /etc/sudoers.d directory occur.
1 rule found Severity: Medium

Ubuntu 22.04 LTS must generate audit records for privileged activities, nonlocal maintenance, diagnostic sessions and other system-level access.
1 rule found Severity: Medium

The Central Log Server must generate audit records when successful/unsuccessful logon attempts occur.
1 rule found Severity: Medium

AlmaLinux OS 9 must generate audit records for all account creations, modifications, disabling, and termination events that affect /etc/sudoers.
1 rule found Severity: Medium

AlmaLinux OS 9 must generate audit records for all account creations, modifications, disabling, and termination events that affect /etc/group.
1 rule found Severity: Medium

AlmaLinux OS 9 must generate audit records for all account creations, modifications, disabling, and termination events that affect /etc/gshadow.
1 rule found Severity: Medium

AlmaLinux OS 9 must generate audit records for all account creations, modifications, disabling, and termination events that affect /etc/security/opasswd.
1 rule found Severity: Medium

AlmaLinux OS 9 must generate audit records for all account creations, modifications, disabling, and termination events that affect /etc/passwd.
1 rule found Severity: Medium

AlmaLinux OS 9 must generate audit records for all account creations, modifications, disabling, and termination events that affect /etc/shadow.
1 rule found Severity: Medium

AlmaLinux OS 9 must generate audit records for all account creations, modifications, disabling, and termination events that affect the files within /etc/sudoers.d/
1 rule found Severity: Medium

The Cisco switch must be configured to generate log records when administrator privileges are modified.
1 rule found Severity: Medium

The Cisco switch must generate audit records showing starting and ending time for administrator access to the system.
1 rule found Severity: Medium

1 rule found Severity: Medium

The container platform must generate audit records when successful/unsuccessful attempts to access privileges occur.
1 rule found Severity: Medium

The container platform must generate audit records when successful/unsuccessful attempts to access security objects occur.
1 rule found Severity: Medium

The container platform must generate audit records when successful/unsuccessful attempts to access security levels occur.
1 rule found Severity: Medium

The container platform must generate audit records when successful/unsuccessful attempts to access categories of information (e.g., classification levels) occur.
1 rule found Severity: Medium

The container platform must generate audit records when successful/unsuccessful attempts to modify privileges occur.
1 rule found Severity: Medium

The container platform must generate audit records when successful/unsuccessful attempts to modify security objects occur.
1 rule found Severity: Medium

The container platform must generate audit records when successful/unsuccessful attempts to modify security levels occur.
1 rule found Severity: Medium

The container platform must generate audit records when successful/unsuccessful attempts to modify categories of information (e.g., classification levels) occur.
1 rule found Severity: Medium

The container platform must generate audit records when successful/unsuccessful attempts to delete privileges occur.
1 rule found Severity: Medium

The container platform must generate audit records when successful/unsuccessful attempts to delete security levels occur.
1 rule found Severity: Medium

The container platform must generate audit records when successful/unsuccessful attempts to delete security objects occur.
1 rule found Severity: Medium

The container platform must generate audit records when successful/unsuccessful attempts to delete categories of information (e.g., classification levels) occur.
1 rule found Severity: Medium

The container platform must generate audit records when successful/unsuccessful logon attempts occur.
1 rule found Severity: Medium

1 rule found Severity: Medium

1 rule found Severity: Medium

The container platform must generate audit records when concurrent logons from different workstations and systems occur.
1 rule found Severity: Medium

The container platform runtime must generate audit records when successful/unsuccessful attempts to access objects occur.
1 rule found Severity: Medium

The container platform must generate audit records for all account creations, modifications, disabling, and termination events.
1 rule found Severity: Medium

The container runtime must generate audit records for all container execution, shutdown, restart events, and program initiations.
1 rule found Severity: Medium

1 rule found Severity: Medium

1 rule found Severity: Medium

1 rule found Severity: Medium

1 rule found Severity: Medium

1 rule found Severity: Medium

1 rule found Severity: Medium

AlmaLinux OS 9 must generate audit records for all account creations, modifications, disabling, and termination events that affect /var/log/tallylog.
1 rule found Severity: Medium

AlmaLinux OS 9 must generate audit records for all account creations, modifications, disabling, and termination events that affect /var/log/lastlog.
1 rule found Severity: Medium

1 rule found Severity: Medium

1 rule found Severity: Medium

Successful/unsuccessful uses of the umount2 system call in AlmaLinux OS 9 must generate an audit record.
1 rule found Severity: Medium

1 rule found Severity: Medium

AlmaLinux OS 9 must audit all uses of the truncate, ftruncate, creat, open, openat, and open_by_handle_at system calls.
1 rule found Severity: Medium

1 rule found Severity: Medium

1 rule found Severity: Medium

1 rule found Severity: Medium

1 rule found Severity: Medium

1 rule found Severity: Medium

1 rule found Severity: Medium

1 rule found Severity: Medium

AlmaLinux OS 9 must audit all uses of the rename, unlink, rmdir, renameat, and unlinkat system calls.
1 rule found Severity: Medium

AlmaLinux OS 9 must generate audit records for all account creations, modifications, disabling, and termination events that affect /var/log/faillock.
1 rule found Severity: Medium

1 rule found Severity: Medium

1 rule found Severity: Medium

1 rule found Severity: Medium

1 rule found Severity: Medium

1 rule found Severity: Medium

1 rule found Severity: Medium

1 rule found Severity: Medium

1 rule found Severity: Medium

1 rule found Severity: Medium

1 rule found Severity: Medium

1 rule found Severity: Medium

1 rule found Severity: Medium

1 rule found Severity: Medium

1 rule found Severity: Medium

1 rule found Severity: Medium

1 rule found Severity: Medium

1 rule found Severity: Medium

1 rule found Severity: Medium

1 rule found Severity: Medium

AlmaLinux OS 9 must audit all uses of the setxattr, fsetxattr, lsetxattr, removexattr, fremovexattr, and lremovexattr system calls.
1 rule found Severity: Medium

1 rule found Severity: Medium

The DBMS must be able to generate audit records when unsuccessful attempts to retrieve privileges/permissions occur.
1 rule found Severity: Medium

1 rule found Severity: Medium

1 rule found Severity: Medium

The DBMS must generate audit records when categories of information (e.g., classification levels/security levels) are accessed.
1 rule found Severity: Medium

The DBMS must generate audit records when unsuccessful attempts to access categories of information (e.g., classification levels/security levels) occur.
1 rule found Severity: Medium

1 rule found Severity: Medium

The DBMS must generate audit records when unsuccessful attempts to add privileges/permissions occur.
1 rule found Severity: Medium

1 rule found Severity: Medium

The DBMS must generate audit records when unsuccessful attempts to modify privileges/permissions occur.
1 rule found Severity: Medium

1 rule found Severity: Medium

1 rule found Severity: Medium

The DBMS must generate audit records when categories of information (e.g., classification levels/security levels) are modified.
1 rule found Severity: Medium

The DBMS must generate audit records when unsuccessful attempts to modify categories of information (e.g., classification levels/security levels) occur.
1 rule found Severity: Medium

1 rule found Severity: Medium

The DBMS must generate audit records when unsuccessful attempts to delete privileges/permissions occur.
1 rule found Severity: Medium

1 rule found Severity: Medium

1 rule found Severity: Medium

The DBMS must generate audit records when categories of information (e.g., classification levels/security levels) are deleted.
1 rule found Severity: Medium

The DBMS must generate audit records when unsuccessful attempts to delete categories of information (e.g., classification levels/security levels) occur.
1 rule found Severity: Medium

1 rule found Severity: Medium

1 rule found Severity: Medium

1 rule found Severity: Medium

The DBMS must generate audit records when unsuccessful attempts to execute privileged activities or other system-level access occur.
1 rule found Severity: Medium

The DBMS must generate audit records showing starting and ending time for user access to the database(s).
1 rule found Severity: Medium

The DBMS must generate audit records when concurrent logons/connections by the same user from different workstations occur.
1 rule found Severity: Medium

1 rule found Severity: Medium

1 rule found Severity: Medium

1 rule found Severity: Medium

1 rule found Severity: Medium

The firewall must generate traffic log records when attempts are made to send packets between security zones that are not authorized to communicate.
1 rule found Severity: Medium

Forescout must generate a log record when the client machine fails policy assessment because required security software is missing or has been deleted. This is required for compliance with C2C Step 1.
1 rule found Severity: Medium

1 rule found Severity: Low

1 rule found Severity: Low

1 rule found Severity: Low

1 rule found Severity: Low

1 rule found Severity: Low

Forescout must generate log records showing starting and ending time for administrator access to the system.
1 rule found Severity: Low

1 rule found Severity: Low

The operating system must generate audit records when successful/unsuccessful attempts to access privileges occur.
1 rule found Severity: Medium

The HYCU virtual appliance must generate audit records when successful/unsuccessful attempts to access privileges occur.
1 rule found Severity: Medium

The HYCU virtual appliance must generate audit records when successful/unsuccessful attempts to modify administrator privileges occur.
1 rule found Severity: Medium

The HYCU virtual appliance must generate audit records when successful/unsuccessful attempts to delete administrator privileges occur.
1 rule found Severity: Medium

The HYCU virtual appliance must generate audit records when successful/unsuccessful login attempts occur.
1 rule found Severity: Medium

The HYCU virtual appliance must generate audit records for privileged activities or other system-level access.
1 rule found Severity: Medium

The HYCU virtual appliance must generate audit records showing starting and ending time for administrator access to the system.
1 rule found Severity: Medium

The operating system must generate audit records when successful/unsuccessful attempts to access security objects occur.
1 rule found Severity: Medium

The operating system must generate audit records when successful/unsuccessful attempts to access categories of information (e.g., classification levels) occur.
1 rule found Severity: Medium

The operating system must generate audit records when successful/unsuccessful attempts to modify privileges occur.
1 rule found Severity: Medium

The operating system must generate audit records when successful/unsuccessful attempts to modify security objects occur.
1 rule found Severity: Medium

The operating system must generate audit records when successful/unsuccessful attempts to modify categories of information (e.g., classification levels) occur.
1 rule found Severity: Medium

The operating system must generate audit records when successful/unsuccessful attempts to delete privileges occur.
1 rule found Severity: Medium

The operating system must generate audit records when successful/unsuccessful attempts to delete security levels occur.
1 rule found Severity: Medium

The operating system must generate audit records when successful/unsuccessful attempts to delete security objects occur.
1 rule found Severity: Medium

1 rule found Severity: Medium

The operating system must generate audit records for privileged activities or other system-level access.
1 rule found Severity: Medium

1 rule found Severity: Medium

The operating system must generate audit records showing starting and ending time for user access to the system.
1 rule found Severity: Medium

The operating system must generate audit records when concurrent logons to the same account occur from different sources.
1 rule found Severity: Medium

The operating system must generate audit records when successful/unsuccessful accesses to objects occur.
1 rule found Severity: Medium

1 rule found Severity: Medium

The operating system must generate audit records for all account creations, modifications, disabling, and termination events.
1 rule found Severity: Medium

The operating system must generate audit records for all kernel module load, unload, and restart actions, and also for all program initiations.
1 rule found Severity: Medium

The Juniper router must be configured to generate audit records when successful/unsuccessful attempts to logon with access privileges occur.
1 rule found Severity: Medium

The Juniper router must be configured to generate log records when administrator privileges are modified.
1 rule found Severity: Medium

The Juniper router must be configured to generate log records when administrator privileges are deleted.
1 rule found Severity: Medium

The Juniper router must be configured to generate audit records when successful/unsuccessful logon attempts occur.
1 rule found Severity: Medium

1 rule found Severity: Medium

The Juniper router must be configured to generate log records when concurrent logons from different workstations occur.
1 rule found Severity: Medium

The Juniper SRX Services Gateway must generate log records when firewall filters, security screens and security policies are invoked and the traffic is denied or restricted.
1 rule found Severity: Medium

The Juniper SRX Services Gateway Firewall must generate audit records when unsuccessful attempts to access security zones occur.
1 rule found Severity: Medium

The Juniper SRX Services Gateway must generate log records when successful attempts to configure the device and use commands occur.
1 rule found Severity: Low

The Juniper SRX Services Gateway must generate log records when changes are made to administrator privileges.
1 rule found Severity: Low

The Juniper SRX Services Gateway must generate log records when administrator privileges are deleted.
1 rule found Severity: Low

1 rule found Severity: Low

1 rule found Severity: Low

The Juniper SRX Services Gateway must generate log records when concurrent logons from different workstations occur.
1 rule found Severity: Low

The Mainframe Product must generate audit records when successful/unsuccessful attempts to access privileges occur.
1 rule found Severity: Medium

1 rule found Severity: Medium

MariaDB must be able to generate audit records when unsuccessful attempts to retrieve privileges/permissions occur.
1 rule found Severity: Medium

The Mainframe Product must generate audit records when successful/unsuccessful attempts to access security objects occur.
1 rule found Severity: Medium

The Mainframe Product must generate audit records when successful/unsuccessful attempts to access security levels occur.
1 rule found Severity: Medium

The Mainframe Product must generate audit records when successful/unsuccessful attempts to access categories of information (e.g., classification levels) occur.
1 rule found Severity: Medium

The Mainframe Product must generate audit records when successful/unsuccessful attempts to modify privileges occur.
1 rule found Severity: Medium

The Mainframe Product must generate audit records when successful/unsuccessful attempts to modify security objects occur.
1 rule found Severity: Medium

The Mainframe Product must generate audit records when successful/unsuccessful attempts to modify security levels occur.
1 rule found Severity: Medium

The Mainframe Product must generate audit records when successful/unsuccessful attempts to modify categories of information (e.g., classification levels) occur.
1 rule found Severity: Medium

The Mainframe Product must generate audit records when successful/unsuccessful attempts to delete privileges occur.
1 rule found Severity: Medium

The Mainframe Product must generate audit records when successful/unsuccessful attempts to delete security levels occur.
1 rule found Severity: Medium

The Mainframe Product must generate audit records when successful/unsuccessful attempts to delete security objects occur.
1 rule found Severity: Medium

The Mainframe Product must generate audit records when successful/unsuccessful attempts to delete categories of information (e.g., classification levels) occur.
1 rule found Severity: Medium

The Mainframe Product must generate audit records when successful/unsuccessful logon attempts occur.
1 rule found Severity: Medium

The Mainframe Product must generate audit records for privileged activities or other system-level access.
1 rule found Severity: Medium

The Mainframe Product must generate audit records showing starting and ending time for user access to the system.
1 rule found Severity: Medium

The Mainframe Product must generate audit records when concurrent logons from different workstations occur.
1 rule found Severity: Medium

The Mainframe Product must generate audit records when successful/unsuccessful accesses to objects occur.
1 rule found Severity: Medium

1 rule found Severity: Medium

The Mainframe Product must generate audit records for all account creations, modifications, disabling, and termination events.
1 rule found Severity: Medium

The Mainframe Product must generate audit records for all kernel module load, unload, and restart events, and for all program initiations.
1 rule found Severity: Medium

1 rule found Severity: Medium

1 rule found Severity: Medium

MariaDB must generate audit records when categories of information (e.g., classification levels/security levels) are accessed.
1 rule found Severity: Medium

MariaDB must generate audit records when unsuccessful attempts to access categories of information (e.g., classification levels/security levels) occur.
1 rule found Severity: Medium

1 rule found Severity: Medium

1 rule found Severity: Medium

1 rule found Severity: Medium

MariaDB must generate audit records when unsuccessful attempts to modify privileges/permissions occur.
1 rule found Severity: Medium

1 rule found Severity: Medium

1 rule found Severity: Medium

MariaDB must generate audit records when categories of information (e.g., classification levels/security levels) are modified.
1 rule found Severity: Medium

MariaDB must generate audit records when unsuccessful attempts to modify categories of information (e.g., classification levels/security levels) occur.
1 rule found Severity: Medium

1 rule found Severity: Medium

MariaDB must generate audit records when unsuccessful attempts to delete privileges/permissions occur.
1 rule found Severity: Medium

1 rule found Severity: Medium

1 rule found Severity: Medium

MariaDB must generate audit records when categories of information (e.g., classification levels/security levels) are deleted.
1 rule found Severity: Medium

MariaDB must generate audit records when unsuccessful attempts to delete categories of information (e.g., classification levels/security levels) occur.
1 rule found Severity: Medium

1 rule found Severity: Medium

1 rule found Severity: Medium

1 rule found Severity: Medium

MariaDB must generate audit records when unsuccessful attempts to execute privileged activities or other system-level access occur.
1 rule found Severity: Medium

MariaDB must generate audit records showing starting and ending time for user access to the database(s).
1 rule found Severity: Medium

MariaDB must generate audit records when concurrent logons/connections by the same user from different workstations occur.
1 rule found Severity: Medium

1 rule found Severity: Medium

1 rule found Severity: Medium

1 rule found Severity: Medium

SQL Server must generate audit records when successful/unsuccessful attempts to retrieve privileges/permissions occur.
1 rule found Severity: Medium

SQL Server must be able to generate audit records when successful and unsuccessful attempts to access security objects occur.
1 rule found Severity: Medium

SQL Server must generate audit records when successful and unsuccessful attempts to access categorized information (e.g., classification levels/security levels) occur.
1 rule found Severity: Medium

SQL Server must generate audit records when successful and unsuccessful attempts to add privileges/permissions occur.
1 rule found Severity: Medium

SQL Server must generate audit records when successful and unsuccessful attempts to modify privileges/permissions occur.
1 rule found Severity: Medium

SQL Server must generate audit records when successful and unsuccessful attempts to modify security objects occur.
1 rule found Severity: Medium

SQL Server must generate audit records when successful and unsuccessful attempts to modify categorized information (e.g., classification levels/security levels) occur.
1 rule found Severity: Medium

1 rule found Severity: Medium

1 rule found Severity: Medium

SQL Server must generate audit records when successful and unsuccessful attempts to delete privileges/permissions occur.
1 rule found Severity: Medium

SQL Server must generate audit records when successful and unsuccessful attempts to delete security objects occur.
1 rule found Severity: Medium

SQL Server must generate audit records when successful and unsuccessful attempts to delete categorized information (e.g., classification levels/security levels) occur.
1 rule found Severity: Medium

SQL Server must generate audit records when successful and unsuccessful logons or connection attempts occur.
1 rule found Severity: Medium

1 rule found Severity: Medium

SQL Server must generate audit records when unsuccessful attempts to execute privileged activities or other system-level access occur.
1 rule found Severity: Medium

SQL Server must generate audit records showing starting and ending time for user access to the database(s).
1 rule found Severity: Medium

SQL Server must generate audit records when concurrent logons/connections by the same user from different workstations occur.
1 rule found Severity: Medium

1 rule found Severity: Medium

1 rule found Severity: Medium

Windows Server 2019 must be configured to audit Account Management - Security Group Management successes.
1 rule found Severity: Medium

Windows Server 2019 must be configured to audit Account Management - User Account Management successes.
1 rule found Severity: Medium

Windows Server 2019 must be configured to audit Account Management - User Account Management failures.
1 rule found Severity: Medium

Windows Server 2019 must be configured to audit Account Management - Computer Account Management successes.
1 rule found Severity: Medium

1 rule found Severity: Medium

1 rule found Severity: Medium

1 rule found Severity: Medium

1 rule found Severity: Medium

1 rule found Severity: Medium

1 rule found Severity: Medium

1 rule found Severity: Medium

1 rule found Severity: Medium

1 rule found Severity: Medium

Windows Server 2019 must be configured to audit Account Management - Other Account Management Events successes.
1 rule found Severity: Medium

1 rule found Severity: Medium

1 rule found Severity: Medium

1 rule found Severity: Medium

Windows Server 2019 must be configured to audit Policy Change - Authentication Policy Change successes.
1 rule found Severity: Medium

Windows Server 2019 must be configured to audit Policy Change - Authorization Policy Change successes.
1 rule found Severity: Medium

1 rule found Severity: Medium

1 rule found Severity: Medium

1 rule found Severity: Medium

1 rule found Severity: Medium

1 rule found Severity: Medium

1 rule found Severity: Medium

1 rule found Severity: Medium

1 rule found Severity: Medium

1 rule found Severity: Medium

1 rule found Severity: Medium

Windows Server 2019 Active Directory Group Policy objects must be configured with proper audit settings.
1 rule found Severity: Medium

1 rule found Severity: Medium

Windows Server 2019 Active Directory Infrastructure object must be configured with proper audit settings.
1 rule found Severity: Medium

Windows Server 2019 Active Directory Domain Controllers Organizational Unit (OU) object must be configured with proper audit settings.
1 rule found Severity: Medium

Windows Server 2019 Active Directory AdminSDHolder object must be configured with proper audit settings.
1 rule found Severity: Medium

Windows Server 2019 Active Directory RID Manager$ object must be configured with proper audit settings.
1 rule found Severity: Medium

1 rule found Severity: Medium

1 rule found Severity: Medium

1 rule found Severity: Medium

1 rule found Severity: Medium

1 rule found Severity: Medium

1 rule found Severity: Medium

1 rule found Severity: Medium

Windows Server 2019 must be configured to audit Object Access - Other Object Access Events successes.
1 rule found Severity: Medium

Windows Server 2019 must be configured to audit Object Access - Other Object Access Events failures.
1 rule found Severity: Medium

1 rule found Severity: Medium

1 rule found Severity: Medium

1 rule found Severity: Medium

1 rule found Severity: Medium

1 rule found Severity: Medium

Windows Server 2022 must be configured to audit Account Management - Other Account Management Events successes.
1 rule found Severity: Medium

Windows Server 2022 must be configured to audit Account Management - Security Group Management successes.
1 rule found Severity: Medium

Windows Server 2022 must be configured to audit Account Management - User Account Management successes.
1 rule found Severity: Medium

Windows Server 2022 must be configured to audit Account Management - User Account Management failures.
1 rule found Severity: Medium

1 rule found Severity: Medium

1 rule found Severity: Medium

1 rule found Severity: Medium

1 rule found Severity: Medium

1 rule found Severity: Medium

Windows Server 2022 must be configured to audit Object Access - Other Object Access Events successes.
1 rule found Severity: Medium

Windows Server 2022 must be configured to audit Object Access - Other Object Access Events failures.
1 rule found Severity: Medium

1 rule found Severity: Medium

1 rule found Severity: Medium

1 rule found Severity: Medium

1 rule found Severity: Medium

Windows Server 2022 must be configured to audit Policy Change - Authentication Policy Change successes.
1 rule found Severity: Medium

Windows Server 2022 must be configured to audit Policy Change - Authorization Policy Change successes.
1 rule found Severity: Medium

1 rule found Severity: Medium

1 rule found Severity: Medium

1 rule found Severity: Medium

1 rule found Severity: Medium

1 rule found Severity: Medium

1 rule found Severity: Medium

1 rule found Severity: Medium

1 rule found Severity: Medium

1 rule found Severity: Medium

1 rule found Severity: Medium

Windows Server 2022 Active Directory Group Policy objects must be configured with proper audit settings.
1 rule found Severity: Medium

1 rule found Severity: Medium

Windows Server 2022 Active Directory Infrastructure object must be configured with proper audit settings.
1 rule found Severity: Medium

Windows Server 2022 Active Directory Domain Controllers Organizational Unit (OU) object must be configured with proper audit settings.
1 rule found Severity: Medium

Windows Server 2022 Active Directory AdminSDHolder object must be configured with proper audit settings.
1 rule found Severity: Medium

Windows Server 2022 Active Directory RID Manager$ object must be configured with proper audit settings.
1 rule found Severity: Medium

Windows Server 2022 must be configured to audit Account Management - Computer Account Management successes.
1 rule found Severity: Medium

1 rule found Severity: Medium

1 rule found Severity: Medium

1 rule found Severity: Medium

The configuration integrity of the container platform must be ensured and runtime policies must be configured.
1 rule found Severity: High

OL 8 audit records must contain information to establish what type of events occurred, the source of events, where events occurred, and the outcome of events.
1 rule found Severity: Medium

Rancher RKE2 components must be configured in accordance with the security configuration settings based on DOD security configuration or implementation guidance, including SRGs, STIGs, NSA configuration guides, CTOs, and DTMs.
1 rule found Severity: Medium

1 rule found Severity: Medium

OpenShift must generate audit records for all DOD-defined auditable events within all components in the platform.
1 rule found Severity: Medium

OpenShift must generate audit records when successful/unsuccessful attempts to access privileges occur.
1 rule found Severity: Medium

1 rule found Severity: Medium

1 rule found Severity: Medium

OL 8 must generate audit records for all account creation events that affect "/etc/security/opasswd".
1 rule found Severity: Medium

1 rule found Severity: Medium

1 rule found Severity: Medium

1 rule found Severity: Medium

OL 8 must generate audit records for all account creations, modifications, disabling, and termination events that affect "/etc/sudoers".
1 rule found Severity: Medium

OL 8 must generate audit records for all account creations, modifications, disabling, and termination events that affect "/etc/sudoers.d/".
1 rule found Severity: Medium

The OL 8 audit system must be configured to audit any use of the "setxattr", "fsetxattr", "lsetxattr", "removexattr", "fremovexattr", and "lremovexattr" system calls.
1 rule found Severity: Medium

1 rule found Severity: Medium

OpenShift must generate audit records when successful/unsuccessful attempts to modify privileges occur.
1 rule found Severity: Medium

OpenShift must generate audit records when successful/unsuccessful attempts to modify security objects occur.
1 rule found Severity: Medium

OpenShift must generate audit records when successful/unsuccessful attempts to delete privileges occur.
1 rule found Severity: Medium

OpenShift must generate audit records when successful/unsuccessful attempts to delete security objects occur.
1 rule found Severity: Medium

1 rule found Severity: Medium

Red Hat Enterprise Linux CoreOS (RHCOS) must be configured to audit the loading and unloading of dynamic kernel modules.
1 rule found Severity: Medium

OpenShift must generate audit records when concurrent logons from different workstations and systems occur.
1 rule found Severity: Medium

1 rule found Severity: Medium

1 rule found Severity: Medium

1 rule found Severity: Medium

1 rule found Severity: Medium

1 rule found Severity: Medium

1 rule found Severity: Medium

1 rule found Severity: Medium

1 rule found Severity: Medium

1 rule found Severity: Medium

OL 8 must generate audit records for any use of the "rename", "unlink", "rmdir", "renameat", and "unlinkat" system calls.
1 rule found Severity: Medium

1 rule found Severity: Medium

1 rule found Severity: Medium

1 rule found Severity: Medium

OL 8 must generate audit records for any use of the "truncate", "ftruncate", "creat", "open", "openat", and "open_by_handle_at" system calls.
1 rule found Severity: Medium

OL 8 must generate audit records for any use of the "chown", "fchown", "fchownat", and "lchown" system calls.
1 rule found Severity: Medium

1 rule found Severity: Medium

1 rule found Severity: Medium

1 rule found Severity: Medium

1 rule found Severity: Medium

1 rule found Severity: Medium

OL 8 must allocate an "audit_backlog_limit" of sufficient size to capture processes that start prior to the audit daemon.
1 rule found Severity: Low

The Palo Alto Networks security platform must generate audit records when successful/unsuccessful attempts to access privileges occur.
1 rule found Severity: Medium

1 rule found Severity: Low

1 rule found Severity: Medium

1 rule found Severity: Medium

RHEL 9 must audit all uses of the setxattr, fsetxattr, lsetxattr, removexattr, fremovexattr, and lremovexattr system calls.
1 rule found Severity: Medium

1 rule found Severity: Medium

RHEL 9 must audit all uses of the truncate, ftruncate, creat, open, openat, and open_by_handle_at system calls.
1 rule found Severity: Medium

1 rule found Severity: Medium

1 rule found Severity: Medium

1 rule found Severity: Medium

1 rule found Severity: Medium

1 rule found Severity: Medium

The SUSE operating system must generate audit records for all account creations, modifications, disabling, and termination events that affect /etc/passwd.
2 rules found Severity: Medium

The SUSE operating system must generate audit records for all account creations, modifications, disabling, and termination events that affect /etc/group.
2 rules found Severity: Medium

The SUSE operating system must generate audit records for all account creations, modifications, disabling, and termination events that affect /etc/shadow.
2 rules found Severity: Medium

The SUSE operating system must generate audit records for all account creations, modifications, disabling, and termination events that affect /etc/opasswd.
1 rule found Severity: Medium

2 rules found Severity: Medium

2 rules found Severity: Low

2 rules found Severity: Low

1 rule found Severity: Low

1 rule found Severity: Low

2 rules found Severity: Low

2 rules found Severity: Low

2 rules found Severity: Medium

The SUSE operating system must generate audit records for all uses of the setxattr, fsetxattr, lsetxattr, removexattr, fremovexattr, and lremovexattr syscalls.
1 rule found Severity: Medium

The SUSE operating system must generate audit records for all uses of the chown, fchown, fchownat, and lchown syscalls.
1 rule found Severity: Medium

The SUSE operating system must generate audit records for all uses of the chmod, fchmod, and fchmodat system calls.
2 rules found Severity: Medium

The SUSE operating system must generate audit records for all uses of the creat, open, openat, open_by_handle_at, truncate, and ftruncate syscalls.
1 rule found Severity: Medium

1 rule found Severity: Medium

1 rule found Severity: Medium

RHEL 9 must generate audit records for all account creations, modifications, disabling, and termination events that affect /etc/sudoers.
1 rule found Severity: Medium

RHEL 9 must generate audit records for all account creations, modifications, disabling, and termination events that affect /etc/sudoers.d/ directory.
1 rule found Severity: Medium

RHEL 9 must generate audit records for all account creations, modifications, disabling, and termination events that affect /etc/group.
1 rule found Severity: Medium

RHEL 9 must generate audit records for all account creations, modifications, disabling, and termination events that affect /etc/gshadow.
1 rule found Severity: Medium

RHEL 9 must generate audit records for all account creations, modifications, disabling, and termination events that affect /etc/opasswd.
1 rule found Severity: Medium

RHEL 9 must generate audit records for all account creations, modifications, disabling, and termination events that affect /etc/passwd.
1 rule found Severity: Medium

RHEL 9 must generate audit records for all account creations, modifications, disabling, and termination events that affect /etc/shadow.
1 rule found Severity: Medium

RHEL 9 must generate audit records for all account creations, modifications, disabling, and termination events that affect /var/log/faillock.
1 rule found Severity: Medium

RHEL 9 must generate audit records for all account creations, modifications, disabling, and termination events that affect /var/log/lastlog.
1 rule found Severity: Medium

RHEL 9 must generate audit records for all account creations, modifications, disabling, and termination events that affect /var/log/tallylog.
1 rule found Severity: Medium

1 rule found Severity: Low

2 rules found Severity: Low

2 rules found Severity: Low

2 rules found Severity: Low

The SUSE operating system must generate audit records for all account creations, modifications, disabling, and termination events that affect /etc/gshadow.
2 rules found Severity: Medium

2 rules found Severity: Medium

2 rules found Severity: Medium

2 rules found Severity: Medium

Successful/unsuccessful attempts to modify categories of information (e.g., classification levels) must generate audit records.
1 rule found Severity: Medium

2 rules found Severity: Medium

The SUSE operating system must generate audit records for all modifications to the tallylog file must generate an audit record.
2 rules found Severity: Medium

2 rules found Severity: Medium

2 rules found Severity: Medium

1 rule found Severity: Medium

2 rules found Severity: Medium

2 rules found Severity: Medium

2 rules found Severity: Medium

The SUSE operating system must generate audit records for all uses of the pam_timestamp_check command.
2 rules found Severity: Medium

1 rule found Severity: Medium

The SUSE operating system must generate audit records for all uses of the init_module and finit_module syscalls.
1 rule found Severity: Medium

1 rule found Severity: Medium

The SUSE operating system must generate audit records for all uses of the unlink, unlinkat, rename, renameat and rmdir syscalls.
1 rule found Severity: Medium

The operating system must generate audit records for the selected list of auditable events as defined in DoD list of events.
2 rules found Severity: Medium

The SUSE operating system must generate audit records for all account creations, modifications, disabling, and termination events that affect /etc/security/opasswd.
1 rule found Severity: Medium

1 rule found Severity: Medium

The SUSE operating system must generate audit records for all uses of the unix_chkpwd or unix2_chkpwd commands.
1 rule found Severity: Medium

The SUSE operating system must audit all uses of the sudoers file and all files in the /etc/sudoers.d/ directory.
1 rule found Severity: Medium

The SUSE operating system must generate audit records for all uses of the creat, open, openat, open_by_handle_at, truncate, and ftruncate system calls.
1 rule found Severity: Medium

The SUSE operating system must generate audit records for all uses of the setxattr, fsetxattr, lsetxattr, removexattr, fremovexattr, and lremovexattr system calls.
1 rule found Severity: Medium

The SUSE operating system must generate audit records for all uses of the chown, fchown, fchownat, and lchown system calls.
1 rule found Severity: Medium

1 rule found Severity: Medium

1 rule found Severity: Low

1 rule found Severity: Low

1 rule found Severity: Medium

1 rule found Severity: Medium

1 rule found Severity: Medium

1 rule found Severity: Medium

The SUSE operating system must generate audit records for all uses of the delete_module system call.
1 rule found Severity: Medium

The SUSE operating system must generate audit records for all uses of the init_module and finit_module system calls.
1 rule found Severity: Medium

The SUSE operating system must generate audit records for all uses of the unlink, unlinkat, rename, renameat, and rmdir system calls.
1 rule found Severity: Medium

1 rule found Severity: Medium

1 rule found Severity: Medium

1 rule found Severity: Medium

The VMM must generate audit records when successful/unsuccessful attempts to access privileges occur.
1 rule found Severity: Medium

The UEM server must generate audit records when successful/unsuccessful attempts to access privileges occur.
1 rule found Severity: Medium

The UEM server must generate audit records when successful/unsuccessful attempts to access security objects occur.
1 rule found Severity: Medium

The UEM server must generate audit records when successful/unsuccessful attempts to modify privileges occur.
1 rule found Severity: Medium

The UEM server must generate audit records when successful/unsuccessful attempts to modify security objects occur.
1 rule found Severity: Medium

The UEM server must generate audit records when successful/unsuccessful attempts to delete privileges occur.
1 rule found Severity: Medium

The UEM server must generate audit records when successful/unsuccessful attempts to delete security objects occur.
1 rule found Severity: Medium

1 rule found Severity: Medium

1 rule found Severity: Medium

The UEM server must generate audit records showing starting and ending time for user access to the system.
1 rule found Severity: Medium

The UEM server must generate audit records when concurrent logons from different workstations occur.
1 rule found Severity: Medium

1 rule found Severity: Medium

1 rule found Severity: Medium

The UEM server must generate audit records for all account creations, modifications, disabling, and termination events.
1 rule found Severity: Medium

1 rule found Severity: Medium

The VMM must generate audit records when successful/unsuccessful attempts to access security objects occur.
1 rule found Severity: Medium

The VMM must generate audit records when successful/unsuccessful attempts to access security levels occur.
1 rule found Severity: Medium

The VMM must generate audit records when successful/unsuccessful attempts to access categories of information (e.g., classification levels) occur.
1 rule found Severity: Medium

The VMM must generate audit records when successful/unsuccessful attempts to modify privileges occur.
1 rule found Severity: Medium

The VMM must generate audit records when successful/unsuccessful attempts to modify security objects occur.
1 rule found Severity: Medium

The VMM must generate audit records when successful/unsuccessful attempts to modify security levels occur.
1 rule found Severity: Medium

The VMM must generate audit records when successful/unsuccessful attempts to delete privileges occur.
1 rule found Severity: Medium

The VMM must generate audit records when successful/unsuccessful attempts to delete security levels occur.
1 rule found Severity: Medium

The VMM must generate audit records when successful/unsuccessful attempts to delete security objects occur.
1 rule found Severity: Medium

1 rule found Severity: Medium

1 rule found Severity: Medium

1 rule found Severity: Medium

1 rule found Severity: Medium

1 rule found Severity: Medium

The VMM must generate audit records for all account creations, modifications, disabling, and termination events.
1 rule found Severity: Medium

The VMM must generate audit records for all module load, unload, and restart actions, and also for all program and guest VM initiations.
1 rule found Severity: Medium

The NSX Distributed Firewall must generate traffic log entries that can be sent by the ESXi hosts to the central syslog.
1 rule found Severity: Low

The Photon operating system must generate audit records when successful/unsuccessful attempts to access privileges occur.
3 rules found Severity: Medium

3 rules found Severity: Medium

1 rule found Severity: Medium

The Photon operating system must generate audit records when successful/unsuccessful logon attempts occur.
3 rules found Severity: Medium

The Photon operating system auditd service must generate audit records for all account creations, modifications, disabling, and termination events.
1 rule found Severity: Medium

The vCenter server must provide an immediate real-time alert to the system administrator (SA) and information system security officer (ISSO), at a minimum, of all audit failure events requiring real-time alerts.
2 rules found Severity: Medium

The vCenter ESX Agent Manager service must produce log records containing sufficient information regarding event details.
2 rules found Severity: Medium

The vCenter Lookup service must produce log records containing sufficient information regarding event details.
2 rules found Severity: Medium

vCenter must provide an immediate real-time alert to the system administrator (SA) and information system security officer (ISSO), at a minimum, of all audit failure events requiring real-time alerts.
1 rule found Severity: Medium

The vCenter Perfcharts service must produce log records containing sufficient information regarding event details.
2 rules found Severity: Medium

The Photon operating system must be configured to audit the loading and unloading of dynamic kernel modules.
2 rules found Severity: Medium

The VPN Gateway must generate log records when successful and/or unsuccessful VPN connection attempts occur.
1 rule found Severity: Medium

The vCenter STS service must produce log records containing sufficient information regarding event details.
2 rules found Severity: Medium

The vCenter UI service must produce log records containing sufficient information regarding event details.
2 rules found Severity: Medium

CL/SuperSession must be properly configured to generate SMF records for audit trail and accounting reports.
3 rules found Severity: Medium

The NSX-T Distributed Firewall must generate traffic log entries containing information to establish the details of the event.
1 rule found Severity: Medium
