Capacity
CCI-002684
Audit and/or alert organization-defined personnel when unauthorized network services are detected.
Choose one
2
Rule
Severity: Medium
The ALG providing content filtering must generate a log record when unauthorized network services are detected.
2
Rule
Severity: Medium
The ALG providing content filtering must generate an alert to, at a minimum, the ISSO and ISSM when unauthorized network services are detected.
1
Rule
Severity: Medium
The DataPower Gateway providing content filtering must generate a log record when unauthorized network services are detected.
1
Rule
Severity: Medium
The DataPower Gateway providing content filtering must generate an alert to, at a minimum, the ISSO and ISSM when unauthorized network services are detected.
2
Rule
Severity: Medium
The IDPS must generate a log record when unauthorized network services are detected.
4
Rule
Severity: Medium
The IDPS must generate an alert to the ISSM and ISSO, at a minimum, when unauthorized network services are detected.
1
Rule
Severity: Medium
Symantec ProxySG providing content filtering must generate a log record when access attempts to unauthorized websites and/or services are detected.
1
Rule
Severity: Medium
Symantec ProxySG providing content filtering must generate an alert to, at a minimum, the ISSO and ISSM when access attempts to unauthorized websites and/or services are detected.
2
Rule
Severity: High
The TPS must generate a log record so an alert can be configured to, at a minimum, the system administrator when malicious code is detected.
4
Rule
Severity: Medium
The Palo Alto Networks security platform must generate a log record when unauthorized network services are detected.
2
Rule
Severity: Medium
The Palo Alto Networks security platform must generate an alert to, at a minimum, the ISSO and ISSM when unauthorized network services are detected.
2
Rule
Severity: Medium
The Palo Alto Networks security platform must generate an alert to the ISSO and ISSM, at a minimum, when unauthorized network services are detected.
1
Rule
Severity: Medium
The F5 BIG-IP appliance must generate event log records that can be forwarded to the centralized events log.
1
Rule
Severity: Medium
The F5 BIG-IP appliance providing content filtering must generate a log record when unauthorized network services are detected.
Patternfly
PatternFly elements
The content of the drawer really is up to you. It could have form fields, definition lists, text lists, labels, charts, progress bars, etc. Spacing recommendation is 24px margins. You can put tabs in here, and can also make the drawer scrollable.
Modules
66%