TIBCO LogLogic Reports and Alerts Quick Reference

The following table lists the reports and alerts included in the LogLogic® Compliance Suite - NERC Edition.

Implementation Specification Description TIBCO LogLogic Reports and Alerts
CIP-003-1
CIP-003-1 R3.2 Documented exceptions to the cyber security policy must include an explanation as to why the exception is necessary and any compensating measures. Compliance Suite Reports

NERC: Escalated Privilege Activities on Servers

Compliance Suite Alerts

NERC: UNIX Privilege Escalated

CIP-003-1 R5.2 The Responsible Entity shall review at least annually the access privileges to protected information to confirm that access privileges are correct and that they correspond with the Responsible Entity’s needs and appropriate personnel roles and responsibilities. Compliance Suite Reports

NERC: Account Activities on UNIX Servers

NERC: Account Activities on Windows Servers

NERC: Accounts Changed on NetApp Filer

NERC: Accounts Changed on TIBCO Administrator

NERC: Accounts Changed on TIBCO ActiveMatrix Administrator

NERC: Accounts Changed on UNIX Servers

NERC: Accounts Changed on Windows Servers

NERC: Accounts Created on NetApp Filer

NERC: Accounts Created on NetApp Filer Audit

NERC: Accounts Created on Sidewinder

NERC: Accounts Created on Symantec Endpoint Protection

NERC: Accounts Created on TIBCO Administrator

NERC: Accounts Created on TIBCO ActiveMatrix Administrator

CIP-003-1 R5.2 The Responsible Entity shall review at least annually the access privileges to protected information to confirm that access privileges are correct and that they correspond with the Responsible Entity’s needs and appropriate personnel roles and responsibilities. Compliance Suite Reports (Cont.)

NERC: Accounts Created on UNIX Servers

NERC: Accounts Created on Windows Servers

NERC: Accounts Deleted on NetApp Filer

NERC: Accounts Deleted on NetApp Filer Audit

NERC: Accounts Deleted on Symantec Endpoint Protection

NERC: Accounts Deleted on TIBCO Administrator

NERC: Accounts Deleted on TIBCO ActiveMatrix Administrator

NERC: Accounts Deleted on Sidewinder

NERC: Accounts Deleted on UNIX Servers

NERC: Accounts Deleted on Windows Servers

NERC: Cisco ISE, ACS Accounts Created

NERC: Cisco ISE, ACS Accounts Removed

NERC: DB2 Database Successful Logins

NERC: ESX Accounts Activities

NERC: ESX Accounts Created

NERC: ESX Accounts Deleted

NERC: ESX Logins Succeeded

NERC: F5 BIG-IP TMOS Login Successful

NERC: Guardium SQL Guard Audit Logins

NERC: Guardium SQL Guard Logins

NERC: HP NonStop Audit Login Successful

NERC: LogLogic DSM Logins

NERC: LogLogic Management Center Account Activities

NERC: LogLogic Management Center Login

NERC: Microsoft Operations Manager - Windows Accounts Activities

NERC: Microsoft Operations Manager - Windows Accounts Changed

NERC: Microsoft Operations Manager - Windows Accounts Created

NERC: Microsoft Operations Manager - Windows Accounts Enabled

NERC: Microsoft SQL Server Database Successful Logins

CIP-003-1 R5.2 The Responsible Entity shall review at least annually the access privileges to protected information to confirm that access privileges are correct and that they correspond with the Responsible Entity’s needs and appropriate personnel roles and responsibilities. Compliance Suite Reports (Cont.)

NERC: NetApp Filer Audit Accounts Enabled

NERC: NetApp Filer Audit Group Members Added

NERC: NetApp Filer Audit Group Members Deleted

NERC: NetApp Filer Audit Login Successful

NERC: NetApp Filer Login Successful

NERC: Oracle Database Successful Logins

NERC: RACF Accounts Created

NERC: RACF Accounts Deleted

NERC: RACF Accounts Modified

NERC: RACF Successful Logins

NERC: Successful Logins

NERC: Sybase ASE Successful Logins

NERC: TIBCO ActiveMatrix Administrator Successful Logins

NERC: vCenter Successful Logins

NERC: vCloud Successful Logins

NERC: vCloud User Created

NERC: vCloud User Deleted or Removed

NERC: Windows Accounts Enabled

NERC: Windows Accounts Locked

NERC: Windows Group Members Added

NERC: Windows Group Members Deleted

CIP-003-1 R5.2 The Responsible Entity shall review at least annually the access privileges to protected information to confirm that access privileges are correct and that they correspond with the Responsible Entity’s needs and appropriate personnel roles and responsibilities. Compliance Suite Alerts

NERC: Accounts Created

NERC: Accounts Deleted

NERC: Accounts Enabled

NERC: Accounts Locked

NERC: Accounts Modified

NERC: Group Members Added

NERC: Group Members Deleted

NERC: Guardium SQL Guard Logins

NERC: Logins Succeeded

NERC: LogLogic DSM Logins

NERC: vCenter User Login Successful

NERC: vCloud Director Login Success

NERC: vCloud User Created

NERC: Windows Group Members Added

NERC: Windows Group Members Deleted

CIP-003-1 R5.3 The Responsible Entity shall assess and document at least annually the processes for controlling access privileges to protected information. Compliance Suite Reports

NERC: Check Point Configuration Changes

NERC: Cisco ISE, ACS Configuration Changes

NERC: Cisco PIX, ASA, FWSM Failover Disabled

NERC: Cisco PIX, ASA, FWSM Failover Performed

NERC: Cisco PIX, ASA, FWSM Policy Changed

NERC: Cisco PIX, ASA, FWSM Restarted

NERC: Cisco Switch Policy Changes

NERC: DB2 Database Failed Logins

NERC: DB2 Database Configuration Changes

NERC: ESX Failed Logins

NERC: ESX Logins Failed Unknown User

NERC: F5 BIG-IP TMOS Login Failed

NERC: Failed Logins

NERC: Guardium SQL Guard Audit Configuration Changes

NERC: Guardium SQL Guard Configuration Changes

NERC: HP NonStop Audit Configuration Changes

NERC: HP NonStop Audit Login Failed

NERC: HP NonStop Audit Object Changes

NERC: i5/OS Audit Configuration Changes

NERC: i5/OS System Management Changes

NERC: i5/OS User Profile Creation, Modification, or Restoration

NERC: Juniper Firewall HA State Changed

NERC: Juniper Firewall Policy Changed

NERC: Juniper Firewall Policy Out of Sync

NERC: LogLogic DSM Configuration Changes

NERC: LogLogic Universal Collector Configuration Changes

NERC: Microsoft Sharepoint Policy Add, Remove, or Modify

NERC: Microsoft SQL Server Configuration Changes

NERC: Microsoft SQL Server Database Failed Logins

CIP-003-1 R5.3 The Responsible Entity shall assess and document at least annually the processes for controlling access privileges to protected information. Compliance Suite Reports (Cont.)

NERC: NetApp Filer Audit Login Failed

NERC: NetApp Filer Login Failed

NERC: Oracle Database Configuration Changes

NERC: Oracle Database Failed Logins

NERC: RACF Failed Logins

NERC: Sidewinder Configuration Changes

NERC: Sybase ASE Database Configuration Changes

NERC: Sybase ASE Failed Logins

NERC: Symantec Endpoint Protection Configuration Changes

NERC: TIBCO ActiveMatrix Administrator Failed Logins

NERC: vCenter Change Attributes

NERC: vCenter Failed Logins

NERC: vCenter Modify Firewall Policy

NERC: vCenter Orchestrator Change Attributes

NERC: vCenter Orchestrator Failed Logins

NERC: vCenter Orchestrator vSwitch Added, Changed or Removed

NERC: vCenter Resource Usage Change

NERC: vCenter vSwitch Added, Changed or Removed

NERC: vCloud Failed Logins

NERC: vShield Edge Configuration Changes

Compliance Suite Alerts

NERC: Check Point Policy Changed

NERC: Cisco ISE, ACS Configuration Changed

CIP-003-1 R5.3 The Responsible Entity shall assess and document at least annually the processes for controlling access privileges to protected information. Compliance Suite Alerts (Cont.)

NERC: System Restarted

NERC: Cisco PIX, ASA, FWSM Failover Disabled

NERC: Cisco PIX, ASA, FWSM Failover Performed

NERC: Cisco PIX, ASA, FWSM Logon Failure

NERC: Cisco PIX, ASA, FWSM Logon Success

NERC: Cisco PIX, ASA, FWSM Policy Changed

NERC: Cisco PIX, ASA, FWSM Shun Added

NERC: Cisco PIX, ASA, FWSM Shun Deleted

NERC: Cisco Switch Card Insert

NERC: Cisco Switch Device Reload

NERC: Cisco Switch Device Restart

NERC: Cisco Switch HA Failure (ver)

NERC: Cisco Switch Interface Change

NERC: Cisco Switch Interface Down

NERC: Cisco Switch Interface Up

NERC: Cisco Switch Policy Changed

NERC: DB2 Database Configuration Change

NERC: Disallowed Services

NERC: DNS Server Shutdown

NERC: DNS Server Started

NERC: Excessive IDS Attack

NERC: Guardium SQL Guard Config Changes

NERC: HP NonStop Audit Configuration Changed

NERC: Juniper Firewall HA State Change

NERC: Juniper Firewall Logon Failure

NERC: Juniper Firewall Logon Success

NERC: Juniper Firewall Policy Changes

NERC: Juniper Firewall Policy Out of Sync

NERC: Juniper Firewall Peer Missing

NERC: Juniper Firewall System Reset

NERC: Logins Failed

CIP-003-1 R5.3 The Responsible Entity shall assess and document at least annually the processes for controlling access privileges to protected information. Compliance Suite Alerts (Cont.)

NERC: LogLogic DSM Configuration Changes

NERC: LogLogic Universal Collector Configuration Changed

NERC: Microsoft Sharepoint Policies Added, Removed, Modified

NERC: NetApp Authentication Failure

NERC: NetApp Bad File Handle

NERC: NetApp Bootblock Update

NERC: NetApp Filer Disk Failure

NERC: NetApp Filer File System Full

NERC: NetApp Filer Disk Inserted

NERC: NetApp Filer Disk Pulled

NERC: NetApp Filer Snapshot Error

NERC: NetApp Filer Unauthorized Mounting

NERC: Oracle Database Configuration Change

NERC: Policy Violation

NERC: Sidewinder Configuration Changed

NERC: Sybase ASE Database Config Changes

NERC: Symantec Endpoint Protection Configuration Changed

NERC: Symantec Endpoint Protection Policy Add, Delete, Modify

NERC: System Anomalies

NERC: UNIX Groups Added

NERC: UNIX Groups Deleted

NERC: UNIX Groups Modified

NERC: vCenter Firewall Policy Change

NERC: vCenter Orchestrator Login Failed

NERC: vCenter Orchestrator vSwitch Add, Modify or Delete

NERC: vCenter User Login Failed

NERC: vCenter vSwitch Add, Modify or Delete

NERC: vCloud Director Login Failed

NERC: vCloud User, Group, or Role Modified

NERC: vShield Edge Configuration Change

CIP-003-1 R6 Change Control and Configuration Management — The Responsible Entity shall establish and document a process of change control and configuration management for adding, modifying, replacing, or removing Critical Cyber Asset hardware or software, and implement supporting configuration management activities to identify, control and document all entity-or vendor-related changes to hardware and software components of Critical Cyber Assets pursuant to the change control process. Compliance Suite Reports

NERC: Check Point Configuration Changes

NERC: Cisco ISE, ACS Configuration Changes

NERC: Cisco PIX, ASA, FWSM Failover Disabled

NERC: Cisco PIX, ASA, FWSM Failover Performed

NERC: Cisco PIX, ASA, FWSM Policy Changed

NERC: Cisco PIX, ASA, FWSM Restarted

NERC: Cisco Switch Policy Changes

NERC: DB2 Database Failed Logins

NERC: DB2 Database Configuration Changes

NERC: ESX Failed Logins

NERC: ESX Logins Failed Unknown User

NERC: F5 BIG-IP TMOS Login Failed

NERC: Failed Logins

NERC: Guardium SQL Guard Audit Configuration Changes

NERC: Guardium SQL Guard Configuration Changes

NERC: HP NonStop Audit Configuration Changes

NERC: HP NonStop Audit Login Failed

NERC: HP NonStop Audit Object Changes

NERC: i5/OS Audit Configuration Changes

NERC: i5/OS System Management Changes

NERC: i5/OS User Profile Creation, Modification, or Restoration

NERC: Juniper Firewall HA State Changed

NERC: Juniper Firewall Policy Changed

NERC: Juniper Firewall Policy Out of Sync

NERC: LogLogic DSM Configuration Changes

NERC: LogLogic Universal Collector Configuration Changes

NERC: Microsoft Sharepoint Policy Add, Remove, or Modify

NERC: Microsoft SQL Server Configuration Changes

NERC: Microsoft SQL Server Database Failed Logins

CIP-003-1 R6 Change Control and Configuration Management — The Responsible Entity shall establish and document a process of change control and configuration management for adding, modifying, replacing, or removing Critical Cyber Asset hardware or software, and implement supporting configuration management activities to identify, control and document all entity-or vendor-related changes to hardware and software components of Critical Cyber Assets pursuant to the change control process. Compliance Suite Reports (Cont.)

NERC: NetApp Filer Audit Login Failed

NERC: NetApp Filer Login Failed

NERC: Oracle Database Configuration Changes

NERC: Oracle Database Failed Logins

NERC: RACF Failed Logins

NERC: Sidewinder Configuration Changes

NERC: Sybase ASE Database Configuration Changes

NERC: Sybase ASE Failed Logins

NERC: Symantec Endpoint Protection Configuration Changes

NERC: TIBCO ActiveMatrix Administrator Failed Logins

NERC: vCenter Change Attributes

NERC: vCenter Failed Logins

NERC: vCenter Modify Firewall Policy

NERC: vCenter Orchestrator Change Attributes

NERC: vCenter Orchestrator Failed Logins

NERC: vCenter Orchestrator Virtual Machine Created

NERC: vCenter Orchestrator Virtual Machine Deleted

NERC: vCenter Orchestrator vSwitch Added, Changed or Removed

NERC: vCenter Resource Usage Change

NERC: vCenter Virtual Machine Created

NERC: vCenter Virtual Machine Deleted

NERC: vCenter vSwitch Added, Changed or Removed

NERC: vCloud Failed Logins

NERC: vCloud Organization Created

NERC: vCloud Organization Deleted

NERC: vCloud Organization Modified

NERC: vCloud vApp Created, Modified, or Deleted

NERC: vCloud vDC Created, Modified, or Deleted

NERC: vShield Edge Configuration Changes

Compliance Suite Alerts

NERC: Check Point Policy Changed

NERC: Cisco ISE, ACS Configuration Changed

CIP-003-1 R6 Change Control and Configuration Management — The Responsible Entity shall establish and document a process of change control and configuration management for adding, modifying, replacing, or removing Critical Cyber Asset hardware or software, and implement supporting configuration management activities to identify, control and document all entity or vendor related changes to hardware and software components of Critical Cyber Assets pursuant to the change control process. Compliance Suite Alerts (Cont.)

NERC: System Restarted

NERC: Cisco PIX, ASA, FWSM Failover Disabled

NERC: Cisco PIX, ASA, FWSM Failover Performed

NERC: Cisco PIX, ASA, FWSM Logon Failure

NERC: Cisco PIX, ASA, FWSM Logon Success

NERC: Cisco PIX, ASA, FWSM Policy Changed

NERC: Cisco PIX, ASA, FWSM Shun Added

NERC: Cisco PIX, ASA, FWSM Shun Deleted

NERC: Cisco Switch Card Insert

NERC: Cisco Switch Device Reload

NERC: Cisco Switch Device Restart

NERC: Cisco Switch HA Failure (ver)

NERC: Cisco Switch Interface Change

NERC: Cisco Switch Interface Down

NERC: Cisco Switch Interface Up

NERC: Cisco Switch Policy Changed

NERC: DB2 Database Configuration Change

NERC: Disallowed Services

NERC: DNS Server Shutdown

NERC: DNS Server Started

NERC: Excessive IDS Attack

NERC: Guardium SQL Guard Config Changes

NERC: HP NonStop Audit Configuration Changed

NERC: Juniper Firewall HA State Change

NERC: Juniper Firewall Logon Failure

NERC: Juniper Firewall Logon Success

NERC: Juniper Firewall Policy Changes

NERC: Juniper Firewall Policy Out of Sync

NERC: Juniper Firewall Peer Missing

NERC: Juniper Firewall System Reset

NERC: Logins Failed

CIP-003-1 R6 Change Control and Configuration Management — The Responsible Entity shall establish and document a process of change control and configuration management for adding, modifying, replacing, or removing Critical Cyber Asset hardware or software, and implement supporting configuration management activities to identify, control and document all entity or vendor related changes to hardware and software components of Critical Cyber Assets pursuant to the change control process. Compliance Suite Alerts (Cont.)

NERC: LogLogic DSM Configuration Changes

NERC: LogLogic Universal Collector Configuration Changed

NERC: Microsoft Sharepoint Policies Added, Removed, Modified

NERC: NetApp Authentication Failure

NERC: NetApp Bad File Handle

NERC: NetApp Bootblock Update

NERC: NetApp Filer Disk Failure

NERC: NetApp Filer File System Full

NERC: NetApp Filer Disk Inserted

NERC: NetApp Filer Disk Pulled

NERC: NetApp Filer Snapshot Error

NERC: NetApp Filer Unauthorized Mounting

NERC: Oracle Database Configuration Change

NERC: Policy Violation

NERC: Sidewinder Configuration Changed

NERC: Sybase ASE Database Config Changes

NERC: Symantec Endpoint Protection Configuration Changed

NERC: Symantec Endpoint Protection Policy Add, Delete, Modify

NERC: System Anomalies

NERC: UNIX Groups Added

NERC: UNIX Groups Deleted

NERC: UNIX Groups Modified

NERC: vCenter Create Virtual Machine

NERC: vCenter Delete Virtual Machine

NERC: vCenter Firewall Policy Change

NERC: vCenter Orchestrator Create Virtual Machine

NERC: vCenter Orchestrator Delete Virtual Machine

NERC: vCenter Orchestrator Login Failed

NERC: vCenter Orchestrator vSwitch Add, Modify or Delete

CIP-003-1 R6 Change Control and Configuration Management — The Responsible Entity shall establish and document a process of change control and configuration management for adding, modifying, replacing, or removing Critical Cyber Asset hardware or software, and implement supporting configuration management activities to identify, control and document all entity or vendor related changes to hardware and software components of Critical Cyber Assets pursuant to the change control process. Compliance Suite Alerts (Cont.)

NERC: vCenter User Login Failed

NERC: vCenter vSwitch Add, Modify or Delete

NERC: vCloud Director Login Failed

NERC: vCloud Organization Created

NERC: vCloud Organization Deleted

NERC: vCloud Organization Modified

NERC: vCloud User, Group, or Role Modified

NERC: vCloud vApp Created, Deleted, or Modified

NERC: vCloud vDC Created, Modified, or Deleted

NERC: vShield Edge Configuration Change

CIP-005-1
CIP-005-1 R1.6 The Responsible Entity shall maintain documentation of Electronic Security Perimeter(s), all interconnected Critical and non-critical Cyber Assets within the Electronic Security Perimeter(s), all electronic access points to the Electronic Security Perimeter(s) and the Cyber Assets deployed for the access control and monitoring of these access points. Compliance Suite Reports

NERC: Active Connections for Cisco ASA

NERC: Active Connections for Cisco FWSM

NERC: Active Connections for Cisco PIX

NERC: Active VPN Connections for Cisco VPN Concentrators

NERC: Active VPN Connections for Nortel Contivity

NERC: Active VPN Connections for RADIUS

NERC: Denied Connections by IP Addresses

NERC: Denied Connections - Cisco Router

NERC: Denied Connections - Cisco IOS

NERC: Denied Connections - Cisco NXOS

NERC: Denied Connections - F5 BIG-IP TMOS

NERC: Denied Connections - Sidewinder

NERC: Denied Connections - VMware vShield

NERC: Denied Inbound Connections - Check Point

NERC: Denied Inbound Connections - Cisco ASA

NERC: Denied Inbound Connections - Cisco FWSM

NERC: Denied Inbound Connections - Cisco PIX

NERC: Denied Inbound Connections - Juniper Firewall

NERC: Denied Outbound Connections - Check Point

NERC: Denied Outbound Connections - Cisco ASA

NERC: Denied Outbound Connections - Cisco FWSM

NERC: Denied Outbound Connections - Cisco PIX

NERC: Denied Outbound Connections - Juniper Firewall

NERC: Files Downloaded via Proxy

NERC: Files Downloaded via Proxy - Blue Coat Proxy

NERC: Files Downloaded via Proxy - Cisco WSA

NERC: Files Downloaded via Proxy - Microsoft IIS

NERC: Files Downloaded via the Web

NERC: Files Downloaded via the Web - F5 BIG-IP TMOS

NERC: Files Downloaded via the Web - Microsoft IIS

NERC: Files Uploaded via Proxy - Microsoft IIS

CIP-005-1 R1.6 The Responsible Entity shall maintain documentation of Electronic Security Perimeter(s), all interconnected Critical and non-critical Cyber Assets within the Electronic Security Perimeter(s), all electronic access points to the Electronic Security Perimeter(s) and the Cyber Assets deployed for the access control and monitoring of these access points. Compliance Suite Reports -(Cont.)

NERC: Files Uploaded via the Web - Microsoft IIS

NERC: Files Uploaded via Proxy

NERC: Files Uploaded via Proxy - Blue Coat Proxy

NERC: Files Uploaded via Proxy - Cisco WSA

NERC: Files Uploaded via the Web

NERC: Files Uploaded via the Web - F5 BIG-IP TMOS

NERC: Most Active Ports Through Firewall - Check Point

NERC: Most Active Ports Through Firewall - Cisco ASA

NERC: Most Active Ports Through Firewall - Cisco FWSM

NERC: Most Active Ports Through Firewall - Cisco PIX

NERC: Most Active Ports Through Firewall - Fortinet

NERC: Most Active Ports Through Firewall - Juniper Firewall

NERC: Most Active Ports Through Firewall - Nortel

NERC: NetApp Filer Accounts Locked

NERC: Ports Allowed Access - Cisco IOS

NERC: Ports Allowed Access - Cisco Netflow

NERC: Ports Allowed Access - Cisco PIX

NERC: Ports Allowed Access - Check Point

NERC: Ports Allowed Access - Cisco ASA

NERC: Ports Allowed Access - Cisco FWSM

NERC: Ports Allowed Access - F5 BIG-IP TMOS

NERC: Ports Allowed Access - Fortinet

NERC: Ports Allowed Access - Juniper Firewall

NERC: Ports Allowed Access - Juniper JunOS

NERC: Ports Allowed Access - Juniper RT Flow

NERC: Ports Allowed Access - PANOS

CIP-005-1 R1.6 The Responsible Entity shall maintain documentation related to the following entities:
  • Electronic Security Perimeters
  • Interconnected Critical and non-critical Cyber Assets within the Electronic Security Perimeters
  • Electronic access points to the Electronic Security Perimeters
  • Cyber Assets deployed for the access control and monitoring of these access points
Compliance Suite Reports (Cont.)

NERC: Ports Allowed Access - Sidewinder

NERC: Ports Allowed Access - Nortel

NERC: Ports Allowed Access - VMware vShield

NERC: VPN Denied Connections by Users

NERC: vShield Risky Firewall Traffic

Compliance Suite Alerts

NERC: F5 BIG-IP TMOS Risky Traffic

NERC: vShield Risky Traffic

CIP-005-1 R2.2 At all access points to the Electronic Security Perimeter(s), the Responsible Entity shall enable only ports and services required for operations and for monitoring Cyber Assets within the Electronic Security Perimeter, and shall document, individually or by specified grouping, the configuration of those ports and services. Compliance Suite Reports

NERC: Allowed URLs by Source IPs

NERC: Allowed URLs by Source IPs - F5 BIG-IP TMOS

NERC: Allowed URLs by Source IPs - Microsoft IIS

NERC: Allowed URLs by Source Users

NERC: Allowed URLs by Source Users - F5 BIG-IP TMOS

NERC: Allowed URLs by Source Users - Microsoft IIS

NERC: Blocked URLs by Source IPs

NERC: Blocked URLs by Source IPs - F5 BIG-IP TMOS

NERC: Blocked URLs by Source IPs - Microsoft IIS

NERC: Blocked URLs by Source Users

NERC: Blocked URLs by Source Users - F5 BIG-IP TMOS

NERC: Blocked URLs by Source Users - Microsoft IIS

Compliance Suite Alerts

None

CIP-005-1 R2.3 The Responsible Entity shall maintain a procedure for securing dial-up access to the Electronic Security Perimeter(s). Compliance Suite Reports

NERC: Logins by Authentication Type

Compliance Suite Alerts

None

CIP-005-1 R2.4 Where external interactive access into the Electronic Security Perimeter has been enabled, the Responsible Entity shall implement strong procedural or technical controls at the access points to ensure authenticity of the accessing party, where technically feasible. Compliance Suite Reports

NERC: DB2 Database User Additions and Deletions

NERC: DB2 Database Successful Logins

NERC: Denied Connections by IP Addresses

NERC: Denied Connections - Cisco IOS

NERC: Denied Connections - Cisco NXOS

NERC: Denied Connections - Cisco Router

NERC: Denied Connections - F5 BIG-IP TMOS

NERC: Denied Connections - Sidewinder

NERC: Denied Connections - VMware vShield

NERC: Denied Inbound Connections - Check Point

NERC: Denied Inbound Connections - Cisco ASA

NERC: Denied Inbound Connections - Cisco FWSM

NERC: Denied Inbound Connections - Cisco PIX

NERC: Denied Inbound Connections - Juniper Firewall

NERC: Denied Outbound Connections - Check Point

NERC: Denied Outbound Connections - Cisco ASA

NERC: Denied Outbound Connections - Cisco FWSM

NERC: Denied Outbound Connections - Cisco PIX

NERC: Denied Outbound Connections - Juniper Firewall

NERC: ESX Logins Succeeded

NERC: F5 BIG-IP TMOS Login Successful

NERC: Files Accessed on Servers

NERC: Files Accessed on NetApp Filer Audit

NERC: Files Accessed through Juniper SSL VPN (Secure Access)

NERC: Files Accessed through PANOS

NERC: Files Accessed Through Pulse Connect Secure

NERC: Guardium SQL Guard Audit Logins

NERC: Guardium SQL Guard Logins

NERC: HP NonStop Audit Login Successful

NERC: HP NonStop Audit Object Access

NERC: i5/OS Object Access

NERC: LogLogic DSM Logins

NERC: LogLogic Management Center Login

NERC: Microsoft Sharepoint Content Deleted

NERC: Microsoft Sharepoint Content Updates

CIP-005-1 R2.4 Where external interactive access into the Electronic Security Perimeter has been enabled, the Responsible Entity shall implement strong procedural or technical controls at the access points to ensure authenticity of the accessing party, where technically feasible. Compliance Suite Reports (Cont.)

NERC: Microsoft SQL Server Database Permission Events

NERC: Microsoft SQL Server Database Successful Logins

NERC: Microsoft SQL Server Database User Additions and Deletions

NERC: NetApp Filer Audit Login Successful

NERC: NetApp Filer Audit Group Members Deleted

NERC: NetApp Filer File Activity

NERC: NetApp Filer Login Successful

NERC: Oracle Database Successful Logins

NERC: Oracle Database Permission Events

NERC: Oracle Database User Additions and Deletions

NERC: Ports Denied Access - Check Point

NERC: Ports Denied Access - Cisco ASA

NERC: Ports Denied Access - Cisco FWSM

NERC: Ports Denied Access - Cisco IOS

NERC: Ports Denied Access - Cisco PIX

NERC: Ports Denied Access - Cisco Router

NERC: Ports Denied Access - F5 BIG-IP TMOS

NERC: Ports Denied Access - Fortinet

NERC: Ports Denied Access - Juniper Firewall

NERC: Ports Denied Access - Juniper JunOS

NERC: Ports Denied Access - Juniper RT Flow

NERC: Ports Denied Access - Nortel

NERC: Ports Denied Access - PANOS

NERC: Ports Denied Access - Sidewinder

NERC: Ports Denied Access - VMware vShield

NERC: RACF Files Accessed

NERC: RACF Successful Logins

NERC: Root Logins

NERC: Successful Logins

NERC: Sybase ASE Database User Additions and Deletions

NERC: Sybase ASE Successful Logins

CIP-005-1 R2.4 Where external interactive access into the Electronic Security Perimeter has been enabled, the Responsible Entity shall implement strong procedural or technical controls at the access points to ensure authenticity of the accessing party, where technically feasible. Compliance Suite Reports (Cont.)

NERC: TIBCO ActiveMatrix Administrator Successful Logins

NERC: Unauthorized Logins

NERC: vCenter Data Move

NERC: vCenter Datastore Events

NERC: vCenter Orchestrator Datastore Events

NERC: vCenter Orchestrator Data Move

NERC: vCenter Successful Logins

NERC: vCloud Successful Logins

NERC: VPN Denied Connections by Users

NERC: VPN Users Accessing Corporate Network

NERC: Windows Group Members Deleted

Compliance Suite Alerts

NERC: DB2 Database User Added or Dropped

NERC: Group Members Deleted

NERC: Guardium SQL Guard Logins

NERC: Logins Succeeded

NERC: LogLogic DSM Logins

NERC: Microsoft Sharepoint Content Deleted

NERC: Microsoft Sharepoint Content Updated

NERC: Neoteris Files Accessed

NERC: Oracle Database User Added or Deleted

NERC: RACF Files Accessed

NERC: vCenter Data Move

NERC: vCenter Datastore Event

NERC: vCenter Orchestrator Data Move

NERC: vCenter Orchestrator Datastore Events

NERC: vCenter User Login Successful

NERC: vCloud Director Login Success

NERC: Windows Files Accessed

NERC: Windows Group Members Deleted

CIP-005-1 R3 The Responsible Entity shall implement and document an electronic or manual process(es) for monitoring and logging access at access points to the Electronic Security Perimeter(s) twenty-four hours a day, seven days a week Compliance Suite Reports

NERC: Active Directory System Changes

NERC: Cisco ISE, ACS Password Changes

NERC: DB2 Database Failed Logins

NERC: DB2 Database Successful Logins

NERC: DNS Server Error

NERC: ESX Failed Logins

NERC: ESX Logins Failed Unknown User

NERC: ESX Logins Succeeded

NERC: F5 BIG-IP TMOS Login Failed

NERC: F5 BIG-IP TMOS Login Successful

NERC: F5 BIG-IP TMOS Password Changes

NERC: Failed Logins

NERC: Guardium SQL Guard Audit Logins

NERC: Guardium SQL Guard Logins

NERC: HP NonStop Audit Login Failed

NERC: HP NonStop Audit Login Successful

NERC: HP NonStop Audit Permissions Changed

NERC: LogLogic DSM Logins

NERC: LogLogic Management Center Login

NERC: LogLogic Management Center Password Changes

NERC: Microsoft Operations Manager - Windows Permissions Modified

NERC: Microsoft Sharepoint Content Deleted

NERC: Microsoft Sharepoint Content Updates

NERC: Microsoft Sharepoint Permissions Changed

NERC: Microsoft Sharepoint Policy Add, Remove, or Modify

NERC: Microsoft SQL Server Database Failed Logins

NERC: Microsoft SQL Server Database Successful Logins

CIP-005-1 R3 The Responsible Entity shall implement and document an electronic or manual process(es) for monitoring and logging access at access points to the Electronic Security Perimeter(s) twenty-four hours a day, seven days a week Compliance Suite Reports (Cont.)

NERC: NetApp Filer Audit Login Failed

NERC: NetApp Filer Audit Login Successful

NERC: NetApp Filer Login Failed

NERC: NetApp Filer Login Successful

NERC: NetApp Filer Password Changes

NERC: Oracle Database Failed Logins

NERC: Oracle Database Successful Logins

NERC: Periodic Review of Log Reports

NERC: Periodic Review of User Access Logs

NERC: Permissions Modified on Windows Servers

NERC: RACF Failed Logins

NERC: RACF Permissions Changed

NERC: RACF Successful Logins

NERC: Sensors Generating Alerts

NERC: Sensors Generating Alerts - Cisco IOS

NERC: Sensors Generating Alerts - ISS SiteProtector

NERC: Sensors Generating Alerts - SiteProtector

NERC: Sensors Generating Alerts - Sourcefire Defense Center

NERC: Successful Logins

NERC: Sybase ASE Failed Logins

NERC: Sybase ASE Successful Logins

NERC: Symantec Endpoint Protection Password Changes

NERC: TIBCO ActiveMatrix Administrator Failed Logins

NERC: TIBCO ActiveMatrix Administrator Permission Changes

NERC: TIBCO ActiveMatrix Administrator Successful Logins

NERC: TIBCO Administrator Password Changes

NERC: TIBCO Administrator Permission Changes

NERC: Unauthorized Logins

NERC: vCenter Change Attributes

NERC: vCenter Data Move

NERC: vCenter Datastore Events

CIP-005-1 R3 The Responsible Entity shall implement and document an electronic or manual process(es) for monitoring and logging access at access points to the Electronic Security Perimeter(s) twenty-four hours a day, seven days a week Compliance Suite Reports (Cont.)

NERC: vCenter Failed Logins

NERC: vCenter Modify Firewall Policy

NERC: vCenter Orchestrator Change Attributes

NERC: vCenter Orchestrator Datastore Events

NERC: vCenter Orchestrator Data Move

NERC: vCenter Orchestrator Failed Logins

NERC: vCenter Orchestrator Virtual Machine Created

NERC: vCenter Orchestrator Virtual Machine Deleted

NERC: vCenter Orchestrator Virtual Machine Shutdown

NERC: vCenter Orchestrator Virtual Machine Started

NERC: vCenter Orchestrator vSwitch Added, Changed or Removed

NERC: vCenter Resource Usage Change

NERC: vCenter Shutdown or Restart of ESX Server

NERC: vCenter Successful Logins

NERC: vCenter User Permission Change

NERC: vCenter Virtual Machine Created

NERC: vCenter Virtual Machine Deleted

NERC: vCenter Virtual Machine Shutdown

NERC: vCenter Virtual Machine Started

NERC: vCenter vSwitch Added, Changed or Removed

NERC: vCloud Failed Logins

NERC: vCloud Organization Created

NERC: vCloud Organization Deleted

NERC: vCloud Organization Modified

NERC: vCloud Successful Logins

NERC: vCloud vApp Created, Modified, or Deleted

NERC: vCloud vDC Created, Modified, or Deleted

NERC: VPN Sessions by Destination IPs

NERC: VPN Sessions by Source IPs

NERC: VPN Sessions by Users

NERC: vShield Edge Configuration Changes

Compliance Suite Alerts

NERC: Accounts Enabled

NERC: Accounts Locked

CIP-005-1 R3 The Responsible Entity shall implement and document an electronic or manual process(es) for monitoring and logging access at access points to the Electronic Security Perimeter(s) twenty-four hours a day, seven days a week Compliance Suite Alerts (Cont.)

NERC: Active Directory Changes

NERC: Allowed Connections

NERC: Cisco ISE, ACS Passwords Changed

NERC: Cisco PIX, ASA, FWSM Commands Executed

NERC: System Restarted

NERC: Cisco PIX, ASA, FWSM Failover Errors

NERC: Cisco PIX, ASA, FWSM Failover Performed

NERC: Cisco PIX, ASA, FWSM Fragment Database Limit

NERC: Cisco PIX, ASA, FWSM Logon Failure

NERC: Cisco PIX, ASA, FWSM Logon Success

NERC: Cisco PIX, ASA, FWSM NAT Failure

NERC: Cisco PIX, ASA, FWSM Policy Changed

NERC: Cisco PIX, ASA, FWSM Protocol Failure

NERC: Cisco PIX, ASA, FWSM Routing Failure

NERC: Cisco PIX, ASA, FWSM Shun Added

NERC: Cisco PIX, ASA, FWSM Shun Deleted

NERC: Cisco PIX, ASA, FWSM VPN Tunnel Creation

NERC: Cisco PIX, ASA, FWSM VPN Tunnel Teardown

NERC: Cisco Switch Card Insert

NERC: Cisco Switch Device Reload

NERC: Cisco Switch Device Restart

NERC: Cisco Switch HA Failure (ver)

NERC: Cisco Switch Interface Change

NERC: Cisco Switch Interface Down

NERC: Cisco Switch Interface Up

NERC: Cisco Switch Policy Changed

NERC: Disallowed Services

NERC: DNS Server Shutdown

NERC: DNS Server Started

NERC: Excessive IDS Attack

NERC: Groups Created

CIP-005-1 R3 The Responsible Entity shall implement and document an electronic or manual process(es) for monitoring and logging access at access points to the Electronic Security Perimeter(s) twenty-four hours a day, seven days a week Compliance Suite Alerts (Cont.)

NERC: Groups Deleted

NERC: Groups Modified

NERC: Group Members Added

NERC: Group Members Deleted

NERC: Guardium SQL Guard Logins

NERC: HP NonStop Audit Permission Changed

NERC: IBM AIX Password Changed

NERC: Juniper Firewall HA State Change

NERC: Juniper Firewall Logon Failure

NERC: Juniper Firewall Logon Success

NERC: Juniper Firewall Peer Missing

NERC: Juniper Firewall Policy Changes

NERC: Juniper Firewall Policy Out of Sync

NERC: Juniper Firewall System Reset

NERC: Logins Failed

NERC: Logins Succeeded

NERC: LogLogic DSM Logins

NERC: LogLogic File Retrieval Errors

NERC: LogLogic Management Center Passwords Changed

NERC: LogLogic Message Routing Errors

NERC: Microsoft Operations Manager - Permissions Changed

NERC: Microsoft Operations Manager - Windows Passwords Changed

NERC: Microsoft Operations Manager - Windows Policies Changed

NERC: Microsoft Operations Manager - Windows Server Restarted

NERC: Microsoft Sharepoint Content Deleted

NERC: Microsoft Sharepoint Content Updated

NERC: Microsoft Sharepoint Permission Changed

NERC: Microsoft Sharepoint Policies Added, Removed, Modified

CIP-005-1 R3 The Responsible Entity shall implement and document an electronic or manual process(es) for monitoring and logging access at access points to the Electronic Security Perimeter(s) twenty-four hours a day, seven days a week. Compliance Suite Alerts (Cont.)

NERC: Neoteris Files Accessed

NERC: NetApp Authentication Failure

NERC: NetApp Bad File Handle

NERC: NetApp Bootblock Update

NERC: NetApp Filer Audit Policies Changed

NERC: NetApp Filer Disk Failure

NERC: NetApp Filer Disk Missing

NERC: NetApp Filer Disk Scrub Suspended

NERC: NetApp Filer File System Full

NERC: NetApp Filer NIS Group Update

NERC: NetApp Filer Disk Inserted

NERC: NetApp Filer Disk Pulled

NERC: NetApp Filer Snapshot Error

NERC: NetApp Filer Unauthorized Mounting

NERC: Policy Violation

NERC: RACF Files Accessed

NERC: RACF Passwords Changed

NERC: RACF Permissions Changed

NERC: Symantec Endpoint Protection Policy Add, Delete, Modify

NERC: System Anomalies

NERC: TIBCO ActiveMatrix Administrator Permission Changed

NERC: UNIX Groups Added

NERC: UNIX Groups Deleted

NERC: UNIX Groups Modified

NERC: UNIX Privilege Escalated

NERC: vCenter Create Virtual Machine

NERC: vCenter Data Move

NERC: vCenter Datastore Event

NERC: vCenter Delete Virtual Machine

NERC: vCenter Firewall Policy Change

NERC: vCenter Orchestrator Data Move

NERC: vCenter Orchestrator Datastore Events

CIP-005-1 R3 The Responsible Entity shall implement and document an electronic or manual process(es) for monitoring and logging access at access points to the Electronic Security Perimeter(s) twenty-four hours a day, seven days a week. Compliance Suite Alerts (Cont.)

NERC: vCenter Orchestrator Create Virtual Machine

NERC: vCenter Orchestrator Delete Virtual Machine

NERC: vCenter Orchestrator Login Failed

NERC: vCenter Orchestrator Virtual Machine Shutdown

NERC: vCenter Orchestrator Virtual Machine Started

NERC: vCenter Orchestrator vSwitch Add, Modify or Delete

NERC: vCenter Permission Change

NERC: vCenter Shutdown or Restart ESX

NERC: vCenter User Login Failed

NERC: vCenter User Login Successful

NERC: vCenter Virtual Machine Shutdown

NERC: vCenter Virtual Machine Started

NERC: vCenter vSwitch Add, Modify or Delete

NERC: vCloud Director Login Failed

NERC: vCloud Director Login Success

NERC: vCloud Organization Created

NERC: vCloud Organization Deleted

NERC: vCloud Organization Modified

NERC: vCloud User Created

NERC: vCloud User, Group, or Role Modified

NERC: vCloud vApp Created, Deleted, or Modified

NERC: vCloud vDC Created, Modified, or Deleted

NERC: vShield Edge Configuration Change

NERC: Windows Audit Log Cleared

NERC: Windows Files Accessed

NERC: Windows Group Members Added

NERC: Windows Group Members Deleted

NERC: Windows Groups Created

NERC: Windows Groups Deleted

NERC: Windows Groups Modified

NERC: Windows Passwords Changed

NERC: Windows Permissions Changed

NERC: Windows Policies Changed

NERC: Windows Privileges Escalated

NERC: System Restarted

CIP-005-1 R3.1 For dial-up accessible Critical Cyber Assets that use non-routable protocols, the Responsible Entity shall implement and document monitoring process(es) at each access point to the dial-up device, where technically feasible. Compliance Suite Reports

NERC: VPN Sessions by Destination IPs

NERC: VPN Sessions by Source IPs

NERC: VPN Sessions by Users

Compliance Suite Alerts

None

CIP-005-1 R3.2 Where technically feasible, the security monitoring process(es) shall detect and alert for attempts at or actual unauthorized accesses. These alerts shall provide for appropriate notification to designated response personnel. Where alerting is not technically feasible, the Responsible Entity shall review or otherwise assess access logs for attempts at or actual unauthorized accesses at least every ninety calendar days. Compliance Suite Reports

NERC: Denied Connections by IP Addresses

NERC: Denied Connections - Cisco IOS

NERC: Denied Connections - Cisco NXOS

NERC: Denied Connections - Cisco Router

NERC: Denied Connections - F5 BIG-IP TMOS

NERC: Denied Connections - Sidewinder

NERC: Denied Connections - VMware vShield

NERC: Denied Inbound Connections - Check Point

NERC: Denied Inbound Connections - Cisco ASA

NERC: Denied Inbound Connections - Cisco FWSM

NERC: Denied Inbound Connections - Cisco PIX

NERC: Denied Inbound Connections - Juniper Firewall

NERC: Denied Outbound Connections - Check Point

NERC: Denied Outbound Connections - Cisco ASA

NERC: Denied Outbound Connections - Cisco FWSM

NERC: Denied Outbound Connections - Cisco PIX

NERC: Denied Outbound Connections - Juniper Firewall

NERC: DHCP Activities on Microsoft DHCP

NERC: DHCP Activities on VMware vShield

NERC: Unauthorized Logins

NERC: VPN Denied Connections by Users

Compliance Suite Alerts

None

CIP-005-1 R1.4 The Responsible Entity shall perform a cyber vulnerability assessment of the electronic access points to the Electronic Security Perimeter(s) at least annually. LogLogic solution can assist with the vulnerability assessment by providing a report on the access points and ports that are available for services. Compliance Suite Reports

NERC: DHCP Activities on Microsoft DHCP

NERC: DHCP Activities on VMware vShield

CIP-005-1 R4.2 A review to verify that only ports and services required for operations at these access points are enabled. Compliance Suite Reports

NERC: Allowed URLs by Source IPs

NERC: Allowed URLs by Source IPs - F5 BIG-IP TMOS

NERC: Allowed URLs by Source IPs - Microsoft IIS

NERC: Allowed URLs by Source Users

NERC: Allowed URLs by Source Users - F5 BIG-IP TMOS

NERC: Allowed URLs by Source Users - Microsoft IIS

NERC: Blocked URLs by Source IPs

NERC: Blocked URLs by Source IPs - F5 BIG-IP TMOS

NERC: Blocked URLs by Source IPs - Microsoft IIS

NERC: Blocked URLs by Source Users

NERC: Blocked URLs by Source Users - F5 BIG-IP TMOS

NERC: Blocked URLs by Source Users - Microsoft IIS

NERC: Ports Denied Access - Check Point

NERC: Ports Denied Access - Cisco ASA

NERC: Ports Denied Access - Cisco FWSM

NERC: Ports Denied Access - Cisco IOS

NERC: Ports Denied Access - Cisco PIX

NERC: Ports Denied Access - Cisco Router

NERC: Ports Denied Access - F5 BIG-IP TMOS

NERC: Ports Denied Access - Fortinet

NERC: Ports Denied Access - Juniper Firewall

NERC: Ports Denied Access - Juniper JunOS

NERC: Ports Denied Access - Juniper RT Flow

NERC: Ports Denied Access - Nortel

NERC: Ports Denied Access - PANOS

NERC: Ports Denied Access - Sidewinder

NERC: Ports Denied Access - VMware vShield

Compliance Suite Alerts

None

CIP-005-1 R4.4 A review of controls for default accounts, passwords, and network management community strings. Compliance Suite Reports

NERC: Juniper Firewall Reset Accepted

NERC: Juniper Firewall Reset Imminent

NERC: i5/OS Restore Events

NERC: LogLogic Management Center Restore Activities

Compliance Suite Alerts

None

CIP-005-1 R5 Documentation Review and Maintenance — The Responsible Entity shall review, update, and maintain all documentation to support compliance with the requirements of Standard CIP-005. N/A
CIP-005-1 R5.3 The Responsible Entity shall retain electronic access logs for at least ninety calendar days. Logs related to reportable incidents shall be kept in accordance with the requirements of Standard CIP-008. Compliance Suite Reports

NERC: VPN Users Accessing Corporate Network

Compliance Suite Alerts

None

CIP-006-1
CIP-006-1 R4 Logging shall record sufficient information to uniquely identify individuals and the time of access twenty-four hours a day, seven days a week. The Responsible Entity shall implement and document the technical and procedural mechanisms for logging physical entry at all access points to the Physical Security Perimeter(s) using computerized logging as one of the methods. N/A
CIP-006-1 R5 Access log retention for at least 90 days. N/A
CIP-007
CIP-007 R4 Use anti-virus software and other malware prevention tools, where technically feasible, to detect, prevent, deter, and mitigate the introduction, exposure, and propagation of malware on all cyber assets within the Electronic Security Perimeter(s). Compliance Suite Reports

NERC: Attackers by Service - FireEye MPS

NERC: Attackers by Signature - FireEye MPS

NERC: Cisco ESA: Attacks by Event ID

NERC: Cisco ESA: Attacks Detected

NERC: Cisco ESA: Attacks by Threat Name

NERC: Cisco ESA: Scans

NERC: Cisco ESA: Updated

NERC: FireEye MPS: Attacks by Event ID

NERC: FireEye MPS: Attacks by Threat Name

NERC: FireEye MPS: Attacks Detected

NERC: FortiOS: Attacks Detected

NERC: FortiOS: Attacks by Event ID

NERC: FortiOS: Attacks by Threat Name

NERC: FortiOS DLP Attacks Detected

NERC: McAfee AntiVirus: Attacks Detected

NERC: McAfee AntiVirus: Attacks by Event ID

NERC: McAfee AntiVirus: Attacks by Threat Name

NERC: PANOS: Attacks by Event ID

NERC: PANOS: Attacks by Threat Name

NERC: PANOS: Attacks Detected

NERC: Symantec AntiVirus: Attacks by Event ID

NERC: Symantec AntiVirus: Attacks by Threat Name

NERC: Symantec AntiVirus: Attacks Detected

NERC: Symantec AntiVirus: Scans

NERC: Symantec AntiVirus: Updated

NERC: Symantec Endpoint Protection: Attacks Detected

NERC: Symantec Endpoint Protection: Attacks by Threat Name

NERC: Symantec Endpoint Protection: Scans

NERC: Symantec Endpoint Protection: Updated

NERC: TrendMicro Control Manager: Attacks Detected

NERC: TrendMicro Control Manager: Attacks Detected by Threat Name

CIP-007-5 R1.1 Where technically feasible, enable only logical network accessible ports that have been determined to be needed by the Responsible Entity, including port ranges or services where needed to handle dynamic ports. Compliance Suite Reports

NERC: Ports Allowed Access - Check Point

NERC: Ports Allowed Access - Cisco ASA

NERC: Ports Allowed Access - Cisco FWSM

NERC: Ports Allowed Access - Cisco IOS

NERC: Ports Allowed Access - Cisco Netflow

NERC: Ports Allowed Access - Cisco PIX

NERC: Ports Allowed Access - F5 BIG-IP TMOS

NERC: Ports Allowed Access - Fortinet

NERC: Ports Allowed Access - Juniper Firewall

NERC: Ports Allowed Access - Juniper JunOS

NERC: Ports Allowed Access - Juniper RT Flow

NERC: Ports Allowed Access - Nortel

NERC: Ports Allowed Access - PANOS

NERC: Ports Allowed Access - Sidewinder

NERC: Ports Allowed Access - VMware vShield

CIP-007-5 R1.2 Protect against the use of unnecessary physical input/output ports used for network connectivity, console commands, or removable media. Compliance Suite Reports

NERC: Ports Denied Access - Check Point

NERC: Ports Denied Access - Cisco ASA

NERC: Ports Denied Access - Cisco FWSM

NERC: Ports Denied Access - Cisco IOS

NERC: Ports Denied Access - Cisco Router

NERC: Ports Denied Access - Cisco PIX

NERC: Ports Denied Access - F5 BIG-IP TMOS

NERC: Ports Denied Access - Fortinet

NERC: Ports Denied Access - Juniper Firewall

NERC: Ports Denied Access - Juniper JunOS

NERC: Ports Denied Access - Juniper RT Flow

NERC: Ports Denied Access - Nortel

NERC: Ports Denied Access - PANOS

NERC: Ports Denied Access - Sidewinder

NERC: Ports Denied Access - VMware vShield

CIP-007-5 R2 Document and implement a security patch management program for tracking, evaluating, testing, and installing applicable cyber security software patches for all Cyber Assets in the Electronic Security Perimeters. Compliance Suite Reports

NERC: Cisco ESA: Updated

NERC: Symantec AntiVirus: Updated

NERC: Symantec Endpoint Protection: Updated

CIP-007-5 R2.1 Document and implement a security patch management program for tracking, evaluating, testing, and installing applicable cyber security software patches for all Cyber Assets in the Electronic Security Perimeters. Compliance Suite Reports

NERC: vCenter Restart ESX Services

Compliance Suite Alerts

NERC: vCenter Restart ESX Services

CIP-007-5 R3 Use anti-virus software and other malware prevention tools, where technically feasible, to detect, prevent, deter, and mitigate the introduction, exposure, and propagation of malware on all cyber assets in the Electronic Security Perimeters. Compliance Suite Reports

NERC: Administrator Logins on Windows Servers

NERC: Cisco ESA: Attacks by Event ID

NERC: Cisco ESA: Attacks Detected

NERC: Cisco ESA: Attacks by Threat Name

NERC: Cisco ESA: Scans

NERC: Cisco ESA: Updated

NERC: DB2 Database Failed Logins

NERC: DB2 Database Successful Logins

NERC: ESX Failed Logins

NERC: ESX Logins Failed Unknown User

NERC: ESX Logins Succeeded

NERC: F5 BIG-IP TMOS Login Failed

NERC: F5 BIG-IP TMOS Login Successful

NERC: Failed Logins

NERC: Files Accessed on Servers

NERC: Files Accessed on NetApp Filer Audit

NERC: Files Accessed through Juniper SSL VPN (Secure Access)

NERC: Files Accessed through PANOS

NERC: Files Downloaded via Proxy

NERC: Files Downloaded via Proxy - Blue Coat Proxy

NERC: Files Downloaded via Proxy - Cisco WSA

NERC: Files Downloaded via Proxy - Microsoft IIS

NERC: Files Downloaded via the Web

NERC: Files Downloaded via the Web - F5 BIG-IP TMOS

NERC: Files Downloaded via the Web - Microsoft IIS

NERC: Files Uploaded via Proxy

NERC: Files Uploaded via Proxy - Blue Coat Proxy

NERC: Files Uploaded via Proxy - Cisco WSA

NERC: Files Uploaded via the Web - F5 BIG-IP TMOS

NERC: Files Uploaded via Proxy - Microsoft IIS

NERC: Files Uploaded via the Web - Microsoft IIS

NERC: Files Uploaded via the Web

NERC: FireEye MPS: Attackers by Service

NERC: FireEye MPS: Attackers by Signature

NERC: FireEye MPS: Attacks by Event ID

NERC: FireEye MPS: Attacks by Threat Name

NERC: FireEye MPS: Attacks Detected

NERC: Files Accessed Through Pulse Connect Secure

CIP-007-5 R3 Use anti-virus software and other malware prevention tools, where technically feasible, to detect, prevent, deter, and mitigate the introduction, exposure, and propagation of malware on all cyber assets in the Electronic Security Perimeters. Compliance Suite Reports (Cont.)

NERC: FortiOS: Attacks Detected

NERC: FortiOS: Attacks by Event ID

NERC: FortiOS: Attacks by Threat Name

NERC: FortiOS DLP Attacks Detected

NERC: Guardium SQL Guard Audit Logins

NERC: Guardium SQL Guard Logins

NERC: HP NonStop Audit Login Failed

NERC: HP NonStop Audit Login Successful

NERC: i5/OS Access Control List Modifications

NERC: Last Activities Performed by Administrators

NERC: Last Activities Performed by All Users

NERC: Logins by Authentication Type

NERC: LogLogic DSM Logins

NERC: LogLogic Management Center Login

NERC: McAfee AntiVirus: Attacks Detected

NERC: McAfee AntiVirus: Attacks by Event ID

NERC: McAfee AntiVirus: Attacks by Threat Name

NERC: Microsoft Sharepoint Content Updates

NERC: Microsoft SQL Server Database Failed Logins

NERC: Microsoft SQL Server Database Successful Logins

NERC: NetApp Filer Audit Login Failed

NERC: NetApp Filer Audit Login Successful

NERC: NetApp Filer File Activity

NERC: NetApp Filer Login Failed

NERC: NetApp Filer Login Successful

NERC: Oracle Database Failed Logins

NERC: Oracle Database Successful Logins

NERC: PANOS: Attacks by Event ID

NERC: PANOS: Attacks by Threat Name

NERC: PANOS: Attacks Detected

NERC: RACF Failed Logins

NERC: RACF Files Accessed

NERC: RACF Successful Logins

NERC: Root Logins

CIP-007-5 R3 Use anti-virus software and other malware prevention tools, where technically feasible, to detect, prevent, deter, and mitigate the introduction, exposure, and propagation of malware on all cyber assets in the Electronic Security Perimeters. Compliance Suite Reports (Cont.)

NERC: Successful Logins

NERC: Sybase ASE Failed Logins

NERC: Sybase ASE Successful Logins

NERC: Symantec AntiVirus: Attacks by Event ID

NERC: Symantec AntiVirus: Attacks by Threat Name

NERC: Symantec AntiVirus: Attacks Detected

NERC: Symantec AntiVirus: Scans

NERC: Symantec AntiVirus: Updated

NERC: Symantec Endpoint Protection: Attacks Detected

NERC: Symantec Endpoint Protection: Attacks by Threat Name

NERC: Symantec Endpoint Protection: Scans

NERC: Symantec Endpoint Protection: Updated

NERC: TIBCO ActiveMatrix Administrator Failed Logins

NERC: TIBCO ActiveMatrix Administrator Successful Logins

NERC: TrendMicro Control Manager: Attacks Detected

NERC: TrendMicro Control Manager: Attacks Detected by Threat Name

NERC: TrendMicro OfficeScan: Attacks Detected

NERC: TrendMicro OfficeScan: Attacks Detected by Threat Name

NERC: Unencrypted Logins

NERC: vCenter Failed Logins

NERC: vCenter Orchestrator Failed Logins

NERC: vCenter Successful Logins

NERC: vCloud Failed Logins

NERC: vCloud Successful Logins

NERC: VPN Connections by Users

NERC: Web Access from All Users

CIP-007-5 R3 Use anti-virus software and other malware prevention tools, where technically feasible, to detect, prevent, deter, and mitigate the introduction, exposure, and propagation of malware on all cyber assets in the Electronic Security Perimeters. Compliance Suite Reports (Cont.)

NERC: Web Access from All Users - Fortinet

NERC: Web Access from All Users - F5 BIG-IP TMOS

NERC: Web Access from All Users - Microsoft IIS

NERC: Web Access from All Users - PANOS

NERC: Web Access to Applications - Fortinet

NERC: Web Access to Applications - F5 BIG-IP TMOS

NERC: Web Access to Applications - Microsoft IIS

NERC: Web Access to Applications - PANOS

NERC: Web Access to Applications

CIP-007-5 R3 Use anti-virus software and other malware prevention tools, where technically feasible, to detect, prevent, deter, and mitigate the introduction, exposure, and propagation of malware on all cyber assets in the Electronic Security Perimeters. Compliance Suite Alerts

NERC: Cisco PIX, ASA, FWSM Logon Failure

NERC: Guardium SQL Guard Logins

NERC: Juniper Firewall Logon Failure

NERC: Logins Failed

NERC: Logins Succeeded

NERC: LogLogic DSM Logins

NERC: Microsoft SharePoint Content Updated

NERC: vCenter User Login Failed

NERC: vCenter User Login Successful

NERC: vCenter Orchestrator Login Failed

NERC: vCloud Director Login Failed

NERC: vCloud Director Login Success

CIP-007 R5 Establish, implement, and document technical and procedural controls that enforce access authentication of, and accountability for, all user activity and that minimize the risk of unauthorized system access. Compliance Suite Reports

NERC: Administrator Logins on Windows Servers

NERC: DB2 Database Failed Logins

NERC: DB2 Database Successful Logins

NERC: ESX Failed Logins

NERC: ESX Logins Failed Unknown User

NERC: ESX Logins Succeeded

NERC: F5 BIG-IP TMOS Login Failed

NERC: F5 BIG-IP TMOS Login Successful

NERC: Failed Logins

NERC: Files Accessed on Servers

NERC: Files Accessed on NetApp Filer Audit

NERC: Files Accessed through Juniper SSL VPN (Secure Access)

NERC: Files Accessed through PANOS

NERC: Files Accessed Through Pulse Connect Secure

NERC: Files Downloaded via Proxy

NERC: Files Downloaded via Proxy - Blue Coat Proxy

NERC: Files Downloaded via Proxy - Cisco WSA

NERC: Files Downloaded via Proxy - Microsoft IIS

NERC: Files Downloaded via the Web

NERC: Files Downloaded via the Web - F5 BIG-IP TMOS

NERC: Files Downloaded via the Web - Microsoft IIS

NERC: Files Uploaded via Proxy

NERC: Files Uploaded via Proxy - Blue Coat Proxy

NERC: Files Uploaded via Proxy - Cisco WSA

NERC: Files Uploaded via Proxy - Microsoft IIS

NERC: Files Uploaded via the Web

NERC: Files Uploaded via the Web - F5 BIG-IP TMOS

NERC: Files Uploaded via the Web - Microsoft IIS

NERC: Guardium SQL Guard Audit Logins

NERC: Guardium SQL Guard Logins

NERC: HP NonStop Audit Login Failed

NERC: HP NonStop Audit Login Successful

NERC: i5/OS Access Control List Modifications

CIP-007 R5 Establish, implement, and document technical and procedural controls that enforce access authentication of, and accountability for, all user activity and that minimize the risk of unauthorized system access. Compliance Suite Reports (Cont.)

NERC: Last Activities Performed by Administrators

NERC: Last Activities Performed by All Users

NERC: Logins by Authentication Type

NERC: LogLogic DSM Logins

NERC: LogLogic Management Center Login

NERC: Microsoft SQL Server Database Failed Logins

NERC: Microsoft SQL Server Database Successful Logins

NERC: NetApp Filer Audit Login Failed

NERC: NetApp Filer Audit Login Successful

NERC: NetApp Filer File Activity

NERC: NetApp Filer Login Failed

NERC: NetApp Filer Login Successful

NERC: Oracle Database Failed Logins

NERC: Oracle Database Successful Logins

NERC: RACF Failed Logins

NERC: RACF Files Accessed

NERC: RACF Successful Logins

NERC: Root Logins

NERC: Successful Logins

NERC: Sybase ASE Failed Logins

NERC: Sybase ASE Successful Logins

NERC: TIBCO ActiveMatrix Administrator Failed Logins

NERC: TIBCO ActiveMatrix Administrator Successful Logins

NERC: Unauthorized Logins

NERC: Unencrypted Logins

NERC: Users Using the Proxies

NERC: Users Using the Proxies - Blue Coat Proxy

NERC: Users Using the Proxies - Cisco WSA

NERC: Users Using the Proxies - Microsoft IIS

CIP-007 R5 Establish, implement, and document technical and procedural controls that enforce access authentication of, and accountability for, all user activity and that minimize the risk of unauthorized system access. Compliance Suite Reports (Cont.)

NERC: vCenter Failed Logins

NERC: vCenter Orchestrator Failed Logins

NERC: vCloud Failed Logins

NERC: vCenter Successful Logins

NERC: vCloud Successful Logins

NERC: VPN Connections by Users

NERC: Web Access from All Users

NERC: Web Access from All Users - F5 BIG-IP TMOS

NERC: Web Access from All Users - Fortinet

NERC: Web Access from All Users - Microsoft IIS

NERC: Web Access from All Users - PANOS

NERC: Web Access to Applications - Fortinet

NERC: Web Access to Applications - F5 BIG-IP TMOS

NERC: Web Access to Applications - Microsoft IIS

NERC: Web Access to Applications - PANOS

NERC: Web Access to Applications

CIP-007 R5 Establish, implement, and document technical and procedural controls that enforce access authentication of, and accountability for, all user activity and that minimize the risk of unauthorized system access. Compliance Suite Alerts

NERC: Cisco PIX, ASA, FWSM Logon Failure

NERC: Guardium SQL Guard Logins

NERC: Juniper Firewall Logon Failure

NERC: Logins Failed

NERC: Logins Succeeded

NERC: LogLogic DSM Logins

NERC: vCenter User Login Failed

NERC: vCenter User Login Successful

NERC: vCenter Orchestrator Login Failed

NERC: vCloud Director Login Failed

NERC: vCloud Director Login Success

CIP-007 R5.1.1 Ensure that user accounts are implemented as approved by designated personnel as specified in CIP-003 Requirement 5. Compliance Suite Reports

NERC: Account Activities on UNIX Servers

NERC: Account Activities on Windows Servers

NERC: Accounts Changed on NetApp Filer

NERC: Accounts Changed on TIBCO Administrator

NERC: Accounts Changed on TIBCO ActiveMatrix Administrator

NERC: Accounts Changed on UNIX Servers

NERC: Accounts Changed on Windows Servers

NERC: Accounts Created on NetApp Filer

NERC: Accounts Created on NetApp Filer Audit

NERC: Accounts Created on Sidewinder

NERC: Accounts Created on Symantec Endpoint Protection

NERC: Accounts Created on TIBCO Administrator

NERC: Accounts Created on TIBCO ActiveMatrix Administrator

NERC: Accounts Created on UNIX Servers

NERC: Accounts Created on Windows Servers

NERC: Accounts Deleted on NetApp Filer

NERC: Accounts Deleted on NetApp Filer Audit

NERC: Accounts Deleted on Symantec Endpoint Protection

NERC: Accounts Deleted on TIBCO Administrator

NERC: Accounts Deleted on TIBCO ActiveMatrix Administrator

NERC: Accounts Deleted on Sidewinder

NERC: Accounts Deleted on UNIX Servers

NERC: Accounts Deleted on Windows Servers

NERC: Cisco ISE, ACS Accounts Created

NERC: Cisco ISE, ACS Accounts Removed

NERC: ESX Accounts Activities

NERC: ESX Accounts Created

NERC: ESX Accounts Deleted

NERC: LogLogic Management Center Account Activities

CIP-007 R5.1.1 Ensure that user accounts are implemented as approved by designated personnel as specified in CIP-003 Requirement 5. Compliance suite Reports (Cont.)

NERC: Microsoft Operations Manager - Windows Accounts Activities

NERC: Microsoft Operations Manager - Windows Accounts Changed

NERC: Microsoft Operations Manager - Windows Accounts Created

NERC: Microsoft Operations Manager - Windows Accounts Enabled

NERC: NetApp Filer Audit Accounts Enabled

NERC: NetApp Filer Audit Group Members Added

NERC: NetApp Filer Audit Group Members Deleted

NERC: RACF Accounts Created

NERC: RACF Accounts Deleted

NERC: RACF Accounts Modified

NERC: vCloud User Created

NERC: vCloud User Deleted or Removed

NERC: Windows Accounts Enabled

NERC: Windows Accounts Locked

NERC: Windows Group Members Added

NERC: Windows Group Members Deleted

Compliance Suite Alerts

NERC: Accounts Created

NERC: Accounts Deleted

NERC: Accounts Enabled

NERC: Accounts Locked

NERC: Accounts Modified

NERC: Group Members Added

NERC: Group Members Deleted

NERC: vCloud User Created

NERC: Windows Group Members Added

NERC: Windows Group Members Deleted

CIP-007 R5.1.2 / CIP-007-5 R4.1 Establish methods and procedures that generate logs of sufficient detail to create historical and audit trails to individual user account access activity for a minimum of 90 days. Compliance Suite Reports

NERC: Account Activities on UNIX Servers

NERC: Account Activities on Windows Servers

NERC: Bandwidth Usage by User

NERC: ESX Accounts Activities

NERC: ESX Group Activities

NERC: ESX Kernel log daemon terminating

NERC: ESX Kernel logging Stop

NERC: ESX Syslogd Restart

NERC: F5 BIG-IP TMOS Restarted

NERC: Group Activities on NetApp Filer Audit

NERC: Group Activities on Symantec Endpoint Protection

NERC: Group Activities on TIBCO ActiveMatrix Administrator

NERC: Group Activities on UNIX Servers

NERC: Group Activities on Windows Servers

NERC: LogLogic Management Center Account Activities

NERC: Microsoft Operations Manager - Windows Accounts Activities

NERC: Microsoft Operations Manager - Windows Events by Users

NERC: Users Created on Servers

NERC: Users Removed from Servers

NERC: Users Using the Proxies

NERC: Users Using the Proxies - Blue Coat Proxy

NERC: Users Using the Proxies - Cisco WSA

NERC: Users Using the Proxies - Microsoft IIS

NERC: vCenter Restart ESX Services

NERC: VPN Connections by Users

NERC: VPN Sessions by Users

NERC: VPN Users Accessing Corporate Network

NERC: Windows Events by Users

Compliance Suite Alerts

NERC: vCenter Restart ESX Services

CIP-007 R5.2 / CIP-007-5 R5.3 Implement a policy to minimize and manage the scope and acceptable use of admin, shared and other generic account privileges. Compliance Suite Reports

NERC: Accounts Changed on NetApp Filer

NERC: Accounts Changed on TIBCO Administrator

NERC: Accounts Changed on TIBCO ActiveMatrix Administrator

NERC: Accounts Changed on UNIX Servers

NERC: Accounts Changed on Windows Servers

NERC: Administrator Logins on Windows Servers

NERC: DB2 Database Successful Logins

NERC: Domain activities on Symantec Endpoint Protection

NERC: ESX Logins Succeeded

NERC: F5 BIG-IP TMOS Login Successful

NERC: Guardium SQL Guard Audit Logins

NERC: Guardium SQL Guard Logins

NERC: HP NonStop Audit Login Successful

NERC: HP NonStop Audit Permissions Changed

NERC: LogLogic DSM Logins

NERC: LogLogic Management Center Login

NERC: Microsoft Operations Manager - Windows Accounts Changed

NERC: Microsoft Operations Manager - Windows Permissions Modified

NERC: Microsoft Operations Manager - Windows Policies Modified

NERC: Microsoft Sharepoint Permissions Changed

NERC: Microsoft SQL Server Database Successful Logins

NERC: NetApp Filer Audit Group Members Added

NERC: NetApp Filer Audit Group Members Deleted

NERC: NetApp Filer Audit Login Successful

NERC: NetApp Filer Audit Policies Modified

NERC: NetApp Filer Login Successful

NERC: Oracle Database Successful Logins

NERC: Permissions Modified on Windows Servers

NERC: Policies Modified on Windows Servers

NERC: RACF Accounts Modified

CIP-007 R5.2 / CIP-007-5 R5.3 Implement a policy to minimize and manage the scope and acceptable use of admin, shared and other generic account privileges. Compliance Suite Reports (Cont.)

NERC: RACF Permissions Changed

NERC: RACF Successful Logins

NERC: Successful Logins

NERC: Sybase ASE Successful Logins

NERC: Symantec Endpoint Protection Policy Add, Remove, or Modify

NERC: TIBCO Administrator Permission Changes

NERC: TIBCO ActiveMatrix Administrator Permission Changes

NERC: TIBCO ActiveMatrix Administrator Successful Logins

NERC: Trusted Domain Created on Windows Servers

NERC: Trusted Domain Deleted on Windows Servers

NERC: vCenter Successful Logins

NERC: vCenter User Permission Change

NERC: vCloud Successful Logins

NERC: Windows Group Members Added

NERC: Windows Group Members Deleted

Compliance Suite Alerts

NERC: Accounts Modified

NERC: Guardium SQL Guard Logins

NERC: HP NonStop Audit Permission Changed

NERC: Logins Succeeded

NERC: LogLogic DSM Logins

NERC: Microsoft Operations Manager - Permissions Changed

NERC: Microsoft Operations Manager - Windows Policies Changed

NERC: Microsoft Sharepoint Permission Changed

NERC: NetApp Filer Audit Policies Changed

NERC: RACF Permissions Changed

NERC: TIBCO ActiveMatrix Administrator Permission Changed

CIP-007 R5.2 / CIP-007-5 R5.3 Implement a policy to minimize and manage the scope and acceptable use of admin, shared and other generic account privileges. Compliance Suite Reports (Cont.)

NERC: vCenter Permission Change

NERC: vCenter User Login Successful

NERC: vCloud Director Login Success

NERC: Windows Group Members Deleted

NERC: Windows Permissions Changed

NERC: Windows Policies Changed

CIP-007 R5.3.3 / CIP-007-5 R5.6 Each password shall be changed at least annually or more frequently based on risk. Compliance Suite Reports

NERC: Cisco ISE, ACS Password Changes

NERC: F5 BIG-IP TMOS Password Changes

NERC: i5/OS DST Password Reset

NERC: LogLogic Management Center Password Changes

NERC: Microsoft Operations Manager - Windows Password Changes

NERC: Microsoft SQL Server Password Changes

NERC: NetApp Filer Password Changes

NERC: Novell eDirectory Password Changes

NERC: Password Changes on Windows Servers

NERC: RACF Password Changed

NERC: Symantec Endpoint Protection Password Changes

NERC: TIBCO Administrator Password Changes

NERC: Unix Password Changes

Compliance Suite Alerts

NERC: Cisco ISE, ACS Passwords Changed

NERC: IBM AIX Password Changed

NERC: LogLogic Management Center Passwords Changed

NERC: Microsoft Operations Manager - Windows Passwords Changed

NERC: RACF Passwords Changed

NERC: Windows Passwords Changed

CIP-007 R6.2 / CIP-007-5 R4.2 The security monitoring controls shall issue automated or manual alerts for security incidents. Compliance Suite Reports

NERC: Attackers by Service

NERC: Attackers by Signature

NERC: Attackers by Service - Cisco IOS

NERC: Attackers by Service - ISS SiteProtector

NERC: Attackers by Service - SiteProtector

NERC: Attackers by Service - Sourcefire Defense Center

NERC: Attackers by Signature - Cisco IOS

NERC: Attackers by Signature - ISS SiteProtector

NERC: Attackers by Signature - SiteProtector

NERC: Attackers by Signature - Sourcefire Defense Center

NERC: Attacks Detected

NERC: Attacks Detected - Cisco IOS

NERC: Attacks Detected - HIPS

NERC: Attacks Detected - ISS SiteProtector

NERC: Attacks Detected - SiteProtector

NERC: Attackers Detected - Sourcefire Defense Center

NERC: FireEye MPS: Sensors Generating Alerts

Compliance Suite Alerts

NERC: Anomalous IDS Alerts

NERC: Sensors Generating Alerts - FireEye MPS

CIP-007 R6.5 / CIP-007-5 R4.4 Review logs of system events related to cyber security and maintain records documenting review of logs. Compliance Suite Reports

NERC: Periodic Review of Log Reports

NERC: Periodic Review of User Access Logs

Compliance Suite Alerts

None