CCI-002684
Audit and/or alert organization-defined personnel when unauthorized network services are detected.
The DataPower Gateway providing content filtering must generate a log record when unauthorized network services are detected.
1 rule found Severity: Medium

The DataPower Gateway providing content filtering must generate an alert to, at a minimum, the ISSO and ISSM when unauthorized network services are detected.
1 rule found Severity: Medium

Symantec ProxySG providing content filtering must generate a log record when access attempts to unauthorized websites and/or services are detected.
1 rule found Severity: Medium

Symantec ProxySG providing content filtering must generate an alert to, at a minimum, the ISSO and ISSM when access attempts to unauthorized websites and/or services are detected.
1 rule found Severity: Medium

The F5 BIG-IP appliance must generate event log records that can be forwarded to the centralized events log.
1 rule found Severity: Medium

The F5 BIG-IP appliance providing content filtering must generate a log record when unauthorized network services are detected.
1 rule found Severity: Medium

The TPS must generate a log record so an alert can be configured to, at a minimum, the system administrator when malicious code is detected.
1 rule found Severity: High

The IDPS must generate an alert to the ISSM and ISSO, at a minimum, when unauthorized network services are detected.
2 rules found Severity: Medium

The ALG providing content filtering must generate a log record when unauthorized network services are detected.
1 rule found Severity: Medium

The ALG providing content filtering must generate an alert to, at a minimum, the ISSO and ISSM when unauthorized network services are detected.
1 rule found Severity: Medium

1 rule found Severity: Medium

The Palo Alto Networks security platform must generate a log record when unauthorized network services are detected.
2 rules found Severity: Medium

The Palo Alto Networks security platform must generate an alert to, at a minimum, the ISSO and ISSM when unauthorized network services are detected.
1 rule found Severity: Medium
